06th week of 2016 patent applcation highlights part 64 |
Patent application number | Title | Published |
20160044014 | COMMUNICATION SYSTEM AND METHOD, INFORMATION PROCESSING TERMINAL AND METHOD, AND INFORMATION PROCESSING DEVICE AND METHOD - The present invention relates to a communication system and method, an information processing terminal and method, and an information processing device and method which enable simple and secure restricted access. When a PDA | 2016-02-11 |
20160044015 | Secure Challenge System for Verifying Access Rights to Media Content - Described is a technique for securely verifying access rights to a media file stored on a user device. By verifying the access rights to the media file, a server may provide access to a licensed version of the media from a media library in a remote location such as server for a cloud-based service. When a media file is confirmed to be available in a media library, a cryptographic a hash function that incorporates a random value or “salt” is used to verify that a user is in possession of an entire media file. Accordingly, the techniques described herein improve the security for verifying that a user is in possession of a media file by preventing the use of pre-calculated hashes. | 2016-02-11 |
20160044016 | Pre-Delivery Authentication - Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require that a recipient authenticate to ensure legitimate use or identity. Should pre-delivery authentication be required, the electronic content is held at any networked device while the recipient authenticates. If the recipient correctly authenticates, then the electronic content is released for delivery. | 2016-02-11 |
20160044017 | SECURE DOMAIN NAME SYSTEM - A method and system for authenticating answers to Domain Name System (DNS) queries originating from recursive DNS servers are provided. A verification component provides a verification that a DNS query originated from the recursive DNS server. An authoritative DNS server receives the query via a network, such as the Internet, and provides an answer to the query to an authentication component. The authentication component then provides an authentication, such as a digital signature, which confirms that the received answer was provided by the authoritative DNS server, and then communicates the answer and the authentication to the verification component via the network. The verification component then verifies that the authentication corresponds to the received answer and sends the answer to the recursive DNS server. When the verification component receives an answer in the absence of a corresponding authentication, the verification component drops the answer. | 2016-02-11 |
20160044018 | SECURE DATA ENTRY VIA AUDIO TONES - A cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with the cloud client device. The cloud client device pairs with one or more of the devices. To provide secure access to the cloud client device and to other functionality provided by the paired devices, the cloud client device accepts tones as a password. The cloud client device receives a password after a prompt as one or more tones and translates the tones for comparison with the password for the cloud client device. Access is allowed if the translated tones match the password for the cloud client device. | 2016-02-11 |
20160044019 | EXTENSIBLE CONFIGURATION SYSTEM TO ALLOW A WEBSITE TO AUTHENTICATE USERS BASED ON AN AUTHORIZATION PROTOCOL - An extensible configuration system to allow a website to authenticate users based on an authorization protocol is disclosed. In some embodiments, the extensible configuration system includes receiving an identifier for an authentication provider; and automatically configuring a website to use the authentication provider for logging into the website. | 2016-02-11 |
20160044020 | FACILITATING USERS TO OBFUSCATE USER CREDENTIALS IN CREDENTIAL RESPONSES FOR USER AUTHENTICATION - A system and method for facilitating users to obfuscate user credentials in credential responses for user authentication are disclosed. A string sequence may be presented to a user for prompting the user to input credential characters sequentially but not continuously. The string sequence may comprise a set of prompt strings containing a prompt character sequence associated with the user and a set of noise strings that do not contain the prompt character sequence. The individual prompt strings in the set of prompt strings may be composed by obfuscating the prompt sequence among noise characters. A user credential response may be received and a user provided credential may be extracted from the received user credential for user authentication. | 2016-02-11 |
20160044021 | METHODS AND SYSTEMS FOR SECURING PROOFS OF KNOWLEDGE FOR PRIVACY - Embodiments described herein relate to securing the privacy of knowledge used to authenticate a user (i.e., Proof of Knowledge (PoK) test(s)). In some embodiments, a client device is operable to receive a first encryption key and encrypted test(s) from a PoK server. The client device also receives a second encryption key from a Relying Party (RP) server. The client device can decrypt the encrypted test(s) by using the first encryption key and the second encryption key to thereby render decrypted test(s). The client device is further operable to obtain answer(s) for the decrypted test(s), send a communication to the PoK server based on the answer(s), and receive a communication from the | 2016-02-11 |
20160044022 | COMPREHENSIVE AUTHENTICATION AND IDENTITY SYSTEM AND METHOD - A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be passed back or otherwise utilized by websites (e.g. for registrations, logins, etc.) The user information may include the user's username, password, contact information, personal information, marketing preferences, financial information, etc. For website registrations, the user may provide a mobile communication number that is utilized to perform a type of mobile communication device verification process. As part of a website login, the user may provide identifiable information (e.g. a username) that is looked up by the system or website to determine a mobile communication number for the user, which is used for a verification process. If the verification process is completed successfully, the user may be logged into the website. For accessing the system directly, a user may go through a mobile communication device verification process. | 2016-02-11 |
20160044023 | AUTHENTICATION POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate. | 2016-02-11 |
20160044024 | ONE-TIME ACCESS TO AN AUTOMATION SYSTEM - Methods and systems are described for managing one-time access to an automation system. According to at least one embodiment, a computer-implemented method to grant a user access to an automation is described. The method may comprise receiving one or more access parameters to authorize one-time permission to the user to access the automation system. The method may further comprise granting one-time permission to the user to access the automation system based at least in part on the one or more access parameters. The method may additionally comprise generating a message comprising at least the one-time permission to access the automation system. The one or more access parameters may comprise at least one of a limited time frame, single use entry code, or a limited number of entries. | 2016-02-11 |
20160044025 | SYSTEM AND METHOD FOR SECURITY ENHANCEMENT - A system and method thereof for secure authentication using multimedia contents set particular to user (MCSPU) and user specified parameters is disclosed. A host system for performing an authentication with a user system is disclosed. The host system comprises of a processor; and a memory coupled to said processor for executing a plurality of modules present in said memory. For the authentication (while logging in or performing a transaction), the host system would provide to the user one or more elements belonging to MCSPU, after embedding, within the elements the authentication related critical information using the user specific parameters. The proposed method ensures the user that the response is coming from authentic system. In case of suspicious user behavior, the parameters or multimedia contents not specific to the user could be used. | 2016-02-11 |
20160044026 | SERVER AND/OR CLIENT DEVICE AUTHENTICATION - Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile network device to a server, wherein the information comprises a seed that is used by both the mobile network device and the server to compute a series of one time passwords. The method also includes receiving, by the mobile network device, a succession of one time passwords generated by the server throughout a session. And the method further includes comparing the received one time passwords generated by the server throughout the session to corresponding one time passwords generated at the mobile network device. In this manner, the server can be authenticated. In various embodiments, the process may be reversed to facilitate client, e.g., mobile network device, authentication. | 2016-02-11 |
20160044027 | AUTHENTICATED REMOTE PIN UNBLOCK - This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise, the answers to the passphrases arc hashed and stored inside the security token for future comparison. A local client program provides the user input and display dialogs and ensures a secure communications channel is provided before passphrases are retrieved from the remote server. Retrieval of passphrases and an administrative unblock secret from the remote server are accomplished using a unique identifier associated with the security token, typically the token's serial number. A PIN unblock applet provides the administrative mechanism to unblock the security token upon receipt of an administrative unblock shared secret. The remote server releases the administrative unblock shared secret only after a non-forgeable confirmatory message is received from the security token that the user has been properly authenticated. The administrative unblock shared secret is encrypted with the token's public key during transport to maximize security. | 2016-02-11 |
20160044028 | MESSAGE AUTHENTICATION - The disclosure is related authenticating a digital message exchanged among communication devices. A device may perform, for authenticating a digital message, transmitting an authentication request message to a messaging server when a message is received, receiving an authentication result from the messaging server, and displaying the authentication result with the received message. A server may perform, for authenticating a message, receiving an authentication request message for requesting authentication of a target message from a device that received the target message, performing an authentication procedure in response to the received authentication request message, and transmitting an authentication result message to the device. | 2016-02-11 |
20160044029 | METHOD OF HOST-DIRECTED ILLUMINATION AND SYSTEM FOR CONDUCTING HOST-DIRECTED ILLUMINATION - A method of host-directed illumination for verifying the validity of biometric data of a user is provided that includes capturing biometric data from a user with an authentication device during authentication and directing illumination of the biometric data from a host authentication system during the capturing operation. Moreover, the method includes comparing illumination characteristics of the captured biometric data against illumination characteristics expected to result from the directing operation, and determining that the user is a live user when the illumination characteristics of the captured biometric data match the illumination characteristics expected to result from the directing operation. | 2016-02-11 |
20160044030 | METHOD OF PROVIDING REAL-TIME SECURE COMMUNICATION BETWEEN END POINTS IN A NETWORK - A method of establishing a multiplicity of shared secrets at two mutually authenticated end points in a network. The method includes authenticating a first end point in the network based on an asymmetric key pair and authenticating a second end point based on an asymmetric key pair. Upon successful authentication of the first and second end points, the end points negotiate a shared secret. Multiple shared secret keys are generated from the negotiated shared secret and session keys are computed from the multiple shared secret keys. | 2016-02-11 |
20160044031 | PROTECTING AGAINST MALICIOUS MODIFICATION IN CRYPTOGRAPHIC OPERATIONS - A message and an identifying parameter associated with the message are obtained. The message comprises a plurality of units. A plurality of one-unit message authentication codes is generated, wherein each one-unit message authentication code corresponds to a respective unit of the plurality of units of the message, and wherein each one-unit message authentication code is generated based on the identifying parameter associated with the message, a given one of the plurality of units, and the position of the given unit in the message. Verification of each unit of the message may then be efficiently performed inside a method of secure computation such as, by way of example only, a garbled circuit. | 2016-02-11 |
20160044032 | SETUP OF MULTIPLE IOT NETWORK DEVICES - The present disclosure relates to setup of multiple IoT network devices. Specifically, various techniques and systems are provided for setup of multiple similar IoT devices at substantially the same time using joint authentication. More specifically, embodiments of the present invention are directed to methods and systems including, for example, receiving, at an existing network device on a network, one or more communications, wherein the one or more communications include an indication that multiple new network devices are associated with the network; receiving an indication that the multiple new network devices have each generated a setup access point; establishing a connection with the setup access point of each of the multiple new network devices; receiving identification information, wherein the identification information includes information identifying each of the multiple new network devices; and transmitting the identification information identifying each of the multiple new network devices, wherein when the identification information is received, the identification information facilitates generating one or more authentication queries to authenticate one or more of the multiple new network devices. | 2016-02-11 |
20160044033 | METHOD FOR VERIFYING SECURITY DATA, SYSTEM, AND A COMPUTER-READABLE STORAGE DEVICE - The disclosure herein is related to a method for verifying security data, a system, and a computer-readable storage device. The system includes an application server for providing service, and receiving a service request made by a terminal. The system also includes an authentication server for providing identification authentication for receiving a request made by the application server for verifying the terminal. The authentication server sends a signal to the terminal for initiating an authentication process, and processing authentication with the terminal. The authentication server delivers transaction data for the terminal to complete the service access when the connection between the server and terminal is verified. The terminal is permitted to access the service when the terminal passes the authentication and submits a request form according to the data to the application server. | 2016-02-11 |
20160044034 | REMOTE BLIND HASHING - A remote data protection network provides a blind hashing service. A blind hashing server receives a message such as a digest from a client, and uses the message to derive a set of indices or offsets into a huge block of random data that is maintained by the remote data protection network. The corresponding extents of data in the block are combined, e.g. using a hash or HMAC function, and then returned to the invoking client, e.g. as a salt. The message and response may be salted with a unique client salt. | 2016-02-11 |
20160044035 | Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication - Systems and apparatuses for a secure mobile cloud framework (referred to as MobiCloud) for mobile computing and communication are disclosed. Embodiments of MobiCloud transfer each mobile node from a traditional strictly layer-structured communication node into a service node (SN). Each SN may be used as a service provider or a service broker according its capability. Each SN may be incorporated as a virtualized component of the MobiCloud. In some embodiments, MobiCloud mirrors an SN to one or multiple virtual images in the Cloud for addressing communication and computation deficiencies of mobile devices. Virtual images can create a visualized MANET routing and communication layer that can maximally assist the mobile nodes to enable pervasive computing services for each mobile device owner. A secure data processing framework is disclosed for the MobiCloud. | 2016-02-11 |
20160044036 | MANAGING PRIVATE AND PUBLIC SERVICE SET UTILIZATION - Methods, systems, and computer readable media may be operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets. An access point may maintain a list of client devices that have successfully associated with a private service set broadcast from the access point, and when a client device from the list attempts to connect to a public service set broadcast from the access point, the access point may deny the client device's attempt to connect to the public service set. Attempts by the client device to join the public service set may be denied for a predetermined number of attempts or a predetermined period of time. Denying an attempt to connect to a public service set may provide a client device with more opportunities to connect to a private service set broadcast from a corresponding access point. | 2016-02-11 |
20160044037 | NODE AND A METHOD FOR ENABLING NETWORK ACCESS AUTHORIZATION - The embodiments herein relate to a method in an AAA server ( | 2016-02-11 |
20160044038 | PREVENTION OF QUERY OVERLOADING IN A SERVER APPLICATION - A system for processing a transaction request. A transaction request is received by a server computer that includes a user identification and an associated request token, to execute on an application on the server computer. It is determined by the server computer whether available resources on the server computer to perform the transaction are below respective threshold values. In response to determining, by the server computer, that the available resources on the server computer to perform the transaction are below the threshold value, the server computer determines whether the user identification is allowed access to the application. In response to determining that the user identification is allowed access to the application, the transaction is executed on the server computer. In response to determining that the user identification is not allowed access to the application, the transaction is rejected. | 2016-02-11 |
20160044039 | PRIVACY-AWARE PERSONAL DATA STORE - A capability for privacy-aware personal data storage is presented. The capability for privacy-aware personal data storage enables secure storage of data within a personal data store. The data stored in the personal data store may be data produced by a set of connected end devices associated with an entity for which the personal data store stores data of the set of connected end devices. The capability for privacy-aware personal data storage may support visualization of and control over privacy level for data of a connected end device(s) that is stored in the personal data store. The visualization of and control over data stored in the personal data store may be supported by a privacy meter, which may be an object or device that may be integrated with or independent of the connected end device(s) for which the visualization of and control over data stored in the personal data store is supported. | 2016-02-11 |
20160044040 | Environment-Aware Security Tokens - The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset. | 2016-02-11 |
20160044041 | VERIFYING CALLER AUTHORIZATION USING SECRET DATA EMBEDDED IN CODE - In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection domain without disclosing the secret data to a managing operating system. In operation, a security module executes at a higher privilege level than both the managing operating system and the confidential code. After the managing operating system loads the executable of the confidential code, the security module injects the secret data directly into an authorization instruction and a verification instruction included in the confidential code and then sets both the authorization instruction and the verification instruction as executable-only. As the confidential code executes at the assigned privilege level, the authorization instruction and the verification instruction use the secret data to distinguish between unauthorized and authorized execution of the confidential code. | 2016-02-11 |
20160044042 | DIGITAL SOCIAL NETWORK TRUST PROPAGATION - A trust propagation system is disclosed that propagates trust data based on established trust relationships. The trust system may automatically propagate trust data between parties A and C based on trust relationships with a common party B. Trust data may include authentication data such as biometric data, encryption data, passwords, etc. that may be used to conduct exclusive communications. | 2016-02-11 |
20160044043 | METHOD AND DEVICE FOR TRANSMITTING A FILE CONTAINING A CONTROLLED-ACCESS MULTIMEDIA CONTENT - The invention relates to a method for transmitting a controlled-access multimedia content to at least one recipient terminal. The method comprises a step of inserting into a file containing the multimedia content at least one identifier relating to the recipient terminal or to the user of the recipient terminal, the identifier being intended to control access to the multimedia content by the recipient terminal, and a step of dispatching the file to at least the recipient terminal. The invention also relates to a corresponding transmission device. | 2016-02-11 |
20160044044 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An image forming apparatus controls the use of a remote user interface (RUI) by requesting authentication with an RUI access password from a client device in a case where the RUI access password is set. In a case of a department ID management setting, the security setting is different from the RUI access password setting. In this situation, the image forming apparatus requests authentication with the department ID, and then controls the use of the RUI based on the result of the authentication. | 2016-02-11 |
20160044045 | SECURITY VERIFICATION METHOD, APPARATUS, SERVER AND TERMINAL DEVICE - A security verification method is provided. The method includes receiving a security verification request from a terminal device, sending verification information to the terminal device in response to the security verification request, and receiving first converted verification information from the terminal device. The first converted verification information may be generated by converting the verification information according to a preset verification rule. The method may further include determining whether the first converted verification information matches with second converted verification information. The second converted verification information may be generated by converting the verification information according to the preset verification rule. The method may further include determining that a user associated with the terminal device passes security verification if the first converted verification information matches with the second converted verification information. | 2016-02-11 |
20160044046 | SECURE, NON-DISRUPTIVE FIRMWARE UPDATING - Firmware updates for, e.g., thin client devices may be achieved in a seamless, non-disruptive manner using a two-stage firmware loader, including a base loader pre-installed on the device and a caching loader downloaded, by the base loader, from a firmware server and thereafter responsible for downloading and updating other firmware application packages. | 2016-02-11 |
20160044047 | CONTINUOUS USER AUTHENTICATION - Technologies are generally described for authenticating a user account. In some examples, a method performed under control of a server may include providing a communication service to an end device; receiving, from the end device, a text input, while providing the communication service; and authenticating a user account associated with the end device, based on the received text input, while providing the communication service. | 2016-02-11 |
20160044048 | AUTOMATED SECONDARY LINKING FOR FRAUD DETECTION SYSTEMS - Systems, methods, and other embodiments associated with automated secondary linking for fraud detection systems. According to one embodiment, a system includes a parsing logic configured to receive an incoming fraud report based on a first fraud detection strategy. The parse logic is also configured to parse the incoming fraud report into fraud data. The system further includes a search logic configured to search a set of fraud reports to identify instances of the fraud data. The system also includes an alert logic configured to generate an alert in response to an instance of the fraud data being identified in the set of fraud reports. | 2016-02-11 |
20160044049 | DETECTION OF PILEUP VULNERABILITIES IN MOBILE OPERATING SYSTEMS - A system is provided for detecting pileup vulnerabilities corresponding to mobile operating system updates. The system includes: an exploit opportunity analyzer, configured to identify pileup exploit opportunities corresponding to a plurality of mobile operating system configurations based on mobile operating system upgrades for each of the plurality of mobile operating system configurations, wherein the identification of exploit opportunities is based on information relating to pileup flaws; a risk database, configured to store information regarding the identified pileup exploit opportunities for a plurality of versions of each of the plurality of mobile operating system configurations; and a scanner application, configured to be executed by a mobile device, configured to query identified exploit opportunities relating to a particular mobile operating system configuration and version, and to evaluate third-party applications installed at the mobile device based on the identified exploit opportunities. | 2016-02-11 |
20160044050 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. | 2016-02-11 |
20160044051 | COMPUTER PROGRAM, METHOD, AND SYSTEM FOR PREVENTING EXECUTION OF VIRUSES AND MALWARE - Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications and terminating execution of any application not on the inventory recordation while in a protected mode. An instantaneous and unprompted inventory recordation known as a “snapshot” can be performed by the computer program. A user may further train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode can be activated. A smart icon graphical user interface is utilized, that automatically toggles between locked and unlocked depending on if the computing device is at risk or not, to place the computing device in a protected or unprotected mode. | 2016-02-11 |
20160044052 | SYSTEM AND APPARATUS FOR ROGUE VOIP PHONE DETECTION AND MANAGING VOIP PHONE MOBILITY - A method and a system track network access information for authorized network devices. The access information facilitates tracking movement of the device throughout the network. In addition the access information can be used to detect when an unauthorized device attempts to access the network, posing as an authorized device | 2016-02-11 |
20160044053 | Identifying Source of Malicious Network Messages - System, method and program for identifying a subset of a multiplicity of source networks. The subset including one or more source networks which have sent messages to one of a plurality of destination locations having a same IP address. For each of the multiplicity of source networks, a determination is made whether there are fewer intervening hops from the source network to the one destination location than from the source network to other of the plurality of destination locations. If so, the source network is included in the subset. If not, the source network is not included in the subset. One application of the present invention is to identify a source of a denial of service attack. After the subset is identified, filters can be sequentially applied to block messages from respective source networks in the subset to determine which source network in the subset is sending the messages. | 2016-02-11 |
20160044054 | NETWORK APPLIANCE FOR DYNAMIC PROTECTION FROM RISKY NETWORK ACTIVITIES - Electronic appliances, computer-implemented systems, non-transitory media, and methods are provided to identify risky network activities using intelligent algorithms. The appliances, systems, media, and methods enable rapid detection of risky activities. | 2016-02-11 |
20160044055 | VECTOR-BASED ANOMALY DETECTION - Methods of detecting anomalous behaviors associated with a fabric are presented. A network fabric can comprise many fungible networking nodes, preferably hybrid-fabric apparatus capable of routing general purpose packet data and executing distributed applications. A nominal behavior can be established for the fabric and represented by a baseline vector of behavior metrics. Anomaly detection criteria can be derived as a function of a variation from the baseline vector based on measured vectors of behavior metrics. Nodes in the fabric can provide a status for one or more anomaly criterion, which can be aggregated to determine if an anomalous behavior has occurred, is occurring, or is about to occur. | 2016-02-11 |
20160044056 | Methods, Systems, and Computer Program Products for Detecting Communication Anomalies in a Network Based on Overlap Between Sets of Users Communicating with Entities in the Network - Anomalies are detected in a network by detecting communication between a plurality of entities and a set of users in the network, determining an overlap between subsets of the set of users that the entities comprising the plurality of entities communicated with, respectively, and determining whether the communication between the plurality of entities and the set of users is anomalous based on the overlap. | 2016-02-11 |
20160044057 | Cyber Security Posture Validation Platform - A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described. | 2016-02-11 |
20160044058 | MANAGING SECURITY OF ENDPOINTS OF A NETWORK - Disclosed are various embodiments for analyzing endpoints of a network, including determining security statuses for clients on the network. A recommendation may be made for the clients from the determined security statuses. A user interface may be generated to provide a user with the recommendation. The user interface may include a summary of the security statuses for the clients. | 2016-02-11 |
20160044059 | DETECTION OF SIDE CHANNEL ATTACKS BETWEEN VIRTUAL MACHINES - Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt (IPI) rate of a first virtual machine (VM), a time stamp counter (TSC) rate of a second VM, and a cache miss ratio (CMR) of a third VM may be monitored. A side channel attack may then be detected based on the IPI rate, the TSC rate, and the CMR. | 2016-02-11 |
20160044060 | POLICY SYNCHRONIZATION FOR MULTIPLE DEVICES - Technologies are generally described for generating policies for multiple devices associated with a user. In some examples, one or more policies associated with a user may be accessed. The policies may pertain to one or more computing devices associated with the user. The capabilities of an additional computing device to be associated with the user may be determined. Based on the determined capabilities, which of the one or more policies are applicable to the additional computing device may be identified. Based on the identified policies, a default set of policies for the additional computing device may be automatically generated. | 2016-02-11 |
20160044061 | METHOD AND SYSTEM FOR AUTOMATED CYBERSECURITY INCIDENT AND ARTIFACT VISUALIZATION AND CORRELATION FOR SECURITY OPERATION CENTERS AND COMPUTER EMERGENCY RESPONSE TEAMS - A method and system is provided for visualizing and navigating cybersecurity information. A hypertree is displayed on a display device of a computerized system. The hypertree includes a plurality of nodes linked by edges, one or more of the nodes representing cybersecurity incidents, and one or more of the nodes representing elements or artifacts of cybersecurity incidents, the edges representing a specific relationship between the nodes linked by the edges. The computerized system displays an interactive navigation aid to enable a user to navigate the hypertree, and receives a navigation command from the user through the interactive navigation aid. The computerized system modifies the displayed hyerptree in response to the navigation command. The navigation command comprises selective elimination or restoration of edges or nodes on the hypertree so as to enable the user to readily visualize interrelationships between the displayed nodes that are significant to a cybersecurity investigation or response. | 2016-02-11 |
20160044062 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND METHOD FOR CONTROLLING INFORMATION PROCESSING SYSTEM - An information processing system includes a first information processing apparatus for setting a security policy, and a second information processing apparatus subject to a function restriction according to the security policy set by the first information processing apparatus. The first information processing apparatus includes a generation unit generating forced data based on the security policy to set. The forced data includes a setting value for determining an operation of the second information processing apparatus and control information for controlling prohibition of a change of the setting value in the second information processing apparatus. The second information processing apparatus includes an application unit performing application processing for setting the setting value included in the forced data generated by the first information processing apparatus to the second information processing apparatus and enabling a prohibition control on a change of the setting value based on the control information about the setting value. | 2016-02-11 |
20160044063 | Session Association Method, Apparatus, and System - A session association method, apparatus, and system. The method includes collecting call control signaling, on a signaling link of a control plane in a communications network, transmitted by network elements, where the call control signaling includes speech channel information; and performing session association on the call control signaling according to the speech channel information. | 2016-02-11 |
20160044064 | FAST METHOD OF INITIALIZING A CALL FOR AN APPLICATION OF PTT TYPE ON AN IP-WAN CELLULAR NETWORK - A method for initializing a call for a mobile terminal including PTT applications on an IP-WAN cellular network, the method including, for each user of the mobile terminal connected to an IP-WAN modem intended to register for a group call: upon starting up the IP-WAN modem, connecting the mobile terminal to the IP-WAN cellular network; when a PTT client is active and has obtained an IP address of a PTT server, initiating by the PTT client a procedure for registering a SIP with the PTT server on a default IP-WAN carrier; performing by the PTT client a procedure for affiliation to a call group with the PTT server on the default IP-WAN carrier, and as soon as the procedure for affiliation to the call group is performed, executing an “INVITE” (SIP) procedure to RTP resources at an application level on a PTT side and on the PTT client side, to allow the establishment of the RTP session after the affiliation of the PTT client to the group. | 2016-02-11 |
20160044065 | HYBRID LOCATION - A location application can be configured to detect a call to a particular telephone number. The location application can also be configured to receive a plurality of radio frequency (RF) signals provided through a plurality of different RF interfaces. Each of the RF interfaces can be configured to receive RF signals of different protocols. The location application can also be configured to determine an identifier (ID) for a source of each of the RF signals. At least two of the RF signals can be of different protocols. The location application can also be configured to insert the ID for the sources of each of the RF signals into call signaling for the call. | 2016-02-11 |
20160044066 | PERSONALIZED TELEPRESENCE SERVICE PROVIDING METHOD AND APPARATUS THEREOF - Exemplary embodiments of the present invention relate to a telepresence service providing method and an apparatus thereof. The telepresence service providing method according to the present invention comprises: receiving at least one of current location information, peripheral device information acquired at the current location, and noise information acquired at the current location from a user device; generating or updating a service profile which specifies a service mode corresponding to the user device and a device profile which specifies functions which the user device and the peripheral devices can provide, based on the received information; and transmitting data for telepresence services to at least one device of the user device and the peripheral devices based on the profiles. According to exemplary embodiments of the present invention may provide a telepresence service with consideration of user's surrounding environment. | 2016-02-11 |
20160044067 | CALL COUPLING - A method for establishing for a first smartphone a phone connection with a second smartphone, each smartphone comprising a phone and running a software application (“app”), the method comprising: exchanging, by operating the app, at least one permission message between the first and second smartphones; transmitting a first identifier from the first smartphone and a second identifier from the second smartphone to a call connector, responsive to a successful exchanging of the at least one permission message; and connecting a first phone call and a second phone call to establish a phone connection between the first and second smartphones, if the first phone call matches the first identifier and the second phone call matches the second identifier. | 2016-02-11 |
20160044068 | CENTRAL CONFERENCING ROUTING SERVER - Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. | 2016-02-11 |
20160044069 | SYSTEM AND METHOD FOR RELIABLE MESSAGING BETWEEN APPLICATION SESSIONS ACROSS VOLATILE NETWORKING CONDITIONS - An electronic device is provided comprising a processor, a memory coupled to the processor, and a communications module saved in the memory and an application saved in the memory. The communications module configures the processor to generate a first transmission sequence number associated with a transport message to be sent to a remote device, include the first transmission sequence number in the transport message, and send the transport message to the remote device. | 2016-02-11 |
20160044070 | AUTOMATIC INITIATION OF A COLLABORATIVE SESSION - A method includes a conference facilitation server to determine whether a conference initiator has defined a set of conference parameters, storing the set of conference parameters in a database. The server communicates a conference invitation to each of the proposed participants using contact identifiers and designates the proposed participants as a confirmed participants when the proposed participants send conference acknowledgements to the conference server, responsive to the conference invitation to participate in a collaborative session. The server automatically initiates a first attempt to establish communications with each of the confirmed participants at the conference time on the conference date through a conference medium using contact identifiers. If the first attempt to establish communication fails then the server automatically initiates an additional attempt to establish communications with a particular confirmed participant with whom the first attempt has failed. | 2016-02-11 |
20160044071 | SHARING A WEB BROWSER SESSION BETWEEN DEVICES IN A SOCIAL GROUP - A content sharing platform for sharing a web browser session between users in a social group is disclosed. The content sharing platform enables users of mobile devices to share a reference to the social group between users in the social group. A web sharing session is initiated by running a bookmarklet on a web page accessed by a primary user in the social group. Content from the web page and an action of the primary user on the web page are encoded into an image. The encoded image is associated with the reference to the social group and presented on a web page to one or more secondary users in the social group. | 2016-02-11 |
20160044072 | INFORMATION PROCESSING APPARATUS, DATA PROCESSING METHOD THEREOF, AND PROGRAM - An information processing apparatus ( | 2016-02-11 |
20160044073 | SUGGESTION AND BACKGROUND MODES FOR REAL-TIME COLLABORATIVE INTELLIGENCE SYSTEMS - Systems and methods for real-time collaborative computing and collective intelligence are disclosed. A collaborative application runs on a collaborative server connected to a plurality of computing devices. Collaborative sessions are run wherein a group of independent users, networked over the internet, collaboratively answer questions in real-time, thereby harnessing their collective intelligence. Systems and methods for suggestion modes wherein group users select one suggestion from a plurality of suggestions are disclosed, including systems and methods for multi-phase, multi-group suggestion mode embodiments. Methods for background swarming modes and reactivation of the group are also disclosed. | 2016-02-11 |
20160044074 | DISTRIBUTED STREAM PROCESSING - In a computing device supporting distributed stream processing, a regularizer process is started by a first thread executing at a computing device. The regularizer process is a separate process from a process executing on the first thread. The started regularizer process, sends a presence announcement to a controller device; receives a presence acknowledgement from the controller device; sends a notification to the first thread that the started regularizer process is ready to receive streamed data; receives, from the controller device, an indicator of a data provider system that is to connect to the started regularizer process; receives a connection request from the data provider system; compares the received connection request to the received indicator; sends a connection acknowledgement to the data provider system when the received connection request matches the received indicator; accepts a connection from the data provider system; and receives the streamed data through the connection. | 2016-02-11 |
20160044075 | STREAMING MEDIA DELIVERY COMPOSITE - A system delay factor associated with a segment file of a streaming media product is determined. A file transfer delay factor associated with the segment file of the streaming media product is also determined. A media delivery composite is determined for the segment file of the streaming media product based upon, at least in part, the system delay factor associated with the segment file and the file transfer delay factor associated with the segment file. | 2016-02-11 |
20160044076 | IN-HOUSE LOCATION BASED SERVICES - A mobile device of a user discovers topological information about electronic devices in a premise environment, and shares such information with a media gateway. The media gateway uses the topological information to augment content from a server, such as a web page that supports access to media content, to add graphical objects corresponding to those electronic devices in proximity to the mobile device that are capable of reproducing the streaming media content. Selection of the one of the add-on graphical objects causes delivery of the media content to the corresponding electronic device instead of the display of the mobile device. In this manner, a more natural selection mechanism than that available using conventional pull-down lists of options is provided. | 2016-02-11 |
20160044077 | POLICY USE IN A DATA MOVER EMPLOYING DIFFERENT CHANNEL PROTOCOLS - Techniques and mechanisms described herein facilitate the transmission of a data stream to a networked storage system. According to various embodiments, a request to transfer the data stream to the networked storage system may be received at a data mover located at a client device. The data mover may be configured to transfer data to the networked storage system via two different communications protocol interfaces. The data stream may be transmitted to the networked storage system over a network via a first one of the interfaces when a first characteristic associated with the data stream meets a designated criterion. | 2016-02-11 |
20160044078 | METHOD AND APPARATUS FOR DELIVERING MEDIA CONTENT UTILIZING SEGMENT AND PACKAGING INFORMATION - Aspects of the subject disclosure may include, for example, receiving multicast multi-bitrate streams that include segment and packaging information for media content where the segment and packaging information includes fragment start and end boundary point markers for the media content, generating an adaptive bitrate stream for the media content according to the segment and packaging information, and providing the adaptive bitrate stream to an end user device via unicast. Other embodiments are disclosed. | 2016-02-11 |
20160044079 | DISTRIBUTION CONTROL SYSTEM, DISTRIBUTION CONTROL METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - A distribution control system distributes, to a communication terminal, first frame data capable of being reproduced singly by the communication terminal or second frame data as a difference with the previous frame data distributed to the communication terminal. The distribution control system includes a generating unit configured to generate the first frame data or the second frame data from certain frame data; and a transmitting unit configured to transmit third frame data with the contents being not updated or non-update information indicating that the contents are not updated, in place of the first frame data or the second frame data, to the communication terminal when contents of the certain frame data are not updated over a certain range or more as compared with contents of the frame data previously generated. | 2016-02-11 |
20160044080 | SYSTEMS AND METHODS FOR MULTICAST DELIVERY OF A MANAGED BUNDLE IN SERVICE PROVIDER NETWORKS - A method is provided for distributing video content by a network operator. The method includes receiving media streams including programs having a prescribed duration; assigning a traffic index for each program contained within the media streams, each traffic index reflecting the volume of traffic expected to be associated with the program by client devices; selecting a predetermined number of programs to provide to client devices based at least in part on the traffic index for each program; encoding said selected program as individual adaptive bitrate streams; and streaming said encoded individual adaptive bitrate streams to client devices over the network as a managed bundle, wherein the adaptive bitrate streams in the bundle are multicast simultaneously to the client devices. | 2016-02-11 |
20160044081 | DISTRIBUTED STREAM PROCESSING - In a computing device supporting distributed stream processing, a request is received from a controller device to redistribute blocks storing streamed data. The request indicates that a number of blocks stored on the computing device be sent to a second computing device. The controller device controls distribution of analytic results to a data access system. The analytic results are computed from the streamed data. The indicated number of blocks are selected from the blocks storing the streamed data. The selected blocks are sent to the second computing device. Pointers to remaining blocks of the blocks storing the streamed data are updated. | 2016-02-11 |
20160044082 | QoS-GUARANTEED VIDEO STREAM METHOD AND SYSTEM, AND TRANSMITTING SERVER - Provided is a quality-of-service (QoS)-guaranteed video stream method. The QoS-guaranteed video stream method includes transmitting, by a transmitting server, a video stream including different video stream data for a plurality of respective layers, to a relay server, receiving, by the transmitting server, first section network state information which is information about a network state between the relay server and the transmitting server, from the relay server, receiving, by the transmitting server, second section network state information which is information about a network state between the plurality of respective user terminals and the transmitting server, and adjusting, by the transmitting server, qualities of video streams which are transmitted to the plurality of respective user terminals through the relay server by using network state information of the first section and network state information of the second section. | 2016-02-11 |
20160044083 | SYSTEMS AND METHODS FOR CLIENT-SIDE CONTEXTUAL ENGAGEMENT - Disclosed is a new approach for client-side contextual engagement with a website visitor. A browser loads a page containing a reference to a script file implementing a visitor client. The visitor client may store visitor client data including site rules and a visitor profile locally on the client device. The visitor client may include a context monitor for calling the decision engine, a decision engine for evaluating the site rules relative to a context defined at least partially by events occurring on the page and the visitor profile, and a widget manager for managing visitor client data persisted on the client device. The content monitor may call the decision engine when the context changes. The decision engine may determine, in real time and relative to the context, that proactive or reactive engagement(s) may be appropriate and call the widget manager to launch and display corresponding engagement channel(s) on the page. | 2016-02-11 |
20160044084 | SYSTEM AND METHOD FOR FACILITATING POSTING OF PUBLIC AND PRIVATE USER COMMENTS AT A WEB SITE - A software system and method that allows web site operators to adapt web pages for posting of public and private user comments. An administrator accesses a web site to enter data for creating reader comment areas. HTML code for the reader comment areas is generated for insertion into web pages. When the web page containing the code is posted to a web site, the code results in a reader comment display page where web site visitors can comment on the content of the particular web page where the reader comment area appears. Comments are saved at a remote web site accessible to the administrator. The administrator may review and manage the reader comments. A reader who makes a comment on a web page has the option of creating a personal journal comprising all comments entered by the reader at any web page enabled according to the invention. | 2016-02-11 |
20160044085 | FIELD DEVICE, COMMUNICATION CHIP, AND METHOD FOR A WEB ACCESS TO A FIELD DEVICE - The invention relates to a method for accessing a field device in order to simplify and/or improve web access to a field device. The field device is connected to a field bus designed for an Industrial Ethernet protocol or ProfiNET, and the method comprises transmitting a request from a web browser to a web server implemented in the field device, processing the received request in the field device by using a protocol stack of the Industrial Ethernet protocol, the protocol stack being stored in the field device, and transmitting response information from the web server to the web browser. The web server is implemented in the communication chip of the field device and both the communication with the controller and the web server use the same ProfiNET stack. The invention further relates to a field device designed to perform the method, and to a communication chip. | 2016-02-11 |
20160044086 | Delivering Files to a Mobile Device - Among other things, in controlling a download of one or more files from a server to a mobile device, account is taken of at least two of: an urgency of the file, the existence of a user-indicated preference about the download, a power status of the mobile device, and a network connectivity status of the mobile device. | 2016-02-11 |
20160044087 | USER CONTACT INFORMATION PRIVACY PROTECTION IN COMPUTER NETWORKS - A method and a device are disclosed including software components that are executed on a computing device to enable finding, adding, and sending messages to users within a social network. In various embodiments, a requesting user may request finding, adding, and/or sending messages to one or more other users in a social network, the other users presently being on one or more contact lists associated with the requesting user. The requesting user's contact list may be used to verify that he knows the other users and respond to the requesting user's request based on the requesting user's own contact list, without supplying additional information from the other users. In various embodiments, the requesting user's contact list may be partitioned into two sections, one section including the other users who are also in the social network and the other including the other users who are not in the social network. | 2016-02-11 |
20160044088 | Reverse Seamless Integration Between Local and Remote Computing Environments - Methods and systems for transparent user interface integration between remote (“published”) applications and their local counterparts are described, providing a seamless, unified user experience, and allowing integration of a start menu, dock, taskbar, desktop shortcuts, windows, window and application switching, system tray elements, client-to-host and host-to-client file type association, URL redirection, browser cookie redirection, token redirection, status message interception and redirection, and other elements. These methods and systems further enhance theme-integration between a client and remote desktop or virtual machine by remoting all UI elements to a recipient for generation, including text controls, buttons, progress bars, radio buttons, list boxes, or other elements; presenting them with the receiver's product and OS-specific UI; and returning status back to the sender. This may achieve a more unified and transparent UI integration. Furthermore, international text may be correctly received in cross-language environments, or translated into the language of the presenting environment. | 2016-02-11 |
20160044089 | CONTEXT-BASED CONTACT NOTIFICATION - Disclosed are systems and methods for providing a context-based notification from a first device to a second device. In an embodiment, the first device is associated with a driver travelling to pick up a passenger, and the second device is associated with the passenger. Substantially at a notification point, the first device determines if, how, and when to transmit an auto-notification to the second device based on context. For example, if the passenger is not near the meeting point, then a notification is not sent, whereas if the passenger is in a conference with others, then a text rather than a call is sent. If traffic between the notification point and the meeting point is heavy, then the notification is delayed until the expected amount of travel time remains. | 2016-02-11 |
20160044090 | TRIGGERING A COMMUNICATIVE ACTION BASED ON A CLIENT-DETERMINED RELATIONSHIP BETWEEN PROXIMATE CLIENT DEVICES - In an aspect, a client device detects a set of proximate client devices. The client device classifies, for each respective proximate client device in the set of proximate client devices, a relationship relative to an operator of the client device based on a local evaluation of one or more interactions between the client device and at least one proximate client device from the set of proximate client devices in response to the detecting. The client device determines whether to automatically trigger a communicative action with one or more proximate client devices from the set of proximate client devices based on the classifying. | 2016-02-11 |
20160044091 | EXTENDING MOBILE APPLICATIONS TO THE LOCK SCREEN OF A MOBILE DEVICE - App content, such as an app notification, is displayed on a lock screen or home screen of a mobile device even when the app is closed. In contrast to present app content, the content may be full-screen, engaging, interactive, and media-rich. An app content SDK is inserted into an app and works directly with native app software. The content SDK determines whether the app has permission to display content on, for example, a lock screen. It may also determine whether the app has priority in displaying the content. The content itself is retrieved either from a content server or from the app itself. In either case, the retrieval and display of the content is coordinated and managed by the SDK which may use other constraints, such as date/time, geographic location, and device motion patterns to determine which content should be displayed. | 2016-02-11 |
20160044092 | DYNAMIC ASSIGNMENT OF TRANSFERS OF BLOCKS OF DATA - A computer-program causing a computing device to transmit a command to a data storage cluster for multiple data transfer threads thereof to request assignment of a data transfer from a distribution thread; await receipt of a request for assignment from a data transfer thread; compare the quantity data transfer threads to the quantity of computation threads of a data processing cluster; assign to the data transfer thread an exchange of a block of data with a single computation thread in response to receipt of the request and to the multitude of data transfer threads comprising a greater quantity of threads than the multitude of computation threads; and assign to the data transfer thread exchanges of multiple blocks of data with multiple computation threads in response to receipt of the request and to the multitude of data transfer threads comprising a lesser quantity of threads than the multitude of computation threads. | 2016-02-11 |
20160044093 | ELECTRONIC SYSTEM WITH CUSTOM NOTIFICATION MECHANISM AND METHOD OF OPERATION THEREOF - An electronic system includes: a control unit configured to: generate a media content for presenting on a device including a subcontent based on a content template, which includes a configurable element, determine a user information for identifying the device within a context, and update the subcontent with the configurable element, which is adjusted based on the media content and the context, and a communication interface, coupled to the control unit, configured to communicate the subcontent for presenting on the device. | 2016-02-11 |
20160044094 | METHOD, CONFIGURATION, USE OF THE METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING ENERGY ENGINEERING DATA - A method evaluates power engineering data using a data request that is transmitted to a coupling device by a first communication link. The coupling device is used to convert the data request from a coupling data format into a further data request that is specific to an energy engineering device in a device-specific data format. The further data request is transmitted to the power engineering device by a second communication link. The power engineering device transmits its power engineering data, requested by the further data request, to the coupling device by the second communication link. The power engineering data are in a data format that is specific to the power engineering device, and the coupling device converts all the power engineering data requested by further data requests into a data response in the coupling data format and uses the first communication link to transmit them to the evaluation device. | 2016-02-11 |
20160044095 | DISTRIBUTING SERVICE SESSIONS - Provided are methods and systems for distributing service sessions from a client device in a service data network. A packet of the service session is received by a forwarding node. The forwarding node determines whether the packet matches a service address associated with the service session. Responsive to the determining, a servicing node associated with the service address is selected based on a forwarding policy. The packet is sent to the selected servicing node. The servicing node determines whether the packet is a service request packet. A server is selected based on a service policy, wherein the server is configured to serve the service session. The packet is sent to the server. Before being received by a forwarding node, the packet is received by a gateway node. The gateway node determines whether the packet matches the service address and selects the forwarding node based on a notification. | 2016-02-11 |
20160044096 | Scaling Up and Scaling Out of a Server Architecture for Large Scale Real-Time Applications - Scaling up and scaling out of a server architecture for large scale real-time applications is provided. A group of users may be provisioned by assigning them to a server pool and allotting them to a group. Grouped users help to reduce inter-server communication when they are serviced by the same server in the pool. High availability may be provided by choosing a primary server and one or more secondary servers from the pool to ensure that grouped users are serviced by the same server. Operations taken on the primary server are synchronously replicated to secondary servers so that when a primary server fails, a secondary server may be chosen as the primary for the group. Servers for multiple user groups may be load balanced to account for changes in either the number of users or the number of servers in a pool. Multiple pools may be paired for disaster recovery. | 2016-02-11 |
20160044097 | Rebalancing of Distribution Group Servers - The invention relates to an architecture that facilitates assigning and load balancing of rooms assigned to at least one server. In an illustrative embodiment, the method comprises retrieving a current number of assigned rooms to each server, retrieving a current number of unassigned rooms, determining a current server weight for each of at least a subset of the at least one server within the at least two distribution groups, determining a total server weight, and calculating the number of rooms to load for at least a given one of the at least one server based at least in part on the number of unassigned rooms, total server weight, and current server weight of the given one of the at least one server. | 2016-02-11 |
20160044098 | CODING METHODS OF COMMUNICATING IDENTIFIERS IN PEER DISCOVERY IN A PEER-TO-PEER NETWORK - Systems and methodologies are described that facilitate identifying peers based upon encoded signals during peer discovery in a peer to peer network. For example, direct signaling that partitions a time-frequency resource into a number of segments can be utilized to communicate an identifier within a peer discovery interval; thus, a particular segment selected for transmission can signal a portion of the identifier, while a remainder can be signaled based upon tones communicated within the selected segment. Moreover, a subset of symbols within the resource can be reserved (e.g., unused) to enable identifying and/or correcting timing offset. Further, signaling can be effectuated over a plurality of peer discovery intervals such that partial identifiers communicated during each of the peer discovery intervals can be linked (e.g., based upon overlapping bits and/or bloom filter information). | 2016-02-11 |
20160044099 | INTERNET PROTOCOL (IP) MULTIMEDIA SUBSYSTEM (IMS) BASED PEER-TO-PEER (P2P) CONTENT DISTRIBUTION - A Technology for providing peer-to-peer (P2P) content distribution via a P2P applications server is disclosed. In an example, service control function (SCF) module can be operable for P2P content distribution and include computer circuitry configured to host P2P applications server operable to manage Internet protocol (IP) multimedia subsystem (IMS) content distribution between two user equipments (UEs). | 2016-02-11 |
20160044100 | ACCELERATING TRANSFER PROTOCOLS - Techniques and mechanisms described herein facilitate the acceleration of data transfer protocols via client side de-duplication techniques for transmitting data from a client device to a networked storage system while maintaining protocol usage characteristics. while preserving the same presentation semantics to the users. A data chunk may be determined at a client device by parsing a data stream generated at the client device via a network storage protocol. A fingerprint for the data chunk may be identified by applying a hash function to the data chunk. A determination may be made as to whether the chunk is stored at a networked storage system by transmitting the fingerprint to the networked storage system via a network. The client device may transmit a block map update request message including information for updating a block map to the networked storage system. | 2016-02-11 |
20160044101 | CONFLICT RESOLUTION FOR KEYCHAIN SYNCING - Some embodiments provide a program that synchronizes a keychain stored on a device with a set of other devices. The keychain includes a set of keychain items. The program receives (1) a list of keychain items for updating the keychain stored on the device and (2) data representing the keychain items specified in the list of keychain items. For each keychain item in the list of keychain items, the program updates the keychain stored on the device with the data that represents the keychain item. | 2016-02-11 |
20160044102 | METHOD AND APPARATUS FOR SYNCHRONIZING DATA INPUTS GENERATED AT A PLURALITY OF FREQUENCIES BY A PLURALITY OF DATA SOURCES - Methods and apparatuses are disclosed for synchronizing data inputs generated at a plurality of frequencies by a plurality of data sources. A device receives a first set of data points from a first data source of the plurality of data sources generated at a first frequency of the plurality of frequencies, receives a second set of data points from a second data source of the plurality of data sources generated at a second frequency of the plurality of frequencies, selects a time window corresponding to a period of time during which at least a subset of the first set of data points and at least a subset of the second set of data points were generated, and generates a vector representing a first reduced form of the subset of the first set of data points and a second reduced form of the subset of the second set of data points. | 2016-02-11 |
20160044103 | METHOD AND APPARATUS FOR SYNCHRONIZING APPLICATION OF ELECTRONIC DEVICE - An apparatus and method for synchronizing applications of an electronic device include identifying, at the electronic device, a first data transmission time corresponding to a first application and a second data transmission time corresponding to a second application. A third data transmission time corresponding to the first application is determined based on the first data transmission time and a fourth data transmission time corresponding to the second application based on the second data transmission time. Data associated with the first application is transmitted from the electronic device at a fifth data transmission time determined based on at least the fourth data transmission time. | 2016-02-11 |
20160044104 | SYNCHRONIZING AN APPLICATION ON A COMPANION DEVICE - A media server machine may be configured to provide media content within a datastream. This datastream may be provided to a media device that is configured to present the media content on a display. Also, this datastream may contemporaneously contain an “app-sync indicator” for the media content. The app-sync indicator is a data structure that signals the media device to launch an application on a companion device. By providing the app-sync indicator contemporaneously with the media content in the datastream, the launching of the application on the companion device may be synchronized with the media content. The app-sync indicator may specify the application to be launched. Also, the app-sync indicator may specify supplemental content to be presented by the launched application on the companion device. | 2016-02-11 |
20160044105 | MANAGED OBJECT REPLICATION AND DELIVERY - A method, system and computer program product for managed object replication and delivery redirects, directly or indirectly, a client's request for an object that is not available at a best or optimal handling edge server of a network to a parent server that has the requested object. So, where the requested object is not available at the handling edge server, the client's request is redirected directly to the parent server that can provide the requested object to the client or indirectly via one or more parent servers to a parent server that can provide the requested object to the client. The method, system and computer program product further intelligently replicates the object to the edge server if the object is popular enough. Likewise, an object is removed from an edge server when it is no longer popular. All redirection and replication operations are preferably transparent to the end-user and do not degrade the quality of service. | 2016-02-11 |
20160044106 | DEVICE AND RELATED METHOD FOR DYNAMIC TRAFFIC MIRRORING - A function is provided in a network system for the dynamic mirroring of network traffic for a variety of purposes including the identification of characteristics of the traffic. Multiple criteria are established for when, what and where to mirror the traffic. The criteria include what frames of traffic to mirror, what portions of the selected frames to mirror, one or more portals through which to mirror the selected frames, a destination for the mirroring and the establishment of a mirror in a device to carry out the mirroring. The criteria may also include when to stop the mirroring. The mirroring instructions can be changed based on the detection of a triggering event, such as authentication, device type or status, ownership of an attached function attached to the device, flow status, but not limited to that. The function may be established in one or more devices of the network. | 2016-02-11 |
20160044107 | HIGH SPEED COMMUNICATION PROTOCOL - The present disclosure involves systems, software, and computer implemented methods for providing high speed communication between a sending system and a receiving system. One computer-implemented method includes determining, by a computer, that data is available for serialization using a pointer transfer; getting a data block of the data from a memory; getting metadata corresponding to the data block; writing an original address of the data block to a transport layer; writing the data block to the transport layer; determining that the data corresponding to the data block contains pointers; and adding a referenced data block to one or more data blocks to be transferred to a receiving system. | 2016-02-11 |
20160044108 | DISTRIBUTED STORAGE SYSTEM WITH WEB SERVICES CLIENT INTERFACE - A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node. | 2016-02-11 |
20160044109 | Concurrently Uploading Multimedia Objects and Associating Metadata with the Multimedia Objects - In one embodiment, a first computing device receives a first user input selecting a set of multimedia objects stored on the first computing device, and initiates upload of the set of multimedia objects to a second computing device. While the upload is in progress, a second user input is concurrently received selecting a subset of the set of multimedia objects, and a third user input is concurrently received comprising metadata, and the metadata is associated with one or more multimedia objects from the subset of multimedia objects. | 2016-02-11 |
20160044110 | METHODS, DEVICES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING AND DELIVERING MEDIA CONTENT - An aspect of managing media content includes a memory device and a processor communicatively coupled to the memory device. The processor executes program instructions for causing the processor to perform operations. The operations include providing user-selectable options for managing storage space in the memory device that is allocated for an account. The options include an option for defining a condition for generating an alert when a threshold amount of the storage space is consumed. The operations also include receiving a data stream from a media device assigned to the account, determining an encoding rate corresponding to the data stream, monitoring consumption of the storage space, and upon determining the condition is met, transmitting the alert to the media device. The alert indicates an amount of storage space consumed and an approximated amount of recording time remaining for the data stream before a maximum capacity of the storage space is reached. | 2016-02-11 |
20160044111 | APPARATUS AND METHOD FOR ZONE MANAGEMENT - The present disclosure relates to a sensor network, machine type communication (MTC), machine-to-machine (M2M) communication, and technology for Internet of things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. An apparatus for zone management is provided. The apparatus includes a processor configured to collect environment information of each zone of a plurality of zones, and determine an energy efficiency level of each zone of the plurality of zones based on the environment information. | 2016-02-11 |
20160044112 | User Feedback Systems and Methods - An exemplary method includes detecting, by a user feedback system, ring-back content provided to a first computing device during a connection period prior to beginning a communication session between the first computing device and a second computing device, and providing, by the user feedback system in conjunction with the detecting of the ring-back content provided to the first computing device, a feedback mechanism that facilitates a user of the first computing device providing feedback regarding the ring-back content. Corresponding systems and methods are also described. | 2016-02-11 |
20160044113 | ADVANCED NETWORK CHARACTERIZATION - Some embodiments include a method for determining whether to establish a connection between a computer and a network. In some embodiments, the method includes: receiving first network information from a network; determining a first trust level for the network by matching the network information to provisioning information, wherein the provisioning information indicates the first trust level and an authentication method of the network; verifying that network supports the authentication method, wherein the verifying includes exchanging information with the network; after verifying that the network supports the authentication method, establishing a connection to the network, wherein the connection provides access to an Internet. | 2016-02-11 |