TELEFONICA DIGITAL ESPAÑA, S.L.U. Patent applications |
Patent application number | Title | Published |
20160021174 | COMPUTER IMPLEMENTED METHOD FOR CLASSIFYING MOBILE APPLICATIONS AND COMPUTER PROGRAMS THEREOF - A computer implemented method for classifying mobile applications and computer programs thereof. | 01-21-2016 |
20150282117 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR ALERTING AN INCOMING COMMUNICATION IN A COMMUNICATION APPLICATION AND COMPUTER PROGRAMS THEREOF - The method comprising a communication service ( | 10-01-2015 |
20150223010 | METHOD FOR PROVIDING WIRELESS DATA CONNECTIVITY BETWEEN USER COMPUTING DEVICES IN A GIVEN AREA AND COMPUTING DEVICE - A method for providing wireless data connectivity between user computing devices in a given area and computing device | 08-06-2015 |
20150189166 | METHOD, DEVICE AND SYSTEM FOR IMPROVING THE QUALITY OF PHOTOGRAPHS - Disclosed herein are a method, system and device for improving the quality of photographs taken by a photo camera user. They provide, in real time, a continuous and customized auditory quality feedback to the user for an image displayed by the camera in the viewfinder, to help the user to decide whether to take a photograph or not for said image (that is, the photograph for said image has not been taken by the user yet). With the technical solution proposed herein, a more effective, faster and more accurate feedback is given to the photographer and more quality photos are taken saving camera resources at the same time. | 07-02-2015 |
20150189096 | METHOD FOR OPTIMIZING TRAFFIC VOLUME CAPS IN WIRELESS CELLULAR NETWORKS - Method for optimizing traffic volume caps in mobile cellular networks comprising: defining three traffic volume caps (x, y, z), wherein x indicates number of messages from mobile messaging services, y indicates bandwidth for mobile data and z indicates duration time of voice calls; computing initial user balance by subtracting total traffic cost generated by user for the mobile cellular network operator from total revenue paid by user to the mobile cellular network operator; obtaining total user balance for a range of caps (x, y, z) using the initial balance and at least a, net-oblivious or net-aware balance model which determines whether user is affected by the caps (x, y, z); selecting optimal traffic volume caps which maximize the total user balance. The method also computes social attraction parameters pk as a fraction of customers of the mobile cellular network operator having k contacts in the mobile cellular network operator. | 07-02-2015 |
20150189014 | APPLICATIONS EXECUTION BETWEEN ELECTRONIC DEVICES AND CLOUD - A method, system and devices for extending battery life and capability of a user mobile device capable of running applications. It allows the isolation of network and application background activity in the cloud, while maintaining interactivity for the final user. | 07-02-2015 |
20150189004 | METHOD AND FARM LOAD BALANCING DEVICE FOR ESTABLISHING A BI-DIRECTIONAL SERVER TO SERVER COMMUNICATION AND COMPUTER PROGRAM THEREOF - The method comprises creating a single point in a communication flow, by a first farm load balancer, that both communication sessions requested by a client server A and a client server B at a network layer will pass through; creating stickiness based on said communication session requests and creates a bi-directional affinity by correlating the communication session requests of different sessions and maintaining a correlation mapping. | 07-02-2015 |
20150189000 | METHOD, SYSTEM AND DEVICE FOR DISTRIBUTED APPLICATION EXECUTION BETWEEN ELECTRONIC DEVICES AND CLOUD - A method system and device for distributed application execution. The system aims to automatically analyze and split application into application blocks to be run in the most appropriate place based on a set of resources optimizations constraints, combined with end user or provider defined set of rules. Each application can be analyzed in separated way and the results of the analysis might be shared with all the parties participating to the application execution optimization scheme. This way, the overhead during the execution is reduced and the resources are spread and shared. | 07-02-2015 |
20150188974 | METHOD AND A SYSTEM FOR SMOOTH STREAMING OF MEDIA CONTENT IN A DISTRIBUTED CONTENT DELIVERY NETWORK - A method and a system for smooth streaming of media content in a distributed content delivery network, including encoding original media files; providing the encoded original media files to an indexer entity; calculating, the indexer entity, index jump tables for all the encoded original media files; ingesting the index jump tables and the encoded original media files to an origin server; requesting an end user to a SSS a stream fragment; retrieving, the SSS from the origin server, a specific index jump table associated to the requested stream fragment, and using the table to find out and retrieve, from the origin Server, a needed encoded original media file block; and retrieving, the SSS, the requested stream fragment out of the encoded media file block, and sending the requested stream fragment to the end user. | 07-02-2015 |
20150188941 | METHOD AND SYSTEM FOR PREDICTING VICTIM USERS AND DETECTING FAKE USER ACCOUNTS IN ONLINE SOCIAL NETWORKS - A system and method for predicting victims and detecting fake accounts in OSNs, comprising: a feature-based classifier for predicting victims by classifying, with a classification probability, a target variable of each user in the OSN social graph; a graph-transformer for transforming the social graph into a defense graph by reassigning edge weights to incorporate victim predictions using the classification probability, a graph-based detector for detecting fake users by computing through the power iteration method a probability of a random walk to land on each node in the defense graph after 0(log n) steps, assigning to each node a rank value equal to a node's landing probability normalized by the node degree, sorting the nodes by their rank value and estimating a detection threshold such that each node whose rank value is smaller than the detection threshold is flagged as representing a fake account. | 07-02-2015 |
20150187024 | System and Method for Socially Aware Recommendations Based on Implicit User Feedback - A content recommender based on collaborative filtering and implicit user feedbacks comprising retrieving a social graph split into a user and the user's relationship network in order to obtain a social aware model of the user's preferences based on preferences of the users belonging to the user's relationship network, minimizing the objective function for all the response values of the whole user-item matrix, the response values meaning implicit and explicit feedback data, providing a list of content recommendations obtained by a score function computed using the social aware model. | 07-02-2015 |
20150186849 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR SCHEDULING MOMENT-BASED TASKS ASSOCIATED WITH A MEDICAL TREATMENT AND COMPUTER PROGRAM THEREOF - A computer implemented method and system for scheduling moment-based tasks associated with a medical treatment and computer program thereof. The method includes receiving by at least one patient a moment-based list of tasks as a patient's instruction specifying when a number of given tasks should be performed; assigning for each task of said list of tasks an amount of time or time normal zone indicating an optimal period of time to perform a given task; and assigning, for each time normal zone, a previous time zone and a subsequent time zone of the time normal zone indicating that said task also can be done. In case of overlapping of time normal zones and/or previous or subsequent time zones for a given number of tasks of a same type an algorithm is executed in order to resolve the conflicts between said overlapped tasks. | 07-02-2015 |
20150186427 | METHOD AND SYSTEM OF ANALYZING DYNAMIC GRAPHS - A method and a system for analyzing dynamic graphs are disclosed. In accordance with such method and system, computations are performed at a plurality of graph vertices every time a change in the graph occurs. In order to minimize the computational load of each computation iteration, previous computation results are reused when the inputs for a computation at a given vertex are unchanged from previous computations. This approach enables real-time data mining from large dynamic graphs, without requiring users to devise their own incremental graph algorithms. | 07-02-2015 |
20150178797 | FEEDBACK GATHERING APPARATUS, METHOD AND DEVICE - An apparatus, method and device for gathering feedback information about a product ( | 06-25-2015 |
20150156024 | COMPUTER IMPLEMENTED METHOD AND A COMPUTER SYSTEM TO PREVENT SECURITY PROBLEMS IN THE USE OF DIGITAL CERTIFICATES IN CODE SIGNING AND A COMPUTER PROGRAM PRODUCT THEREOF - A computer implemented method including a software distributor signing via a first server at least one software file using a digital certificate with a digital signature and at least one user via a computing device acquiring a copy of the signed software file. The digital certificate to be used is previously recorded in a second server in communication with the first server, the digital certificate to be recorded being provided by the software distributor upon a registration of the latter in the second server and including information obtained from a trust certificate chain associated to the digital certificate when performing the registration. The second server generates, upon a request made by the software distributor, a hashstamp of the signed software file. | 06-04-2015 |
20150131468 | METHOD FOR ACCESS POINTS SCHEDULING FOR BACKHAUL AGGREGATION IN A TELECOMMUNICATIONS NETWORK AND A DEVICE - A method for access points scheduling for backhaul aggregation in a telecommunications network and a device | 05-14-2015 |
20150121473 | METHOD AND SYSTEM FOR PROVIDING MULTIPATH TCP PROXY SERVICES - In the method an Access Point comprises aggregating spare bandwidth of at least another Access Point and capturing data traffic from at least one user computing device, said user computing device taking benefit of said aggregated spare bandwidth. The method: requesting, by said Access Point admission to a MPTcp server including proxy control functions or services, to make use of the latter; checking, by a control module of said MPTcp server, credentials information of said Access Point to allow the latter said admission; and upon said admission being authorized, checking, by said MPTcp server through a connection with a service subscription repository module, if at least one origin server is authorized for accessing said proxy control functions or services. | 04-30-2015 |
20150120722 | Method and system for providing multimedia content recommendations - A system for providing content recommendations, including a frontend manager for receiving explicit events from a client application of a user and generating implicit events based upon additional user actions within the client application; a backend storage of data on events and users and an Online Data Store for the explicit events and the implicit events; a Data Processor for creating an explicit user model from the explicit events and an implicit user model from the implicit events; a pool of recommendation engines with one or more recommendation algorithms for receiving the explicit user model and assigning a ranked recommendation list of content items to the user as a result, and further including an aggregator controlled by the Data Processor for aggregating the ranked recommendation lists based on a user-dependent strategy, in order to obtain multiple content recommendation lists of ranked items to be delivered by the frontend server to the client application in a final arrangement, pull from the Online Data Store along with data on the content sources. | 04-30-2015 |
20150117210 | METHOD FOR COORDINATING ACCESS POINTS FOR BACKHAUL AGGREGATION IN A TELECOMMUNICATIONS NETWORK AND DEVICE - In the method, a plurality of access points forming a cluster in a telecommunication network monitors network data traffic information from at least one user computing device connected thereto; obtains a status profile; reports an own identifier to a remote server; builds, by using a record including the corresponding identifier of each access point, a list of access points available for performing backhaul aggregation; and establishes connections between available access points forming sub-clusters of access points. Wherein, one of the access points acts as a cluster coordinator coordinating said formed sub-clusters of access points for a backhaul aggregation. | 04-30-2015 |
20150012213 | METHOD, SYSTEM AND COMPUTER-READABLE STORAGE MEDIUMS FOR ESTIMATING A ROUTE - The method estimating said route between an origin location and a destination location of a cell phone user requesting said route by using a computer device receiving as inputs location data from a base station tower, said computer device: creating a plurality of perturbations of at least one of said computed origin or said destination location within said base station tower coverage; for each perturbation created querying a route calculation engine, based on geospatial data, to calculate a route between said perturbations or between said perturbations and said origin or destination and obtaining a list of routes, and choosing among said list of routes an optimal route by maximizing an utility function that assesses the efficacy of each route of said list of routes by using user's location data being performed within certain distance of said calculated routes. | 01-08-2015 |
20140380453 | COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST USER AUTHENTICATION AND COMPUTER PROGRAMS PRODUCTS THEREOF - The computer implemented method comprising: receiving a first server a request in the name of a user to be logged into a service of said first server and authenticating said request by verifying user identification information of said user, wherein a second server in connection with a user computing device with a dedicated program is used for: receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication; verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status to said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid. | 12-25-2014 |
20140380431 | COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST AUTHORIZATION SYSTEMS AND COMPUTER PROGRAMS PRODUCTS THEREOF - A computer implemented method and computer program products to prevent attacks against authorization systems | 12-25-2014 |
20140355412 | COMPUTER IMPLEMENTED METHOD FOR TRACKING AND CHECKING MEASURES AND COMPUTER PROGRAMS THEREOF - A computer implemented method for tracking and checking measures and computer programs thereof. A master node receiving from a plurality of slaves nodes messages related with measures generated by the slaves nodes, the method including: capturing, a traffic driver unit, the messages sent by the slaves nodes and further sending them to a monitor unit; analyzing, the monitor unit, the received messages so as to detect, by a behavioral learning technique, anomalies in the messages; when an anomaly is detected, sending, the monitor unit, the detected anomaly to a regenerator unit for regenerating at least the detected anomaly by a prediction technique; and injecting, said traffic drive unit, measures regenerated by the regenerator unit to the transport network. | 12-04-2014 |
20140317736 | METHOD AND SYSTEM FOR DETECTING FAKE ACCOUNTS IN ONLINE SOCIAL NETWORKS - A system and method for detecting fake accounts in OSNs is proposed to aid the OSN provider | 10-23-2014 |
20140241215 | METHOD AND SYSTEM FOR COMBINED PEER-TWO-PEER (P2P) AND CENTRAL RELAY SERVER-BASED TELECOMMUNICATION CONFERENCING USING A TELEPHONY AND CONFERENCING PROTOCOL - A Method and a System for combined Peer-two-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol | 08-28-2014 |