10th week of 2014 patent applcation highlights part 90 |
Patent application number | Title | Published |
20140068644 | CLAMPING DEVICE OF SPINDLE MOTOR - The clamping device of spindle motor is disclosed, wherein a case portion contacted by the other distal end of the arms is inclined due to depression of a distal end of the arms by the disk, such that the arms linearly moves into the case to allow the other distal end to further rotate upwards, whereby the disk can be easily inserted into the case regardless of size of the inner diameter of the disk. | 2014-03-06 |
20140068645 | Sharing Television And Video Programming Through Social Networking - In particular embodiments, one or more computer systems of a social-networking system receive information associated with one or more users in proximity to a display device and access user data of the social-networking system. The one or more computer systems of the social-networking system determine, by comparing the user data with the received information associated with the one or more users, an identity of at least one of the users in proximity to the display device. The one or more computer systems of the social-networking system send one or more instructions based on the determined identities. | 2014-03-06 |
20140068646 | METHOD AND APPARATUS FOR PROCESSING DIGITAL SERVICE SIGNAL - An apparatus of processing a digital service signals and a method thereof are disclosed. The present invention includes a PDI module configured to receive a PDI table, wherein the PDI table includes at least one question element having attributes of a PDI question, wherein the PDI table further includes a table Id field identifying the PDI table, a table version field indicating a version of the PDI table and a time field indicating a date and a time of the most recent change to the PDI question and extract the PDI question from the at least one question element, wherein each of the at least one question element has a different type, a PDI answer module configured to receive a PDI answer according to the extracted PDI question, a filtering module configured to receive a filtering criteria information and filter contents of the digital service signal by comparing the filtering criteria information against the received the PDI answer and a content storing module configured to download the filtered contents, wherein the type of the at least one question element indicates a type for the PDI question with one of an integer answer, a Boolean answer, a selection answer, a text answer and an answer with no PDI question. | 2014-03-06 |
20140068647 | METHOD OF PROVIDING PROGRAM MONITORING INFORMATION AND BROADCASTING SYSTEM USING THE SAME - A method of providing program monitoring information and a broadcasting system using the same are provided, which can inform a viewer of program change circumstances made by other people. A user terminal of the broadcasting system may include a display unit configured to display a particular program; and a monitoring information manager unit configured to display program monitoring information through the display unit. Here, the program monitoring information includes the program change information of at least one other terminal different from the user terminal. | 2014-03-06 |
20140068648 | SYSTEMS, METHODS AND ARTICLES TO PROVIDE CONTENT IN NETWORKED ENVIRONMENT - Content delivery system may include a metadata tunnel system component which is responsive to defined subaudible tones in programming, for instance programming provided for a broadcast. An action may be based on a characteristic or aspect of the subaudible tone, for instance frequency and/or duration. The metadata tunnel system may selectively generate or provide modified or new metadata to downstream components (e.g., injector system, encoder). The metadata tunnel system may provide metadata that causes a content provider identifier that identifies a content provider to appear in an alternative feed of programming (e.g., streaming programming) at points downstream of a broadcaster, for instance at end user media players. The metadata tunnel system may provide metadata that inhibits an injector system from injecting (e.g., inserting, substituting) new content into the alternative feed of programming created from portions of broadcast programming. | 2014-03-06 |
20140068649 | Sharing Television and Video Programming Through Social Networking - In particular embodiments, one or more computer systems of a social-networking system determine information associated with a product displayed on a display device and access a database of known products. The one or more computer systems of the social-networking system determine, by comparing the database of known products with the determined information associated with the product, an identity of the product displayed on the display device. The one or more computer systems of the social-networking system provide one or more instructions to display media content related to the identified product. | 2014-03-06 |
20140068650 | DISPLAY DEVICE, SET-TOP BOX AND METHOD OF DETERMINING STEREOSCOPIC VIDEO CONTENT - Exemplary embodiments disclose a method of determining whether an image received, or to be received, through a display device or a set-top box is stereoscopic video content, a display device and set-top box thereto. The method of determining stereoscopic video content includes receiving an EIT of future image content, extracting a plurality of events based on the EIT, detecting an event group, having different channel information and a same event identifier, among the extracted events, reading event information of events belonging to the event group to determine whether a stereoscopic program info descriptor is present in at least one event information of the events, and determining that the event group is an event group of stereoscopic video content, when the stereoscopic program info descriptor is present in the at least one event information of the events. | 2014-03-06 |
20140068651 | Obtaining User Reactions to Video - A user interaction request is received during playback of video content. The user interaction request can be received independent of any indication from the video content that user interaction is possible. In response to receiving the interaction request, one or more menus are displayed allowing the user to select one or more reaction options and to select whether the selected one or more reaction options are to be communicated to another user or to a content provider. | 2014-03-06 |
20140068652 | CONTENT CARRIED RATINGS BASED CONTROL - Example apparatus and methods concern selectively accepting or rejecting content based on ratings identifier information included in the content. Example apparatus and methods facilitate identifying a content fragment (e.g., f-MP4 fragment) to be rejected based on an identifier located in the fragment rather than information located in some external source (e,g., Event Information Table (EIT)). One example method includes identifying a fragment based on a ratings identifier encoded as a universally unique identifier (UUID) in the fragment and then selectively accepting or rejecting the fragment based on the rating. Rather than rely only on a predicted start time, a predicted end time, a predicted source, and a pre determined coarse-grained rating, example apparatus and methods may be better prepared to account for unanticipated start times, ending times, schedule changes, and source changes, and may provide finer grained user control based on ratings carried in content. | 2014-03-06 |
20140068653 | REMOTE DIAGNOSTIC SYSTEM AND METHOD FOR MEDICAL IMAGE - In a remote diagnostic system, one remote service provider among plural remote service providers is requested by a health care provider (service requester) to diagnose a medical image, and the image is transmitted thereto. Attribute information constituted by at least one of an object region and symptom information of an object in the image is input for the request of diagnosis. The one remote service provider is selected among the plural remote service providers, to transmit the image and the attribute information to the selected remote service provider. It is checked whether the object region or symptom information of the image corresponds to an available specialty of the selected remote service provider by use of a specialty database component. If it is judged in authorization control that the object region or symptom information of the image does not correspond to the available specialty, distribution of the image is rejected. | 2014-03-06 |
20140068654 | Sharing Television and Video Programming through Social Networking - In particular embodiments a social networking system may receive authorization from a first user of a social-networking system to control at least in part one or more functions of a set-top box (STB) of the first user, determine one or more social actions of one or more second users of the social-networking system, determine one or more instructions for the STB of the first user based at least in part on the social actions, and provide the instructions for the STB of the first user. The social-networking system includes a graph having a plurality of nodes and edges connecting the nodes. | 2014-03-06 |
20140068655 | Broadcasting Receiver and Parental Control System - This broadcasting receiver includes a receiving portion receiving a broadcast signal, a determination portion determining whether or not a user to be subject to parental control of the broadcast signal has entered a prescribed range, and a control portion performing control of enabling parental control corresponding to a user determined to have entered the prescribed range in the case where the parental control corresponding to the user determined to have entered the prescribed range is disabled when the determination portion determines that the user to be subject to parental control has entered the prescribed range. | 2014-03-06 |
20140068656 | RELIABLE AND NON-MANIPULATABLE PROCESSING OF DATA STREAMS IN A RECEIVER - The invention provides a solution for secure and non-manipulatable processing of a data stream in a receiver, possibly in conjunction with a smartcard. A packet identity and a content type identifier associated with the packet identifier are received in encrypted form and securely processed within the receiver to allow an encrypted payload of the data stream to be processed without the possibility to manipulate the content type identifier in an attempt to intercept the payload after decryption. | 2014-03-06 |
20140068657 | METHOD AND APPARATUS FOR INSERTING ADVERTISING INTO A VIDEO SIGNAL AT A RECEIVING DEVICE NOT HAVING A DIGITAL VIDEO RECORDER (NON-DVR) RECEIVER - A system and method of operating a non-recordable receiving device comprises a video storage device and a network. The non-DVR receiving device is separate from the video storage device and communicates with the video storage device through the network. The non-DVR receiving device receives a video signal, monitors the television signal for an insert indicator and proximate the insert indicator, communicates an advertisement request signal from the non-DVR receiving device to the video storage device through the network. The video storage device communicates an advertisement to the non-DVR receiving device in response to the advertisement request signal. The non-DVR receiving device displays the advertisement on a display associated with the non-DVR receiving device. | 2014-03-06 |
20140068658 | ADVERTISEMENT EMBEDDED SYSTEM, ADVERTISEMENT EMBEDDED METHOD, AND RECORDING MEDIUM THEREOF - An advertisement embedded system, an advertisement embedded method, and a recording medium thereof are provided. The system includes a medium providing module and a digital television (DTV) apparatus. The medium providing module is used to provide a piece of advertisement media data. The DTV apparatus includes a digital signal receiving unit, a detection unit, and a processing unit. The digital signal receiving unit receives a DTV signal, and the detection unit detects strength of the DTV signal. The processing unit is connected to the digital signal receiving unit and the detection unit. When the strength of the DTV signal detected by the detection unit is less than a preset value, the processing unit switches a media source of the DTV apparatus from the digital signal receiving unit to the medium providing module, so as to obtain the piece of advertisement media data. | 2014-03-06 |
20140068659 | COMPUTER-IMPLEMENTED METHODS AND COMPUTER SYSTEMS FOR COMBINING MULTICHANNEL CONTENT PRESENTATION WITHIN INTERACTIVE LOTTERY/GAMING ENVIRONMENT IN AN INTERACTIVE PRESENTATION DEVICE OF A LOTTERY/GAME OPERATOR - In some embodiments, the instant invention provides for a computer-implemented method having at least the following: presenting, by a specialized interactive presentation device, to a user, a touchscreen divided into: a first function area, a second function area, and a third function area; where the specialized interactive presentation device is located at a physical establishment that provides gaming, lottery, or both; where the first function area, the second function area, and the third function area are configured to function independently from each other and concurrently with each other; displaying, by the specialized interactive presentation device, in the first function area, advertisement content related to lottery, gaming, or both; displaying, by the specialized interactive presentation device, in the second function area, event content for a live or stored event; displaying, by the specialized interactive presentation device, in the third function area, an interactive non-lottery game, an interactive lottery game, or both. | 2014-03-06 |
20140068660 | INTERACTIVE PRODUCT PLACEMENT SYSTEM AND METHOD THEREFOR - A method for presenting advertisements for commercial products in video productions, whereby the commercial product is placed in the video production as an element of the video production. A viewer is enabled to interact with the video production to select the product. Information is then displayed about the selected product; and the viewer is enabled to purchase the selected product. | 2014-03-06 |
20140068661 | Dynamic Customization and Monetization of Audio-Visual Content - Systems and methods for dynamic customization of audio-visual content are described. In some implementations, a process may include receiving at least one audio-visual core portion, receiving at least one selection signal indicative of a viewer preference, modifying the audio-visual core portion with at least one revised content portion in accordance with the at least one selection signal to create a dynamically customized audio-visual content, outputting the dynamically-customized audio-visual content; and receiving a consideration for the dynamically-customized audio-visual content. | 2014-03-06 |
20140068662 | Method and Apparatus for Selection of Advertisements to Fill a Commercial Break of an Unknown Duration - In one embodiment, a method includes: receiving a user input requesting an event to be displayed; playing out the requested event; identifying a type of the requested event; estimating a duration of a next commercial break occurring in the requested event according to the type; selecting at least one advertisement having a duration corresponding to the estimated duration of the next commercial break; and playing out the at least one advertisement. Related systems, apparatus and methods are also described. | 2014-03-06 |
20140068663 | GENERATING TEASERS FOR LIVE PERFORMANCES - A live performance is monitored by analyzing an input data stream comprising real-time updates related to the live performance. Different sets of excitement levels, excitement curves, alerts and teasers are generated based on the analysis and reported to a plurality of subscribers using any of a variety of mobile communication and/or computing devices. | 2014-03-06 |
20140068664 | METHOD FOR ADDING AN OBJECT MAP TO A VIDEO SEQUENCE - A method to provide image recognition within a video and to add time-based data to the video. The time-based data is from a manually or automatically classified and indexed video database. The time-based data is dependent upon the recognized image within the video. Hence, the time-based data is available as a function of times when the image is available. | 2014-03-06 |
20140068665 | METHOD AND APPARATUS FOR PROVIDING INTERACTION PACKAGES TO USERS BASED ON METADATA ASSOCIATED WITH CONTENT - The disclosed embodiments relate to a method, apparatus, and computer-readable medium for providing an interaction package to a user based at least in part on metadata associated with content. An exemplary method comprises processing metadata associated with content, determining information corresponding to an interaction package for a user based at least in part on the metadata, wherein at least a portion of the interaction package is associated with the content, and transmitting the information corresponding to the interaction package to at least one of one or more user computing devices. The disclosed embodiments further relates to a method, apparatus, and computer-readable medium for presenting at least a portion of an interaction package to a user based at least in part on metadata associated with content. | 2014-03-06 |
20140068666 | ELECTRONIC PROGRAM GUIDES, SYSTEMS AND METHODS PROVIDING A COLLAPSIBLE CHANNEL LISTING - A television receiving device includes a memory configured to store an electronic program guide. The electronic program guide is divided into channel listings including program information corresponding to television programs being broadcast currently and to television programs scheduled for future broadcast. The device further includes a user interface configured to receive a user input and a processor in communication with the memory and the user interface. The processor is configured to output the electronic program guide to be displayed with, alternatively: 1) at least one channel listing including an expansion icon, where upon the user input indicating a selection of the expansion icon, a single channel listing expands into a plurality of channel listings, or 2) at least one channel including a collapsing icon, where upon the user input indicating a selection of the collapsing icon, a plurality of channel listings collapse into a single channel listing. | 2014-03-06 |
20140068667 | SYSTEMS AND METHODS FOR DISPLAYING MEDIA CONTENT AND MEDIA GUIDANCE INFORMATION - A system comprises television equipment and a number of portable electronic devices. The television equipment includes a large display and control circuitry. The control circuitry receives media content and media guidance data for display on the display. The control circuitry also includes communication components for communicating with the portable electronic devices. The portable electronic devices are operable for displaying video and communicating with the television equipment. A method comprises the steps of receiving media guidance information with a first portable electronic device; transmitting at least some of the media guidance information from the first portable electronic device to the control circuitry of the television equipment; and displaying the media guidance information from the first portable electronic device on the display of the television equipment while simultaneously displaying media content or media guidance information received from a source other than the first portable electronic device. | 2014-03-06 |
20140068668 | Electronic Program Guide for Obtaining Past, Current, and Future Programs - An electronic program guide (EPG) for facilitating obtaining copies of selected programs includes a plurality of program listings, the program listings including listings for previously broadcast programs available for downloading to a user's recording device, programs currently being broadcast available for downloading to the user's recording device, and programs which may be recorded on the user's recording device during a future broadcast of the programs. This EPG merges two models of distribution for broadcast content (e.g., EPGs) and video on demand (VOD) systems (e.g., video catalogs) to address the problem of acquiring a recording of a program that was broadcast in the past. The EPG of the present invention provides a combined, unified user interface whereby a user may easily obtain a copy of any one or more of past, current, or future programs. | 2014-03-06 |
20140068669 | PROGRAM GUIDE SYSTEM WITH FLIP AND BROWSE ADVERTISEMENTS - An interactive television program guide is provided in which advertisements may be displayed in program listings display regions on program guide screens. The program listings display regions may be browse displays or flip displays. The program guide screens contain video for the current channel to which the user is tuned. The program listings display regions containing the advertisements may be overlaid on top of the current channel. Alternatively, the video for the current channel may be provided in a reduced-size video window. The advertisements may contain video. The advertisements may be used to promote television programs and conventional goods and services. Advertisements may be selectable. When a user selects an advertisement, the program guide provides the user with an opportunity to order products or services, request information, set reminders for upcoming programs, view program descriptions, record programs, or take other such actions. | 2014-03-06 |
20140068670 | ENHANCING VIDEO CONTENT WITH EXTRINSIC DATA - Disclosed are various embodiments for enhancing video content with extrinsic data. A video content feature is rendered on a display. A user interface is rendered on top of the video content feature on the display. The user interface presents cast member images, each of which corresponds to a cast member in the video content feature. A selection of a cast member image is obtained through the user interface. The user interface is updated to present additional information regarding the respective cast member corresponding to the selected image. | 2014-03-06 |
20140068671 | ON-LINE SCHEDULE SYSTEM WITH PERSONALIZATION FEATURES - An on-line scheduling application allows users to personalize how television-related, entertainment-related, and social event related information is provided. Users may select one or more sources from which the information is obtained. Users may set up a date book that is also uses as a source. Users may select one or more delivery schemes that the application used to provide the information. One or more of the personalization features of the scheduling application stay be incorporated into an on-line television programming guide. | 2014-03-06 |
20140068672 | METHOD AND APPARATUS FOR DISPLAYING ENTERTAINMENT SYSTEM DATA UPON SELECTION OF A VIDEO DATA DISPLAY - A graphical user interface (GUI) includes a first window that displays video data of a first entertainment selection. A first area of the first window displays entertainment system data that corresponds to the first entertainment selection. The GUI includes a second window that displays video data of a second entertainment selection. A second area of the second window, displays entertainment system data that corresponds to the second entertainment selection. Upon selection by a user of the respective window, entertainment system data regarding the entertainment selection corresponding to the respective window is displayed. | 2014-03-06 |
20140068673 | ON SCREEN HEADER BAR FOR PROVIDING PROGRAM INFORMATION - A method, system, and executable instructions are provided that, in a first mode, display, on the television screen, a thumbnail preview comprising EPG information associated with the selected program and the graphical image, wherein the selected program corresponds to an in focus program in a listing of EPG information for multiple channels and/or programs and wherein the graphical image is not related with a currently viewed program and in a second mode, display, on the television screen, a header bar, the header bar comprising EPG information associated with the selected program and the graphical image, wherein the selected program corresponds to a currently viewed program and is not related to an in focus program in a listing of EPG information for multiple channels and/or programs. | 2014-03-06 |
20140068674 | PANEL USER INTERFACE FOR AN INTELLIGENT TELEVISION - An intelligent television, methods for displaying content, and methods for user interaction between the intelligent television and the user are provided. In general, a user is provided with an application panel allowing for navigation, categories, favorites, and search options that enable one or more functions associated with the intelligent television. The presentation of options is based on input received by the intelligent television. As a user provides input to the intelligent television via a remote control or other input device. The intelligent television is configured to interpret the input and provide interactive functionality in the form of content presented to the display of the intelligent television without obstructing the user from viewing content displayed on the screen of the intelligent television. | 2014-03-06 |
20140068675 | ENHANCED PROGRAM PREVIEW CONTENT - Methods and apparatus for providing an enhanced EPG or EPG banner are described. A method of displaying first and second audiovisual content, the first audiovisual content comprising a current program and the second audiovisual content comprising audiovisual content relating to a future program according to a program broadcast schedule, the method comprising receiving the first audiovisual content at a media playback device, receiving the second audiovisual content at the media playback device from a remote content system over a packet-based data network, in response to user input, outputting the first and second audiovisual content to an output device having a screen, and controlling the screen of the output device to display the first and second audiovisual content concurrently. A method of controlling a screen, the display being operable in different modes according to whether a PiP window is shown, and whether currently broadcast or future content is shown. | 2014-03-06 |
20140068676 | METHOD AND SYSTEM FOR VIDEO COLLECTION MANAGEMENT, INVALID VIDEO REPLACEMENT AND CONTINUOUS VIDEO REPLAY - A method and a system for video collection management are provided. The method and the system can gather related videos in a network, classify the videos into multiple channels and recommend the channels to be viewed by the user. The method and the system can check the videos of the channels periodically to determine whether the videos are valid or invalid and search for other videos to replace the invalid videos. The method and the system also provide continuous, cross-apparatus and cross-channel video replay. | 2014-03-06 |
20140068677 | SYSTEM AND METHOD FOR GENERATING CONTENT CHANNELS - A system and method for generating and providing content channels are provided. A system and method may obtain a plurality of content items from a plurality of sources, generate a program, include the content items in the program and provide the program to a user computing device. A system and method may include plurality of programs in a channel and provide the channel to a user. Providing a channel may include continuous content delivery. | 2014-03-06 |
20140068678 | INTEGRATED VIDEO CONTENT - A method includes receiving a request, associated with a user profile, for an integrated video guide for a video service. The integrated video guide is time based, and the video service includes broadcast video content and video service selected video content. The video service selected video content is provided via unicast or multicast. The method includes identifying basic video channels that are provided to all subscribers of the video service, and identifying user selected channels that are provided based on the user profile. Broadcast channels that are included in the user selected channels are identified. Online channels that are included in the user selected channels are also identified. The method also includes presenting the basic video channels, the broadcast channels, and the online channels in a same manner in the integrated video guide. | 2014-03-06 |
20140068679 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, DIGITAL TELEVISION RECEIVING APPARATUS, AND STORAGE MEDIUM - According to one embodiment, a content output module outputs viewing content to a display module. A service menu list display module displays a service menu related to the content in list form on the display module when an instruction to acquire a service from a server is received, while the content is being output to the display module. Then, a related service menu switching display module switches to a further related service menu and displays the menu in response to a subsequent specification input according to a display state of the service menu. | 2014-03-06 |
20140068680 | SYSTEMS AND METHODS FOR PRIORITIZATION OF DATA FOR INTELLIGENT DISCARD IN A COMMUNICATION NETWORK - Systems and methods for optimizing system performance of capacity and spectrum constrained, multiple-access communication systems by selectively discarding packets are provided. The systems and methods provided herein can drive changes in the communication system using control responses. One such control responses includes the optimal discard (also referred to herein as “intelligent discard”) of network packets under capacity constrained conditions. Some embodiments inspect a video stream to determine priorities for various elements of the video stream. The elements may be discarding using the priorities. In various embodiments, the elements include frames, slices, macroblocks, and data partitions. | 2014-03-06 |
20140068681 | Method and system for synchronized multi-venue experience and production - The present disclosure discloses methods and systems for an interactive event experience capable of synchronizing two or more physical venues, with live events happening at one or more venues. In some embodiments, a system may synchronize the live event experience by equalizing remote participants with local ones, and remote shared screens with local ones. In some embodiments, attention management may be provided to local and remote participants. In some embodiments, a cloud-based broadcasting system may be provided at a local venue and/or remote venues. | 2014-03-06 |
20140068682 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-03-06 |
20140068683 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-03-06 |
20140068684 | Digital Video Recorder Program To Mobile Device - Method, device, and storage medium to provide programs, recorded and stored in relation to a digital video recorder (DVR) service, to a mobile device. A mobile device includes a mobile DVR application that provides for the automatic downloading or streaming of the programs. A network device provides transcoding of the programs to a format compatible with the mobile device. The mobile DVR application allows the user to set preferences pertaining to the invocation and delivery of the programs. | 2014-03-06 |
20140068685 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-03-06 |
20140068686 | METHOD AND APPARATUS FOR PROCESSING DIGITAL SERVICE SIGNAL - An apparatus of processing digital service signals includes a PDI module configured to receive a PDI table, wherein the PDI table includes at least one question element having an id field identifying a PDI question and extract the PDI question from the PDI table, a PDI storing module configured to receive a PDI answer according to the extracted PDI question, a filtering module configured to receive a filtering criteria information associated with downloadable contents including criterion id and criterion value, wherein the criterion id identifies each criterion matching the id field of each of the PDI question and the criterion value indicates a value of the criterion being a possible answer to the PDI question and filter contents of the digital service signal using the filtering criteria information to determine the contents to download. | 2014-03-06 |
20140068687 | PROCESS FOR SUBTITLING STREAMING VIDEO CONTENT - A system and process is provided in which original video or dialog content is securely received from the content owner. Subtitle language data is derived, translated, stored and served on a separate database for synchronous playback with the content in video streaming, downloading or online TV following the activation of an option by the end user through a media player. | 2014-03-06 |
20140068688 | APPARATUS AND METHODS FOR CONTROLLING DIGITAL VIDEO RECORDERS - A DVR controller in network communication with a digital video recorder receives an instruction from a user directing the digital video recorder to perform a function among a set of available functions. The set of available functions comprises a record function operative to cause the digital video recorder to record content and store that content on the digital video recorder, and a playback function operative to cause the digital video recorder to play back content stored on the digital video recorder. Subsequently, at least in part in response to the instructions from the user, the DVR controller issues a command to the digital video recorder to perform the function. The digital video recorder is operative to present content on a presentation device controlled by the user. The DVR controller, in turn, is remotely disposed from the digital video recorder in a facility of a content provider. | 2014-03-06 |
20140068689 | SYSTEMS AND METHODS FOR PROVIDING SOCIAL MEDIA WITH AN INTELLIGENT TELEVISION - An Intelligent Television provides unique user interfaces and user interface interactions to provide social media. The interfaces and interface are intuitive and allow the user to quickly retrieve and view social media with respect to content displayed on the Intelligent Television. Further, intuitive user interface interactions are provided to allow for the quick and efficient posting of social media from the Intelligent Television to a social media site. | 2014-03-06 |
20140068690 | BROADCAST CONTENT TO HTTP CLIENT CONVERSION - In embodiments of broadcast content to HTTP client conversion, a client converter ( | 2014-03-06 |
20140068691 | METHOD, SYSTEM, AND APPARATUS FOR ACQUIRING COMMENT INFORMATION WHEN WATCHING A PROGRAM - Embodiments of the present invention disclose a method, a system, and an apparatus for acquiring comment information when watching a program. The method includes: acquiring, by a comments functional entity, comment content sent by the end user on an IPTV program and related information corresponding to the comment content; send the related information corresponding to the comment content to a metadata control functional entity, so as to enable an end user who demands and watches the IPTV program to select and play the comment content corresponding to the IPTV program. In the embodiments of the present invention, in the process of watching a program, a user can synchronously record audio or video content as comment information on the program, and upload the comment content to a network side, so that later other friends when watching the program. | 2014-03-06 |
20140068692 | Sharing Television and Video Programming Through Social Networking - In particular embodiments, one or more computer systems of a social-networking system receive a first video stream from a content source, receive social content from a social graph of the social-networking system, and generate an overlay area comprising at least a portion of the social content. The social graph includes a plurality of nodes and edges connecting the nodes, the nodes comprising user nodes that are each associated with a particular user of the social-networking system. The one or more computer systems of the social-networking system determine a placement for the overlay area within the first video stream, generate a modified video stream using at least the first video stream and the overlay area, and provide the modified video stream for display on a display device. The overlay area is placed within the modified video stream according to the determined placement. | 2014-03-06 |
20140068693 | METHOD, SYSTEM, OR USER DEVICE FOR ADAPTIVE BANDWIDTH CONTROL OF PROXY MULTIMEDIA SERVER - The approach is for controlling a data rate of proxy server of a user device that includes a multimedia player, and a proxy server adapted to communicate with the multimedia player. The proxy server also communicates with a multimedia server. The approach includes receiving a request for a multimedia content from the multimedia player, requesting the multimedia content to the multimedia server, receiving a plurality of packets for the multimedia content from the multimedia server, estimating a data rate between the user device and the multimedia server, and sending a data stream for the multimedia content to the multimedia player based on the estimated data rate. | 2014-03-06 |
20140068694 | Method and System for Power Management in a Frequency Division Multiplexed Network - A network device may receive a signal from a headend, wherein a bandwidth of the received signal spans from a low frequency to a high frequency and encompasses a plurality of sub-bands. The network device may determine, based on communication with the headend, whether one of more of the sub-bands residing above a threshold frequency are available for carrying downstream data from the headend to the circuitry. The network device may digitize the signal using an ADC operating at a sampling frequency. The sampling frequency may be configured based on a result of the determining. When the sub-band(s) are available for carrying downstream data from the headend to the network device, the sampling frequency may be set to a relatively high frequency. When the sub-band(s) are not available for carrying downstream data from the headend to the network device, the sampling frequency may be set to a relatively low frequency. | 2014-03-06 |
20140068695 | Advanced Digital TV System - A system for displaying electronic program guide information about a plurality of video items on a screen, the system including a display module to display a plurality of pages layering into the screen, each of the pages including a plurality of graphical panels associated with the video items, and a user input module to receive a user input to turn at least one of the pages such that the at least one page is peeled away from other ones of the pages in order to bring the graphical panels of the at least one page in or out of view, wherein the display module is operative to show the turning of the at least one page bringing the at least one page in or out of view. Related apparatus and methods are also described. | 2014-03-06 |
20140068696 | PARTIAL AND RISK-BASED DATA FLOW CONTROL IN CLOUD ENVIRONMENTS - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for risk-based data flow control in a cloud environment. Implementations include actions of intercepting first data transmitted from a first application to a second application before receipt of the first data at the second application, the first application and the second application being hosted within the cloud environment, processing the first data to provide a first risk factor, the first risk factor reflecting a degree of risk if the first data is received by the second application, generating first sanitized data based on the first data, the first risk factor and a first access control policy associated with the first data and transmitting the first sanitized data to the second application. | 2014-03-06 |
20140068697 | STATIC ENFORCEMENT OF PROCESS-LEVEL SECURITY AND COMPLIANCE SPECIFICATIONS FOR CLOUD-BASED SYSTEMS - Implementations of the present disclosure are directed to statically checking conformance of a computer-implemented service at a source code level to requirements specified at a process level and include actions of receiving source code of the computer-implemented service, receiving one or more rules, the one or more rules being generated based on a mapping and including a set of technical requirements that can be checked on the source code level, the mapping associating the requirements with the source code, and processing the source code and the one or more rules using static code analysis (SCA) to generate a result, the result indicating whether the computer-implemented service conforms to the requirements. | 2014-03-06 |
20140068698 | Automatically Recommending Firewall Rules During Enterprise Information Technology Transformation - Techniques for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment. A method includes obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment. | 2014-03-06 |
20140068699 | NETWORK SYSTEM FOR IMPLEMENTING A CLOUD PLATFORM - A network system for implementing a cloud platform within a network to which a device defining a computing environment for a user has access comprises an application management module, a community management module, and a user enrolment portal. The application management module enables access to an abstract application associated with a concrete application defining an implementation of the abstract application for the computing environment. The community management module manages a community comprised of a user credential and the abstract application, the community defines at least one of: a policy, a management process, and a service, under which the user can access the abstract application. The user enrolment portal supports an enrolment of the user in the community from the device and orchestrates a policy management mechanism to support an enforcement of the policy under which the user has access to the concrete application from the device. | 2014-03-06 |
20140068700 | PRIORITIZED TOKEN BASED ARBITER AND METHOD - An apparatus and method for employing a token based arbiter. The apparatus includes a priority provider ( | 2014-03-06 |
20140068701 | Automatically Recommending Firewall Rules During Enterprise Information Technology Transformation - A system and computer program product for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment include obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment. | 2014-03-06 |
20140068702 | SINGLE SIGN-ON SYSTEM AND METHOD - A computer-readable storage medium having computer-executable instructions for authenticating in a computing environment where the computer-executable instructions instruct a processor to receive a token from a client by a first process, send the token to a second process, validate the token by the second process by sending the token to a policy server and receiving a validation of the token from the policy server, and selectively grant access to the computing resource based at least in part upon the validation of the token. The validation of the token indicates that the token is associated with a previous successful authentication of the client by the second process. A system also includes the first process and the second process. | 2014-03-06 |
20140068703 | SYSTEM AND METHOD PROVIDING POLICY BASED DATA CENTER NETWORK AUTOMATION - Systems, methods, architectures and/or apparatus for implementing policy-based management of network resources within a data center (DC) by detecting compute events via the hypervisor and responsively generating a registration event in which a policy-based determination is made regarding event authorization and DC resource allocation. | 2014-03-06 |
20140068704 | MITIGATING UNAUTHORIZED ACCESS TO DATA TRAFFIC - One particular example implementation of an apparatus for mitigating unauthorized access to data traffic, comprises: an operating system stack to allocate unprotected kernel transfer buffers; a hypervisor to allocate protected memory data buffers, where data is to be stored in the protected memory data buffers before being copied to the unprotected kernel transfer buffers; and an encoder module to encrypt the data stored in the protected memory data buffers, where the unprotected kernel transfer buffers receive a copy the encrypted data. | 2014-03-06 |
20140068705 | METHOD FOR CLOUD-BASED ACCESS CONTROL POLICY MANAGEMENT - A Web-based management server includes an ACP manager to manage access control rules (ACRs) and access control policies (ACPs). The ACRs and ACPs are configured by an administrator via a Web interface of the management server. The ACP manager is to transmit over the Internet the ACPs and the ACRs to network access devices (NADs) to allow the NADs to apply the ACPs to their respective network client devices (NCDs) based on the ACRs, where the NADs are managed by the management server over the Internet. Each of the NADs operates as one of a router, a network switch, and an access point. The ACP manager is to periodically update the ACRs and ACPs stored in the NADs, including receiving an update from one NAD and broadcasting the update to a remainder of the NADs, | 2014-03-06 |
20140068706 | Protecting Assets on a Device - Embodiments of the present invention are directed to systems and methods for protecting data assets on a device. In embodiments of the invention, a data protection module dynamically and statically searches for one or more data assets and identifies the data assets based on one or more security and privacy attributes. The data assets are classified based on a policy and protected using one or more protection mechanisms. Additionally, data assets are ranked and a security and privacy map is generated and maintained. The security and privacy map may include association of the data assets with their location, ranking, protection mechanism, etc. In some embodiments, a user interface is provided on the device for viewing and generating the policy and/or the security and privacy map. | 2014-03-06 |
20140068707 | Internetwork Authentication - A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network, and allowing access at the first network. The technique can include filtering access to a network, thereby restricting access to users with acceptable credentials. Offering a service that incorporates these techniques can enable incorporation of the techniques into an existing system with minimal impact to network configuration. | 2014-03-06 |
20140068708 | SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES - A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to detect the launch of an application. A workstation application server receives data associated with the application from the workstation. This data can include a hash value. The application server module can determine one or more categories to associate with the application by referencing an application inventory database or requesting the category from an application database factory. The application database factory can receive applications from multiple application server modules. The application database factory determines whether the application was previously categorized by the application database factory and provides the category to the application server module. Once the application server module has the category, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the launched application to control access to the application on the workstation. | 2014-03-06 |
20140068709 | METHOD AND APPARATUS FOR NEGOTIATING SECURITY DURING HANDOVER BETWEEN DIFFERENT RADIO ACCESS TECHNOLOGIES - Solution for security negotiation during handover of a user equipment (UE) between different radio access technologies are provided. In the solution, the UE receives NAS security information and AS security information which are selected by the target system and then performs security negotiation with the target system according to the received NAS security information and AS security information. As such, the UE may obtain the key parameter information of the NAS and AS selected by a LTE system and perform security negotiation with the LTE system when the UE hands over from a different system, such as a UTRAN, to the LTE system. | 2014-03-06 |
20140068710 | USER DEVICE SELECTION - A method may include receiving, at an application server, a session initiation protocol (SIP) message including a public user identifier (ID) associated a user. The public user ID corresponds to a plurality of user devices. The method also includes determining an applicable order of alerting at least one of the plurality of user devices. The method further includes identifying at least one available user device associated with the user, based on a terminal identifier (ID) associated with each at least one available user device. The method includes selecting a user device from the at least one available user device based on the applicable order of alerting. A SIP invite message, including a terminal ID for the selected user device, is generated. The method includes sending the SIP invite message to the selected user device based on the applicable order of alerting, and receiving a response to the SIP invite message. | 2014-03-06 |
20140068711 | Network Access Management via a Secondary Communication Channel - The present disclosure provides for selectively enabling a primary communication channel upon receipt of enablement instructions received via a secondary communication channel. In some embodiments, a first intelligent electronic device (IED) may be connected to a second IED via a primary communication channel. In various embodiments, the primary communication channel may be selectively and/or temporarily enabled by transmitting an enablement instruction via a secondary communication channel. The secondary communication channel may be relatively more secure than the primary communication channel. In some embodiments, the secondary communication channel may also connect the first and second IEDs. Accordingly, the first IED may transmit an enablement instruction to the second IED in order to temporarily enable communication via the primary communication channel between the first and second IEDs. | 2014-03-06 |
20140068712 | REMOTE CONTROL OF SECURE INSTALLATIONS - Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a communications network and a second hardware interface configured to convey the received command to a protected destination when the relay is actuated. A decoder includes a third hardware interface configured to receive a digital signature for the command from the communications network and hardware decoding logic coupled to verify the digital signature and to actuate the relay upon verifying the digital signature, whereby the command is conveyed via the second hardware interface to the protected destination. | 2014-03-06 |
20140068713 | SYSTEMS, METHODS AND ARTICLES FOR PROVIDING COMMUNICATIONS AND SERVICES INVOLVING AUTOMOBILE HEAD UNITS AND USER PREFERENCES - Network communications, Web-based services and customized services using the Web-based services may be provided to drivers and users via the automobile head unit in the vehicle and via their mobile device. The automobile head unit in the vehicle and the mobile device are communicatively linked via a short range wireless connection. Also, these devices may communicate over a network such as a cellular network to a service provider that provides entertainment and informational services to the mobile device and the head unit of the vehicle. The user's profile and preferences are able to follow the user to various locations and into vehicles because this information is stored at a server accessible by the user's mobile device, and in some embodiments, also the head unit. The mobile device may provide services to the head unit if it does not have wider network connectivity over the short range wireless connection. | 2014-03-06 |
20140068714 | NETWORK SYSTEM, DATA PROCESSING APPARATUS, AND METHOD - A method for processing data with a terminal and a system connected to the terminal via a network, which includes the steps of executing a process according to a request transmitted from the terminal via the network, performing a first user authentication with respect to the terminal by using the terminal or an authentication apparatus connected to the terminal via the network, storing first authentication data used for the first user authentication in association with second authentication data used for a second user authentication in a storage unit, and performing the second user authentication with respect to the system. In a case where at least a portion of the first authentication data is authenticated by the first user authentication, the second user authentication is performed by using the first and second authentication data stored in the storage unit and the portion of the first authentication data. | 2014-03-06 |
20140068715 | INFORMATION PROCESSOR, SYSTEM AND RECORDING MEDIUM - An information processor is connected via a network to an output apparatus and configured to control a job outputting process of the output apparatus. The information processor includes a job identifier generation part configured to generate a job identifier for uniquely identifying a job input from a terminal apparatus connected via the network to the information processor, an information storage part configured to store information that correlates the job identifier and the input job, a job identifier transmission part configured to transmit the job identifier correlated with the input job to the terminal apparatus, and a job association part configured to associate user information for uniquely identifying an authenticated user received from the output apparatus with the input job based on a job association request including the user information and the job identifier and on the information stored in the information storage part. | 2014-03-06 |
20140068716 | METHOD AND SYSTEM FOR A GIGABIT ETHERNET IP TELEPHONE CHIP WITH INTEGRATED SECURITY MODULE - Methods and systems for processing Ethernet data are disclosed and may comprise receiving Ethernet data via a single gigabit Ethernet IP telephone chip. A secure application key may be received from a secure server by an OSM integrated within the gigabit Ethernet IP telephone chip for processing the received Ethernet data. The received Ethernet data may be processed by the gigabit Ethernet IP telephone chip based on the received secure application key. A unique security identifier internal to the single gigabit Ethernet IP telephone chip may be communicated off-chip to the secure server. The unique security identifier may identify the single gigabit Ethernet IP telephone chip. The secure server may authenticate the gigabit Ethernet IP telephone chip based on the unique security identifier internal to the single gigabit Ethernet IP telephone chip, prior to the receiving of the secure application key. | 2014-03-06 |
20140068717 | METHOD AND SYSTEM FOR CONTROLLING ACCESS - A method and system for controlling access to a service by increasing security and/or authentication is described. A security controller comprises: a processor that receives event data and is connected to a state data store comprising state data indicating a status of a first device in a computing system. The state data comprises a proximity status of the first device relative to at least one other device in the computing system and a security status of the first device relative to at least one other device in said computing system. A policy data store stores a policy determining the required proximity status and security status of the first device. The processor is configured to read the event data, state data and the policy; determine whether the proximity status of the first device meets the required proximity status defined in the policy; determine whether the security status of the first device meets the required security status defined in the policy and output action data via an action output if both said determining steps are complied with. | 2014-03-06 |
20140068718 | FLATTENING PERMISSION TREES IN A VIRTUALIZATION ENVIRONMENT - A virtualization manager receives a permission request indicating a user and an entity in a virtual machine system. The virtualization manager flattens a permissions database to generate a flattened database view. Using the flattened database view, the virtualization manager determines whether the user has permission to access the entity in the virtual machine system and returns an indication of whether the user has permission to access the entity in the virtual machine system. | 2014-03-06 |
20140068719 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR SHARING WIRELESS NETWORK CONFIGURATIONS - Example method, apparatus, and computer program product embodiments are disclosed to improve user experience and security in sharing wireless network configurations. An embodiment comprises reading, by a guest wireless device, data from a machine readable medium, including accessing information, to enable the guest device to obtain credentials from an access rights server, to access an access point or network, based on the accessing information; transmitting by the guest device, a wireless message to the access rights server, requesting credentials to enable accessing the access point or network, the request including the accessing information addressing a storage partition in a database associated with the access rights server, the storage partition being accessible with the accessing information; and receiving by the guest device from the access rights server, the credentials to enable the guest device to gain access to the access point or network by using the credentials. | 2014-03-06 |
20140068720 | SYSTEM AND METHOD FOR PROTECTING DEVICES ON DYNAMICALLY CONFIGURED NETWORK - Provided herein are systems and methods for implementing a more secure network client device in connection with the dynamic host configuration protocol (DHCP). Incoming DHCP Offer packets containing configuration information are temporarily collected. Once all incoming Offers are judged to have been received, offers are scored and a winning offer is selected. The winning offer is used to configure the device's network stack. | 2014-03-06 |
20140068721 | ALLOWING GUEST OF HOSPITALITY ESTABLISHMENT TO UTILIZE MULTIPLE GUEST DEVICES TO ACCESS NETWORK SERVICE - Network traffic is received from a guest device on a computer network of a hospitality establishment, and a guest area of the hospitality establishment is accordingly identified. A login database is queried to find an unexpired login for the guest area, the unexpired login specifying a stored guest identifier corresponding to information retrieved from a property management system of the hospitality establishment regarding a guest of the guest area at a time when the unexpired login was created. The stored guest identifier of the unexpired login is compared with a current guest identifier of the guest area retrieved from the property management system regarding a current guest of the guest area. When the stored guest identifier matches the current guest identifier, the guest device is automatically allowed to access the network service for a remaining portion of the allowed access duration of the unexpired login. | 2014-03-06 |
20140068722 | PERSONAL IDENTITY CONTROL - Obtaining authorization from a subscriber to an authorization service provided by an authorization provider in a data communications system. The data communications system includes a plurality of relying parties and a plurality of authorization providers. An authorization request including data identifying is subscriber to an authorization service is received from a relying party. An authorization provider is selected from the plurality of authorization providers on the basis of the subscriber-identifying data. An authorization request is transmitted to the selected authorization provider. An authorization response is received from the selected authorization provider. The authorization response indicates that the subscriber has authorized the request on a telecommunications device with which contact has been initiated by the authorization provider in response to the authorization request. An authorization message is transmitted to the relying party based at least in part on the authorization response received from the selected authorization provider. | 2014-03-06 |
20140068723 | TWO-FACTOR AUTHENTICATION SYSTEMS AND METHODS - Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an authenticating service to perform an action on behalf of a user. The authentication service then sends a permission request to a mobile device associated with the user, asking the user whether or not the action should be allowed. The user sends a permission response via the mobile device to the authentication service, granting or denying the action. The user may automate future similar responses so long as at least one automation criterion is met (e.g., the physical location of the mobile device), eliminating the need to manually provide a response to future permission requests. Information necessary to determine whether the automation criterion is met is stored locally on the mobile device. | 2014-03-06 |
20140068724 | DYNAMIC AUTHENTICATION IN SECURED WIRELESS NETWORKS - Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required. | 2014-03-06 |
20140068725 | Wireless Pairing and Communication Between Devices Using Biometric Data - In a first implementation, a host determines to pair with a device and transmits biometric data for a user to the device. The device receives the transmitted biometric data and compares such to device biometric data to determine whether or not to pair with the host and/or what data stored by the device to allow the host to access. The host then accesses data of the device to which the device has allowed access. In another implementation, a device determines to pair with a host and transmits biometric data for a user to the host. The host receives the transmitted biometric data and compares such to device biometric data to determine whether or not to pair with the device and/or what data stored by the host to allow the device to access. The device then accesses data of the host to which the host has allowed access. | 2014-03-06 |
20140068726 | SYSTEMS AND METHODS FOR AUTHENTICATION USING LOW QUALITY AND HIGH QUALITY AUTHENTICATION INFORMATION - Systems, methods, and devices for authenticating a user are provided. A device includes one or more processors configured to determine if a requested service requires high quality authentication, generate a request for high quality authentication if the requested service requires high quality authentication, and generate a request for low quality authentication if the requested service requires low quality authentication. The device also include a network interface component coupled to a network, the network interface component configured to: receive the request for the service requiring authentication, and a memory, the memory storing high quality authentication information and low quality authentication information for authenticating the user. | 2014-03-06 |
20140068727 | WI-FI CREDENTIAL SHARING USING IMAGES - In order to facilitate access to a wireless network, access information (and, more generally, credentials) may be provided to an electronic device via an image. In particular, the electronic device may capture an image that includes a representation of the access information. For example, the electronic device may scan a two-dimensional representation of the access information, such as a Quick Response (QR) code. Then, the electronic device may analyze the image to extract the access information. Next, the access information may be used to access the wireless network. This communication technique allows a user of the electronic device to access the wireless network with less effort, thereby improving the user's experience. | 2014-03-06 |
20140068728 | APPARATUS AND METHOD FOR MANAGING HEALTH DATA - An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the user terminal, and information of a medical instrument for measuring the health data to a management server interworked with the user terminal, receiving, by a receiver, a security type table mapped onto the user terminal number and comprising a security type code for instructing the health data which the medical instrument has measured to be stored in a first memory without security or in a second memory with security, from the management server, and storing the health data in the first memory or the second memory, which the security type code instructs, through determining the security type code of the security type table when the health data is received from the medical instrument. | 2014-03-06 |
20140068729 | System for Enabling a Smart Device to Securely Accept Unsolicited Transactions - A Smart Device ( | 2014-03-06 |
20140068730 | AUTHENTICATION BASED ON PREVIOUS AUTHENTICATIONS - A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N≧2). Each record of a stored authentication plan associated with the user has authentication records each having expected information relating to authentication of the user for access to the N−1 target servers at respective levels 1 through N−1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N−1 target servers at respective levels 1 through N−1. It is determined that that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N. | 2014-03-06 |
20140068731 | MANAGING PASSWORD STRENGTH - A method, system or computer usable program product for managing password strength including receiving a password on a data processing system for a user, filtering for personal information about the user from multiple independent data sources accessible across a computer network, computing the password strength by the data processing system using an algorithm which compares the password to the filtered personal information about the user, and presenting feedback to the user through a user interface on a data processing system display regarding the computed password strength. | 2014-03-06 |
20140068732 | Single tenant audit view in a multi-tenant environment - A method correlates audit information in a multi-tenant computing infrastructure. The method leverages a user's authentication to the infrastructure, such as via federated single sign-on (F-SSO) from an identity provider. Preferably, the user's tenant identifier in the environment is derived based on identity information obtained during the F-SSO exchange. This tenant identifier is propagated to one or more other components in the infrastructure that are accessed by the user. As audit event from multiple components in the computing infrastructure are generated, these audit events are annotated with the tenant identifier and stored in an audit repository. In response to a request to view the tenant's audit data, a collection of tenant-specific audit events are then retrieved from the audit repository and displayed in a single tenant view. This approach ensures that audit event information is not leaked inadvertently between tenants. | 2014-03-06 |
20140068733 | MANAGING PASSWORD STRENGTH - A method for managing password strength including receiving a password on a data processing system for a user, filtering for personal information about the user from multiple independent data sources accessible across a computer network, computing the password strength by the data processing system using an algorithm which compares the password to the filtered personal information about the user, and presenting feedback to the user through a user interface on a data processing system display regarding the computed password strength. | 2014-03-06 |
20140068734 | Managing Access to a Shared Resource Using Client Access Credentials - Systems and methods to manage access to shared resources are provided. A particular method may include receiving a request to access a shared resource from a first client of a plurality of clients and determining whether the shared resource is being used. A first window credential associated with the first client may be retrieved. The first window credential may be one of a plurality of window credentials associated with the plurality of clients. The first window credential may be used to access the shared resource. | 2014-03-06 |
20140068735 | SYSTEM FOR PROVIDING TRUSTED USER ACCESS OF COMPUTER SYSTEMS - Enables trusted user access of computer systems for example that verifies trusted users and may allow trusted users to bypass challenge-response tests, while limiting access by automated processes and unwanted human challenge-response test solvers. Embodiments may implement an account that may be utilized across websites to enable a valid or trusted user to bypass challenge-response tests. Embodiments of the invention cost time, or cost a nominal fee, or require use of something that may be validated as owned by a user such as a physical address or cell phone, or trusted referral or social graph or any combination thereof, but cost large amounts time or money for spammers using cheap third world labor, thus making it expensive to invoke attacks on sites protected by embodiments of the invention. | 2014-03-06 |
20140068736 | MANAGEMENT OF MULTIPLE DEVICES REGISTERED TO A USER - A system and method for managing electronic devices based on user identity information is presented. An authenticating entity authenticates and provides secure user identity data and a first electronic device. The first electronic device includes memory that stores first secure user identity data provisioned to the first electronic device and a communication module that discovers a second electronic device and initiates a wireless connection with the discovered second electronic device, in which the second electronic device is provisioned with second secure user identity data, logic that has the first and second electronic devices exchange and validate their respective first and second secure user identity data, and a discovery list that stores attributes of the second electronic device. Upon determining that the first and second electronic devices are associated with the same user, the logic adds self-property to the stored attributes of the second electronic device. | 2014-03-06 |
20140068737 | SYSTEMS AND METHODS FOR CONTENT MANAGEMENT IN AN ON DEMAND ENVIRONMENT - The technology disclosed relates to hosting legacy data sources in a cloud environment. In particular, it relates to providing users with flyweight access to content stored in legacy content repositories from within cloud based applications. It uses full-duplex secure transport tunnels and repository-specific connectors to traverse security layers and access the content repositories. It also creates virtual objects representing the content in the content repositories and embeds them in the cloud based applications. | 2014-03-06 |
20140068738 | ADAPTIVE DEVICE AUTHENTICATION - Device attributes corresponding to hardware and system configuration and characteristics of the user of the device are associated with adjustment logic, e.g., according to various types and classes of attributes. A hierarchical authentication process provides highly detailed and accurate authentication of a device, including device identification, device authentication, user authentication, and attribute adjustment. If the device is not properly identified, authentication fails. Otherwise, device authentication is attempted. If device authentication fails, all authentication fails. Otherwise, the user of the device is authenticated. If user authentication fails, authentication of the device fails. Otherwise, adjustment logic is used to adjust attributes for subsequent authentication. | 2014-03-06 |
20140068739 | METHOD AND SYSTEM FOR VERIFYING AN ACCESS REQUEST - A system for verifying a request for access to data is provided, the system comprising a first module and a second module. The first module is arranged to generate a password, and the second module is arranged to receive a password associated with a request for data (received at step), validate the received password, and enable access to the requested data. The system is such that the first and second modules share a secret that has been uniquely assigned thereto, the shared secret being for use in generation and validation of a said password. Furthermore, the first module is communicatively disconnected from the second module. | 2014-03-06 |
20140068740 | SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION IN CONNECTION WITH CAMERA EQUIPPED DEVICES - The present invention relates generally to the use of biometric technology for authentication and identification, and more particularly to non-contact based solutions for authenticating and identifying users, via computers, such as mobile devices, to selectively permit or deny access to various resources. In the present invention authentication and/or identification is performed using an image or a set of images of an individual's palm through a process involving the following key steps: (1) detecting the palm area using local classifiers; (2) extracting features from the region(s) of interest; and (3) computing the matching score against user models stored in a database, which can be augmented dynamically through a learning process. | 2014-03-06 |
20140068741 | AUTHENTICATING AN AUXILIARY DEVICE FROM A PORTABLE ELECTRONIC DEVICE - This document discusses, among other things, a method for authenticating a browser executing on an auxiliary device with a web service executing on a portable electronic device. The method includes receiving a request for a resource from the browser, determining whether the request identifies a protected resource, and selectively authenticating the request based on whether the request identifies a protected resource. | 2014-03-06 |
20140068742 | PRE-AUTHENTICATED IDENTIFICATION TOKEN - A pre-authenticated token system includes an identification token having a switch, a transmitter and receiver circuit, and a sensor; a docking station having control circuitry, a transmit/receive circuit and an antenna; a personal computer; and an authentication server computer. The personal computer transmits security information to the authentication server, receives authentication information, and transmits an authentication signal to the docking station. The docking station receives the authentication signal, enters an authentication mode, and transmits the authentication signal to the identification token. The sensor of the identification token detects removal of the identification token from the user's body, and the switch then responds by disabling the identification token to prevent transmission of identification data. | 2014-03-06 |
20140068743 | Secure configuration catalog of trusted identity providers - A secure database includes a catalog of information about one or more identity providers (IdPs) that are trusted by a service provider (SP) to authenticate users on the SP's behalf. The catalog securely stores one or more IdP configurations. An entry in the database stores information associated with the trusted IdP including artifacts to identify the IdP, artifacts used by the IdP for cryptographic operations, and a specification of one or more website(s) serviced by the trusted identity provider. Upon receipt by the SP of identity information representing a user that has authenticated to an IdP, information in the catalog of information is used to determine whether the IdP is trusted to authenticate the user on the service provider's behalf. The determination verifies that the SP uses the IdP and that a binding between an IdP identifier and at least one IdP cryptographic artifact is valid. | 2014-03-06 |