08th week of 2015 patent applcation highlights part 55 |
Patent application number | Title | Published |
20150052499 | ECOSYSTEM CERTIFICATION OF A PARTNER PRODUCT - Exemplary systems and methods certify a partner product for use with an originally developed product. A certification agent within a partner computing system transmits, to a certification server that is external to the partner computing system, an indication that the certification agent is ready to run a certification test of a partner product. The certification agent is configured to run the certification test. The certification agent is communicatively coupled to a testbed operating within the partner computing system and in which the partner product is to be tested. The certification agent receives, from the external certification server, an instruction to implement at least a portion of the certification test. In response to receiving the instruction, the certification agent initiates the portion of the certification test within testbed. | 2015-02-19 |
20150052500 | TESTING COMPUTER-IMPLEMENTABLE INSTRUCTIONS - Briefly, embodiments of methods or systems for testing software modules are disclosed. | 2015-02-19 |
20150052501 | CONTINUOUS DEPLOYMENT OF CODE CHANGES - A processor implemented method to deploy a code change in a software application. The code change is assigned to a deployment pipeline based on a filtering rule. The code change is deployed after the code change passes a set of test criteria associated with the deployment pipeline. | 2015-02-19 |
20150052502 | SETTING BREAKPOINTS IN A CODE DEBUGGER USED WITH A GUI OBJECT - An embodiment of the invention pertains to debugging program code associated with graphical objects, wherein the code responds to events of user interactions with the object. A menu is generated that includes user interaction events, and an associated program window is adapted to present the menu to a user when requested, wherein the user can select user interaction events from the menu. For each selected event, the method identifies a component of the program code that is responsive to that selected event. The method further includes setting a breakpoint in the program code in selected relationship with each identified program code component, wherein the subsequent occurrence of one of the selected user interaction events triggers a corresponding one of the breakpoints. | 2015-02-19 |
20150052503 | Automatically Capturing User Interactions And Evaluating User Interfaces In Software Programs Using Field Testing - A method includes analyzing, on a first computing device, data from second computing device(s) of user interaction with a user interface of an application previously executed on the second computing device(s). The data corresponds to events caused by the user interaction with the user interface of the application. The first computing device generates representation(s) of the analyzed data and outputs the representation(s) of the user interaction. Another method includes capturing and logging, by a computing device, events caused by user interaction with a user interface of an application when the application is executed on the computing device. In response to a trigger, data comprising the captured and logged events is sent toward another computing device. Another method includes instrumenting a measurement library into an application to create an instrumented version of the application, and sending the instrumented application to computing device(s). Methods, apparatus, software, and computer program products are disclosed. | 2015-02-19 |
20150052504 | METHOD AND SYSTEM FOR VERIFYING SLEEP WAKEUP PROTOCOL BY COMPUTING STATE TRANSITION PATHS - Disclosed are a method and a system for facilitating verification of program code implementing Sleep Wakeup protocol for a microcontroller. An input handling module is configured to receive metadata from user required for verification of the program code. Identification module is configured to identify abstract syntax tree (AST) nodes corresponding to each program point in the program code. A computation module is configured to compute an actual interrupt protection status (IPS), task lock status (TLS), path entities and shared variables for each program point in the program code. A path analysis module is configured to determine transition paths between program points specified in the metadata, and are computed in terms of the path entities. Also, review information is computed for each of the path entities comprised in the transition paths. Further, a report generation module is configured to generate a report comprising the review information facilitating the user to verify the program code. | 2015-02-19 |
20150052505 | IDENTIFYING AND TRIAGING SOFTWARE BUGS THROUGH BACKWARD PROPAGATION OF UNDER-APPROXIMATED VALUES AND EMPIRIC TECHNIQUES - A software testing tool may use static verification analysis techniques to locate points (lines/events) in computer code at which an error may be present and points (lines/events) in the computer code that may be the underlying cause of the located error points. In one implementation, a device may perform a static verification analysis of computer code to locate a point in the code that causes an error in the execution of the computer code. The static analysis may be performed by analyzing a first set of possible execution paths of the computer code based on an over-approximation of states. The device may back-propagate, from the located point, through a second set of possible execution paths, where the second set of possible execution paths is obtained based on an under-approximation of the states that were over-approximated. Based on the back-propagation, the device may determine potential causes of the error. Additionally, in some implementations, empiric analysis techniques, based on semantic information for the computer code, may also be performed. The empiric analysis techniques may be used to assist in classifying the potential causes of the error. | 2015-02-19 |
20150052506 | RUNTIME MEMORY THROTTLING - A system that implements a memory management policy at runtime when receiving a syntax tree in response to initiating the compiling of software code identifies a plurality of calls within the syntax tree and modifies each the plurality of calls with a corresponding memory-modified call to create a plurality of memory-modified calls. Each memory-modified call is linked with a memory management class and the modifying occurs during the compiling of the software code. Following modification of each of the plurality of calls, the system compiles the plurality of memory-modified calls to generate a bytecode. | 2015-02-19 |
20150052507 | COMPILING OPTIMIZATION OF AN APPLICATION AND COMPILER THEREOF - One aspect is a method for compiling optimization of an application and a compiler thereof. The method includes determining could-be-constant variables in source code of the application. Constant variables designated as final constant variables and values of the constant variables are obtained using the could-be-constant variables. The application is compiled using the constant variables and the values of the constant variables. | 2015-02-19 |
20150052508 | UPGRADE OF SOFTWARE IMAGES BASED ON STREAMING TECHNIQUE - Releasing a portion of mass memory, relocating memory blocks stored in boot locations of the target software image to the released portion, storing the boot blocks into corresponding boot locations, booting the data-processing entity from the boot blocks in the corresponding boot locations thereby loading a streaming function, and serving each request of reading a selected memory block of the target software image by the streaming function, the streaming function downloading the selected memory block from the external source and storing the selected memory block into the released portion when the selected memory block is not available in the mass memory, or retrieving the selected memory block from the mass memory otherwise. | 2015-02-19 |
20150052509 | ASSOCIATED PLUG-IN MANAGEMENT METHOD, DEVICE AND SYSTEM - An associated plug-in management method, device, and system are provided. A first associated plug-in and a second component that uses the first associated plug-in are determined by obtaining description information of the first associated plug-in and information about the second component that uses the associated plug-in, where the description information of the first associated plug-in and the information about the second component are provided by a first component; and then, based on the information about the second component and the description information of the first associated plug-in, the first associated plug-in is installed onto a device on which the second component is located. Thus decoupling during deployment of components related to an associated plug-in is implemented. | 2015-02-19 |
20150052510 | GENERATING A CUSTOMIZED SET OF TASKS FOR MIGRATION OF A DEPLOYED SOFTWARE SOLUTION - A migration set list generator specifies a physical topology of a deployed software solution, wherein the software solution comprises software components and data associated with the software components, integrated into a single entity. The migration set list generator specifies at least one solution change to the deployed software solution to meet at least one business requirement and specifies at least one migration strategy for migrating the deployed software solution. The migration set list generator generates migration tasks for making the at least one solution change to the deployed software solution specified in the physical topology based on the at least one migration strategy and generates a recommended physical topology yielded for the software solution if the physical topology is updated according to the migration tasks. | 2015-02-19 |
20150052511 | SYSTEMS AND METHODS FOR UPDATING A MEDICAL DEVICE - Embodiments described herein include methods and/or systems for updating a medical device. Embodiments include medical devices which are configured for updates in response to various events including connection of a peripheral device to the medical device, a user initiated event, or based on received recommendations. | 2015-02-19 |
20150052512 | SYSTEM AND METHOD FOR UPDATING FIRMWARE ACROSS DEVICES IN A PROCESS FACILITY - Embodiments of a system and method to update firmware across multiple devices in a process facility using a single domain of a FOUNDATION Fieldbus protocol. In one embodiment, the system has a receiving device that couples with a pair of target devices, e.g., a first target device and a second target device. The receiving device includes operating instructions that can process an input and generate an output. The input comprises data comprising a first firmware component and a second firmware component for, respectively, the first target device and the second target device. The receiving device can direct the firmware component to the appropriate target device; generating a first output and a second output that distribute the firmware components to complete the upgrade process. | 2015-02-19 |
20150052513 | LIVE DATA AS A SERVICE AND CORRESPONDING PROGRAMMING INFRASTRUCTURE - Techniques for live data management are described. Some embodiments provide a Live Data Management System (“LDMS”) that provides a facility for managing live data objects and for efficiently developing client-server applications that utilize such live data objects. Live data objects are modules of computation that exist on both a client side and server side portion of a client-server application. Live data objects are configured to monitor changes to data hosted on or accessible via the server side, and to automatically update the client side without the need for polling or other requests made by the client side. The described techniques facilitate efficient software development of Web-based client server applications. | 2015-02-19 |
20150052514 | METHOD AND COMPUTER SYSTEM OF DISTRIBUTING A COMPUTER PROGRAM PRODUCT - In a method of distributing an extension module for a host data program, the extension module is arranged to cooperate with and extend the functionality of the host data program. Source code is provided for the extension module, the source code being arranged so as to be compiled to executable code, and the source code is independent of the platform in which the executable code is to be executed. A first compilation step is performed on the source code to provide the extension module in an intermediate format, the intermediate format also being independent of the platform in which the executable code is to be executed. A vendor stores the extension module in the intermediate format, so that the stored extension module can be compiled to machine-executable format at a later stage. | 2015-02-19 |
20150052515 | METHOD FOR DISTRIBUTING, INSTALLING AND EXECUTING SOFTWARE-DEFINED RADIO APPLICATION - Disclosed is a method for distributing, installing and operating software-defined radio-based radio application independent of hardware and a user application. The radio application comprises a radio controller code and a user-defined function block code. A radio application package for distributing and installing the radio application includes pipeline component metadata for constituting a pipeline of the radio application. The user-defined function block code may be provided in the form of an execution code, a source code or an intermediate representation, and the radio controller code and the user-defined function block code may call a standard function block. Accordingly, with the configuration of the radio application of the present invention and the method for distributing, installing and operating the radio application according to the present invention, various wireless communication systems can be used independently of a modem chip just by downloading and installing the radio application. | 2015-02-19 |
20150052516 | MANAGEMENT OF PRIORITIZING VIRTUAL MACHINES IN AN OPERATING ENVIRONMENT - Embodiments directed toward a method, system, and computer program product for placement of a plurality of virtual machines on a hardware resource are provided. The method can also include generating a user location vector for each candidate virtual machine from the plurality of candidate virtual machines by aggregating a plurality of user location metrics for each candidate virtual machine. The method can also include ranking, in response to a performance resource demanded by the plurality of candidate virtual machines being at or above a threshold of the performance resource available on the hardware resource, the candidate virtual machines as a function of an aggregate user location vector for each candidate virtual machine. The method can include selecting a subset of the candidate virtual machines for migration based on the ranking. | 2015-02-19 |
20150052517 | METHOD AND SYSTEM FOR MIGRATION OF VIRTUAL MACHINES AND VIRTUAL APPLICATIONS BETWEEN CLOUD-COMPUTING FACILITIES - The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing IP and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate. | 2015-02-19 |
20150052518 | METHOD AND SYSTEM FOR PRESENTING AND MANAGING STORAGE IN A VIRTUAL MACHINE ENVIRONMENT - Method and system for presenting storage in a virtual machine environment are provided. A storage volume is allocated to an existing profile, when the existing profile meets attributes for a requested storage and a new profile is generated when an existing profile does not meet the attributes and the storage volume is assigned to the new profile. | 2015-02-19 |
20150052519 | HYPERVISOR DRIVEN EMBEDDED ENDPOINT SECURITY MONITORING - Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method may include providing one or more computer processors configured to operate a bare-metal hypervisor; launching a user OS virtual machine operatively connected to the hypervisor; launching a security virtual machine operatively connected to the hypervisor and receiving data from the security virtual machine via the hypervisor; and receiving data representative of security information from the computer processor processed by the security virtual machine. The hypervisor may include using a virtual switch for providing communications between the user OS virtual machine and the security virtual machine. The method may include using the security virtual machine to monitor malware on the user OS virtual machine. | 2015-02-19 |
20150052520 | METHOD AND APPARATUS FOR VIRTUAL MACHINE TRUST ISOLATION IN A CLOUD ENVIRONMENT - Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment. | 2015-02-19 |
20150052521 | METHOD AND SYSTEM FOR MIGRATION OF VIRTUAL MACHINES AND VIRTUAL APPLICATIONS BETWEEN CLOUD-COMPUTING FACILITIES AND SUBSEQUENTLY PERMANENTLY RELOCATING MIGRATED VIRTUAL MACHINES AND VIRTUAL APPLICATIONS - The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility by internal-network extension and redeployment of virtual machines and virtual applications by a stretch-deploy operation, allowing the virtual machine or virtual application to resume execution on the second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility. In addition, the current document discloses a snap operation that permanently relocates a stretch-deployed virtual machine or virtual application to the second cloud-computing facility. | 2015-02-19 |
20150052522 | Generation of DHCP Configuration Files - Some embodiments provide a method for an application operating on a host machine. The method receives a configuration of a Dynamic Host Configuration Protocol (DHCP) service for implementation within a virtualized container on the host machine. The configuration includes several database table entries. The method converts the several database table entries into a configuration file for use by a process that operates in the virtualized container. the method initializes the process in the virtualized container. The process in the virtualized container reads the configuration file in order to perform DHCP services for machines connected to at least one logical forwarding element of a logical network. | 2015-02-19 |
20150052523 | METHOD AND SYSTEM FOR MIGRATION OF VIRTUAL MACHINES AND VIRTUAL APPLICATIONS BETWEEN CLOUD-COMPUTING FACILITIES THROUGH MULTIPLEXED SECURE TUNNELS - The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing IP and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate. Multiplexing multiple stretch deployed L2 networks over the same secure (SSL-VPN) tunnel, terminating on organization edges. | 2015-02-19 |
20150052524 | METHOD AND SYSTEM FOR REMIGRATION OF VIRTUAL MACHINES AND VIRTUAL APPLICATIONS BETWEEN CLOUD-COMPUTING FACILITIES - The current document discloses methods and systems for extending an internal network within a source cloud-computing facility to a new target cloud-computing facility and redeploying a virtual machine or virtual application previously running on a target cloud-computing facility within the context of an extended internal network in the target cloud-computing facility. The currently disclosed methods and systems, which allow a virtual machine or virtual application formerly executing on a target cloud-computing facility to resume execution on a new target cloud-computing facility, using the computational and storage facilities of the new target cloud-computing facility but depending on network support from the source cloud-computing facility, without changing IP and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate. | 2015-02-19 |
20150052525 | VIRTUAL PRIVATE NETWORKS DISTRIBUTED ACROSS MULTIPLE CLOUD-COMPUTING FACILITIES - The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and using the extended internal network as a basis for creating virtual private clouds distributed across multiple cloud-computing facilities. In one implementation, a pool of IP addresses is allocated and distributed to end appliances of the first and second cloud-computing facilities. In this implementation, the internal network is extended via a secure tunnel between end appliances in the first and second cloud-computing facilities and the end appliances of the extended internal network are configured to route messages transmitted by a first member of the virtual private cloud executing on a first cloud-computing facility to a second member of the virtual private cloud executing on a second cloud-computing facility through the secure tunnel. | 2015-02-19 |
20150052526 | VIRTUAL-MACHINE MANAGING DEVICE AND VIRTUAL-MACHINE MANAGING METHOD - Provided is a virtual-machine managing device including: a model acquiring unit that acquires, for each server device, a performance model indicative of plural correspondent relationships between a workload amount and performance information on a workload; a performance-information acquiring unit that acquires the performance information on a virtual machine to be moved running on a current server device; a conversion unit that converts the performance information on the virtual machine to be moved into a combination of the workload amount and the workload characteristic value concerning the virtual machine to be moved, by using the performance model of the current server device; and an estimating unit that estimates performance information on the virtual machine to be moved on a destination server device serving as a candidate for a destination of movement of the virtual machine to be moved, by applying the combination converted by the conversion unit to the performance model of the destination server device. | 2015-02-19 |
20150052527 | PROVIDING A CUSTOM VIRTUAL APPLIANCE - A method, system and/or computer program product provides a custom virtual appliance. A description file of a custom virtual appliance is generated based on a user requirement. A configuration metadata of the custom virtual appliance is acquired from the description file. A list of candidate virtual appliances is created based on the configuration metadata by using conversion information, wherein the candidate virtual appliances in the list are capable of converting to a configuration that corresponds to the configuration metadata. | 2015-02-19 |
20150052528 | MANAGEMENT OF PRIORITIZING VIRTUAL MACHINES IN AN OPERATING ENVIRONMENT - Embodiments directed toward a method, system, and computer program product for placement of a plurality of virtual machines on a hardware resource are provided. The method can also include generating a user location vector for each candidate virtual machine from the plurality of candidate virtual machines by aggregating a plurality of user location metrics for each candidate virtual machine. The method can also include ranking, in response to a performance resource demanded by the plurality of candidate virtual machines being at or above a threshold of the performance resource available on the hardware resource, the candidate virtual machines as a function of an aggregate user location vector for each candidate virtual machine. The method can include selecting a subset of the candidate virtual machines for migration based on the ranking. | 2015-02-19 |
20150052529 | EFFICIENT TASK SCHEDULING USING A LOCKING MECHANISM - For efficient task scheduling using a locking mechanism, a new task is allowed to spin on the locking mechanism if a number of tasks spinning on the locking mechanism is less than a predetermined threshold for parallel operations requiring locks between the multiple threads. | 2015-02-19 |
20150052530 | TASK-BASED MODELING FOR PARALLEL DATA INTEGRATION - System, method, and computer program product to perform an operation for task-based modeling for parallel data integration, by determining, for a data flow, a set of processing units, each of the set of processing units defining one or more data processing operations to process the data flow, generating a set of tasks to represent the set of processing units, each task in the set of tasks comprising one or more of the data processing operations of the set of processing units, optimizing the set of tasks based on a set of characteristics of the data flow, and generating a composite execution plan based on the optimized set of tasks to process the data flow in a distributed computing environment. | 2015-02-19 |
20150052531 | MIGRATING JOBS FROM A SOURCE SERVER FROM WHICH DATA IS MIGRATED TO A TARGET SERVER TO WHICH THE DATA IS MIGRATED - Provided are a computer program product, system, and method for migrating jobs from a source server from which data is migrated to a target server to which the data is migrated. Mirrored data is copied from a source storage to a target storage. A determination is made of at least one eligible job of the jobs executing in the source server having execution characteristics indicating that the job is eligible for migration to the target server. The determined at least one eligible job is migrated to the target server to execute on the target server and perform operations with respect to the mirrored data in the target storage. The migrated eligible job is disabled at the source server. | 2015-02-19 |
20150052532 | PARALLEL COMPUTER SYSTEM, METHOD OF CONTROLLING PARALLEL COMPUTER SYSTEM, AND RECORDING MEDIUM - A management device includes: a memory; and a processor coupled to the memory. The processor executes a process including: storing therein an assignment table including first assignment information indicating whether a job is assigned to the information processing devices and second assignment information indicating that a job is constantly assigned to virtual information processing devices arranged at ends of a connection relation of the information processing devices; searching regions in which idle information processing devices assigned with no job are arranged continuously, using the assignment table stored at the storing; specifying a region appropriate for assignment of a job as an assignment target among the regions searched by the searching; and assigning the job as the assignment target to the region specified by the specifying. | 2015-02-19 |
20150052533 | MULTIPLE THREADS EXECUTION PROCESSOR AND OPERATING METHOD THEREOF - There is provided a multiple threads execution processor. The multiple threads execution processor includes a thread selector configured to select a first thread from among a plurality of threads for executing a program code, and a thread executor configured to execute the first thread selected by the thread selector, and execute a second thread selected by the thread selector from among the plurality of threads after completing execution of the first thread. | 2015-02-19 |
20150052534 | METHOD AND DEVICE FOR EXECUTING SCHEDULED TASKS, COMPUTER-READABLE STORAGE MEDIUM, GRAPHICAL USER INTERFACE AND MOBILE TERMINAL - A method and device for processing scheduled tasks. Computer readable storage medium, graphical user interface and mobile terminal are also provided. The method includes: acquiring current geographic location and current time of the mobile terminal; determining whether the current geographic location of the mobile terminal matches up to a trigger geographic location preset in the preset scheduled task; determining whether the current time of the mobile terminal matches up to a trigger time of the scheduled task; triggering the mobile terminal to execute the scheduled task, if the geographic location of the mobile terminal matches up to the trigger geographic location and the current time of the mobile terminal matches up to the trigger time of the scheduled task. By determining whether the current geographic location of the mobile terminal matches up to the trigger geographic location of the scheduled task and whether the current time of the mobile terminal matches up to the trigger time of the scheduled task and then to execute the scheduled task, it solves the complex problem that the user has to repeatedly set scheduled tasks in different locations so the mobile terminal can execute the scheduled task according to the current geographic location and time of the user. | 2015-02-19 |
20150052535 | INTEGRATED COMPUTER SYSTEM AND ITS CONTROL METHOD - [Object] A computer system in which a server and a storage apparatus are integrated and operated is designed so that a multi-tenant can be realized favorably. | 2015-02-19 |
20150052536 | DATA PROCESSING METHOD USED IN DISTRIBUTED SYSTEM - Provided is a data processing method which can increase data processing speed without adding a new node to a distributed system. The data processing method may include: calculating a conversion number of cores corresponding to a number of processing blocks included in a graphics processing unit (GPU) of a node of a distributed system; calculating a adding up number of cores by adding up a number of cores included in a central processing unit (CPU) of the node of the distributed system and the conversion number of cores; splitting job data allocated to the node of the distributed system into a number of job units data equal to the adding up number of cores; and allocating a number of job units data equal to the number of cores included in the CPU to the CPU of the node of the distributed system and a number of job units data equal to the conversion number of cores to the GPU of the node of the distributed system. | 2015-02-19 |
20150052537 | BARRIER SYNCHRONIZATION WITH DYNAMIC WIDTH CALCULATION - A sequencer of a processing unit determines, at runtime, a barrier width of a barrier operation for a group threads, wherein the barrier width is smaller than a total number of threads in the group of threads, and wherein threads in the group of threads execute data parallel code on one or more compute units. In response to each thread in a subgroup of the group of threads having executed the barrier operation, the subgroup including a same number of threads as the barrier width, the sequencer may enable the subgroup of the group of threads to execute on the one or more processors past the barrier operation without waiting for other threads in the group of threads to execute the barrier operation, wherein the subgroup of the group of threads is smaller than the total number of threads in the group of threads. | 2015-02-19 |
20150052538 | PARALLEL PROCESSING SYSTEM - Software development tools and techniques for configuring parallel processing systems to execute software modules implementing processes for solving complex problems, including over-the-counter trading processes and foreign exchange trading processes, to execute quickly and efficiently. The parallel processing system may include low-cost, consumer-grade multicore processing units. A process for solving a complex problem may be divided into software modules, including by evaluating the process to determine discrete processing steps that produce an intermediate result on which later steps of the process depend. The software modules created for a process may form a template processing chain describing multiple processing chains of the process that are to be executed. A software development tool for producing configuration information for multicore processing units may evaluate the software modules and the processing chains to determine whether the modules will execute quickly and efficiently on the multicore processing units of the parallel processing system. | 2015-02-19 |
20150052539 | Application Synchronization Method and Program - The object of the present invention is to implement application synchronization between a plurality of information processing devices, the application using configuration information stored in a configuration information area. A computer stores, in a synchronization configuration information storage unit, configuration information, which is extracted from a configuration information area storing the configuration information required for an execution of an application, as synchronization configuration information in a predetermined data format, activates the application such that the synchronization configuration information stored in the synchronization configuration information storage unit is referred to when the configuration information is needed for executing the application, and transmits data required for executing the application, which includes the synchronization configuration information, to another computer at a predetermined timing. | 2015-02-19 |
20150052540 | Method and System for Providing Virtual Co-Presence to Broadcast Audiences in an Online Broadcasting System - There is provided an online broadcasting system for providing virtual co-presence to broadcast audiences. The online broadcasting system may comprise a plurality of user terminals, a user reaction processing server and a broadcast server configured to transmit broadcast program data to the user terminals. The user terminals may be configured to: display a broadcast program based on the broadcast program data; receive individual user reaction data from a user input interface; and transmit the received individual user reaction data to the broadcast server. The user reaction processing server may be configured to: receive the individual user reaction data from each of the user terminals; aggregate the individual user reaction data to create total user reaction data based on the received individual user reaction data; generate interface control data based on the total user reaction data, wherein the interface control data, when executed, is operative to cause a client application to generate output indicative of the total user reaction data; and transmit the generated interface control data to at least one of the user terminals. | 2015-02-19 |
20150052541 | METHODS AND APPARATUS TO DETERMINE LOCATIONS OF AUDIENCE MEMBERS - A disclosed example method involves determining, using a neural network at a stationary unit, a first distance of a first portable audio detector from the stationary unit, the first portable audio detector associated with a first panelist, the stationary unit located in proximity to the media presentation device. The example method also involves determining, using the neural network, a second distance of a second portable audio detector from the stationary unit, the second portable audio detector associated with a second panelist. In response to the first distance being less than a threshold distance, the media is credited as exposed to the first panelist. In response to the second distance being more than the threshold distance, the media is not credited as exposed to the second panelist. | 2015-02-19 |
20150052542 | SYSTEM AND METHOD FOR MEASURING MEDIA AUDIENCE - The present invention relates to a system for measuring media audience, especially for measuring contents broadcast by radio and TV broadcasting stations via land, cable, satellite and otherwise, which comprises at least one local audience measurement device ( | 2015-02-19 |
20150052543 | Cross Media Targeted Message Synchronization - Social media content items and references to events that occur therein are aligned with the time-based media events they describe. These mappings may be used as the basis for sending messages to populations of authors of content items, where the populations are determined based on whether the author has written a content item that refers to a specific TV show or advertisement. TV streams are monitored to detect when and where a specific advertisement for a particular advertiser is shown. Concurrently, social media streams are monitored for content items that refer to or are about specific TV shows and advertisements. Responsive to a specific advertisement being detected as being shown during a specific TV show, a message associated with the advertisement is sent to the authors of the content items associated with that TV show or advertisement. The messages can be transmitted while the advertisement is being shown. | 2015-02-19 |
20150052544 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT - An application information reader acquires identification information about an application capable of operating an operation target device. An operation application executer executes the application corresponding to the identification information. A device information manager performs authentication with the target device using authentication information, and stores the authentication information when the authentication is successful. A token manager stores a certificate indicating a permission of the operation of the target device. A token receiver requests a token delivery device to generate the certificate corresponding to the authenticated target device; receives the generated certificate; and stores the generated certificate in the token manager. A transmitter transmits, to the target device, a device operation instruction requested from the executed application, the authentication information, and the certificate. | 2015-02-19 |
20150052545 | METHOD TO BIND THE USE OF A TELEVISION RECEIVER TO A PARTICULAR NETWORK - A method to bind the use of a digital audio/video service data receiver to a network on which at least one services provider broadcasts access controlled and free digital audio/video services streams, the method having the steps: receiving by the receiver a periodic signal transmitted by a conditional access system server via the network, said periodic signal being processed by a run time software embedded in the receiver to check legitimacy of the network; displaying services available on the network only if said run time software recognizes the periodic signal as indicating network legitimacy; and checking operability of the run time software and if necessary taking actions to enforce limitation of using the receiver on the network checked as legitimate. The invention further discloses a receiver bound to a specific network configured to perform the method. | 2015-02-19 |
20150052546 | WIRELESS TRANSMISSION OF SPORTS VENUE-BASED DATA INCLUDING VIDEO TO HAND HELD DEVICES - Venue-based data including video from cameras located at a sports venue can be provided to hand held devices authorized by at least one casino. A casino patron's hand held device can enable to view sporting events provided to a hand held device from a server and placement of wagers with the server. Venue-based data including video and statistics are received from server including camera views captured as video by at least one camera located within at least one sports venue. Venue-based data is processed at server for display on a display associated with at least one hand held device operating within a casino. Venue-based data is displayed on hand held devices, enabling casino patrons to view event video. Portable devices can be authorized only when moving about a casino. Casino patrons can also gamble using said hand held device while viewing selected sporting events within the casino. | 2015-02-19 |
20150052547 | Internet Protocol Television Tuning Adapter - Methods, systems, and computer readable media can be operable to facilitate the provisioning of data and video services to client devices using communication standards and/or protocols that are not compatible with corresponding CPE device(s). An IPTV adapter can be embedded in a CPE device, can be connected to a CPE device, or can be a stand-alone device, and the tuning adapter can translate/reformat communications between client devices and an upstream component and/or content server. The IPTV adapter can support various communication standards and protocols. | 2015-02-19 |
20150052548 | ENCODING PRE-ROLL ADVERTISEMENTS IN PROGRESSIVELY-LOADING IMAGES - Some embodiments of the invention provide techniques for an advertisement mask and a target media content being jointly encoded, transformed, and progressively rendered for presentation to a user. Specifically, a request for the target media content by a user is received. The target media content and the advertisement mask are scaled and divided into equally sized blocks and, further, jointly encoded into a compressed media file. Transformation of the content of the compressed media file is followed by progressively loading and rendering the advertisement mask and a partially obscured view of the media content. As the target media content is transmitted and fully rendered, the advertisement mask gradually decreases in opacity until it is removed for presentation of the fully-rendered target media content. | 2015-02-19 |
20150052549 | TIME SHIFTING OF ADVERTISEMENTS IN DIGITAL CONTENT DELIVERY SERVICES - Advertisements included in a stored digital video program are identified and indexed. A user can time shift the advertisements to play out at a different time position in the program or not play the advertisement at all. A user may incur an advertisement debt for skipping or fast forwarding an advertisement. The advertisement debt can be offset by viewing ads, trading the debt with other users or by paying for the debt in another form. | 2015-02-19 |
20150052550 | DEVICE AND METHOD FOR PROVIDING ADVERTISEMENT - The present invention relates to a device and method for providing an advertisement based on content buffering time. The device for providing an advertisement according to the present invention includes: a calculation unit calculating an expected buffering time for content selected by a user, a selection unit selecting at least one of a plurality of advertisements that corresponds to the calculated expected buffering time; and a providing unit providing the advertisement selected by the selection unit to a user terminal. | 2015-02-19 |
20150052551 | EMERGENCY NOTIFICATION CONTROL DEVICE AND EMERGENCY NOTIFICATION SYSTEM - An emergency notification control device includes an input unit which inputs settings reflecting user preferences, a storage unit which stores the settings that are input using the input unit, and an emergency notification control unit which switches whether or not to perform an emergency notification based on the settings stored in the storage unit when an emergency broadcast is broadcast. | 2015-02-19 |
20150052552 | SYSTEMS AND METHODS OF INTERACTIVE PRODUCTION MARKETING - A viewer of broadcast media requests or receives programming content including advertising over the Internet. The production system manipulates the programming content including the advertising with one or more computer processors to create a video broadcast based on input received over the Internet. The programming content promotes products or services by inserting advertisements or promotional material into the video broadcast based on one or more user interests. In addition, the production system transmits to the user the customized production with the inserted advertisements and promotional material embedded therein. | 2015-02-19 |
20150052553 | System and Method for Media on a Social Network - The proposed invention is a 3 | 2015-02-19 |
20150052554 | GEOGRAPHIC CONTENT RECOMMENDATION - Geographic context may be used to recommend media content items for consumption by users of a media content management system. A request for a media content recommendation may be associated with a content management account and a geographic location. The media content management system may determine whether the geographic location includes individuals who are not associated with the content management account. If the geographic location includes such individuals, the system may recommend content suitable for sharing such as games, music playlists, movies, or television programs. | 2015-02-19 |
20150052555 | Method, System, And Related Device For Operating Display Device - A method, system, and related device for operating a display device are disclosed. The method includes: a control device transmitting the directional light to the display device when detecting a key thereof is pressed, and transmitting the collected intensity data of the first reflected light and the key information to a light tracking system; the light tracking system matching a corresponding coordinate position according to the received intensity data of the first reflected light and the known current distance between the control device and the display device, from the preconfigured reflected light intensity corresponding to the distances between the control device and the coordinate positions of various directional points on display device at the distance, then executing a corresponding operation on an area of the display device corresponding to the coordinate position in conjunction with the key information, and reflecting an operation result on the display device. | 2015-02-19 |
20150052556 | METHOD AND APPARATUS FOR QAM MODULATOR CHANNEL DISTRIBUTION HAVING A PLURALITY OF MODES - Content distribution systems, methods and user interfaces are described wherein a modulator dynamically duplicates output of multiple channels, a plurality of receivers are individually tuned to one of the multiple channels, wherein a single transport stream can be sent on the multiple channels to each of the desired receivers and wherein the distribution can occur in multiple modes, and user interfaces which allow a manager of the content distribution system to dynamically change the channels on each receiver so that each of the receivers can be tuned to one of the multiple channels through the user interface. | 2015-02-19 |
20150052557 | SYSTEM AND A METHOD ADAPTED TO DISPLAY EPG MEDIA CONTENT FROM THE WORLD WIDE WEB - The invention relates to a system, a method of a remote control adapted to display media content from the World Wide Web. This is accomplished by utilizing a smart-phone as a remote control by an application program, and transmitting the media content through a backend system utilizing WI-FI adapters to transmit streaming media to for instance a HDMI TV. Moreover, the invention provides viewing already aired programs through an electronic program guide (EPG). | 2015-02-19 |
20150052558 | SYSTEM AND METHOD FOR PROVIDING RECOMMENDATION ICONS ON AN ELECTRONIC PROGRAMMING GUIDE - Aspects of the subject disclosure may include, for example, a device that receives, from a particular user, identification of selected users from which recommendations are sought. Those users that have made recommendations are determined, and a recommendation graphical user interface is provided to equipment of the particular user. The graphical user interface item is associated with a recommending user and a television program. A selection of the recommendation graphical user interface item is received, and information is provided for presentation, responsive to a determination that viewing of the information has been authorized. Other embodiments are disclosed. | 2015-02-19 |
20150052559 | METHOD AND SYSTEM FOR USING HIERARCHICAL METADATA FOR SEARCHING AND RECORDING CONTENT - A user device for storing or displaying content recommendations includes a search session manager receiving metadata associated with content. The metadata includes a received hierarchical identifier including a primary level and a secondary level unique to the primary level. A memory stores selected hierarchical identifiers. A search module compares the received hierarchical identifiers with the selected hierarchical identifiers. A screen display displays content from at least one of the primary level and secondary level based on comparing. | 2015-02-19 |
20150052560 | PROGRAM GUIDE SYSTEM WITH COMBINATION CATEGORY SEARCH - An interactive television program guide system is provided in which the program guide may provide the user with a selectable list of combination categories. Combination categories are composed of multiple simple categories such as sports, news, comedy, movies, children, etc. Program listings are supplied to the program guide. At least some of the program listings are associated with combination categories. A combination category build process may be used to assign combination categories to program listings. The user is able to use the selectable categories list to quickly identify programming of interest. | 2015-02-19 |
20150052561 | AUDIOVISUAL CONTENT RECOMMENDATION METHOD AND DEVICE - A method for facilitating the generation of recommendations of audiovisual content for a first user. The method comprises receiving data from a plurality of second users, the received data indicating audiovisual content of interest to the second users. The method further comprises processing the received data to automatically identify a plurality of relationships between interests of one or more of the second users in respective items of audiovisual content in the audiovisual content represented by the received data and generate a recommendation engine. The recommendation engine is adapted to take as input indications of audiovisual content of interest to the first user and to generate recommendations of further audiovisual content of interest to the first user based upon a subset of the plurality of relationships. | 2015-02-19 |
20150052562 | SYSTEM AND METHOD FOR CONFIGURING MEDIA SERVICES - A system and method for configuring media services is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a portal having a controller element to detect an installation of an Internet Protocol Television (IPTV) media receiver in an IPTV media system and adapt at least a portion of the portal according to the installation. Other embodiments are disclosed. | 2015-02-19 |
20150052563 | DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A method of processing a digital television (DTV) signal in a DTV receiver, the method includes receiving a digital television signal including a plurality of extended text table (ETT) instances that appear in transport stream packets with common PID values, the ETT instances having common table ID values, each ETT instance comprising a section header and a message body, the section header containing a table identification (ID) extension field that serves to establish uniqueness of each ETT instance, the message body containing an extended text message (ETM) which provides detailed descriptions of a virtual channel or an event associated with each ETT instance, wherein the section header further contains a protocol version field indicating a protocol version and a last section number field indicating a last section number, demodulating the digital television signal; and identifying at least one pertinent ETT instance from the plurality of ETT instances. | 2015-02-19 |
20150052564 | COMPUTING SIMILARITY BETWEEN MEDIA PROGRAMS - System and method are provided to associate or compare media programs. A method includes: obtaining, using at least one processing circuit, first metadata for a first media program and second metadata for a second media program, wherein the first metadata are organized into a plurality of first fields, and the second metadata are organized into a plurality of second fields; extracting, using at least one processing circuit, a plurality of first tokens from one of the plurality of the first fields and a plurality of second tokens from one of the plurality of second fields; assigning a weight factor to each of the first and second tokens; cross-correlating the first and second tokens between the plurality of first fields and the plurality of second fields; and calculating a similarity score between the first and second media programs based on the cross-correlating. | 2015-02-19 |
20150052565 | CACHING MEDIA IN A MEDIA FLING SYSTEM - Aspects of the disclosure relate to a content (e.g., media) transfer or fling platform system and method. In a media fling platform system, media items may be cached at a rendering device prior to any selection of media items to fling. The determination of which media to cache may be based on a variety of factors including a user fling history, a currently viewed media item, and a navigation point in the media files. A fling request may take priority over caching, and the fling request may interrupt any caching processes. | 2015-02-19 |
20150052566 | DIGITAL MULTIMEDIA RECORDER WITH FUNCTIONALITY FOLLOWING LOSS OF PROVIDER NETWORK SERVICE - A network addressable appliance with digital multimedia recording capabilities has limited access including playback of stored multimedia content upon faulty connection with a service provider network. Upon a connectivity event, the network addressable appliance compares a retrieved hardware address for a connected residential gateway to a stored hardware address for an assigned residential gateway. If the two hardware addresses correspond, the network addressable appliance provides playback to stored multimedia content. The system helps prevent violations of digital rights management rules by restricting access to stored multimedia content while the network addressable appliance is connected to an unauthorized residential gateway. The system provides a user with limited access (i.e. playback) to multimedia content during service provider network outages. | 2015-02-19 |
20150052567 | APPARATUS FOR REQUESTING BLACK BOX IMAGES OVER DIGITAL MULTIMEDIA BROADCASTING NETWORK, AND APPARATUS AND METHOD FOR SEARCHING BLACK BOX IMAGES - An apparatus for requesting black box images over a digital multimedia broadcasting (DMB) network, and an apparatus and method for searching black box images are disclosed. The apparatus for requesting black box images over a DMB network includes a request generation unit, an encoding unit, and a request transmission unit. The request generation unit generates information about a request for black box images to be collected. The encoding unit encodes the generated image request information into format suitable for transmission via a DMB data broadcast. The request transmission unit transmits the encoded image request information to apparatuses for searching black box images mounted on one or more vehicles through DMB broadcasting centers. | 2015-02-19 |
20150052568 | Dynamic Tuner Allocation - In an embodiment, a first tuner task type is identified from among a plurality of tuner task types, in response to receiving a first tuner request. The first tuner request was made to perform a tuner task of the first tuner task type. A first set of tuner selection rules specifically for the first tuner task type is determined and applied to a set of tuners to determine whether the set of tuners comprises a tuner available to perform the tuner task of the first tuner task type. | 2015-02-19 |
20150052569 | CONTINUOUS DETECTION OF DEAD OR IMPAIRED IPTV STREAMS - The embodiments herein relate to a method and system for continuous detection of dead and impaired IPTV streams by introducing a hardware block to continuously monitor all IPTV streams for health without software intervention as disclosed in the embodiments herein. Each IPTV packet header is looked up in the multicast forwarding database (TCAM) table. When there are matching entries, the packets are metered and compared with the expected rate for the IPTV stream. A periodic scan of all the meters in hardware is carried out. If any stream is received less than its expected rate, an “impaired error” counter is incremented for the particular stream. | 2015-02-19 |
20150052570 | BROADCAST SERVICE RECEIVING METHOD AND BROADCAST SERVICE RECEIVING APPARATUS - Provided is a broadcast service receiving method of a broadcast receiving device. The method includes: receiving an video stream among a content transmitted as a broadcast service; generating a request message for at least one of signalling information on the broadcast service and signalling information on an adjunct service of the broadcast service on the basis of part of the received video stream; transmitting the generated request message to a server through an internet network; receiving a response message corresponding to the request message from the server; obtaining at least one of the broadcast service corresponding to the video stream and the adjunct service of the broadcast service on the basis of the received response message; and providing the obtained broadcast service and adjunct service, wherein the request message comprises first query information for specifying a request time interval and second query information for specifying at least one signalling table to be requested. | 2015-02-19 |
20150052571 | Marker-Based Inter-Destination Media Synchronization - A method and a system enabling inter-destination synchronization of processing of content of at least a first and second media stream, wherein said first and second media stream are associated with one or more markers for marking one or more content parts of said first and second media streams respectively. The method comprises the steps of: detecting a first marked content part in said first media stream and a second marked content part in said second media stream, said first and second market content part being associated with a first and second marker respectively; associating first timing information, preferably comprising a first clock time, with said detected first marked content part and associating second timing information, preferably comprising a second clock time, with said detected second marked content part; determining a timing difference on the basis of said first and second timing information; and, generating on the basis of said timing difference synchronization information for enabling a first and/or second synchronization client to adjust the processing of said first and/or second media stream respectively. | 2015-02-19 |
20150052572 | R-CCAP WITH AM STAR ARCHITECTURE - A remote node system with an amplitude modulation (AM) star architecture is formed between a remote node and a plurality of field nodes split from the remote CCAP node. In embodiments, an R-CCAP node can be combined with amplitude modulation (AM) optics in a star architecture for building low power nodes, supporting set top box (STB) out of band (OOB) signals, and increasing system bandwidth (BW). The remote node can be implemented in media content delivery networks, such as a hybrid fiber-coax HFC network or evolving radio frequency over glass (RFoG) networks. | 2015-02-19 |
20150052573 | FIBER-OPTIC NODE WITH FORWARD DATA CONTENT DRIVEN POWER CONSUMPTION - Methods and systems for modulating an amplifier power supply to efficiently attain amplified RF output power with much lower power dissipation than existing amplifiers. | 2015-02-19 |
20150052574 | SOFTWARE DEFINED ATSC TV DEMODULATOR WITH WI-FI TUNERS - The present invention provides an implementation method for a Software Defined ATSC TV Demodulator with Wi-Fi Tuners. The method includes the wireless interface between the ATSC TV tuner and the computing platform, the wireless interface (Wi-Fi) transport stream protocol, and the vector-based digital signal processing algorithm for each individual functional block. | 2015-02-19 |
20150052575 | Steering Traffic Among Multiple Network Services Using a Centralized Dispatcher - A network service dispatcher is provided that transparently navigates network traffic through network service appliances utilizing sub-session connection information generated in accordance with policies pertaining to a client-server session. The network service dispatcher intercepts a first data packet of a new session between two computer systems and generates sub-session connection information that navigates the data packet through one or more network service appliances in a manner transparent to the client or server. In turn, the network service dispatcher utilizes the sub-session connection information to navigate subsequent forward or reverse data packets in the session without performing a policy-based search for each data packet. | 2015-02-19 |
20150052576 | NETWORK SYSTEM, CONTROLLER AND PACKET AUTHENTICATING METHOD - A controller managing a switch receives from the switch, a notice of an unknown packet sent from an access source host that is used by a plurality of users having different authorities. The controller inquires authentication data of a packet transmission user to the access source host. The controller inquires the permission or refusal of access to the access destination host based on the authentication data. When the access is permitted, the controller instructs the switch to register a flow entry of transfer of the packet. When the access is refused, the controller instructs the switch to register a flow entry of discard of the packet. | 2015-02-19 |
20150052577 | Deploying Policies and Allowing Off-Line Policy Evaluations - In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions. | 2015-02-19 |
20150052578 | WIRELESS CONFIGURATION AND MANAGEMENT OF A SECURITY SYSTEM - A computer implemented method and system for configuring and managing a security system wirelessly is provided. The security system includes a gateway device and a wireless access point (WAP) for communicating with one or more electronic devices and monitoring event data from the electronic devices. The electronic devices connect to the gateway device via the WAP in the gateway device. A wireless router is connected to the security system to establish a network. A security management application on a control device accesses, configures, and controls the security system wirelessly through the WAP. The security system receives and transmits event data through the WAP to a database, the control device, and/or one or more secondary devices via the network. The security management application wirelessly configures and manages the security system and one or more electronic devices through the WAP via the network based on the received event data. | 2015-02-19 |
20150052579 | ORGANIZATIONAL ATTRIBUTION OF USER DEVICES - A login request to access information associated with a website may be received from a user device accessing the website via a browser. A determination may be made as to whether a browser attribute of the browser, font type, or service set identifier (SSID) information is located within a database. A further determination may be made as to whether to grant access to the information associated with the website. The determination as to whether to grant access to the information associated with the website may be based at least in part on the browser attribute font type, or service set identifier (SSID) information. | 2015-02-19 |
20150052580 | COMMUNICATIONS SYSTEM - A communications system is provided. A network device ( | 2015-02-19 |
20150052581 | DATA COMMUNICATION SYSTEM FOR AGRICULTURAL MACHINE - Data on agricultural machines can be outputted to mobile terminals easily and properly. A data collection device is provided separately from a control device that controls the operation of an agricultural machine and is connected to a vehicle communication network installed in the agricultural machine, and is removably connected to the vehicle communication network. The data collection device includes a data collection unit for collecting agricultural machine data outputted to the vehicle communication network, an authorization determination unit for implementing authentication with a mobile terminal to determine whether or not the collected data is transmitted to the mobile terminal by wireless communication, and a data communication unit for transmitting data to the mobile terminal by wireless communication when the authorization determination unit authorizes data transmission. | 2015-02-19 |
20150052582 | SECURE AREA FOR APPS - Privacy and restricted access are provided for functions, applications, and services on a computing device. An area accessible to a user interface is provided. A request from a user is accepted, the request for associating with the area with one or more available functions. The one or more functions are then associated with the area, and are made invisible. Another request from the user is accepted, the other request for gaining access to the area. Authentication against the user is requested. Access to the one or more functions is granted if the authentication is successful. According to another embodiment, an authorized user may send and receive messages via another device that belongs to another user based on identification of the user by the other user. | 2015-02-19 |
20150052583 | METHOD AND SYSTEM FOR PROVIDING EXTENDED AUTHENTICATION - A method and system for extending an authentication of a wireless device are disclosed. For example, the method includes authenticating access to the wireless device via a first authentication. The method detects a bonded authentication device as a second authentication. The method permits access to the wireless device when the bonded authentication device is detected. | 2015-02-19 |
20150052584 | Access Control System - There is provided a method for delivering web resources to user devices, the method comprising: receiving a plurality of resource requests for a web resource, each resource request being received from a respective user device; and, for each resource request for the web resource, sending an authorisation request to an access server, the authorisation request including authorisation data comprising user identification information. Further, there is provided method for authorising delivery of web resources, the method comprising: receiving an authorisation request from a content delivery network, the request including authorisation data comprising user identification information; authorising the authorisation request based on the authorisation data; and, returning a response to the content delivery network based on the authorisation, wherein if the authorisation is negative the response includes an address of an alternative web resource different from the requested web resource. A content delivery network, access server, system and computer readable medium are also provided. | 2015-02-19 |
20150052585 | Systems and Methods for Managing Digital Content Entitlements - Systems and methods for managing digital content entitlements in distributed computer systems. An example method may comprise: receiving, by a processor, a request comprising an identity certificate and a digital content identifier; validating an entitlement of a requestor identified by the identity certificate to consume, over an entitlement period of time, the digital content identified by the digital content identifier; determining that a pre-defined authorization period of time does not exceed the entitlement period of time; and transmitting, to the requestor, a response comprising at least one of: a status code and a content certificate authorizing to consume the digital content for the pre-defined authorization period of time. | 2015-02-19 |
20150052586 | ENHANCING NETWORK SECURITY - Briefly, embodiments of methods or systems for providing enhancements to network security are disclosed. | 2015-02-19 |
20150052587 | SYSTEM AND METHOD FOR GRADUATED SECURITY IN USER AUTHENTICATION - A computer system for authenticating user access to at least one computer application of a plurality of computer applications is provided. The computer system includes a memory device and a processor. The computer system is programmed to identify a security level from a plurality of security levels for each computer application within the plurality of computer applications. The plurality of security levels include at least a first-tier security level and a second-tier security level. The second-tier security level requires additional authentication information as compared to the first-tier security level. The computer system is also programmed to create a user account for a user within the memory device with the first-tier security level, and to determine that the user account requires the second-tier security level, and prompt the user to enter the additional authentication information. The computer system is also programmed to promote the user account to the second-tier security level. | 2015-02-19 |
20150052588 | SERIALIZED AUTHENTICATION AND AUTHORIZATION SERVICES - Requests for User Services on networked computers running on different platforms with different Authentication, Authorization and Auditing (AAA) Security Systems are processed through an AAA Services Manager Server and Web Services Servers. The AAA Services Manager Server communicates requests for User Services to Web Services Servers using corresponding URL Web addresses. Web Services correspond to their respective Authentication Security Systems and Authorization Security Systems through which User Services may be obtained. The Web Services Servers act to access, for User validation, the respective Authentication Security Systems and Authorization Security Systems according to their individual languages and computing platform requirements. | 2015-02-19 |
20150052589 | APPARATUS FOR PROCESSING IMAGE, METHOD FOR PROVIDING PERSONALIZATION SERVICE, AND COMPUTER-READABLE MEDIUM - The disclosure relates to an image processing apparatus, a method for providing personalization service, and a computer-readable medium. An image processing apparatus according to an exemplary embodiment may include a data parsing unit configured to, by using an apparatus information and a user information obtained from a peripheral user apparatus, parse a security information requiring security from among the user information to a plurality of security information; an interface configured to divide and provide the plurality of parsed security information to at least one apparatus among the user apparatus and an external apparatus; and a personalization service unit configured to, when a personalization service of the user apparatus is requested, perform authorization of the user apparatus by receiving the security information divided and provided from the at least one apparatus, and provide the personalization service to the user apparatus according to an authorization result. | 2015-02-19 |
20150052590 | COMPUTERIZED AUTHORIZATION SYSTEM AND METHOD - A computerized authorization system configured to authorize electronically-made requests to an electronic entity. The computerized authorization system comprises a store configured to store an indication of at least one predetermined electronic authorization device configured to authorize each electronically-made request. The computerized authorization system is further configured such that: in response to receiving an electronically-made request to the electronic entity, an indication of the request is output to the at least one predetermined electronic authorization device configured to authorize the request as indicated in the store; and in response to receiving an indication of authorization from the at least one predetermined electronic authorization device, an indication of authorization of the request is output to the electronic entity. | 2015-02-19 |
20150052591 | DATA COMMUNICATION SYSTEM FOR WORKING MACHINE - A management server includes a user management database in which mobile terminal identification information on the mobile terminal and working machine identification information on a sold working machine are registered in association with each other, a user registration determination unit adapted to determine whether or not the mobile terminal and the working machine are registered in association with each other on the basis of the mobile terminal identification information and the working machine identification information outputted from the mobile terminal and the mobile terminal identification information and the working machine identification information stored in the user management database, and an authorization information output unit adapted to output an authorization key necessary for wireless communication between the mobile terminal and the working machine in the case where the user registration determination unit determines that the mobile terminal and the working machine are registered in association with each other. | 2015-02-19 |
20150052592 | Methods and Systems for Using Derived User Accounts - Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user accounts. In particular, derivation rules define how a DUA is linked to or created based on an existing original user account, or OUA. Derivation transformations may also update the state of a DUA based on its corresponding OUA or give feedback from the state of a DUA to the state of its corresponding OUA. | 2015-02-19 |
20150052593 | SECURE FILE TRANSFERS WITHIN NETWORK-BASED STORAGE - A capability is provided for securely transferring a file within network-based storage. A capability is provided for securely transferring a user file of a user from a first server to a second server. The first server may be associated with a first service provider and the second server may be associated with a second service provider. The secure transfer of a user file from the first server to the second server may be performed based on a One-Click File Transfer capability in which only a single click by the user is needed in order for the user file to be transferred. The secure transfer of a user file from the first server to the second server may be performed based on a Zero-Click File Transfer capability in which the user file may be transferred without any interaction by the user. | 2015-02-19 |
20150052594 | METHODS AND SYSTEMS FOR IDENTITY VERIFICATION IN A SOCIAL NETWORK USING RATINGS - The disclosed embodiment relates to identity verification and identity management, and in particular, to methods and systems for identifying individuals, identifying users accessing one or more services over a network, determining member identity ratings, and based on member identity ratings that restrict access to identity rating-restricted services and certain user-to-user interactions. Further, the user experience in performing identity management is simplified and enhanced as disclosed herein. | 2015-02-19 |
20150052595 | USER, DEVICE, AND APP AUTHENTICATION IMPLEMENTED BETWEEN A CLIENT DEVICE AND VPN GATEWAY - An application executing on a device is authenticated by an enterprise gateway components. This authentication is done in addition to authenticating the device and user. This includes authenticating apps that are being used on the device. The enterprise, by virtue of the gateway component, can authenticate details about specific app usage. The enterprise gateway component establishes a dedicated link coupling the gateway device and a specific executing app. Prior to this app-specific link being established, the gateway device collects information and stores it in a database, including information about the user, device, and the specific application. Authentication is performed at each level. | 2015-02-19 |
20150052596 | NETWORK BASED FIRMWARE FEATURE CONFIGURATION AND FIRMWARE IMAGE GENERATION - A computer-implemented method for modeling a configuration of components connected directly or indirectly to a baseboard of a computer system includes: (a) defining a group of device description files at a network based firmware generator, each device description file describing a component in a set of components which is selectively included in the configuration, and each device description file specifies the identification information associated with the component to which the device description file is associated, (b) providing, at a remote computing device in communication with the firmware generator via a network, a graphical user interface configured to allow a user to visually generate a configuration instruction of baseboard firmware and send the configuration instruction to the firmware generator, and (c) constructing a firmware image at the firmware generator in accordance with the configuration instruction. | 2015-02-19 |
20150052597 | MESSAGE CONTENT AJUDICATION BASED ON SECURITY TOKEN - A computer program product for processing a message is provided. The computer program product comprises a computer readable storage medium having program instructions embodied therewith. The program instructions readable by a processing circuit cause the processing circuit to perform a method. The method validates a security token for a user. The method allows the user to compose a message. Based on the security token, the method verifies that the user is authorized to send the message to an intended recipient of the message and that a security level of the message is at or below a security level of the user. | 2015-02-19 |
20150052598 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TICKET AUTHORIZATION - A system, method, and computer program product are provided for ticket authorization. In use, data stored by an integrated circuit of an integrated circuit card (ICC) is identified. Additionally, it is verified whether the ICC is associated with a valid ticket, based on the data and information stored remotely from the ICC. Further, the ticket is authorized, based on the verification. Still yet, based on the authorization, additional data indicative of the authorization is stored on the ICC. | 2015-02-19 |