53rd week of 2015 patent applcation highlights part 78 |
Patent application number | Title | Published |
20150381611 | METHOD AND NETWORK NODE FOR OBTAINING A PERMANENT IDENTITY OF AN AUTHENTICATING WIRELESS DEVICE - A network node, such as a Wi-Fi Access Point/Authenticator, is able to obtain a permanent device identity of a wireless device requesting authentication, in case the wireless device has only provided an alias. This is achieved by the network node intercepting an authentication message from the wireless device, wherein the authentication message includes a signaled identity of the wireless device, and extracts the signaled identity. In case the extracted identity is an alias and not a permanent identity of the wireless device, the network node responsively manipulates at least one further authentication message to cause the wireless device to signal its permanent identity in a subsequent authentication message. | 2015-12-31 |
20150381612 | Integrated Circuit Device That Includes A Secure Element And A Wireless Component For Transmitting Protected Data Over A Local Point-To-Point Wireless Communication Connection - An integrated circuit device that includes a wireless component and a secure element is herein disclosed and enabled. The integrated circuit device includes a protected memory area for storing protected data that is implemented to be not accessible by a user, but is accessible by a memory controller included in the integrated circuit device. The memory controller accesses the protected data with a combination of security operations that may include authentication, cryptography, decryption, and encryption. The integrated circuit device further includes a wireless interface for establishing a local point-to-point radio connection with wireless computing devices or readers for transmitting the protected data that is encrypted. The integrated circuit device functions as a security key by requiring the presence of the integrated circuit device when using the protected data. The wireless integrated circuit device can be included in, or embodied, as any wireless communication device, such as a smart card. | 2015-12-31 |
20150381613 | SMARTCARD BASED MULTIFACTOR BANKING AUTHENTICATION - A multifactor authentication (MFA) enforcement server provides multifactor authentication services to users and existing services. During registration, the MFA enforcement server changes a user's password on an existing service to a password unknown to the user. During normal usage when the user accesses the existing service through the MFA enforcement server, the MFA enforcement server enforces a multifactor authentication enforcement policy. | 2015-12-31 |
20150381614 | METHOD AND APPARATUS FOR UTILIZING BIOMETRICS FOR CONTENT SHARING - Disclosed is a method and apparatus for biometric based media data sharing. The method may include initiating, in a first device, biometric data capture of a user based, at least in part, on playback of media data by the first device. The method may also include determining that captured biometric data of the user does not correspond with biometric data associated with an authorized user of the first device. Furthermore, the method may also include in response to a failure to match the captured biometric data by the first device, establishing that the user is an authorized user of a second device based, at least in part, on the captured biometric data. The method may also include sharing the media data with the second device. | 2015-12-31 |
20150381615 | MANAGING USER DATA FOR SOFTWARE SERVICES - User-specific data for use with a software service may be stored in an encrypted form, where the encryption and/or decryption keys used are associated with a user's biometric data (that the user voluntarily provides after appropriate disclosure, to protect the user's interest in privacy). When the user uses the software service on a device, the device may receive the user-specific data in an encrypted form, and then may use the biometric data to retrieve or generate the cryptographic key that is used to decrypt the user-specific data. The user-specific data is then decrypted and used on the device with the software service. | 2015-12-31 |
20150381616 | SECRET DATA MATCHING DEVICE, COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM FOR UPDATING SECRET DATA, AND SECRET DATA UPDATING METHOD - A secret data matching device includes a memory unit for storing a first secret vector obtained by concealing a first data set and a key data using a determination matrix; an obtaining unit for obtaining a second secret vector by concealing a second data set using the determination matrix; a calculating unit for calculating a residue vector which is a residue when the determination matrix is a modulus, from a difference between the first and second secret vectors; a determination unit for determining whether the first and second data sets are approximate based on the residue vector; an extracting unit for extracting the key data from the residue vector when the first data set and the second data set are approximate; a creating unit for generating a third secret vector by combining the key data and the second secret vector; and a storing unit for storing the third secret vector. | 2015-12-31 |
20150381617 | ACTIVATING DISPLAY AND PERFORMING ADDITIONAL FUNCTION IN MOBILE TERMINAL WITH ONE-TIME USER INPUT - Disclosed is a mobile terminal including a touch screen display, a camera, a power button and an activation button for turning on the touch screen display. The mobile terminal has a first function and a second function to perform in response to user input and provides user settings for configuring at least one of the first and second functions such that the at least one of the first and second functions is performed along with turning on the touch screen display when pressing of the activation button is detected while the touch screen display is turned off. The mobile terminal is configured to perform the first and second functions depending upon length of pressing of the activation button in addition to turning on the touch screen display. | 2015-12-31 |
20150381618 | METHOD OF MUTUAL VERIFICATION BETWEEN A CLIENT AND A SERVER - A method of mutual verification between a client and a server is disclosed. The method comprises receiving a request via a telecommunication link, the request comprising an address of the server; receiving a verification data; decrypting the verification data with a private key of the server; identifying an account identity (ID) of the client from the decrypted verification data; generating a first logon token; generating a logon message comprising the first logon token and a uniform resource locator (URL) of the server; encrypting the logon message with a public key of the client; transmitting the logon message via the telecommunication link; receiving a logon request comprising the account ID and a second logon token; and determining whether the second logon token matches the first logon token. | 2015-12-31 |
20150381619 | METHODS AND APPARATUS FOR USING KEYS CONVEYED VIA PHYSICAL CONTACT - An example touch key system may include a master device, one or more carrier devices and protected devices, and a server. The master device may automatically detect a predefined trigger action. In response, the master device may automatically generate a carrier device credential and a corresponding cloud credential. The master device may then automatically send the cloud credential to the server. The master device may also automatically detect the carrier device in electrical communication with the master device. In response, the master device may automatically determine whether the carrier device credential from the key pair is intended for the carrier device. If so, the master device may automatically transfer the carrier device credential to the carrier device. The carrier device may use the carrier device credential to obtain access to the protected device. Other embodiments are described and claimed. | 2015-12-31 |
20150381620 | DIGITAL VERIFIED IDENTIFICATION SYSTEM AND METHOD - A digital verified identification system and method are presented for verifying and/or authenticating the identification of an entity associated with an electronic file, such as, for example the digital signatory thereof. In particular, the system and method include a module generating assembly structured to receive at least one verification data element, and at least one digital identification module structured to be associated with at least one entity. The digital identification module is capable of being disposed or embedded within at least one electronic file. Further, the digital Identification module with the entity, and one or more metadata identification module includes at least one primary components identification module includes at least one primary component structured to at least partially associate the digital. | 2015-12-31 |
20150381621 | Enterprise Authentication Via Third Party Authentication Support - Methods and systems are disclosed for providing approaches to enterprise authentication via third party authentication support. The methods and systems may include transmitting, by a computing device to an authentication device, a request to authenticate a client device application via a forms login protocol, and transmitting, by the computing device to the client device application, a first credential form retrieved from an authentication device generated by an extension device. The methods and systems may also include receiving, by the computing device from the client device application, a first authentication credential, and transmitting, by the computing device to the authentication service via the extension device, the first authentication credential. The methods and systems may also include transmitting, by the computing device and in response to a successful validation of the first authentication credential, an approval of the request made by the client device application to authenticate via the forms login protocol. | 2015-12-31 |
20150381622 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AUTHENTICATION APPARATUS, AND RECORDING MEDIUM - An authentication system includes a communications terminal, an authentication apparatus providing a function to the communications terminal using an access token, a first request part requesting the authentication apparatus to transmit client information for issuing the access token, a first transmitter generating the client information to be transmitted to the communications terminal in response to the request from the first request part, a second request part transmitting the client information to the authentication apparatus and requesting the authentication apparatus to provide the access token, a determination part determining whether the received client information is the client information transmitted from the first transmitter in response to the request from the second request part, a generator generating the access token when determining that the received client information is the client information transmitted from the first transmitter, and a second transmitter transmitting the generated access token to the communications terminal. | 2015-12-31 |
20150381623 | SUBSCRIBER MANAGEMENT USING A RESTFUL INTERFACE - A controller provides authentication, authorization, and accounting (AAA) services for a network, the controller comprising a control unit having one or more processors and a Representational State Transfer (REST) interface executed by the control unit to receive application data that specifies an interface method and a resource identifier for a resource, the resource identifier conforming to a subscriber management resource model. The REST interface determines, based on the resource identifier, a record for a subscriber management construct corresponding to the resource. The REST interface applies, to the record, an action corresponding to the interface method to modify access to the network by a subscriber. | 2015-12-31 |
20150381624 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR COMBATING DEVICE THEFT WITH USER NOTARIZATION - The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live. | 2015-12-31 |
20150381625 | SECURE MOBILE CLIENT WITH ASSERTIONS FOR ACCESS TO SERVICE PROVIDER APPLICATIONS - A Software-as-a-Service (SaaS) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more SaaS applications to access, and including an IDP identifier for the SaaS application. The SaaS access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions. A request, made by an application on the client device to a SaaS service provider identified by a Universal Resource Locator (URL) provided during configuration of the SaaS access control application, is intercepted within the network software stack of the client device. The SaaS access control application generates an assertion based on the certificate and configuration information. The requesting application is caused to make a request to the SaaS service provider with the assertion embedded in the request. | 2015-12-31 |
20150381626 | SYSTEMS AND METHODS FOR EFFICIENT DETECTION OF FINGERPRINTED DATA AND INFORMATION - The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository. | 2015-12-31 |
20150381627 | IDENTIFICATION OF PATTERNS IN STATEFUL TRANSACTIONS - A system for the identification of patterns in stateful transactions may include a message interceptor, a message pattern processor, a message handler, and a memory. The message interceptor may be operative to intercept messages transmitted by a first device over a network to a recipient. The message interceptor may be operative to intercept the messages before the messages are received by the recipient. The message pattern processor may be operative to add the message to a message pattern and store the message pattern in a memory. The message pattern processor may compare the message pattern to a plurality of exemplary message patterns and identify when the message pattern matches at least one of the exemplary message patterns. The message handler may be operative to determine an action to take with respect to the message based on the at least one matching exemplary message pattern identified by the message pattern processor. | 2015-12-31 |
20150381628 | SYSTEMS AND METHODS FOR SECURING SOCIAL MEDIA FOR USERS AND BUSINESSES AND REWARDING FOR ENHANCING SECURITY - The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed “social media.” Recent trends have shown that information posted to social media may cause tremendous damage to individuals and other entities. This includes information that was posted deliberately or unintentionally, including social security numbers, financial data and other sensitive information. Further, information that previously may have been viewed as innocuous, such as location data, has caused harm on certain occasions and may need to be protected. The disclosed system provides a novel method of screening, identifying, and preventing certain information from being posted on social media and other public locations. In addition, the disclosed system and method improves security by motivating people to use security software by offering rewards for its use. | 2015-12-31 |
20150381629 | Crowd Sourced Access Approvals - An approach is provided in which a crowd source access manager receives a user request from a requestor to access a resource and determines a set of candidate approvers of the resource. The crowd source access manager identifies a crowd sourced set of users corresponding to the requestor and identifies preferred approvers from the crowd sourced set of users that are also included in the set of candidate approvers. In turn, the crowd source access manager notifies the preferred approvers of the user request. | 2015-12-31 |
20150381630 | INFORMATION PROCESSING SYSTEM, ACCESS METHOD, AND TERMINAL DEVICE - An system comprises: a first storage that stores access destination information, characteristic information, and first identification information in a manner associated with one another; a transmitter that transmits a captured image of a medium; a first-acquiring-unit that extracts the characteristic information and acquires the access destination information and the first identification information associated with the characteristic information, access based on the access destination information being controlled by an authentication device comprising a second storage that stores second identification information allocated to each medium, third identification information corresponding to the first identification information, and collation information indicating an access source in a manner associated with one another; a second-acquiring-unit that acquires fourth identification information allocated to each medium from the captured image; and an access unit that transmits the first identification information, the fourth identification information, and the collation information when accessing an access destination indicated by the access destination information. | 2015-12-31 |
20150381631 | SENSORS FOR A RESOURCE - A system may include first sensor to monitor first information relating a volume of information searched by a user, a second sensor to monitor second information relating to a number of requests, made by the user, to access a resource, a third sensor to monitor third information relating to a number of requests, made by the user, from different geographic locations, and a device to receive the first information, the second information, and the third information, and process the first information, the second information, and the third information in connection with the resource. | 2015-12-31 |
20150381632 | Information Processing Method And Electronic Apparatus - The present application provides an information processing method and an electronic apparatus that can automatically adjust the electronic apparatus to an information inaccessible state, thus the information security is enhanced. The method includes the steps of when a current state of the electronic apparatus is an information accessible state, obtaining an information of at least one parameter for determining whether it is necessary to adjust the current state from the information accessible state to an information inaccessible state or not; determining whether the at least one parameter meets a first preset condition or not to obtain a first determination result; when the first determination result is YES, adjusting the current state of the electronic apparatus to the information inaccessible state. | 2015-12-31 |
20150381633 | AUTOMATED AUTHORIZATION RESPONSE TECHNIQUES - Techniques are disclosed relating to automating permission requests, e.g., in the context of multi-factor authentication. A mobile device may display an option to allow a user to automate responses to future permission requests to perform an action. The mobile device may automatically respond to subsequent permission requests based on at least one automation criterion. The action may include login, transaction approval, physical access, vehicle ignition, account recovery, etc. The automation criteria may include location, acceleration, velocity, wireless connectivity, proximity to another device, temperature, lighting, noise, time, biometrics, altitude, pressure, image characteristics, etc. Disclosed techniques may increase authorization security while reducing user interaction for multi-factor authentication, in some embodiments. | 2015-12-31 |
20150381634 | TRUSTED TIME SERVICE FOR OFFLINE MODE - Systems and methods for providing trusted time service for the off-line mode of operation of a processing system. An example processing system comprises: a first processing device communicatively coupled to a real-time clock, the first processing device to modify an epoch value associated with the real-time clock responsive to detecting a reset of the real-time clock; and a second processing device to execute, in a first trusted execution environment, a first application to receive, from the first processing device, a first time value outputted by the real-time clock and a first epoch value associated with the real-time clock. | 2015-12-31 |
20150381635 | Method and System for Analysis of Security Events in a Managed Computer Network - An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system. | 2015-12-31 |
20150381636 | SYSTEM AND METHOD FOR INTRUSION DETECTION AND SUPPRESSION IN A WIRELESS SERVER ENVIRONMENT - A system for data communications comprising a port scan detector configured to receive port access requests from a plurality of ports and to determine whether a port scan by a hostile device is in progress. A decoy port system configured to open a designated decoy port if the port scan detector determines that the port scan by a hostile device is in progress. A data packet hash manager configured to read a series of hash data fields in a corresponding series of data packets and to generate a flag if a sending device is not operating a hash increment system. An encapsulated artificial intelligence system configured to receive the flag and to monitor data communications from the sending device to determine whether the data communications are consistent with a levelling algorithm. An offensive code system configured to implant offensive code in the sending device and to control operation of the sending device if the sending device is the hostile device, if the sending device is not operating the has increment system and if the data communications are not consistent with the levelling algorithm. | 2015-12-31 |
20150381637 | SYSTEM AND METHODS FOR MALWARE DETECTION USING LOG BASED CROWDSOURCING ANALYSIS - A crowdsourcing log analysis system and methods for protecting computers and networks from malware attacks by analyzing data log information obtained from a plurality of client network. The client networks are associated with a set of network entities representing a plurality of business units or customers. The system may further comprise a plurality of server machines, each operable to execute a security product associated with a security product vendor and log associated information of at the network entities into at least one log file. The log files may be uploaded onto a breach detection platform for analysis based upon crowdsourcing principles and is operable to generate a risk factor attribute for at least one suspect entity. | 2015-12-31 |
20150381638 | System and Method for Identifying Unauthorized Activities on a Computer System using a Data Structure Model - A computer implemented method includes monitoring activity on the virtual machine. A plurality of activities being performed at the virtual machine is identified. Each of the activities includes an activity source, an activity target, and an association between the activity source and the activity target. The activity information is stored in the memory. The one or more of the activity sources, activity targets, and associations are transmitted to prevent future attacks. | 2015-12-31 |
20150381639 | SYSTEMS AND METHODS FOR CORRELATING AND DISTRIBUTING INTRUSION ALERT INFORMATION AMONG COLLABORATING COMPUTER SYSTEMS - Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads. | 2015-12-31 |
20150381640 | METHOD AND SYSTEM FOR PROTECTIVE DISTRIBUTION SYSTEM (PDS) AND INFRASTRUCTURE PROTECTION AND MANAGEMENT - A method and system for managing a protective distribution system is disclosed. In some embodiments, an information transmission line may be monitored. A disturbance on the information transmission line may be detected. The detected disturbance may not exceed a first preset threshold for triggering alerts of a first alert type based on detected disturbances. Responsive to the detection, a count for the number of disturbances within a preset time period that do not exceed the first preset threshold may be determined. A determination of whether the count, for the number of disturbances that do not exceed the first preset threshold, exceeds a second preset threshold may be effectuated. The second preset threshold may correspond to a preset number of allowable disturbances within the preset time period. An alert of the first alert type may be triggered responsive to a determination that the count exceeds the second preset threshold. | 2015-12-31 |
20150381641 | METHOD AND SYSTEM FOR EFFICIENT MANAGEMENT OF SECURITY THREATS IN A DISTRIBUTED COMPUTING ENVIRONMENT - A method and system for distributing security threat management of an instance of an application that is hosted from multiple geographic locations, according to one embodiment. The method and system include monitoring first operational characteristics of the instance of the application, and establishing an average for the first operational characteristics based at least partially on the first operational characteristics, according to one embodiment. The method and system include identifying a deviation from the average for the first operational characteristics that is more than a predetermined amount, according to one embodiment. The method and system include retrieving second operational characteristics for at least one other instance of the application and comparing the first operational characteristics to the second operational characteristics, according to one embodiment. The system and method include reporting an identification of a potential security threat, according to one embodiment. | 2015-12-31 |
20150381642 | ABNORMAL TRAFFIC DETECTION APPARATUS AND METHOD BASED ON MODBUS COMMUNICATION PATTERN LEARNING - An abnormal traffic detection apparatus and method based on Modbus communication pattern learning is provided. The abnormal traffic detection apparatus based on the Modbus communication pattern learning previously detects and responds to abnormal traffic on a Modbus/TCP protocol. According to the present invention, a communication service between control systems can be stably provided by previously detecting the abnormal traffic capable of interfering with a stable operation of the control system. Particularly, since the effective abnormal traffic on the Modbus/TCP protocol can be previously detected, security of the control system can be increased by rapid detection and response with respect to security threats on the Intranet of the control system, and availability can be secured. | 2015-12-31 |
20150381643 | APPARATUS AND METHOD FOR PROVIDING SAFETY LEVEL OF UNIFORM RESOURCE LOCATOR - A method and an electronic device for determining the reliability of a Uniform Resource Locator (URL) is provided. The method includes receiving a selection of a displayed URL, detecting a reliability of the selected URL, and providing a safety level of the URL based on the detected reliability. | 2015-12-31 |
20150381644 | APPARATUS AND METHOD FOR PREVENTING MALICIOUS CODE IN ELECTRONIC DEVICE - A method for preventing a malicious code in an electronic device according to various embodiments of the present disclosure includes: converting a suspicious operation code to a logging operation code, executing the converted logging operation code, and displaying predictive operation information to a display unit related to the logging operation code according to the result of execution. | 2015-12-31 |
20150381645 | Method, Device And System For Intercepting Web Address - Disclosed are a method, device and system for intercepting a web address. The method comprises: triggering an interception program pre-injected in a browser process; the interception program obtaining web address information of a network connection upon detecting a network connection operation, and determining whether the web address information is malicious web address information; and if the web address information is malicious web address information, the interception program instructing the browser process to stop accessing the malicious web address information. The present disclosure can interrupt a connection of a malicious URL in time. | 2015-12-31 |
20150381646 | ANOMALY DETECTION SYSTEM FOR ENTERPRISE NETWORK SECURITY - Anomaly detection is disclosed, including: determining a set of anomalous events associated with an enterprise network; and determining a path of interest based at least in part on at least a subset of the set of anomalous events. | 2015-12-31 |
20150381647 | GENERATING ROW-BASED AND COLUMN-BASED CHUNKS - In some examples, a set of events is received. A row-based chunk includes the set of events and metadata about the set of events is generated, and a column-based chunk that includes metadata about the set of events and, for each event in the set of events, a value of a first field of the multiple fields. The metadata about the set of events includes at least one of a minimum value or a maximum value of the first field over the events in the set of events. | 2015-12-31 |
20150381648 | ANOMALY DETECTION IN NETWORK-SITE METRICS USING PREDICTIVE MODELING - Methods and apparatus for anomaly detection in network-site metrics using predictive modeling are described. A method comprises obtaining time-series data for a given time range, wherein the time-series data comprises values for a network-site analytics metric for each of a plurality of sequential time steps across the given time range. The method includes generating a predictive model for the network-site analytics metric based on at least a segment of the time-series data. The method includes using the predictive model to predict an expected value range for the network-site analytics metric for a next time step after the segment and, based on the expected value range, determining whether an actual value for the network-site analytics metric for the next time step is an anomalous value. | 2015-12-31 |
20150381649 | Probabilistic Model For Cyber Risk Forecasting - A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network. | 2015-12-31 |
20150381650 | COMPUTER SYSTEM FOR DISTRIBUTED DISCOVERY OF VULNERABILITIES IN APPLICATIONS - In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer vulnerability research projects directed to identifying computer vulnerabilities of one or more networks and/or computers that are owned or operated by a third party; assessing reputation and skills of one or more of the researchers, and accepting a subset of the researchers who have a positive reputation and sufficient skills to perform the investigations of the computer vulnerabilities; assigning a particular computer vulnerability research project, relating to a particular network under test, to a particular researcher from among the subset of the researchers; using a computer that is logically interposed between the particular researcher and the particular network under test, monitoring communications between the particular researcher and the particular network under test, wherein the communications relate to attempting to identify a candidate security vulnerability of the particular network under test; validating a report of the candidate security vulnerability of the particular network under test that is received from the particular researcher; determining and providing an award to the particular researcher in response to successfully validating the report of the candidate security vulnerability of the particular network under test that is received from the particular researcher. | 2015-12-31 |
20150381651 | METHOD AND SYSTEM FOR SECURE DELIVERY OF INFORMATION TO COMPUTING ENVIRONMENTS - A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment. | 2015-12-31 |
20150381652 | DETECTION OF SCRIPTED ACTIVITY - Methods, systems, and computer program products for online content referral are provided. A computer-implemented method may include receiving a request from an application, issuing a challenge to the application to determine a capability of the application, analyzing a result of the challenge to associate the application with an application type, determining whether the activity performed by the application is scripted, and classifying the activity as automated or semi-automated when it is determined that the activity is scripted. | 2015-12-31 |
20150381653 | MALICIOUS MESSAGE DETECTION AND PROCESSING - Malicious message detection and processing systems and methods are provided herein. According to various embodiments, a method includes detecting, via an intermediary node, a link included in a message, the link being associated with an unknown resource, hashing a unique identifier for a recipient of the message, coupling the hashed identifier with the link, creating an updated link and updated message, and forwarding the updated message to the recipient. | 2015-12-31 |
20150381654 | METHOD, DEVICE AND SYSTEM FOR DETECTING POTENTIAL PHISHING WEBSITES - The present disclosure discloses a method and device for detecting a potential phishing website. In the method, a computing device having at least a processor obtains information input to a website and determines whether the website is legitimate through a server when the input information entered by the user has some private information. The computing device continues to access the website if the website is legitimate and generates a warning if the website is determined not to be legitimate. | 2015-12-31 |
20150381655 | DETECTING MEMORY-SCRAPING MALWARE - Honey tokens are generated by one or more applications in memory of a device. The honey tokens resemble data that may be of interest to memory-scraping malware. The honey tokens are monitored in memory and when access is detected an alert is raised that there is a potential of having memory-scraping malware, which is operational within memory of the device. | 2015-12-31 |
20150381656 | SELECTIVE MODIFICATION OF ENCRYPTED APPLICATION LAYER DATA IN A TRANSPARENT SECURITY GATEWAY - According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security gateway monitors an encryption protocol handshake between the CES and the WAS to capture, using a provided private key of the WAS, a generated symmetric key to be used for an encryption layer connection. Using the captured symmetric key, the security gateway receives an encrypted connection record of the encryption layer connection, decrypts the encrypted connection record to yield a plaintext connection record, modifies the plaintext connection record, encrypts the modified plaintext connection record using the symmetric key, and transmits one or more packets carrying the encrypted modification plaintext connection record instead of the received encrypted connection record such that neither the CES or WAS is aware of the modification of the encrypted data. | 2015-12-31 |
20150381657 | SELECTIVE MODIFICATION OF ENCRYPTED APPLICATION LAYER DATA IN A TRANSPARENT SECURITY GATEWAY - According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security gateway monitors an encryption protocol handshake between the CES and the WAS to capture, using a provided private key of the WAS, a generated symmetric key to be used for an encryption layer connection. Using the captured symmetric key, the security gateway receives an encrypted connection record of the encryption layer connection, decrypts the encrypted connection record to yield a plaintext connection record, modifies the plaintext connection record, encrypts the modified plaintext connection record using the symmetric key, and transmits one or more packets carrying the encrypted modification plaintext connection record instead of the received encrypted connection record such that neither the CES or WAS is aware of the modification of the encrypted data. | 2015-12-31 |
20150381658 | PREMISES-AWARE SECURITY AND POLICY ORCHESTRATION - A tracking station detects a mobile data processing system (DPS) within communication range of a short range wireless module of the tracking station. In response to detecting the mobile DPS, the tracking station obtains identification data for the mobile DPS from a security module of the mobile DPS. The tracking station uses the identification data to obtain credentials to access secure storage on the mobile DPS. The tracking station automatically generates security configuration data for the mobile DPS, based on multiple factors pertaining to the mobile DPS, such as identity of the mobile DPS, a location of the mobile DPS, capabilities of the mobile DPS, etc. The tracking station uses the credentials to write the security configuration data to the secure storage of the mobile DPS. The security configuration data calls for the mobile DPS to automatically disable or enable at least one component. Other embodiments are described and claimed. | 2015-12-31 |
20150381659 | CRYPTOGRAPHY AND KEY MANAGEMENT DEVICE AND ARCHITECTURE - A method for operating a secure device having a plurality of mutually exclusive circuit zones, including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security, the method including unpacking a key exchange package including receiving a key exchange package in the second circuit zone, the key exchange package including encrypted key data and processing the encrypted key data using a content key in the first circuit zone to generate decrypted key data and storing the decrypted key data in the first circuit zone without disclosing the decrypted key data into the second circuit zone. | 2015-12-31 |
20150381660 | Dynamically Generating a Packet Inspection Policy for a Policy Enforcement Point in a Centralized Management Environment - A mechanism is provided for generating a packet inspection policy for a policy enforcement point in a centralized management environment. Data of a network topology for the policy enforcement point corresponding to a network infrastructure is updated according to metadata of the policy enforcement point, the metadata including a capability of the policy enforcement point. The packet inspection policy for the policy enforcement point is generated according to the data of the network topology and the capability of the policy enforcement point. The packet inspection policy is then deployed to the policy enforcement point. | 2015-12-31 |
20150381661 | METHOD OF MANAGING ACCESS CONTROL IN A CLOUD NETWORK - A method which makes it possible to manage access control between a first entity and a second entity belonging to two security domains in a cloud network is disclosed. In one aspect the method comprises, if the entities belong to security domains implementing different access control policies, determining whether there exists a first access control rule between the first entity and a virtual entity within the security domain of the first entity, and a second access control second rule between the second entity and the virtual entity within the security domain of the second entity. If so, the method may comprise controlling access between the first and second entities as a function of the first and second rules. | 2015-12-31 |
20150381662 | SOCIAL-GRAPH AWARE POLICY SUGGESTION ENGINE - Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users on the network are monitored to determine appropriate configuration settings and preferences by utilizing a combination of internally configured information and externally gathered information for each user. For example, externally gathered information may include information obtained about a user from one or more social media Internet sites. Automatically obtained information may be used to provide or augment policy information such that a user's preference relative to internet content (e.g., content blocking software configuration) may be achieved without requiring an administrator to individually prepare each users security profile and configuration. | 2015-12-31 |
20150381663 | SYSTEMS AND METHODS FOR IMPROVED QUALITY OF A VISUALIZED CALL OVER NETWORK THROUGH SCENARIO BASED BUFFER MODULATION - Systems and methods for improving quality of a call over network (CON) are provided. Call quality may be improved via buffer length modulation based upon the call scenario type. Scenario detection may be based upon who speaks, and the duration of the speaking, as well as contextual analysis. Further, the call over network quality may further be improved by deploying modules over the network. The modules are intermediary vehicles between each communicator and backend servers. The modules intercept audio packets from the communicator to detect packet loss, and perform recovery of lost packets, thereby accelerating real-time audio conversations. | 2015-12-31 |
20150381664 | System and Method for Connectivity Contextual Services Local Online Experience - A connectivity contextual services ecosystem management system may comprise a connectivity contextual services connectivity system, one or more user devices, and one or more merchant devices. The connectivity contextual services connectivity system may deliver different connectivity contextual services to a user device and/or a merchant device in response to a context environment, in order to provide a user with a customized experience, such as allowing that user to enter into conversations with merchants, view inventory of merchants, and search for merchants with relevant products without entering a physical store. | 2015-12-31 |
20150381665 | APPARATUS, SYSTEM, AND METHOD OF CONTROLLING DATA TRANSMISSION, AND RECORDING MEDIUM - A transmission management system, when a request for starting communication with a second transmission terminal is received from a first transmission terminal, obtains first service contents information associated with first service identification information for identifying a service to be provided to the first transmission terminal, and causes a relay device to transmit content data that matches the first service contents information to the second transmission terminal in response to receiving content data at the relay device from the first transmission terminal. | 2015-12-31 |
20150381666 | VOICE COMMUNICATION SYSTEM AND SERVICE WITHIN A MULTI-PROTOCOL NETWORK - A voice communication system ( | 2015-12-31 |
20150381667 | Incident Data Collection for Public Protection Agencies - An approach is provided in which a public protection system sends a data collection request to user devices located within a geographical proximity of an incident in progress that instructs the user devices to capture real-time data corresponding to the incident in progress. The public protection system receives the real-time data from the user devices and determines that a set of the real-time data includes evidence data corresponding to the incident in progress. | 2015-12-31 |
20150381668 | SOCIAL NETWORK CONSTRUCTION - Technologies are generally described for constructing an ad-hoc social network. In some examples, a method performed under control of an end device may include calculating a social relevance on a social graph between the end device and another end device, based on a social graph bit array of the end device and a social graph bit array of the other end device; determining that the calculated social relevance is greater than a predetermined threshold value; and constructing an ad-hoc social network that connects the end device with the other end device. | 2015-12-31 |
20150381669 | NOTIFICATION CONTROL APPARATUS FOR REPLYING TO RECEIVED INFORMATION AND NOTIFICATION CONTROL METHOD - In accordance with one embodiment, a notification control apparatus comprises an interface and a control section. The interface receives first information sent from a terminal held by a user. The control section calculates, based on the information received by the interface, a distance from the notification control apparatus to the terminal held by the user, and carries out a control to send reply information to the terminal held by the user if the distance is within a given range, and not to send reply information if the distance is out of the given range. | 2015-12-31 |
20150381670 | GUIDED EDIT OPTIMIZATION - Techniques for optimizing a guided edit process for editing a member profile page are described. According to various embodiments, profile edit task information associated with a member of an online social network service is accessed, the profile edit task information identifying one or more candidate profile edit tasks to be performed to update a member profile page of the member. Thereafter, if it is determined that the member recently completed a difficult profile edit task, a difficult candidate profile edit task is identified, and the member is prompted to perform the difficult candidate profile edit task. If it is determined that the member has not recently completed a difficult profile edit task, an easy candidate profile edit task is identified, and the member is prompted to perform the easy candidate profile edit task. | 2015-12-31 |
20150381671 | VIRTUAL FILE SHARING METHOD - A virtual file sharing method is disclosed. The method comprises following steps. A device joins a group. A virtual sharing pool corresponding to the group is created. Another device joins the group. The other device shares the virtual sharing pool of the group. The device chooses a file to share to the group. File information corresponding to the shared file is shown in the virtual sharing pool. The other device selects file information from the virtual sharing pool to access the file from the device. | 2015-12-31 |
20150381672 | METHOD OF MANAGING AND SHARING FILE IN HOME NETWORK SYSTEM - The present invention is to provide a method of managing and sharing file in a home network system including an information sharing server and a plurality of network devices within a local area network. When one of the network devices enters into the local area network and is connected with the information sharing server, the network device transmits a file updating message to the information sharing server, and the information sharing server stores the content carried in the file updating message to a file sharing information table and then transmits the file sharing information table to each of the network devices within the local area network periodically or according to a request of each of the network devices, to enable each network device to directly connect with other network device according to the file sharing information table, so as to acquire the shared file stored in the other network device. | 2015-12-31 |
20150381673 | Voice and/or Video Communication Method and Device - A method and apparatus for voice and/or video communication are disclosed. The method includes: a primary terminal device searching for one or more secondary terminal devices; wherein wireless communication modules are set in both the primary terminal device and the secondary terminal device; the primary terminal device sending an authentication request to a searched secondary terminal device; after the primary terminal device receives an authentication response of the secondary terminal device, the primary terminal device establishing a connection with the secondary terminal device via respective wireless communication modules to form a communication group; and the primary terminal device and the secondary terminal device in the communication group performing end-to-end voice and/or video communication according to the respective wireless communication modules. | 2015-12-31 |
20150381674 | System and Method for Efficient Port and Bandwidth Utilization in Setting up Communication Sessions - Techniques for efficiently allocating ports and bandwidth in a communication system configured to establish interactive, real time communication sessions between endpoints are described. Requests are received at a server, from a requester endpoint device, to initiate an interactive, real time communication voice and/or video session requiring access to an interactive session resource. In an embodiment, the communication system is a contact center and the interactive session resource is an available contact center agent. Pending availability of the interactive session resource, a requester is assigned a place in a queue or otherwise scheduled to receive access to the interactive session resource. In the meantime, a data channel is established between the server and the requester's endpoint device. Resources, which can include an executable program and/or information operative to enable the endpoint device to emulate an active on-hold voice connection period, are downloaded to the endpoint device. | 2015-12-31 |
20150381675 | P2P STREAMING SUPPORT - The present invention relates to methods and arrangements to optimize load transportation between a P2P live streaming network and an access network. The method comprises steps like: a peer in the access network selects a live channel to use; a request comprising information of the selected channel is sent from the access network to the streaming network; a converter node connecting the P2P live streaming network and the access network detects that a number of peers in the access network using the selected channel has reached a predetermined threshold value (T); and chunks that are parts of the selected channel arriving from peers in the streaming network are converted in the converter node from P2P format to multicast format. | 2015-12-31 |
20150381676 | METHOD AND APPARATUS FOR MULTICASTING/BROADCASTING IN RELAY NETWORK OF WIRELESS LAN SYSTEM - The present disclosure relates to a wireless communication system and, more particularly, to a method and apparatus for multicasting/broadcasting in a relay network of a wireless LAN system. A method by which a relay entity delivers a multicast/broadcast frame in a wireless LAN system, according to one embodiment of the present disclosure, includes the steps of: receiving a multicast/broadcast frame from an STA; and delivering the multicast/broadcast frame to a root access point (AP). The multicast/broadcast frame may be transmitted by the root AP in a broadcast scheme within a basic service set (BSS). In the multicast/broadcast frame transmitted in the broadcast scheme by the root AP, an address 1 (A1) field may be set to a multicast/broadcast address, an address 2 (A2) field may be set to a medium access control (MAC) address of the root AP, and an address 3 (A3) field may be set as a MAC address of the STA, which is a source address of the multicast/broadcast frame. | 2015-12-31 |
20150381677 | Just-in-Time Distributed Video Cache - A video optimizer receives a request to optimize a source file and stream the optimized file. The request may be accompanied by a key uniquely identifying the original source file to be optimized and an optimized version of the source file to stream to the client. The key uniquely identifies the source video file as it exists on an origin server to prevent transmission of modified source video and the optimized version of the source file by optimization parameters to ensure compatibility with the user device. The video optimizer queries a cache database in response to the received request, which contains references keys and locations of optimized source files among local caches in a cluster of video optimizers. The cache database responds indicates whether a matching optimized version of the source file exists in a local cache of a given video optimizer in the cluster. | 2015-12-31 |
20150381678 | MANAGING CONTENT ON AN ISP CACHE - One embodiment of the present invention sets forth a method for updating content stored in a cache residing at an internet service provider (ISP) location that includes receiving popularity data associated with a first plurality of content assets, where the popularity data indicate the popularity of each content asset in the first plurality of content assets across a user base that spans multiple geographic regions, generating a manifest that includes a second plurality of content assets based on the popularity data and a geographic location associated with the cache, where each content asset included in the manifest is determined to be popular among users proximate to the geographic location or users with preferences similar to users proximate to the geographic location, and transmitting the manifest to the cache, where the cache is configured to update one or more content assets stored in the cache based on the manifest. | 2015-12-31 |
20150381679 | STREAM-BASED REACTIVE PROGRAMMING PLATFORM - Stream-based programming models allow subscriber to observe a stream of stream items received from a source, such as event notifications and updates to observed data. Presented herein is a stream-based reactive programming platform that allows observers to discover sources and streams, and to specify queries applicable to sources that results in new streams, including conditions that apply to the properties of a federation of sources. Variations of the reactive programming platform include generating a new stream from a non-reactive data source; generating a graph of sources and observers; and providing a directory of discoverable elements respectively identified by uniform resource identifiers. The reactive stream-based programming platform may also permit parameterization to configure the functionality of the elements participating in the stream; delegation of query tasks to discoverable elements of the programming platform; and federation of a heterogeneous set of elements to achieve a query using the reactive stream-based programming platform. | 2015-12-31 |
20150381680 | Multiprotocol Multicast Streaming Proxy - Multiprotocol multicast streaming proxy techniques are described. In one or more implementations, a response is sent by a proxy service for receipt by a client device responsive to receipt of a request from the client device to obtain streaming data from a service provider via a network. The response indicates how the client device is to access a multicast of the streaming data from the proxy service and a single dedicated stream of the streaming data. Responsive to receipt of a request from the client device to receive the multicast, the streaming data is obtained by the proxy service via a single dedicated stream from the service provider and multicast for receipt by at least the client device. | 2015-12-31 |
20150381681 | SUPPLEMENTING A TUPLE WITH A DERIVED VALUE - A stream of tuples are processed by a plurality of processing elements, each including one or more stream operators, operating on computer processors. A method determines whether a first stream operator includes a first operation that is deterministic and whether a second stream operator includes a second operation that is equivalent to the first operation. In response to determining that the first operation is deterministic and the second operation is equivalent to the first operation, the first stream operator is configured to include in a tuple output from the first stream operator a result of performing the first operation using a first input. The second stream operator, which uses a second input when performing the second operation, determines whether the second input is the same as the first input, and uses the result in lieu of performing the second operation when the first and second inputs are the same. | 2015-12-31 |
20150381682 | Podcasts in Personalized Content Streams - Software on a content-aggregation website obtains a resource associated with a podcast from a website publishing the podcast and stores it e resource on the content-aggregation website. The software adds the resource as a leaf node to a taxonomy generated by the content-aggregation website. The addition is based on data associated with the podcast. The non-leaf nodes in the taxonomy are categories of content. The software determines that a user of the content aggregation website is qualified as to at least one category that includes the resource as a leaf node. The determination is based at least in part on feedback from the user that includes a viewing or listening history for the user. Then the software serves the resource to the user in a content stream published by the content-aggregation website, based at least in part on a personalization score associated with the resource. | 2015-12-31 |
20150381683 | SUPPLEMENTING A TUPLE WITH A DERIVED VALUE - A stream of tuples are processed by a plurality of processing elements, each including one or more stream operators, operating on computer processors. A method determines whether a first stream operator includes a first operation that is deterministic and whether a second stream operator includes a second operation that is equivalent to the first operation. In response to determining that the first operation is deterministic and the second operation is equivalent to the first operation, the first stream operator is configured to include in a tuple output from the first stream operator a result of performing the first operation using a first input. The second stream operator, which uses a second input when performing the second operation, determines whether the second input is the same as the first input, and uses the result in lieu of performing the second operation when the first and second inputs are the same. | 2015-12-31 |
20150381684 | INTERACTIVELY UPDATING MULTIMEDIA DATA - A method and associated system for updating recorded multimedia data. An interactive request pertaining to a portion of recorded multimedia data is received. A response to the received request is received. A determination is made of a location, within the recorded multimedia data where the portion (of the recorded multimedia data to which the request pertains) is located. The interactive request and the feedback are combined into a combination. The combination of the interactive request and the feedback, or a link pointing to the combination stored external to the recorded multimedia data, is added to the recorded multimedia data at the location of the portion. | 2015-12-31 |
20150381685 | System and Method for Capturing, Editing, Searching, and Delivering Multi-Media Content with Local and Global Time - Various acquisition streams are delivered, synchronously or asynchronously, to a server. Those streams having local time indicia are synchronized with the global timeline and the various acquisition streams are then stored. Low bit rate streams corresponding to the stored acquisition streams are generated for use in subsequent editing of the acquisition streams. The editing of the acquisition streams entails reviewing the various acquisition streams and selecting portions for replay. The portions selected for replay are identified through metadata which is then stored. The replay or distribution mode begins by editing the global timeline using the metadata generated in the editing mode so as to produce an edited timeline. The various acquisition streams are then rendered or played back according to the edited timeline to produce a distribution stream. | 2015-12-31 |
20150381686 | ADAPTIVE DATA SEGMENT DELIVERY ARBITRATION FOR BANDWIDTH OPTIMIZATION - Systems, devices and processes are described to adapt segment requests placed by an autonomous media player during media streaming to compensate for fluctuations in the bandwidth consumed by the requested segments due to variances in the underlying video content. By providing predictive data about the bandwidth consumption of upcoming video segments, client devices can adapt requests for future segments accordingly. Further, predictive consumption data can be shared between players operating within shared bandwidth to assist players needing additional bandwidth for upcoming video sequences. | 2015-12-31 |
20150381687 | PROVIDING CONTENT IN A PLATFORM-SPECIFIC FORMAT - Systems and methods for transforming and sending generic content into a platform-specific format or receiving pre-transformed platform-specific content. The generic content and platform-specific format includes one or more tiles that are modified as part of the transformation. An electronic device requests content, and a smart tile processor converts the generic content to platform-specific content before sending the platform-specific content to the requesting electronic device. | 2015-12-31 |
20150381688 | SYSTEM AND METHOD FOR REAL-TIME AGGREGATION OF IMAGES - A method, system and computer program product for embedding news agency specific information into an image data stream, including a server configured to process and route an image file according to information included in a data stream corresponding to the image file; a cloud based database configured to transmit news agency specific information; and a computer device including a software application configured to receive the news agency specific information from the cloud based database, embed the news agency specific information into the image file, and transmit the data stream corresponding to the image file to the server. | 2015-12-31 |
20150381689 | Methods, Systems and Devices for Spoiler Alert and Prevention Using Networking Framework - Methods, systems and devices are provided for blocking spoiler content from being presented by a content presenting device to a user of a mobile computing device. The content presenting device and the mobile computing device may communicate using a networking framework. One or more spoiler alert events received by the content presenting device via the communication networking framework from the mobile computing device include information associated with content that has not been viewed by a user of the mobile computing device. The information associated with the content that has not been viewed is compared with the content to be presented. It may be determined whether the content to be presented by the content presenting device includes the spoiler content, and, if so, the presentation of the spoiler content by the content presenting device is restricted. | 2015-12-31 |
20150381690 | SERVER SIDE ADAPTIVE BIT RATE CONTROL FOR HTTP STREAMING CLIENTS - Methods and systems are described for adaptively transmitting streaming data to a client. In one embodiment, the method comprises receiving, in a server, a request for a data asset from the client, transcoding at least an segment of the data asset according to initial transcoding parameters, transmitting a first fragment of the transcoded segment of the data asset from the server to the client over a communication channel, generating an estimate of a bandwidth of the communications channel at least in part from information acknowledging reception of at least the first fragment of the transcoded segment of the data asset by the client, generating adaptive transcoding parameters at least in part from an estimate of a bandwidth of the communications channel, the estimate generated at the server, transcoding a further segment of the data asset according to the adaptive transcoding parameters, and transmitting the further segment of the data asset. | 2015-12-31 |
20150381691 | Bonding of Multiple Concurrent Data Streams Among Multiple Devices - Examples are disclosed for hosting a communication session between a computer device and a destination communication device in an Internet Protocol (IP) based packet data network. A computer device receives multiple concurrent IP packet data streams each representative of the same content but received over corresponding multiple communication links. The original IP packet data stream comes from the communications server. At least one IP packet data stream representative of the original IP packet data stream traverses a communication link through a second communication device working in tandem with the communications server before arriving at the computer device. The computer device determines a highest quality packet for each corresponding packet in the multiple concurrent IP packet data streams. The computer device then creates a bonded IP packet data stream by selecting the highest quality packet for each time slot from among corresponding time slots of the multiple concurrent IP packet data streams. | 2015-12-31 |
20150381692 | Specifying Client Behavior and Sessions in Dynamic Adaptive Streaming over Hypertext Transfer Protocol (DASH) - An apparatus comprises a receiver configured to receive a request for an adaptive streaming media presentation description (MPD), a processor coupled to the receiver and configured to generate the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information, and a transmitter coupled to the processor and configured to transmit the MPD. A method comprises receiving a request for an adaptive streaming media presentation description (MPD), generating the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information, and transmitting the MPD. An apparatus comprises a processor configured to generate a request for an adaptive streaming media presentation description (MPD), a transmitter coupled to the processor and configured to transmit the request, and a receiver coupled to the processor and configured to receive the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information. | 2015-12-31 |
20150381693 | SHARING A CONFIGURATION STATE OF A CLIENT DEVICE THAT MEETS A THRESHOLD LEVEL OF QoE - Arrangements described herein can include automatically monitoring, on a first client device receiving multimedia content, a first QoE associated with presenting the multimedia content by the first client device. The arrangements also can include automatically determining a configuration state of the first client device while presenting the multimedia content. The method further includes sharing, by the first client device, with at least a second client device at least a portion of the configuration state of the first client device while presenting the multimedia content, wherein the portion of the configuration state of the first client device is included in a candidate configuration that is a candidate for implementation on the second client device to improve a second QoE associated with presenting the multimedia content, or other multimedia content, by the second client device. | 2015-12-31 |
20150381694 | Bonding of Multiple Concurrent Data Streams Among Multiple Devices - Examples are disclosed for hosting a communication session between a computer device and a destination communication device in an Internet Protocol (IP) based packet data network. A communications server receives multiple concurrent IP packet data streams each representative of the same content but received over corresponding multiple communication links. The original IP packet data stream is created by the computer device. At least one IP packet data stream representative of the original IP packet data stream traverses a communication link through a second communication device working in tandem with the computer device before arriving at the communications server. The communications server determines a packet arrival time for each corresponding packet in the multiple concurrent IP packet data streams. The communications server then creates a bonded IP packet data stream by selecting the first to arrive packet for each time slot from among corresponding time slots of the multiple concurrent IP packet data streams. | 2015-12-31 |
20150381695 | Bonding of Multiple Concurrent Data Streams Among Multiple Devices - Examples are disclosed for hosting a communication session between a computer device and a destination communication device in an Internet Protocol (IP) based packet data network. A communications server receives multiple concurrent IP packet data streams each representative of the same content but received over corresponding multiple communication links. The original IP packet data stream is created by the computer device. At least one IP packet data stream representative of the original IP packet data stream traverses a communication link through a second communication device working in tandem with the computer device before arriving at the communications server. The communications server determines a highest quality packet for each corresponding packet in the multiple concurrent IP packet data streams. The communications server then creates a bonded IP packet data stream by selecting the highest quality packet for each time slot from among corresponding time slots of the multiple concurrent IP packet data streams. | 2015-12-31 |
20150381696 | Bonding of Multiple Concurrent Data Streams Among Multiple Devices - Examples are disclosed for hosting a communication session between a computer device and a destination communication device in an Internet Protocol (IP) based packet data network. A communications server situated in an Internet Protocol (IP) based packet data network is communicable with a computer device and a communication device. The communications server receives an IP packet data stream and establishes a first communication link with the computer device. The communications server also establishes a second communication link with the communication device. The communications server then sends the received IP packet data stream to the computer device over the first communication link and also sends the IP packet data stream to the communication device over the second communication link. The communication device then relays the IP packet data stream to the computer device over one or more additional communication links between the communication device and the computer device. | 2015-12-31 |
20150381697 | Bonding of Multiple Concurrent Data Streams Among Multiple Devices - Examples are disclosed for hosting a communication session between a computer device and a destination communication device in an Internet Protocol (IP) based packet data network. A computer device receives multiple concurrent IP packet data streams each representative of the same content but received over corresponding multiple communication links. The original IP packet data stream comes from the communications server. At least one IP packet data stream representative of the original IP packet data stream traverses a communication link through a second communication device working in tandem with the communications server before arriving at the computer device. The computer device determines a packet arrival time for each corresponding packet in the multiple concurrent IP packet data streams. The computer device then creates a bonded IP packet data stream by selecting the first to arrive packet for each time slot from among corresponding time slots of the multiple concurrent IP packet data streams. | 2015-12-31 |
20150381698 | Bonding of Multiple Concurrent Data Streams Among Multiple Devices - Examples are disclosed for hosting a communication session between a computer device and a destination communication device in an Internet Protocol (IP) based packet data network. The computer device is communicable with a communications server and a communication device, wherein the communications server situated in an Internet Protocol (IP) based packet data network. The computer device creates an IP packet data stream and establishes a first communication link with the communications server. The computer device also establishes a second communication link with the communication device. The computer device then sends the IP packet data stream to the communications server over the first communication link and sends the IP packet data stream to the communication device over the second communication link. The communication device then relays the IP packet data stream to the communications server over one or more additional communication links between the communication device and the communications server. | 2015-12-31 |
20150381699 | OPTIMIZED BROWSER RENDERING PROCESS - Implementations optimize a browser render process by identifying content neutral embedded items and rendering a web page without fetching the content neutral items. An example method includes identifying a URL pattern common to a plurality of URLs stored in fetch records and selecting a sample of URLs from the plurality. The method also includes, for each URL in the sample, determining whether the URL is optional by generating a first rendering result using content for the URL and a second rendering result without using the content for the URL and calculating a similarity score for the URL by comparing the first rendering result and the second rendering result, the URL being optional when the similarity score is greater than a similarity threshold. The method may also include storing the URL pattern in a data store of optional resource patterns when a majority of the URLs in the sample are optional. | 2015-12-31 |
20150381700 | Data Caching and Resource Request Response - A data caching method and device, and a resource request response method and device. The data caching method comprise: receiving a resource request for group content belonging to a specific user group, the resource request being sent from a user terminal to an application server by a user; checking if a mapping between the group content and a group caching ID for identifying the user group and a mapping between the user and the group caching ID have been established in the caching server; and returning the group content cached in the caching server to the user terminal in responses to the mapping between the group content and the group caching ID and the mapping between the user and the group caching ID having been established in the caching server. | 2015-12-31 |
20150381701 | Reducing Latencies in Web Page Rendering - A page structure may be used to begin validation of an embedded resource prior to the time a browser issues a request to validate the embedded resource. A page structure includes information indicating one or more embedded resources in the web page and, in some implementations, its corresponding cache characteristics. The page structure may be used to generate a validation message that indicates resources to be validated. The validation message may be sent to a server at substantially the same time that the browser begins rendering the web page. The server can then begin validating the resources indicated in the validation message by sending validation requests to an origin or other server storing the embedded resources. The server then may send the validation responses back to the client computer executing the browser so that the validation responses can be used to satisfy corresponding validation requests generated by the browser. | 2015-12-31 |
20150381702 | REMOTE APPLICATION CONTROL INTERFACE - Embodiments of the present invention provide an active-application interface on a companion device that allows a user to control an application running on a primary device. The active-application interface may describe state information for a plurality of applications running on the primary device and allow the user to manipulate the application through one or more contextual controls. The active-application interface may be used to control applications running out-of-control focus on the primary device, including applications that do not presently have a visible viewport. | 2015-12-31 |
20150381703 | AUTOMATING A PROCESS ASSOCIATED WITH A WEB BASED SOFTWARE APPLICATION - Disclosed is a method and system for automating a process associated with a web based software application. The method comprises capturing one or more activities performed by a user for the process. An activity of the one or more activities corresponds to one or more events. An event of the one or more events indicates a means of interaction of the user with the web based software application. The method further comprises extracting metadata associated with each activity of the one or more activities. The method comprises sensing a response of the web based software application for each activity performed by the user. The method comprises generating a rule for each activity based on the metadata extracted, the one or more events, and the response. The method further comprises configuring a script for the process by combining rules generated for the one or more activities. | 2015-12-31 |
20150381704 | MECHANISM FOR FILE TRANSFORMATION AND SHARING ACROSS DEVICES USING CAMERA INTERFACE - Embodiments described herein relate generally to the transmission of a request for a file from a first computing device to a second computing device. The first computing device may present an image having a representation of a file to a user and detect a selection of a location on the image at which the representation of the file is disposed. The first computing device, in turn, may transmit the image and a description of the selection to the second computing device. Based on the received image and description of the selection, the second computing device may identify the file corresponding to the selected location on the image. The second computing device may adapt, or cause to be adapted, the identified file. The second computing device may then transmit the identified file (or the adapted version) to the first computing device. Other embodiments may be described and/or claimed. | 2015-12-31 |
20150381705 | Method and System of File Folder Transmission in Instant Messaging - File folder transmission in instant messaging may be implemented by an instant receiving client, which receives information of a file folder and information of each file in the file folder. The instant receiving client may display the information of the file folder and the information of each file in the file folder. In some embodiments, the instant receiving client may further receive selection information inputted by a user, and receive the files in the file folder that correspond to the selection information from an instant sending client. Such file folder transmission in instant messaging can efficiently save network resources within a process of file folder transmission. | 2015-12-31 |
20150381706 | Collaborative Media Playback - Concepts and technologies disclosed herein are directed to collaborative media playback. According to one aspect disclosed herein, a media playback node can receive information for use in determining a start time for playback of media content so that playback of the media content is in sync with playback of the media content by a further playback node. The media playback node also can determine, based at least in part upon the information, the start time for playback of the media content. The media playback node also can initiate playback of the media content at the start time. | 2015-12-31 |
20150381707 | MULTIPLE PLANE NETWORK-ON-CHIP WITH MASTER/SLAVE INTER-RELATIONSHIPS - Systems and methods are provided herein for implementing a Network-on-Chip (NoC) in a System-on-Chip (SoC) device. In some embodiments, an NoC may include a first node that transmits data to a second node, where data may be transmitted via either a first plane or a second plane. The first plane may utilize first logic at each of an output port of the first node, an input port of the second node, and at intermediary ports when transmitting the data to the second node. The second plane may utilize first logic at the output port of the first node and at the input port of the second node when transmitting the data to the second node, and may utilize second logic that is different from the first logic at the intermediary ports when transmitting the data to the second node. | 2015-12-31 |
20150381708 | FAILURE MANAGEMENT IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing failure management in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. One or more queue clients are configured to attempt message processing for the enqueued messages. Log data is received from the one or more queue clients at the queue servers. The log data is descriptive of the attempted message processing. | 2015-12-31 |
20150381709 | INPUT/OUTPUT MANAGEMENT IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing input/output management in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. One or more queue clients are configured to attempt message processing for the enqueued messages. Network interactions between the queue clients and one or more external components are configured to be routed through a network proxy. | 2015-12-31 |
20150381710 | SOCKET APPLICATION PROGRAM INTERFACE (API) FOR EFFICIENT DATA TRANSACTIONS - Methods and systems for efficient data transactions between applications running on devices associated with the same host. According to one embodiment, a host system includes an HTTP proxy and an SSL/TLS proxy operatively coupled with each other. The SSL/TLS proxy may be configured to perform SSL negotiation with a client and the HTTP proxy may be configured to communicate with a web server in clear text. Data can be transferred directly between the proxies through a pair of connected sockets using a handle of the other proxy's socket. The handle includes a pointer to an address within a memory of a first device upon which the other proxy is running In this manner, data stored at the address may be processed by a proxy running on a second device without copying the data to the second device and without the overhead associated with the TCP/IP protocol stack. | 2015-12-31 |