10th week of 2016 patent applcation highlights part 63 |
Patent application number | Title | Published |
20160072708 | Systems And Methods For Routing Data - Methods and systems for routing data are disclosed. In one aspect, service management can be implemented on one or more computing devices located between at least one router and one or more nodes. The one or more computing devices can be a default gateway for a plurality of user devices. In another aspect, the disclosed methods and systems can use a tag in routing a data block (e.g., service data) via a predefined route. For example, a device can transmit a request for a tag to a network node for routing a data block via a predefined route. Upon receiving the request, the network node can allocate a tag and create an interface. The interface can be associated with the tag and communications between the network node and the device for routing the data block. | 2016-03-10 |
20160072709 | FILTERING NETWORK DATA TRANSFERS - Aspects of this disclosure relate to filtering network data transfers. In some variations, multiple packets may be received. A determination may be made that a portion of the packets have packet header field values corresponding to a packet filtering rule. Responsive to such a determination, an operator specified by the packet filtering rule may be applied to the portion of packets having the packet header field values corresponding to the packet filtering rule. A further determination may be made that one or more of the portion of the packets have one or more application header field values corresponding to one or more application header field criteria specified by the operator. Responsive to such a determination, at least one packet transformation function specified by the operator may be applied to the one or more of the portion of the packets. | 2016-03-10 |
20160072710 | DATA PACKET ROUTING - Among other things, one or more techniques and/or system are provided for routing a data packet. Because the data packet may correspond to a source device having an address on a first network that may be similar to an address of a second device on a second network, the data packet may be translated to create a transformed data packet that may be distinguishable from data packets of the second device. For example, the data packet may be translated from a first address format, such as IPv4, to a second address format, such as IPv6, to create a transformed data packet. The transformed data packet may comprise a prefix that may distinctly identify the source device during routing. In this way, the transformed data packet may be identifiable as corresponding to the source device during routing through a network to a destination device. | 2016-03-10 |
20160072711 | Relay System and Relay Device - A ring control unit controls the ring network by transmitting and receiving a control frame through ring ports, and receives an address table deletion command via the control frame. When a first deletion command is received, an address table processing unit prohibits a learning process to the address table and then starts deleting the address table. Then, when a N-th (N is an integer of 2 or more) deletion command is received in a period before the completion of the deletion of the address table, the address table processing unit continues to execute the deletion of the address table. | 2016-03-10 |
20160072712 | METHOD AND DEVICE FOR TRANSMITTING PILOT SIGNAL - Disclosed are a method and device for transmitting a pilot signal. The method therefor comprises: conducting OFDM modulation on a pilot signal; and sending the modulated pilot signal on the first and/or the last OFDM symbol of a subframe which transmits the pilot signal. In the technical solution provided in the embodiments of the present application, the pilot signal is transmitted on the first and/or the last OFDM symbol of the subframe, thereby not occupying an OFDM symbol for transmitting a data signal, so as to reduce the resource overhead of the pilot signal. | 2016-03-10 |
20160072713 | LOAD BALANCING AND MIGRATION OF TRANSPORT CONNECTIONS - Aspects of the subject disclosure may include, for example, a server comprising a memory to store instructions and a controller coupled to the memory, in which the controller, responsive to executing the instructions, performs operations. The operations include detecting a condition requiring a migration of an active transport connection at a source server to a target server without interrupting communications occurring in the active transport connection. The source server is directed to transmit to the target server a migration command with state information from the source server to enable migrating the active transport connection to the target server without interrupting communications occurring in the active transport connection. A message is then received from the source server indicating the source server has received from the target server an acknowledgment that the migrating has been performed. Other embodiments are disclosed. | 2016-03-10 |
20160072714 | Method and system for forwarding information in distributed network - Disclosed is a method for forwarding information in a distributed network, including that when receiving a message of an Application (APP) protocol, a forwarding device sends, according to a forwarding rule that is sent by a Software Defined Networking (SDN)/OpenFlow controller and corresponds to the APP protocol, the message to a corresponding application server directly or sends the message to a corresponding terminal directly. The disclosure further discloses a system for forwarding information in a distributed network. A transmission bandwidth of a control message between a network control layer and a forwarding layer can be ensured by means of the disclosure, thereby ensuring the stability of an SDN/OpenFlow message between the network control layer and the forwarding layer and ensuring system expansibility. | 2016-03-10 |
20160072715 | INTEREST KEEP ALIVES AT INTERMEDIATE ROUTERS IN A CCN - One embodiment provides a system that facilitates an intermediate node to handle a potential timeout event. During operation, the system receives, by an intermediate node, a keep-alive control packet which indicates a name for an Interest message, an indicator to keep alive a Pending Interest Table (PIT) entry, and a time period for which to keep the PIT entry alive. The intermediate node determines whether the keep-alive control packet corresponds to the PIT entry based on the name, and, responsive to determining that the keep-alive control packet corresponds to the PIT entry, updates a timeout value of the PIT entry based on the time period indicated in the keep-alive control packet. Responsive to determining one or more interfaces specified in the PIT entry from which the Interest message is received, the intermediate node forwards the keep-alive control packet to the one or more interfaces. | 2016-03-10 |
20160072716 | SYSTEM AND METHOD OF ADAPTIVE RATE CONTROL AND TRAFFIC MANAGEMENT - A system and method of communication traffic management on a portable communication device having a computer processor and a network connection to a computer server for transmitting or receiving data with the processor over a network is provided. The method includes: identifying, by a traffic manager application running on the processor, a first application running on the processor and delivering first data to or from the server over the network; intercepting, by the traffic manager application, electronic traffic of the first data to or from the first application or to or from the server; and controlling, by the traffic manager application, a rate of delivery of the first data to or from the first application. The system includes the portable communication device and a nonvolatile storage device coupled to the processor and storing instructions that, when executed by the processor, cause the processor to execute the steps of the method. | 2016-03-10 |
20160072717 | REDUCING PACKET REORDERING IN FLOW-BASED NETWORKS - The present disclosure provides for methods, network devices, and computer readable storage media for packet reordering. In one embodiment, a method includes receiving a first packet of a first flow at a network device and determining whether flow-identifying information extracted from the first packet matches an existing flow entry. The method also includes, in response to a determination that the flow-identifying information does not match any existing flow entries, generating a new transient flow entry that includes the flow-identifying information and packet-in state. The method also includes forwarding the first packet to a controller via a packet-in stream. | 2016-03-10 |
20160072718 | SEGMENT BASED SWITCHING ARCHITECTURE WITH HYBRID CONTROL IN SDN - A segment based switching architecture with hybrid control providing flow control in software defined networking (SDN). An SDN controller controls top tier macro-flows and virtual segment backbone connections in a network, and an SDN network edge device controls and manages micro-flows that are attached to the SDN network edge device. The SDN network edge device controls and manages the micro-flows locally without using a southbound API. The SDN network edge device learns flow information such as source information and incoming port information for all unknown micro-flows belonging to defined segments, and builds a virtual segment topology database for each segment. The SDN network edge device employs flow computation algorithms and micro-flow management in a distributed fashion. The virtual segment backbone connections are naturally exposed to the SDN controller through provisioning. | 2016-03-10 |
20160072719 | RESOURCE ALLOCATION/DE-ALLOCATION AND ACTIVATION/DEACTIVATION - A computer-implemented method, carried out by one or more processors, for managing resources in a server environment. In an embodiment, the method includes determining to prepare one or more virtual resources for activation of one or more allocated host resources, based, at least in part, on virtual resource definitions. The one or more allocated host resources and the one or more virtual resources are activated. Activation of the one or more virtual resources is finalized, wherein finalizing the activation includes updating the virtual resource definitions. | 2016-03-10 |
20160072720 | MANAGING RESOURCES IN RESOURCE CACHE COMPONENTS - A system, method, and computer readable medium for managing resources maintained in resource cache components are provided. A network storage provider storing one or more resources on behalf of a content provider obtains client computing device requests for content. The network storage provider provides resources that are received and maintained on resource cache components. The network storage provider either processes requests or provides notifications to the resource cache components to facilitate the management of resources that need to be updated or are otherwise treated as invalid. | 2016-03-10 |
20160072721 | MANAGING NETWORK CONNECTIONS FOR PROCESSING NETWORK RESOURCES - Systems and methods for the generation and management of content requests generated by client computing devices are provided. A client computing device initiates a browse session with a content provider by establishing a remote browse session between the client computing device and a network computing provider. The network computing provider can utilize profile information corresponding to the content provider to determine a number of concurrent network connections to establish with a content provider. The network computing provider and the client computing device exchange browse session state data and client interaction data. | 2016-03-10 |
20160072722 | ADAPTIVE BIT RATE ADMISSION CONTROL OF A SHARED RESOURCE - An admission control resource tracks identities of multiple clients in a network environment that share use of a network resource to retrieve content at the same or different adaptive bit rates. The admission control resource further monitors status information indicating an ability of each of the multiple clients to retrieve content at the same or different adaptive bit rates over the shared network resource. Based at least in part on the status information, the admission control resource controls use of the shared network resource by new clients. In other words, as its name suggests, the admission control resource as discussed herein selectively limits how many subscribers are able to use a shared network resource depending on feedback from one or more clients that currently use the shared network resource to retrieve the content at the same or different adaptive bit rates. | 2016-03-10 |
20160072723 | METHOD AND SYSTEM FOR DETERMINING BANDWIDTH DEMAND - A method, a non-transitory computer-readable storage medium, and a computer system for managing bandwidth allocated to a virtual machine running on a host computer is disclosed. In an embodiment, a method involves obtaining the current bandwidth for a virtual machine running on a host computer, determining bandwidth demand for the virtual machine as a function of the current bandwidth and a growth margin, and adjusting a bandwidth cap for the virtual machine based on the determined bandwidth demand. In an embodiment, when applied, the technique allows for bandwidth to be allocated to the virtual machines without the sum of allocated bandwidth exceeding a global bandwidth cap. | 2016-03-10 |
20160072724 | ANTICIPATORY RESOURCE ALLOCATION/ACTIVATION AND LAZY DE-ALLOCATION/DEACTIVATION - A computer-implemented method, carried out by one or more processors, for managing resources in a server environment. The method includes determining, by one or more processors, to shut down a first resource consumer, wherein the first resource consumer is assigned a first virtual resource with a first set of one or more host resources. It is determined, by one or more processors, whether a second virtual resource assigned to a second resource consumer requires the first set of one or more host resources. If the second virtual resource assigned to the second resource consumer does not require the first set of one or more host resources, it is determined, by one or more processors, not to deactivate the one or more host resources assigned to the first virtual resource. | 2016-03-10 |
20160072725 | ANTICIPATORY RESOURCE ALLOCATION/ACTIVATION AND LAZY DE-ALLOCATION/DEACTIVATION - A computer-implemented method, carried out by one or more processors, for managing resources in a server environment. The method includes determining, by one or more processors, to shut down a first resource consumer, wherein the first resource consumer is assigned a first virtual resource with a first set of one or more host resources. It is determined, by one or more processors, whether a second virtual resource assigned to a second resource consumer requires the first set of one or more host resources. If the second virtual resource assigned to the second resource consumer does not require the first set of one or more host resources, it is determined, by one or more processors, not to deactivate the one or more host resources assigned to the first virtual resource. | 2016-03-10 |
20160072726 | SYSTEMS AND METHODS FOR RESOURCE SHARING BETWEEN TWO RESOURCE ALLOCATION SYSTEMS - In various example embodiments, a system and method for managing a server cluster are provided. An example method may include scheduling a first job on a first node, using a first resource manager, establishing a service for a second resource manager on a second node, wherein the service is allocated node resources of the second node, and attempting to schedule a second job on the first node, using the first resource manager. The method may include preempting the service on the second node, using the second resource manager, in response to the attempt to schedule the second job on the first node, and deallocating the node resources of the second node from the service. The method may include advertising, using a node manager of the first resource manager, available node resources of the second node, and scheduling the second job on the second node, using the first resource manager. | 2016-03-10 |
20160072727 | Pluggable Allocation in a Cloud Computing System - In one embodiment, a cloud computing system provides user extensibility by providing a plugin interface for major systems. Plugin interfaces for a compute service, object service, network service, authentication and authorization service, message service, and image service are disclosed. One or more of the plugin interfaces can be used to alter the allocation of virtual to physical resources across multiple services. Compound services and smart allocation facilities are possible with user-directed modification. | 2016-03-10 |
20160072728 | Managing Multiple Cartridges that are Electrically Coupled Together - Managing multiple cartridges that are electrically coupled together includes obtaining general purpose command instructions from a chassis with a cartridge where the cartridge has a unique application and is connected to the chassis and further operating the unique application based on the general purpose command instructions. | 2016-03-10 |
20160072729 | METHOD, APPARATUS AND SYSTEM FOR ADDRESSING RESOURCES - A method and an apparatus for addressing resources, the apparatus having a first interface to communicate with end-points operationally connected to the apparatus using a binary web service, the end-points including one or more resources; a second interface for receiving requests regarding the resources and for responding to the requests; a component for storing information on sleeping end-points which are non-continuously available and storing a request queue for each sleeping end-point; a component for receiving through the second interface a request regarding a sleeping end-point, adding the request to the request queue of the end-point; communicating with a sleeping end-point regarding the requests after receiving through the first interface a queue request from the end-point; and sending through the first interface responses for the resolved requests. | 2016-03-10 |
20160072730 | NONINTRUSIVE DYNAMICALLY-SCALABLE NETWORK LOAD GENERATION - A method for nonintrusive network load generation may include determining available resources in a distributed computing system, where the distributed computing system includes a plurality of computing devices and a target deployment. Based on an amount of available resources between the target deployment and a plurality of source computing devices, the plurality of source computing devices may be selected to generate a network load directed from the plurality of source computing devices to the target deployment. The plurality of source computing devices may be a subset of the plurality of computing devices in the distributed computing system. A network-traffic generator service may be provided to the plurality of source computing devices in order to generate the network load directed from the plurality of source computing devices to the target deployment. The performance of the distributed computing system in response to the generated network load may be monitored. | 2016-03-10 |
20160072731 | TUNNELING WITHIN A NETWORK-ON-CHIP TOPOLOGY - Systems and methods relate to a network on chip (NoC) which includes one or more channels configured to carry data packets in a first direction, the first direction having an upstream end and a downstream end. A tunnel is configured between an upstream element at the upstream end and a downstream element at the downstream end. The tunnel includes common wires which are shared by the one or more channels. The tunnel is configured to transmit data packets of two or more formats on the common wires based on common signals. common signals comprise data signals to transmit one or more of data, control, or debug information belonging to the data packets on the common wires, and framing signals to control transmission of the data signals on the common wires. | 2016-03-10 |
20160072732 | BROADCAST SIGNAL TRANSMITTING APPARATUS, BROADCAST SIGNAL RECEIVING APPARATUS, AND BROADCAST SIGNAL TRANSCEIVING METHOD IN A BROADCAST SIGNAL TRANSCEIVING APPARATUS - Disclosed is a broadcast signal transmitting apparatus, a broadcast signal receiving apparatus, and a broadcast signal transceiving method in a broadcast signal transceiving apparatus. The broadcast signal transmitting method comprises the following steps: compressing the headers of data packets of an IP stream identified by IP address information, wherein the compressed data packets include a first packet, the header of which contains static field information, a second packet, the header of which contains dynamic field information, and a third packet, the header of which contains the compressed static field information and/or the compressed dynamic field information; signaling IP-PLP mapping information for mapping the IP stream and a component PLP for transmitting the IP stream, the IP stream compression information, and the header information of the first packet to L2 signaling information; and transmitting the header information of the second and third packets via the component PLP, and transmitting the L2 signaling information via a common PLP. | 2016-03-10 |
20160072733 | USING A NETWORK SWITCH TO CONTROL A VIRTUAL LOCAL NETWORK IDENTITY ASSOCIATION - A technique includes providing a communication path in a network switch for communication of data between a first device coupled to the switch and a second device coupled to the network switch. The technique includes using the network switch to regulate tagging of the data to control a virtual local area network identity association of the data based at least in part on a network over which the communication occurs. | 2016-03-10 |
20160072734 | Consolidated Information Delivery in a Fibre Channel Fabric - Presented herein are techniques for collecting and delivering consolidated nameserver information in a merged Fibre (Fiber) Channel (FC) fabric. A principal switch in a merged FC fabric collects information from one or more subordinate switches. The principal switch consolidates the information collected from the subordinate switches to generate consolidated nameserver information. The principal switch then pushes the consolidated nameserver information from the principal switch to each of the subordinate switches. | 2016-03-10 |
20160072735 | LOW VOLTAGE FEEDFORWARD CURRENT ASSIST ETHERNET LINE DRIVER - Described examples include Ethernet physical layer (PHY) interface integrated circuits with transmit interface circuitry for transmitting data to an Ethernet network through a magnetic interface, which includes a voltage mode first amplifier with an output that generates a first voltage signal from a supply voltage according to a data input signal. The transmit interface circuit also includes a feedforward second amplifier circuit with an output stage that operates in a first mode to generate a current signal from the supply voltage according to the first voltage signal and to provide the current signal to the first amplifier output to boost a peak voltage at the output above the supply voltage to facilitate support for higher peak signal voltage swings for 10Base-T applications while using 2.5 volt or other low voltage supply levels. | 2016-03-10 |
20160072736 | PROACTIVE OUT OF OFFICE NOTIFICATION - In an approach to out of office notification, one or more computer processors receive an electronic communication from a sender to a recipient. The one or more computer processors determine an organization associated with the recipient. The one or more computer processors determine whether an organization timing rule for out of office notification exists for the organization. Responsive to determining an organization timing rule for out of office notification exists, the one or more computer processors determine whether the recipient has a planned absence. The one or more computer processors determine whether the recipient's planned absence meets a requirement of the organization timing rule. Responsive to determining the recipient's planned absence meets a requirement of the organization timing rule, the one or more computer processors send an out of office notification to the sender. | 2016-03-10 |
20160072737 | APP POWERED EXTENSIBILITY OF MESSAGES ON AN EXISTING MESSAGING SERVICE - An instant messaging (IM) service interacts with IM clients operating on computing devices to implement an extensible platform with which individual composer applications (“apps”) may interact to support a variety of different messaging user experiences for users of respective local and remote devices. Each IM client exposes an application programming interface for utilization by a local composer app to package content that the IM service then transparently transports to a remote device. An IM client on the remote device provides the package to an identified associated remote composer app that can unpack the content and use it to support the app's customized messaging experience for the remote user. The composer app also provides a preview of the experience supported by the packaged content that the clients on the respective local and remote devices may utilize in a messaging history and/or as a launching point to the composer app's user experience. | 2016-03-10 |
20160072738 | System and methods for electronic communication between business entities - A system and methods for electronic communication between businesses, business representatives and people. | 2016-03-10 |
20160072739 | METHOD AND SYSTEM FOR PLAYING MULTIMEDIA FILES - Playing multimedia files includes determining an instant messaging scenario type associated with an instant messaging session, locating multimedia file information that matches the scenario type, and sending the multimedia file information to at least one instant messaging terminal of a plurality of instant messaging terminals participating in the instant messaging session to trigger the at least one instant messaging terminal to play a multimedia file based on the multimedia file information. | 2016-03-10 |
20160072740 | Dynamic Invites With Automatically Adjusting Displays - Methods, devices, systems, and non-transitory processor-readable storage media for providing a collaboration tool for soliciting responses from users, including operations for receiving at a computing device a request from a user, transmitting to a plurality of computing devices an invitation message that causes the plurality of computing devices to render a display that solicits a response to the request, receiving a response message related to the request from at least one of the plurality of computing devices, evaluating the received response message to determine whether the received response message fulfills the request, and transmitting to the plurality of computing devices a cancellation message in response to determining that the received response message fulfills the request, the cancellation message configured to cause the plurality of computing devices to perform operations to automatically clean-up the display that solicits the response to the request. | 2016-03-10 |
20160072741 | METADATA BASED USER DEVICE COMMUNICATIONS - A system includes a user device and a controller device. The user device is configured to receive messages via user interface components associated with a user interface, analyze, based on receiving the messages, the messages, generate metadata values based on analyzing the messages, and provide the messages and the metadata values to the controller device, via the user interface. The controller device is configured to receive the messages and the metadata values from the user device, via the user interface, receive profile information associated with the user device from a database server device, identify recipient user devices for the messages based on the metadata values and based on the profile information, and cause the messages to be provided to the recipient user devices. | 2016-03-10 |
20160072742 | PERSISTENT FORMAT CONVERSIONS - Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium for persistent format conversions. One of the methods includes receiving an original communication to be routed from a first user to a second user, wherein the original communication is received in a first format; converting, based a format conversion rule, the original communication into a second, different format; routing the original communication to the recipient in the second format; receiving a response communication related to the original communication and to be routed from the second user to the first user; and based on determining that the response communication is responsive to the original communication, converting the response communication into the first format prior to routing the communication to the first user. | 2016-03-10 |
20160072743 | AUTOMATIC IDENTIFICATION AND RETRIEVAL OF MESSAGE ATTACHMENTS IN A MESSAGE CONVERSATION - The present disclosure provides for an end-user communication device of a messaging system configured to identify messages exchanged during a message conversation. Responsive to selection of one or more data files, the device retrieves the one or more selected data files from a local memory of the device or from a server of the messaging system. Optionally, the messages may be identified in response to a request to add one or more new recipients in a reply to a message of a message conversation and selected data files may be forwarded to the new recipients. | 2016-03-10 |
20160072744 | AUTOMATIC SHARING OF MESSAGE ATTACHMENTS ACROSS MULTIPLE SYSTEMS - Provided are techniques for automatic sharing of message attachments across multiple systems. A message that identifies message recipients by their target addresses and includes an attachment is received. Each of the target addresses is mapped to one or more common file servers. It is determined which of the one or more common file servers is to be used for each of the message recipients by grouping message recipients that use a same common file server. For each of the grouped message recipients, a modified message is created by creating copy of the message that adds an attachment link for use in accessing the attachment from the same common file server. | 2016-03-10 |
20160072745 | AUTOMATIC SHARING OF MESSAGE ATTACHMENTS ACROSS MULTIPLE SYSTEMS - Provided are techniques for automatic sharing of message attachments across multiple systems. A message that identifies message recipients by their target addresses and includes an attachment is received. Each of the target addresses is mapped to one or more common file servers. It is determined which of the one or more common file servers is to be used for each of the message recipients by grouping message recipients that use a same common file server. For each of the grouped message recipients, a modified message is created by creating copy of the message that adds an attachment link for use in accessing the attachment from the same common file server. | 2016-03-10 |
20160072746 | E-Mail Proxy - In one embodiment, a method for processing an e-mail message addressed to an e-mail client is disclosed. The method comprises receiving at a mail server an e-mail message addressed to the e-mail client, the e-mail message including an attachment which is characterized by a size; reducing the size of the attachment to create a reduced size attachment; preparing a formatted message, which includes the reduced size attachment and a link to the attachment, wherein the attachment is downloadable from the mail server using the link; and delivering the formatted message to the e-mail client for display on a computational device. | 2016-03-10 |
20160072747 | Automated spam filter updating by tracking user navigation - An email filter updating system includes a tracking component, and a logic component. The tracking component is provided to track user navigation. This tracking compiles information about websites the user has visited and presumably may “trust” in the event an email associated with one such site or application is later received by the user's email application. The logic component uses information and a set of configurable rule-based criteria to output a characterization that a particular email message has been initiated from a site that the user has visited or should otherwise trust. The characterization is then provided to the email filter to control whether in-bound email is passed to the user's email client inbox. Further, the logic component is operative to generate filter update commands that update the email filter in an automated manner, i.e., without user input. | 2016-03-10 |
20160072748 | Method and System for Secure Messaging in Social Network - A method for exchanging content items in computerized social network using data communication network, using mobile phones. The method includes the steps of: creating new message with content object by a first user using a mobile phone, sending the message with the content object to at least one second user mobile phone, saving content object in a specific location in the memory of the second user smartphone which is restricted for use only to a designated messaging application, creating data record of the content object including: unique ID of the object, identification of the first originator user and adding identification of the at least one second user into distribution list, saving the data record in graph database in a network server, receiving update of distribution of the object by a second user to at least one third user, updating distribution list in a graph database with the at least third user identification and applying delete or share actions of objects at the mobile phones based on the distribution list of the users. | 2016-03-10 |
20160072749 | Automated spam filter updating by tracking user navigation - An email filter updating system includes a tracking component, and a logic component. The tracking component is provided to track user navigation. This tracking compiles information about websites the user has visited and presumably may “trust” in the event an email associated with one such site or application is later received by the user's email application. The logic component uses information and a set of configurable rule-based criteria to output a characterization that a particular email message has been initiated from a site that the user has visited or should otherwise trust. The characterization is then provided to the email filter to control whether in-bound email is passed to the user's email client inbox. Further, the logic component is operative to generate filter update commands that update the email filter in an automated manner, i.e., without user input. | 2016-03-10 |
20160072750 | DIGITAL COLLABORATION PROCESS ENABLEMENT TOOL - A collaboration system provides a combination of technical features to address complex collaboration between geographically distributed teams. The collaboration system implements follow and notify functionality, monitor and engage functionality, and capture functionality. The collaboration system may, for instance, tailor data flows and notifications of significant workflow events via a dynamically tuned subscription model. The system may also create a digital collaboration workspace supported by automation and machine learning functionality. In addition, the system may create documentation of collaboration with automatic recommendation of metadata tags to support search and cataloging of the documentation. | 2016-03-10 |
20160072751 | TRACKING ELECTRONIC CONTENT - A method of tracking electronic content includes producing a file of electronic content and executable instructions that collect notification information and attempt to transmit the notification information to an address when triggered by an event. The executable instructions deny access to the electronic content until the notification information is transmitted successfully. | 2016-03-10 |
20160072752 | FILTERING ELECTRONIC MESSAGES BASED ON DOMAIN ATTRIBUTES WITHOUT REPUTATION - A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is received and determined to not be included within a trusted or a block list. A total score is computed from weighted scores assigned to factors associated with the message. The message is evaluated for an unsolicited message determination by comparing the total score against a predetermined threshold. | 2016-03-10 |
20160072753 | SUPPRESSING CONTENT OF A SOCIAL NETWORK - A method of suppressing content of a social network, the method comprising monitoring for a number of gestures of rejection of content on the social network from a number of users, generating suppression data based on the gestures of rejection, receiving input from a first user among the number of users indicating that the suppression data is to be leveraged, and suppressing content based on the suppression data. | 2016-03-10 |
20160072754 | Method and Device for Forwarding Message - The disclosure provides a method and a device for forwarding a message. The method is applied to a layer-2 network device and comprises: a message from a source end is received, the type of the message is judged, and when the type is judged to be a specified type, the message is forwarded according to the processing flow corresponding to the specified type. Through the technical solution provided by the disclosure, the technical problems that addresses may conflict, an IGMPv3 multicast source address cannot be distinguished and the like when a multicast IP address needs to be converted into an MAC address in the process of forwarding a message in the related art are solved, and the usability and security of the multicast function are improved. | 2016-03-10 |
20160072755 | SYSTEMS AND METHODS FOR MANAGING A MESSAGE THREAD ON AN ELECTRONIC DEVICE - The subject matter of this specification can be implemented in, among other things, a method that includes receiving a new message and providing instructions to a client device for collapsing at least one of one or more previously received messages when the number of messages reaches a number at which it is desirable to collapse the message thread. The method also includes providing instructions for appending a new message to the message thread. The method may also include instructions for providing one or more collapse or expand controls for managing message threads. | 2016-03-10 |
20160072756 | Updating a Sender of an Electronic Communication on a Disposition of a Recipient Toward Content of the Electronic Communication - Determining a disposition of an electronic communication recipient is provided. An electronic communication is received from a sender. The electronic communication is sent to a recipient. Then, captured biometric data is received corresponding to the recipient of the electronic communication indicating the disposition of the recipient toward the content of the electronic communication while the recipient was perceiving the electronic communication. | 2016-03-10 |
20160072757 | System and method for managing messages based on user rank - Messages are sent to multiple addressees in an organization. Responses are correlated to the rank of the responding recipient in the organization, to assist the senders of messages to identify which responses to read. Receipt of the messages is acknowledged before the message can be fully read. Responses to the messages include a selection of a user status from a preset choice of statuses, and may include other response attributes required or offered by the sender of the message. The locations of responding and non-responding addressees of messages can be mapped. | 2016-03-10 |
20160072758 | Sharing Television and Video Programming Through Social Networking - In particular embodiments, a social networking system identifies a user viewing video content on a first display device, identifies the video content being viewed on the first display device by the user, and determines a second display device associated with the identified user. The social networking system sends one or more instructions to the determined second display device to display one or more chat messages associated with the identified video content. | 2016-03-10 |
20160072759 | SYSTEMS AND METHODS OF ONLINE SOCIAL ENVIRONMENT BASED TRANSLATION OF ENTITY MENTIONS - The technology disclosed relates to adapting online social feed items according to the posting formats of each of the multiple destination online social environments to which they are posted, regardless of the source online social environments from which they originate. In particular, it relates to creating separate instances of a feed item such that each of the instances includes tag formats, social handles or identifiers that are compatible to the online social environments in which they are embedded. These separate instances of a feed item can all be embedded in a first online social environment while preserving their tag formats corresponding to other online social environments. | 2016-03-10 |
20160072760 | DEVICE AND METHOD FOR THE RECOGNITION OF CALL NUMBERS FOR VOICE-OVER-IP TELEPHONY - Call numbers are recognized in order to establish a connection from a lie-switched network to a packet-switched network. In one aspect, a device comprises a unit for detecting a selected string of digits as a selected call number, a unit for storing a plurality of authorized call numbers, a comparator unit for comparing the selected all number to the plurality of stored call numbers, and a unit for converting the selected call number into an associated IP address as soon as the comparator unit detest that the selected call number matches one of the stored all numbers. | 2016-03-10 |
20160072761 | AUTOMATIC GENERATION OF SERVER NETWORK TOPOLOGY - Embodiments generally relate to network device management. The present technology discloses techniques that can enable an automatic generation of a network topology table for network management. It can use customized identifiers for servers in a server network. It can further enable an automated harvest of network information by utilizing service controllers embedded at different levels of a network. | 2016-03-10 |
20160072762 | Network Access Method and Device for Equipment - Provided are a network access method and device for equipment. The method includes that: first equipment receives a first message, wherein the first message is used for indicating that a controller structuring and sending the first message can provide a reachable path reaching a network address allocation server; the first equipment sends a first request message to the controller according to the first message, wherein the first request message is used for requesting the controller and/or the path-reachable network address allocation server controlled by the controller to allocate a network address to the first equipment; and the first equipment accesses the network according to the allocated network address. By the present disclosure, the technical problem that equipment unconfigured with a network address may not effectively access the network and network deployment and data forwarding flexibility is lower due to the fact that network addresses of equipment are preconfigured in the related technology is solved, and the technical effect that the equipment effectively accesses the network without setting a control plane network is achieved. | 2016-03-10 |
20160072763 | DYNAMIC VPN ADDRESS ALLOCATION - Methods and related systems are presented that relate to automatically avoiding address conflicts when establishing a secure communications link over a public network between a local computer, associated with a local network, and a remote device, located outside the local network. Local network addresses on the local network reserved for use, and a block of local network addresses that do not conflict with the reserved local network addresses, are identified. At least one local network address is selected from the block and assigned as an address of the local device for use in communicating with the remote device securely over the public network. Communication is facilitated with the remote device using the network driver based on the assigned at least one local network address. | 2016-03-10 |
20160072764 | DYNAMIC DOUBLE NETWORK ADDRESS TRANSLATOR - Systems and methods for network address translations are provided, which include a dynamic double network address translation (NAT) solution for interconnecting overlapping IP networks. Some embodiments allow efficient automated connectivity between two networks with overlapping IP address ranges based on the DNS resolutions. As a result, manual identification and configuration of static translations for specific data flows between networks can be eliminated. | 2016-03-10 |
20160072765 | System and Method For Logging Communications - A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address associated with the target user when the target user is active. The method further includes causing the access device to provide traffic information associated with the target user to a logging device. | 2016-03-10 |
20160072766 | SYSTEMS AND METHODS FOR CARRIER GRADE NAT OPTIMIZATION - Methods and systems for maintaining NAT session management on a multi-core device are disclosed. A first core of the multi-core device that is intermediary between a plurality of clients and a plurality of servers may insert a NAT session into a local outbound session table stored in a memory of the first core. The first core may determine that a second core of the multi-core device will serve as a receiving core for a response to the request from the server to the client. The first core may insert the NAT session into a global session table responsive to determining that the second core will serve as the receiving core. | 2016-03-10 |
20160072767 | EFFICIENT METHOD OF NAT WITHOUT REASSEMLING IPV4 FRAGMENTS - A method, apparatus, and machine readable storage medium is disclosed for performing network address translation (NAT) on fragments of a Internet Protocol (IP) packet, comprising: receiving a packet fragment of the packet; calculating a hash key based on a subset of header information in the fragment; if the packet fragment is the first fragment of the packet; initiating a NAT session for the packet; storing the NAT session identifier at an entry in the linked list indexed by the hash key; and if the packet fragment is not the first fragment of the packet, then: retrieving a NAT session identifier, if available, at an entry in said linked list indexed by said hash key; and performing NAT on the fragment using the NAT session identified by the NAT session identifier. The hash key is a subset of a CRC32 calculation performed on: IPv4 source address; IPv4 destination address; and IP Identifier of the fragment. If the indexed entry in the linked list is not available, accessing a second dimension of the linked list. | 2016-03-10 |
20160072768 | Cellular-call activated, mechanical interrupt device for a wired connection to the Internet - The present invention includes an Internet-kill switch for physically opening and closing a first Internet connection. The switch receives a remote signal via either a second, dedicated and independent Internet connection or by a cellular (voice) phone connection. A solenoid controlled electromechanical switch opens and closes a physical switch that creates a circuit or cuts a circuit that includes an Internet feed line. The switch arranges between an upstream apparatus such as an Internet modem and a downstream apparatus such as a router. When a cellular module receives a first activation code from a remote source, the solenoid closes the switch, enabling the downstream apparatus to connect normally to the Internet. When the cellular module receives a second activation code the solenoid opens the switch thus physically severing communication between the upstream apparatus and downstream apparatus, thus killing the Internet connection. | 2016-03-10 |
20160072769 | NETWORK VERIFICATION DEVICE, NETWORK VERIFICATION METHOD, AND PROGRAM - In order to contribute to the improvement in the efficiency of an exhaustive verification of a network, a network verification device is provided with: a verification information input unit which accepts an input of verification information that defines the configuration of a network to be verified and the operation model of a device included in the network; a model checking execution unit which, in model checking using the verification information, performs a state transition without concretely dealing with the contents of a packet from a terminal connected to the network, sends information relating to the past transition path of each state to a search necessity/unnecessity confirmation unit before a state search of a next state, and performs the model checking while inquiring whether or not the search of the next state can be omitted or not; the search necessity/unnecessity confirmation unit which, based on the information relating to the past transition path of the state and received from the model checking execution unit, determines whether or not the search of the next state can be omitted, and responds as to whether or not the search of the next state can be omitted; and a verification result output unit which, based on an output from the model checking execution unit, outputs the result of a verification. | 2016-03-10 |
20160072770 | EMERGENT NETWORK DEFENSE SYSTEM - A system and method are provided of a proxy node for use in a network having a plurality of nodes. The proxy node is configured to identify neighboring node(s) within a predetermined closeness of said node, measured by any of physical, logical, network hops, network link, or vertices analysis closeness. The proxy node determines a level of nervousness of itself and sends and/or receives communication as to the level of nervousness to the neighboring node(s). | 2016-03-10 |
20160072771 | HEALTH AND OTHER USE OF COLLECTION OF ARCHIVAL DIGITAL DATA - A secure digital content collection method, including a server being in signal communications with an application on a computing device; using a computing device to capture digital data about a Collection-Target such as a child or elderly person and deposit the data in a secure vault. Using alerts and/or lock-out on a computing device to encourage collection of digital data. The collected data may be processed into a variety of different criteria reels of data for a user to review. The collected data may be used for marketing and advertising purposes. | 2016-03-10 |
20160072772 | Process for Secure Document Exchange - The present disclosure provides a computer security system with one-to-many relationship between the asymmetric key that encrypts one or more symmetric keys and the method of securing the database that manages said relationship. Further it has a one-to-one relationship between symmetric keys and its associated document and permissions, allows for control of delegation of said documents and permissions as it is transferred along compartments to a second user which is the receiver of the document. In addition has compartments comprising an interface that integrates with a document storage as well as a storage of permissions and key relations in a multi user environment and further provides for the control of the primary compartment in the emission and cancellation of privileges by revoking asymmetric as well as symmetric keys within the document management system. | 2016-03-10 |
20160072773 | Lossy Data Stream Decoder - Lossy data stream decoder techniques are described herein. In response to a request for decoded content from a consuming application, a decoder may validate headers and identify portions of the data that are considered pertinent to the request. The decoder then performs lossy extraction to form incomplete data that is provided to the consuming application in response to the request. The full data for the data stream is not exposed to the consuming application or other downstream components. In this way, the consuming application is provided data sufficient to perform requested graphics processing and resource management operations, while at the same time the risk of piracy is mitigated since the consuming application is unable to get a full version of the data in the clear and the data have been validated by the decoder. | 2016-03-10 |
20160072774 | Encrypted streams to receivers - Techniques to ensure that a content stream will be encrypted prior to it being served it to the stream receiver if either the stream receiver returned an initial status to the stream caster indicating that only encrypted streams will be accepted or if the user of the stream caster optioned that only encrypted streams will be cast. The invention consists of a stream casting device capable of locally sourcing and encrypting streams, a content stream server capable of sourcing encrypted streams and encrypting streams on the fly, a stream receiver device, and software applications and/or hardware devices to manage key exchanges, encryption, and decryption across the devices serving streams, and stream receiving devices. The casted streams, residing on either a content stream server or on the stream casting devices will be encrypted prior to being served. Encrypted streams can be encrypted at the time they are served to the stream receiver or may have been previously encrypted prior to a key exchange between the stream receiver and the device serving the content stream. | 2016-03-10 |
20160072775 | SYSTEM AND METHOD FOR KEY EXCHANGE BASED ON AUTHENTICATION INFORMATION - Disclosed are a system and method for exchanging a key based on user authentication information. The system for exchanging a key based on user authentication information includes a terminal configured to generate an ID-based ciphertext corresponding to authentication information of a user of the terminal using a terminal-side random number and a server ID and a server configured to decrypt the ID-based ciphertext that is received from the terminal using a server-side private key corresponding to the server ID to restore the authentication information, authenticate the terminal using the restored authentication information, and generate a server-side session key corresponding to the authenticated terminal. | 2016-03-10 |
20160072776 | METHOD AND SYSTEM FOR EXCHANGING ENCRYPTED MESSAGES BETWEEN COMPUTING DEVICES IN A COMMUNICATION NETWORK - A method for exchanging a message ( | 2016-03-10 |
20160072777 | HARDWARE CRYPTO MODULE AND SYSTEM FOR COMMUNICATING WITH AN EXTERNAL ENVIRONMENT - A hardware crypto module encrypts or decrypts data from a device, the device being arranged to be remote and separate from the crypto module in terms of hardware. The crypto module includes an interface for communicating with the remotely arranged device, a memory, and a crypto processor. The crypto processor is configured to encrypt or decrypt, while using a first key, data received via the interface, to encrypt the first key while using a second key stored in the memory, and to output the first key via the interface exclusively in an encrypted form. | 2016-03-10 |
20160072778 | METHODS AND SYSTEMS FOR ESTABLISHING SECURE COMMUNICATION BETWEEN DEVICES VIA AT LEAST ONE INTERMEDIATE DEVICE - Methods to establish communication between a first and second device via at least one intermediate deice comprise, at the first device, generating an offer data packet comprising a second device address, which includes a first identifier indicating a public key associated with the second device; transmitting the offer data packet to it first intermediate device for transmission to the second device based upon the address of the second device; receiving an answer data packet via the first intermediate device, the answer data packet including network information associated with the second device; establishing a communication channel with the second device based on the network information received; receiving over the communication channel a first handshake data packet including a public key; calculating a second identifier based upon the public key; comparing the first identifier with the second identifier; and warning if a relationship between the first identifier and the second identifier is not an expected relationship. | 2016-03-10 |
20160072779 | SECURING A CRYPTOGRAPHIC DEVICE AGAINST IMPLEMENTATION ATTACKS - Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key ( | 2016-03-10 |
20160072780 | MAPPING ACCOUNT INFORMATION TO SERVER AUTHENTICATION - An authorization prompt issued from a server is detected, and previously-entered account information, is accessed on a user device. A selectable display element corresponding to each set of entered account information is displayed. User selection or actuation of a given display element is received, and the corresponding account information is retrieved and used to log onto the server that issued the authentication prompt. | 2016-03-10 |
20160072781 | SUPPORTING DIFFERENTIATED SECURE COMMUNICATIONS AMONG HETEROGENEOUS ELECTRONIC DEVICES - A gateway apparatus supports differentiated secure communications among heterogeneous electronic devices. A communication port communicates via communication networks of different types with two or more associated devices having diverse secure communication capabilities. The gateway logic selectively authenticates the associated devices for group membership into a Secure Communication Group (SCG), and selectively communicates Secure Communication Group Keys (SCGKs) to the devices having the diverse secure communication capabilities for selectively generating session keys locally by the associated devices for mutual secure communication in accordance with the group membership of the associated devices in the SCG. | 2016-03-10 |
20160072782 | Publicly Available Protected Electronic Mail System - A secure messaging system provides a secure messaging exchange service to identified user. In one embodiment, the System comprises a User Record Server (URS) comprising a plurality of Private Electronic Mail (PEM) user accounts. A Secure Mail Delivery Agent (SMDA) provides a storage area for inbound sMail upon authentication via the URS that a Sender ID bundle in a message header of each incoming message matches the Sender ID of at least one of said plurality of PEM user accounts before delivering said incoming message. A first Secure Mail Transfer Agent (SMTA), coupled via a first encrypted connection to said SMDA and via a second connection to a public network, is configured to insert a Sender ID bundle into sMail headers when routing outbound sMail, and further configured to establish encrypted channels for the transmission of sMail over a public network. | 2016-03-10 |
20160072783 | A Node for Use by a Network, a System for Interconnecting Multiple Networks and Methods of Operating the Node and System - There is provided a method of operating a node ( | 2016-03-10 |
20160072784 | Client, server, radius capability negotiation method and system between client and server - Disclosed are a client, a server, an RADIUS capability negotiation method and system, and the method includes: a client transmits to a server a first message carrying RADIUS capability parameters of the client; the server captures the RADIUS capability parameters in the first message, matches the RADIUS capability parameters in the first message with RADIUS capability parameters of the server to obtain a matching result, and transmits the matching result to the client through a second message; and the client determines whether to establish effective communication with the server according to the matching result in the second message. By means of the technical solutions of the disclosure, it is possible to extend the RADIUS protocol, and to solve the problem existing in the current RADIUS protocol that both sides in communication cannot perform RADIUS capability negotiation. | 2016-03-10 |
20160072785 | INITIALIZATION AND REGISTRATION OF AN APPLICATION - A public/private key pair is generated on a client device for an application. A device identifier for the client device is generated. An application identifier for the application is generated on the client device. At least one of the public key, the device identifier, and the application identifier are transmitted to a server. | 2016-03-10 |
20160072786 | METHOD AND SYSTEM FOR ENABLING DATA USAGE ACCOUNTING THROUGH A RELAY - A method and system for enabling data usage accounting is described herein. The method can be practiced on a computing device that has secure applications and unsecure applications installed thereon. Initially, a request for a data session that includes a final endpoint can be received through a secure application. The request for the data session can be intercepted and modified to cause the request to be re-directed back to the secure application. A connection with a relay server can be initiated instead of the final endpoint such that data usage accounting for the data session is to be conducted at a remote location. | 2016-03-10 |
20160072787 | METHOD FOR CREATING SECURE SUBNETWORKS ON A GENERAL PURPOSE NETWORK - Techniques used in a network that includes non-trusted devices, in which packets of information communicated across the network include network address information for a source device and a destination device of the packets of information are described herein. According to one embodiment, a process of establishing a more secure subnetwork includes inserting at least one credential into at least one packet of information issued by the source device, the credential assessable by a plurality of devices on the network, enabling transmission of the at least one packet of information from the source device to at least one destination device on the subnetwork, assessing the credential by at least one of the devices, and permitting the source device to communicate with the destination device conditioned upon the results of the assessing step. Other methods and apparatuses are also described. | 2016-03-10 |
20160072788 | Method, Apparatus, and System for Sending Credentials Securely - A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed. | 2016-03-10 |
20160072789 | MOBILE CLOUD SERVICE ARCHITECTURE - Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In certain embodiments, the cloud computer system may receive, from a computing device, a request for a service provided by an enterprise computer system. The cloud computer system may determine security authentication of a user for the requested service. A security protocol may be determined for a requested enterprise computer system and a security token may be generated for the request according to the determined security protocol. The request may be sent to the requested enterprise computer system. In some embodiments, security authentication for a request to an enterprise computer system may be determined based on previous authentication. The cloud computer system may be configured to communicate with several different enterprise computer systems according to their supported protocols (e.g., communication protocol and/or security protocol). | 2016-03-10 |
20160072790 | APPLICATION PROGRAM AS KEY FOR AUTHORIZING ACCESS TO RESOURCES - In a networked environment, a client side application executed on a client device may transmit a request to an authorization service for access to a resource. The authorization service may authenticate the user of client device and/or the client device based on user credentials and/or a device identifier. In response to authenticating the user and/or the client device, the authorization service may send to the client side application a request for confirmation that the client device complies with a distribution rule associated with the resource, where the distribution rule requires a specific application or specific type of application to be installed, enabled and/or executing on the client device as a prerequisite to accessing the resource. If the client device complies with the distribution rule, the client side application accesses the resource. Accessing the resource may include receiving an authorization credential required for access to the resource. | 2016-03-10 |
20160072791 | DATA CENTER ACCESS AND MANAGEMENT SETTINGS TRANSFER - Technologies and implementations for providing a data center access and management settings transfer service are generally disclosed. | 2016-03-10 |
20160072792 | VERIFICATION METHOD, APPARATUS, SERVER AND SYSTEM - Disclosed are a verification method, apparatus, server and system. The method includes: receiving a service request from a terminal; acquiring service data according to the service request received from the terminal; generating a verification question and a standard answer according to the service data; and interacting with the terminal according to the verification question and the standard answer to complete a verification process. The verification question and the standard answer are generated according to the service feature of the service requested by the terminal, and interaction is performed with the terminal according to the verification question and the standard answer to complete the verification process, thereby solving the problem that the network service security cannot be ensured using the verification code technology due to attacks launched by combining the machine and the manpower. | 2016-03-10 |
20160072793 | MITIGATING RISK OF ACCOUNT ENUMERATION - Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a sequence of characters corresponding to a portion of an email address input by a user. The technology retrieves a set of email addresses that have a common first portion identical to the received sequence of characters and generates hashed data. The hashed data is sent to the client computing device. A result value is then generated by hashing the input email address by using the same hashing function as the hashed data. If the result value is in the hashed data, the technology displays a text region for collecting from the user a password. | 2016-03-10 |
20160072794 | CLIENT AUTHENTICATION - A client authentication system receives authentication requests associated with a web page in response to a client computing system requesting access to the web page. The authentication system determines whether a storage device contains configurations for the authentication requests. The authentication system configures client authentication for the client authentication requests in view of whether the storage device includes the configurations for the authentication requests. The GUI allows control to change the client authentication configuration for at least one of the authentication requests. | 2016-03-10 |
20160072795 | SERVICE LOCKING METHOD, APPARATUSES AND SYSTEMS THEREOF - Disclosed are a service locking method, apparatuses and systems thereof. The method includes: receiving a locking request including identification information of a designated service and an identifier of an operating terminal, the designated service being a service of performing a sensitive operation to network virtual property; and sending an authentication request containing the identification information of the designated service and the identifier of the operating terminal to an authentication server, and locking the designated service upon receiving successful authentication information from the authentication server. By locking the designated service in the operating terminal after the authentication server authenticates the operating terminal successfully, the problem that the network virtual property of a legal user is likely to undergo an unauthorized operation is solved; a designated service, once locked, may not be directly operated by any operating terminal, thereby preventing unauthorized operations on the designated service. | 2016-03-10 |
20160072796 | Preserving Data Protection With Policy - Data files are encrypted based on a key associated with an entity that sets a data protection policy controlling access to the data files. The data protection policy identifies various restrictions on how the plaintext data of the encrypted data in the data files can be used. The data files have corresponding metadata identifying the entity that sets the data protection policy, and processes that are running instances of applications that are allowed to access the plaintext data are also associated with the identifier of the entity. These identifiers of the entity, as well as the data protection policy, are used by an operating system of a computing device to protect the data in accordance with the data protection policy, including having the protection be transferred to other devices with the protected data, or preventing the protected data from being transferred to other devices. | 2016-03-10 |
20160072797 | MOBILE VIRTUAL COMMUNICATION AND ENTERTAINMENT SERVICE - Aspects of the subject disclosure may include, for example, a method including providing, by a processor in a dongle coupled to a display device, a graphical user interface at the display device, and transmitting a message to an authentication server in accordance with authentication information stored in a storage device of the dongle and an input via the graphical user interface. The method also includes obtaining an authentication confirmation; obtaining content from a content server; and recording the content in accordance with a second input via the graphical user interface. The recorded content is transmitted for storage at a storage server. The display device communicates with equipment of a video provider that is associated with a service area. In accordance with the authentication confirmation, the processor is authorized to obtain the content based on the location of the dongle relative to the service area. Other embodiments are disclosed. | 2016-03-10 |
20160072798 | BIOMETRIC SOFTKEY SYSTEM - A computing system is described in which biometric softkeys control access to and launch computer applications in response to one or a combination of biometric signatures. After having been registered, biometric signatures are received and mapped to applications of the user environment. A particular biometric signature is then used to automatically launch the corresponding application. | 2016-03-10 |
20160072799 | Method And System For Achieving Screen Unlocking Of A Mobile Terminal Through Retina Information Matching - A method and a system for achieving screen unlocking of a mobile terminal through retina information matching are disclosed. The method comprises: storing first retina information for screen unlocking into the mobile terminal; communicatively connecting a retina reading device with the mobile terminal; reading second retina information and transmitting the second retina information to the mobile terminal by the retina reading device; receiving the second retina information and matching the second retina information against the first retina information by the mobile terminal; and if the second retina information matches the first retina information, then generating a screen unlocking instruction to unlock the screen of the mobile terminal. | 2016-03-10 |
20160072800 | SYNTHETIC GENOMIC VARIANT-BASED SECURE TRANSACTION DEVICES, SYSTEMS AND METHODS - Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with associated synthetic genomic variants. An embodiment of the present invention utilizes digital genomic data associated with an entity, such as a person, who may utilize a genome-based security device to complete a transaction. In one embodiment, a person may use a genome-based security device to communicate with an external device over a wireless or other communication interface, synchronize digital genomic data and an associated synthetic variant received from the external device with digital genomic data and associated synthetic variant stored on the genome-based security device. | 2016-03-10 |
20160072801 | ENCRYPTING AND DECRYPTING INFORMATION - An example information encryption method that includes acquiring to-be-encrypted information and converting the to-be-encrypted information into a polynomial of a predetermined format; extracting biometric information, and acquiring biometric data; and substituting the biometric data into the polynomial for calculation to acquire a value of the polynomial and using a two-dimensional dataset including the biometric data and the value of the polynomial corresponding to the biometric data as first encrypted information. The techniques of the present disclosure improve the security of information encryption, and reduce the risk of illegal decryption of encrypted information. | 2016-03-10 |
20160072802 | SYSTEMS AND METHODS FOR PERFORMING USER RECOGNITION BASED ON BIOMETRIC INFORMATION CAPTURED WITH WEARABLE ELECTRONIC DEVICES - Systems and methods are disclosed herein for performing biometrics based user recognition and monitoring based on biometric information captured using wearable monitoring devices. More specifically, the present application provides systems including monitoring devices built into one or more articles of clothing that capture data relating to the wearer of the device and other subjects, such as biometric information, health vitals, environmental information, location data and the like. The systems also include a mobile computing device configured to receive the captured data from the monitoring device and, in conjunction with a distributed biometric authentication and identity assertion platform, perform user recognition based on biometric information captured by the mobile device and/or the monitoring device. The present application also provides an infrastructure for collecting and managing the data collected by the monitoring device in an authenticated/verified manner. | 2016-03-10 |
20160072803 | SYSTEM AND METHOD FOR AUTHENTICATION ACROSS DEVICES - An authentication approach simplifies the process of authentication across devices, while increasing security. An authentication code is supplied through non-traditional channels, such as audio and visual channels, allowing more complex codes to pass between two devices for authentication with increased security, while reducing user interaction. | 2016-03-10 |
20160072804 | SYSTEM AND METHOD TO SHARE A RESOURCE OR A CAPABILITY OF A DEVICE - A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource. The request is received from a second device and includes authentication information. The method includes, based on a determination that the second device is unknown to the first device, determining whether the second device is authenticated based on the authentication information. The method also includes, based on determining that the second device is authenticated, sharing the resource of the first device with the second device. | 2016-03-10 |
20160072805 | System And Method For Data Quality Analysis Between Untrusted Parties - A system and method for data quality analysis between untrusted parties is provided. A dataset having attributes each associated with one or more elements is maintained. An encrypted request is received from a client regarding data quality for one of the attributes. The encrypted request includes an interest vector of separately encrypted values identifying those elements of interest for the attribute. A condensed data vector representing the elements is generated for the attribute and is the same length as the interest vector. An aggregate of the elements of interest is determined by calculating for each element in the condensed data vector, an encrypted product of that element and a corresponding element of the interest vector and by determining a total product of all the encrypted products. A data quality value is assigned to the elements of the attribute in the dataset based on the aggregate. | 2016-03-10 |
20160072806 | SETUP OF MULTIPLE IOT DEVICES - The present disclosure relates to the setup of multiple devices on a local area network. Specifically, various techniques and systems are provided for utilizing a network device to efficiently add a new device to a local area network using an existing network device. Exemplary embodiments of the present invention include a computer-implemented method. The method comprises receiving, at a network device on a network, credentials identifying a network gateway in the network; receiving a communication including an indication that a new network device has generated a new access point; transmitting a query, wherein the query includes a request to determine whether the new network device is associated with the network; receiving a communication including a response to the query indicating that the new network device is associated with the network; establishing a connection with the new access point of the new network device; and transmitting the credentials identifying the network gateway, wherein the credentials are used for the new network device to join the network. | 2016-03-10 |
20160072807 | METHODS FOR SECURITY SYSTEM-AGNOSTIC UNIFORM DEVICE IDENTIFICATION - Systems and methods can comprise receiving an authentication request according to a first security protocol from a user device. Responsive to a determination that the authentication request is trustworthy according to the first security protocol, a device identifier and information related to a shared key are transmitted to the user device. A content request to access content secured according to a second security protocol is received from the user device. The content request can comprise the device identifier and can be encrypted using a shared key derived from the information related to the shared key. The content request can be decrypted using the shared key, and authenticated based on the device identifier. | 2016-03-10 |