11th week of 2014 patent applcation highlights part 67 |
Patent application number | Title | Published |
20140075439 | VIRTUALIZATION MANAGEMENT METHOD AND RELATED APPARATUSES FOR MANAGING HARDWARE RESOURCES OF A COMMUNICATION DEVICE - A virtualization management method and related apparatuses for managing hardware resources of a communication device are disclosed. A virtualization management method for managing hardware resources of a communication device includes: acquiring a first virtual machine context that is issued by a first service board deployed in a communication device and that corresponds to a first interrupt, and issuing the first virtual machine context, or a second virtual machine context that is obtained based on the first virtual machine context and that corresponds to the first interrupt, so that a second service board deployed in the communication device, after acquiring the issued first virtual machine context or second virtual machine context, transfers the acquired first virtual machine context or second virtual machine context to a first virtual machine running on the intra-board Hypervisor in the second service board for processing, where the first virtual machine is the employer of the first hardware resource. | 2014-03-13 |
20140075440 | SYSTEMS AND METHODS FOR PERFORMING DATA MANAGEMENT OPERATIONS USING SNAPSHOTS - A system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. The snapshot may be used by ancillary applications to perform various functions, such as content indexing, data classification, deduplication, e-discovery, and other functions. | 2014-03-13 |
20140075441 | METHOD AND APPARATUS FOR RECORDING AND PROFILING TRANSACTION FAILURE SOURCE ADDRESSES IN HARDWARE TRANSACTIONAL MEMORIES - A processor core includes a transactional memory, a transaction failure instruction address register (TFIAR), and a transaction failure data address register (TFDAR). The transactional memory stores information of a plurality of transactions executed by the processor core. The processor core retrieves instruction and data address associated with the aborted transaction from TFIAR and TFDAR respectively and stores them into a profiling table. The processor core then generates profiling information based on instruction and data addresses associated with the aborted transaction. | 2014-03-13 |
20140075442 | BATCH SCHEDULING - There is provided a method to schedule execution of a plurality of batch jobs by a computer system. The method includes: reading one or more constraints that constrain the execution of the plurality of batch jobs by the computer system and a current load on the computer system; grouping the plurality of batch jobs into at least one run frequency that includes at least one batch job; setting the at least one run frequency to a first run frequency; computing a load generated by each batch job in the first run frequency on the computer system based on each batch job's start time; and determining an optimized start time for each batch job in the first run frequency that meets the one or more constraints and that distributes each batch job's load on the computer system using each batch job's computed load and the current load. | 2014-03-13 |
20140075443 | FRAMEWORK FOR CRITICAL-PATH RESOURCE-OPTIMIZED PARALLEL PROCESSING - The disclosure generally describes computer-implemented methods, computer-program products, and systems for critical path, resource-optimized, parallel processing. One computer-implemented method includes instantiating a resource consumption optimizer framework (RCOF) for a plurality of sub-process associated with a process, loading the plurality of sub-processes into a memory in accordance with a calculated optimized resource consumption pattern, associating each sub-process of the plurality of sub-processes with an agent, wherein the agent communicates with the RCOF, executing a particular sub-process of the plurality of sub-processes loaded into the memory, wherein the sub-process execution start is gated by an associated agent based upon at least a determined buffer value, and notifying the RCOF of the particular sub-process execution completion. | 2014-03-13 |
20140075444 | Multiple Cell Dequeue for High Speed Queueing - A system includes a task scheduler to select a queue from a port. The port includes a determined number of cell slots between pick opportunities. The task scheduler selects a queue at a pick opportunity. A queue manager connects with the task scheduler to pop cell packets from the selected queue, and to send update information to the task scheduler. The update information includes information of how the queue manager expects to fill the cell slots between the task scheduler selections. The task scheduler makes subsequent queue selections based on the update information. | 2014-03-13 |
20140075445 | MECHANISM FOR PROVIDING A ROUTING FRAMEWORK FOR FACILITATING DYNAMIC WORKLOAD SCHEDULING AND ROUTING OF MESSAGE QUEUES FOR FAIR MANAGEMENT OF RESOURCES FOR APPLICATION SERCERS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic workload scheduling and routing of message queues for fair management of the resources for application servers in an on-demand services environment. In one embodiment and by way of example, a method includes detecting an organization of a plurality of organization that is starving for resources. The organization may be seeking performance of a job request at a computing system within a multi-tenant database system. The method may further include consulting, based on a routing policy, a routing table for a plurality of queues available for processing the job request, selecting a queue of the plurality of queues for the organization based on a fair usage analysis obtained from the routing policy, and routing the job request to the selected queue. | 2014-03-13 |
20140075446 | MECHANISM FOR FACILITATING SLIDING WINDOW RESOURCE TRACKING IN MESSAGE QUEUES FOR FAIR MANAGEMENT OF RESOURCES FOR APPLICATION SERVERS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating sliding window resource tracking in message queues for fair management of resources for application servers in an on-demand services environment. In one embodiment and by way of example, a method includes monitoring, in real-time, in-flight jobs in message queues for incoming jobs from organizations in a distributed environment having application servers in communication over a network, applying local sliding windows to the message queues to estimate wait time associated with each incoming job in a message queue. A local sliding window may include segment of time being monitored in each message queue for estimating the wait time. The method may further include allocating, in real-time, based on the estimated wait time, thread resources to one or more of the incoming jobs associated with the one or more of the organizations. | 2014-03-13 |
20140075447 | PROGRAMMATIC LOAD-BASED MANAGEMENT OF PROCESSOR POPULATION - One or more measurements of processor utilization are taken. A utilization ceiling is calculated. One or more processing units (PUs) are added automatically if it is determined that the utilization ceiling is greater than an available PU capacity. One or more PUs are removed automatically responsive to determining that the utilization ceiling is at least one PU less than the available PU capacity. | 2014-03-13 |
20140075448 | ENERGY-AWARE JOB SCHEDULING FOR CLUSTER ENVIRONMENTS - A job scheduler can select a processor core operating frequency for a node in a cluster to perform a job based on energy usage and performance data. After a job request is received, an energy aware job scheduler accesses data that specifies energy usage and job performance metrics that correspond to the requested job and a plurality of processor core operating frequencies. A first of the plurality of processor core operating frequencies is selected that satisfies an energy usage criterion for performing the job based, at least in part, on the data that specifies energy usage and job performance metrics that correspond to the job. The job is assigned to be performed by a node in the cluster at the selected first of the plurality of processor core operating frequencies. | 2014-03-13 |
20140075449 | Method and Apparatus for Synchronous Processing Based on Multi-Core System - Embodiments of the present invention relate to the field of communications network technologies and provide a method and an apparatus for synchronization processing based on a multi-core system, which can improve efficiency in system scheduling and consume fewer resources. According to the solutions provided in the present invention, an initialization setting is sent by any processing device in a first group of processing devices that synchronously process a same current task and initialization is performed; then a notification message sent by any processing device in the first group of processing devices is received and 1 is subtracted from a value of a counting semaphore; and when the value of the counting semaphore is 0, a control message is sent to a second group of processing devices through a message sending interface. The solutions provided in the present invention are applicable to processing synchronization and communication between multiple modules. | 2014-03-13 |
20140075450 | MULTI-THREADED PROCESSING WITH REDUCED CONTEXT SWITCHING - Multi-threaded processing with reduced context switching is disclosed. Context switches may be avoided through the use of pre-emption notification, a pre-emption wait time attribute and a no-context-save yield. | 2014-03-13 |
20140075451 | INTER-PROCESS COMMUNICATION CHANNEL - Techniques are described herein that are capable of constructing an inter-process communication channel, for example, between a requesting component and a targeted process. The communication channel may have one or more links, such that each link is defined by a respective node pair in a plurality of nodes. The plurality of nodes includes the requesting component, the targeted process, and optionally one or more intermediate nodes. An attachment request is received via a user interface. The requesting component is attached to the targeted process. For instance, the links may be traversed to discover the targeted process. The communication channel is established. For instance, in each node of a subset of the plurality of nodes, node information may be retained to indicate a next consecutive node of the plurality of nodes to which messages from the requesting component to the targeted process are to be delivered. | 2014-03-13 |
20140075452 | MESSAGE PASSING INTERFACE TUNING USING COLLECTIVE OPERATION MODELING - Illustrative embodiments of methods, machine-readable media, and parallel computing systems that automatically tune a communication protocol are disclosed. In some embodiments, a method may include selecting a collective operation to be implemented by a Message Passing Interface (MPI) of a parallel computing system, wherein the MPI is configured to implement the collective operation using at least one of a plurality of algorithms; modeling each of the plurality of algorithms as a corresponding plurality of point-to-point operations; determining a transfer rate of each of the plurality of algorithms using its corresponding plurality of point-to-point operations; selecting one or more algorithms from among the plurality of algorithms, the one or more selected algorithms having higher transfer rates than one or more non-selected algorithms; and testing performance of the one or more selected algorithms with a plurality of configuration parameters to determine at least one optimized algorithm for implementing the collective operation. | 2014-03-13 |
20140075453 | METHOD AND DEVICE FOR CONTROLLING COMMUNICATION BETWEEN APPLICATIONS IN A WEB RUNTIME ENVIRONMENT - The invention relates to a method for controlling communication between web applications in a web runtime environment such as a web browser. The method comprises the step of: executing code of a service provider application by the web runtime environment thereby providing a data object; obtaining a list of one or more service requester applications, each service requester application being adapted to generate a service request and implementing an interface for receiving a data object in response to the generated service request; enabling the selection, among the obtained list, of one or more requester applications adapted to receive data objects of the same type as the provided data object; and communicating the provided data object to the selected one or more requester applications via their corresponding interface. The invention also relates to a computer program and a processing device adapted to execute the method. | 2014-03-13 |
20140075454 | EFFICIENT DYNAMIC SUBSCRIPTION UPDATES IN A CONTENT MANAGEMENT SYSTEM - Provided are a method, computer program product, and system for a dynamic subscription update for multiple queue event systems. A subscription request, including one or more conditions is received. A first subscription object, containing the one or more conditions in the subscription request, is selected from a first set of subscription objects. The first subscription object is moved to a second set of subscription objects. A second subscription object is generated based on the first subscription object. The second subscription object is updated with a generated subscription version and the subscription request. The second subscription object is added to the first set of subscription objects. In response to receiving the one or more conditions, a first event is generated using the second subscription object. The first event including the generated subscription version and the one of more conditions. The first event is added to a collection of first events. | 2014-03-13 |
20140075455 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLISHING AN APPLICATION-INDEPENDENT FORMAT EVENT - In accordance with embodiments, there are provided mechanisms and methods for publishing an application-independent format event. These mechanisms and methods for publishing an application-independent format event can enable optimized data communication, improved scalability, increased operational efficiency, etc. | 2014-03-13 |
20140075456 | INFORMATION PROCESSING APPARATUS AND METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS - An information processing apparatus includes a storage that stores first information and second information, the first information associating a content of a call to be issued from a first application with information on whether to cause a user to select any of second applications, the second information associating the content of the call to be issued from the first application with any of the second applications, and a processor that is configured to receive a call issued from the first application, determine whether the received call is associated with information to cause the user to select any of the second applications based on the first information, specify the second application associated with a content of the received call based on the second information when the received call is determined to be associated with the information to cause the user to select the second applications, and execute the specified second application. | 2014-03-13 |
20140075457 | Providing Support for Position-Related Applications - A method of providing position support to a main processor of a computing device is disclosed. The method may include receiving primary position data from a sensor at a sensor controller. The method may also include analyzing, via the sensor controller, the primary position data to determine secondary position data. The method may also include formatting, via the sensor controller, the secondary position data. The method may also include aggregating, via the sensor controller, the formatted position data. The method may also include providing, via a single channel interface between the sensor controller and the main processor, the aggregated position data to an operating system installed on the main processor. The method may also include communicating, via a driver installed on the operating system, the position data to an application installed on the operating system. | 2014-03-13 |
20140075458 | DEVICE SPECIFIC DATA IN A UNIFIED POINTER MESSAGE - In one embodiment, a unified pointer message | 2014-03-13 |
20140075459 | MANAGED EXECUTION ENVIRONMENT FOR SOFTWARE APPLICATION INTERFACING - Some embodiments are directed to controlling interactions between a host software program and a computer system by providing a managed execution environment running within the host software program. In one embodiment, a computer system integrates a managed execution environment within a host software program. The computer system uses the managed execution environment to interact with one or more features of the host software program. The managed execution environment includes interface controls configured to interface between the computer system and the host software program. The compute system alters one or more of the various software program features based on code that is identified in downloaded content. | 2014-03-13 |
20140075460 | OPEN APPLICATION PROGRAMMING INTERFACE SELECTION METHOD AND DEVICE - Embodiments of the present invention provide an open application programming interface selection method and device. The method includes: receiving an invocation request from a user, where the invocation request includes an OpenAPI function parameter; determining an OpenAPI equivalent set according to the OpenAPI function parameter; and selecting a target OpenAPI from multiple OpenAPIs according to a Qos attribute value that corresponds to each OpenAPI in the OpenAPI equivalent set. By adopting the embodiments of the present invention, an OpenAPI with better performance can be selected from numerous OpenAPIs with equivalent functions for a user, thereby improving the quality of service for the user. | 2014-03-13 |
20140075461 | MEDIUM PROCESSING METHOD AND CASSETTE - According to one embodiment, a medium processing method includes first reading, second reading, and determining. The first reading is configured to read first medium identification information and cassette identification information which are stored in a first medium contained in a cassette. The second reading is configured to read cassette information from the cassette. The determining is configured to determine a cassette contained medium formed of the cassette and the medium as authentic, when the cassette information includes the first medium identification information and the cassette identification information. | 2014-03-13 |
20140075462 | Method, an apparatus and a computer readable medium for delivering media content - The invention concern a social multicast environment. A method comprises receiving a request for media content transmission from a receiving client via the network, wherein request comprises at least information identifying the media content being requested and the number of receiving clients participating to the media content transmission in a common virtual space; determining a total price for the media content based on the information; dividing the total price between the receiving clients; delivering information on the payment divisions to said receiving clients; receiving a confirmation when all payment divisions have been received; controlling that the number of the receiving clients in said common virtual space does not exceed the number of receiving clients in the request for media content transmission; multicasting the media content being requested to the receiving clients; and managing the media content multicast by at least one receiving client. | 2014-03-13 |
20140075463 | VOLUME BASED, TELEVISION RELATED ADVERTISEMENT TARGETING - The present invention provides techniques that relate to television based advertising and advertisement targeting, such as advertisements presented via Internet TV, IPTV, and television programs streamed over the Internet. Techniques are provided that include monitoring user-initiated changes of volume during a television based advertisement. Based at least in part on such changes, a user's interest level in the advertisement may be assessed. Based at least in part on the assessed interest level, a second advertisement may be targeted to the user. | 2014-03-13 |
20140075464 | DATA USAGE MONITORING - Systems and methods for capturing and monitoring the health, safety, and/or activity of a user are described. In one aspect, the system generates a data usage pattern for the user and monitors the user's current data usage activity to detect data usage deviations from the user's usage pattern. When a deviation is detected, the system may send an alert message to the user or another user indicating that an anomaly may have occurred, permitting the user or another user to respond to the anomaly. | 2014-03-13 |
20140075465 | TIME VARYING EVALUATION OF MULTIMEDIA CONTENT - Methods, systems, devices and computer program products are provided to facilitate enhanced use and interaction with multimedia content that is based on a time-varying evaluation of the multimedia content. While a content is being presented on a first device, timing information identifying temporal locations of content segments are extracted and transmitted to a database along with a user's evaluation feedback of the multimedia content. The user then receives a response corresponding to feedback provided by a plurality of consumers of the multimedia content on a segment-by-segment basis. | 2014-03-13 |
20140075466 | ENHANCED CONTENT DISTRIBUTION USING ADVERTISEMENTS - Methods, devices, and computer program products are provided to enhance viewing of an entertainment content in the presence of advertisements. At a compliant device, an indication is received that the entertainment content is associated with a content policy information relating to presentation of advertisements during, or prior to, presentation of the entertainment content. A further indication is received that the entertainment content is associated with an advertisement award program. An advertisement award program message provides that the advertisements may be presented in a modified form in exchange for a specific number of award points. Upon receiving an indication agreeing to such an exchange, advertisements are allowed to be presented in a modified form. The content policy information can be ascertained through extraction of watermarks embedded in the advertisements or the entertainment content and/or through computation and matching of fingerprints associated with the advertisements or the entertainment content. | 2014-03-13 |
20140075467 | STB-DRIVEN UPGRADE OF REMOTE SERVER APPLICATION - A client application, executed on a set-top box with a local network, detects that a media server application, executed on a computing device within the local network, is eligible for a software upgrade. The set-top box provides, based on the detecting, an interactive prompt, on a separate television display, to request authorization for the software upgrade. The set-top box receives user input, via a remote control, authorizing the software upgrade and provides, to the media server application on the computing device, a signal for the media server application to initiate the software upgrade. | 2014-03-13 |
20140075468 | System for Converting Content from a Multiple System Operator (MSO) to Content Suitable for Distribution within a Multi-Dwelling Unit - There is disclosed an integrated system for converting content provided by an operator of multiple cable television systems (e.g. a MSO) to content suitable for distribution within a multi-dwelling unit (MDU). A chassis is provided comprising slots for receiving cableCARDs, an input for receiving a cable feed, and an output for transmitting the RF signal. Circuitry within the chassis is configured to extract selected encrypted programs from the cable feed, forward these encrypted programs to the cableCARDs for decryption, and encrypt the decrypted programs using an encryptor such as a Pro:Idiom™ encryptor. A control unit is provided for controlling the operation of at least some of the circuitry within the chassis. The control unit is responsive to instructions sent over a network cable to allow for remote control of the circuitry. | 2014-03-13 |
20140075469 | CONTENT DISTRIBUTION INCLUDING ADVERTISEMENTS - Methods, devices, and computer program products are provided to enhance viewing of an entertainment content in the presence of advertisements. At a compliant device, at least a portion of an entertainment content is received and content policy information associated with the received entertainment content is obtained. The content policy information relates to presentation of one or more advertisements during a specific release window of the entertainment content. Such content policy information can be ascertained through one or both of: extraction of watermarks that are embedded in the one or more advertisements or the entertainment content, and computation and matching of fingerprints associated with the one or more advertisements or the entertainment content. Based on the content policy information, presentation of the one or more advertisements is triggered before allowing presentation of advertisement-free playback of the entertainment content, or simultaneous with presentation of the entertainment content. | 2014-03-13 |
20140075470 | APPARATUS AND METHOD FOR PROCESSING AN INTERACTIVE SERVICE - A method of processing an interactive service and an apparatus thereof are disclosed. The present invention includes receiving uncompressed audio content or uncompressed video content from an external decoding unit, extracting identifiers of frames from the received content periodically, submitting requests containing the identifiers and receiving a trigger for the content when a new segment is detected or when an event activation needs to be communicated to the receiver, wherein the trigger indicates the current time of the contents and references a particular interactive event in an application parameter table or signals that the event is to be executed now or at a specified future time, wherein the application parameter table includes information about at least one of applications. | 2014-03-13 |
20140075471 | APPARATUS, SYSTEMS AND METHODS FOR ACCESSING SUPPLEMENTAL INFORMATION PERTAINING TO A NEWS SEGMENT - Systems and methods are operable to access additional supplemental information pertaining to a supplemental information window presented during a news broadcast event. An exemplary embodiment serially presents a plurality of news segments of the news broadcast event on a display, presents at least one supplemental information window concurrently with the presented plurality of news segments on the display, receives a request to present additional supplemental information that is associated with the at least one supplemental information window, accesses the additional supplemental information, and presents the additional supplemental information on the display. | 2014-03-13 |
20140075472 | COOPERATIVE COMMUNICATION/BROADCASTING SYSTEM, APPLICATION MANAGEMENT SERVER, RECEIVER, RECEPTION METHOD FOR RECEIVER, AND APPLICATION MANAGEMENT METHOD FOR APPLICATION MANAGEMENT SERVER - An application management server includes: a terminal management table storage unit configured to store terminal device identification data for identifying a terminal device and information indicating whether or not transmission of notification data is necessary while correlating the terminal device identification data with the information; a registration request reception unit configured to receive from the terminal device, a registration request for registering transmission of notification data, and update the terminal management table storage unit based on the registration request; a release request reception unit configured to receive from the terminal device, a release request for releasing transmission of notification data, and update the terminal management table storage unit based on the release request; a via-broadcasting notification transmission unit configured to perform a process of including notification data in a broadcasting signal and transmitting the notification data; and a via-communication notification transmission unit configured to perform a process of referring to the terminal management table storage unit and transmitting the notification data to the terminal device. | 2014-03-13 |
20140075473 | METHOD AND APPARATUS FOR TELEVISION PROGRAM PROMOTION - A computer implemented method and apparatus for determining an optimal time and channel for delivery of television advertising content based on viewer profile information collects viewer profile information for a viewer and stores it in a computer memory. Definitions of modal segments of viewers in terms of one or more viewer profile information thresholds are also stored and the viewer is assigned to one or more modal segments based on a comparison of the viewer profile information thresholds with the collected viewer profile information. The optimal time and channel for delivery of television advertising content is determined based on the viewer's assignment to the modal segments, the collected viewer profile information, and promoted program information; and the determined optimal time and channel for delivery of the television advertising content is provided for display. | 2014-03-13 |
20140075474 | GRAPHICALLY RICH, MODULAR, PROMOTIONAL TILE INTERFACE FOR INTERACTIVE TELEVISION - A user interface arranged as hierarchical grid of tiles configurable to be individually and dynamically programmed for both content type and content placement according to a set of rules defining content placement and display specified by a content controller. | 2014-03-13 |
20140075475 | SYSTEMS AND METHODS FOR MANAGING DATA IN AN INTELLIGENT TELEVISION - An intelligent television can store and retrieve data about various functions of the television or associated with user behavior. The stored data streamlines the processes of providing electronic programming guide information, providing search results, providing statistics about content, providing channel information, etc. The unique set of data services in the intelligent television receive, store, manage, and retrieve the data for various of the applications or components. | 2014-03-13 |
20140075476 | SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for navigating processes associated with providing content. The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of media content, electronic programming guide information, television content, and other content. Further, the user interfaces provide unique process of transitioning between the content. | 2014-03-13 |
20140075477 | SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for navigating processes associated with providing content. The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of media content, electronic programming guide information, television content, and other content. Further, the user interfaces provide unique process of transitioning between the content. | 2014-03-13 |
20140075478 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD - This information processing device is provided with the following: a reception unit that receives either a channel designation that designates, as the broadcast channel to be received, a single channel number designated by a plurality of numbers or a channel designation that designates a plurality of channel numbers using a number string that includes symbols corresponding to a plurality of numbers; and a selection unit that selects a broadcast channel, identified by prescribed criteria, from amongst the broadcast channels indicated by the plurality of channel numbers in the channel designation that designates a plurality of channel numbers. | 2014-03-13 |
20140075479 | CONTENT-SENSITIVE USER INTERFACE FOR AN INTELLIGENT TELEVISION - An intelligent television, methods for displaying content, and methods for user interaction between the intelligent television and the user are provided. In general, a user is provided with a side menu allowing for navigation, selection, additional content, display, and search options that enable one or more functions associated with the intelligent television. The presentation of options is based on input received by the intelligent television. As a user provides input to the intelligent television via a remote control or other input device. The intelligent television is configured to interpret the input and provide interactive functionality in the form of content presented to the display of the intelligent television without obstructing the user from viewing content displayed on the screen of the intelligent television. | 2014-03-13 |
20140075480 | Method and Apparatus for Channel Surfing Through Multiple Sources Based on User-Definable Preferences - A method and apparatus for channel surfing through multiple sources based on user-definable preferences includes accessing a user-definable preferences list that identifies a plurality of channels from a plurality of different sources. One of the plurality of identified channels is selected for provision to a user. | 2014-03-13 |
20140075481 | SYSTEM AND METHOD FOR CREATING AND MANAGING CUSTOM MEDIA CHANNELS - A system and method for creating and managing custom media channels within an Interactive Digital Program Guide (IDPG) of a device having a set-top box function associated with a cable or satellite television network. In general, a user interacts with the set-top box function to define a custom media channel. The custom media channel may be defined by a channel name and user preferences. Once the custom media channel is defined, an Internet search is performed based on the user preferences in order to identify media presentations for the custom media channel. Thereafter, when a user selects the custom media channel via the IDPG, the media presentations are played in a substantially continuous stream in either a predetermined or random sequence. | 2014-03-13 |
20140075482 | METHODS AND APPARATUS FOR IMPROVING SCROLLING THROUGH PROGRAM CHANNEL LISTINGS - Methods and apparatus for improving channel browsing experience for users by control scroll rates in guide listings are described. A user can scroll through channel listings arranged according to program genre at a high maximum scroll rate. The scroll rate is automatically reduced, and in some embodiments scrolling is temporarily paused, when listings corresponding to a new genre are displayed. In this way a high maximum scroll rate can be supported but without the risk of a user unintentionally scrolling thorough an entire genre of programs of interest even if the genre only includes one or a few programs in total. Thus, in various embodiments a scrolling rate is decreased when a change in the genre of programs from a first genre of programs being displayed to a second genre of programs being displayed occurs as part of said scrolling. | 2014-03-13 |
20140075483 | SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for navigating processes associated with providing content. The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of media content, electronic programming guide information, television content, and other content. Further, the user interfaces provide unique process of transitioning between the content. | 2014-03-13 |
20140075484 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-03-13 |
20140075485 | METHOD AND SYSTEM FOR COMMUNICATING BETWEEN A HOST DEVICE AND A USER DEVICE THROUGH AN INTERMEDIATE DEVICE USING A COMPOSITE GRAPHICS SIGNAL - A system and method includes a host device, an intermediate device and a user device. A network is in communication with the host device, the intermediate device and the user device. The host device communicates a first graphics command and a second graphics command to the intermediate device. The intermediate device composites the first graphics command and the second graphics command to form a composite graphics command and communicating the composite graphics command to the user device. The user device generates a screen display in response to the composite graphics command. | 2014-03-13 |
20140075486 | METHOD AND SYSTEM FOR COMMUNICATING BETWEEN A HOST DEVICE AND USER DEVICE THROUGH AN INTERMEDIATE DEVICE USING SYNTAX TRANSLATION - A system and method includes a host device, an intermediate device and a user device having a device type associated therewith. A network is in communication with the host device, the intermediate device and the user device. The host device communicates a first graphics command to the intermediate device. The intermediate device converts the first graphics command to a second graphics command in response to the device type. The user device generates a screen display in response to the second graphics command. | 2014-03-13 |
20140075487 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-03-13 |
20140075488 | DEVICE DISCOVERY SERVICE - A network device receives, from a set-top box within a local network, a discovery request for a server application within the local network. The network device identifies, based on the discovery request, a wide area network (WAN) Internet Protocol (IP) address for a router in the local network and retrieves, from a database of multiple discovery records, a particular discovery record with an IP address that matches the WAN IP address for the local network. The network device sends, to the set-top box, the particular discovery record for use in initiating a communication session with the server application. | 2014-03-13 |
20140075489 | Wireless Transport Framework with Variable Frequency Domain Training - A system and method for wirelessly transmitting audiovisual information. Training information may be stored in a memory. A plurality of packets may be generated, including the training information. The plurality of packets may also include audiovisual information. The plurality of packets may include first information identifying a first training pattern of a plurality of possible training patterns. The first training pattern may specify one or more locations of the training information in the plurality of packets. The first information may be usable by a receiver to determine the first training pattern of the plurality of possible training patterns. The plurality of packets may be transmitted in a wireless manner. | 2014-03-13 |
20140075490 | DIGITAL BROADCASTING SYSTEM AND METHOD OF PROCESSING DATA - A digital broadcast system and method of processing data are disclosed. A channel equalizer includes a frequency domain converter receiving a known data sequence, when the known data sequence is periodically inserted and transmitted in general data, and converting the received data to frequency domain data, a CIR estimator using the data being received during a known data section and known data generated by a receiving system, so as to estimate a CIR, a CIR calculator interpolating or extrapolating the CIR estimated by the CIR estimator in accordance with characteristics of the general data being received, a coefficient calculator converting the CIR being outputted from the CIR calculator to a frequency domain CIR and calculating and outputting an equalization coefficient, and a distortion compensator multiplying the equalization coefficient calculated by the coefficient calculator with the data converted to frequency domain data by the frequency domain converter, thereby compensating channel distortion. | 2014-03-13 |
20140075491 | ERROR PROOF METHOD FOR RECORDING AND RECORDING DEVICE - The method is applied to the recording device, and the recording device is connected to a set-top box. The error proof method includes following steps. In the beginning, whether a startup process of the set-top box has been finished is determined according to a video signal and an audio signal outputted from the set-top box. After the startup process of the set-top box is finished, the video signal outputted from the set-top box is analyzed to determine whether an image of the video signal is covered by an information window. If the image of the video signal is not covered by any information window, then a channel changing signal is transmitted to the set-top box, to change a channel of the set-top box to a reserved recording channel. After that, a television program of the reserved recording channel is recorded. | 2014-03-13 |
20140075492 | Identity context-based access control - Identity context-based access control is implemented by generating an identity context expression from user identity data. In particular, users are clustered based on combinations of one or more attributes. These clusters comprise one or more identity context(s). Preferably, an intersection of attribute sets of each user in the cluster is formed. In addition, an intersection of attribute sets of each user not in the cluster also is formed. If the attribute set that is common across the cluster of users is not a subset of the attribute set that is common across the rest of the users, then the attribute set forms a unique identity context expression. To reduce the number of roles used in role-based access control (RBAC), at least one role is replaced with an identity context expression. Run-time access control is then enabled. | 2014-03-13 |
20140075493 | SYSTEM AND METHOD FOR LOCATION-BASED PROTECTION OF MOBILE DATA - System and method to provide location-based levels of data protection, the method including: receiving, by a receiver, login credentials of a user of a mobile device; authenticating, by use of a policy server, a credentials-based level of data access as configured by a policy; retrieving, by a geo-location module, a location of the mobile device; determining, by use of the policy server, a location-based level of data access as configured by the policy; and granting sensitive data access based upon a more restrictive limitation of the credentials-based level of data access and the location-based level of data access. | 2014-03-13 |
20140075494 | MANAGING SECURITY CLUSTERS IN CLOUD COMPUTING ENVIRONMENTS USING AUTONOMOUS SECURITY RISK NEGOTIATION AGENTS - A method includes receiving at a similarity arbitrator information about a security policy of a candidate virtual machine that is proposed to be included in a cluster of virtual machines, comparing the security policy of the candidate virtual machine to the security policies of a plurality of virtual machines in the cluster, and in response to the comparison, recommending that a virtualization environment manager exclude the candidate virtual machine from the cluster or include the candidate virtual machine in the cluster. Related systems and computer program products are also disclosed. | 2014-03-13 |
20140075495 | METHOD AND SYSTEM FOR FACILITATING SECURE FILE CREATION USING SELINUX POLICIES - An operating system identifies a request of a process to create, in a file system of the computing device, a new object. The operating system creates an object label for the new object, identifies one or more security policy rules applicable to the process, and verifies whether the process is authorized to create the new object with the object label in the file system of the computing device using the applicable security policy rules. When the process is authorized to create the new object with the object label, the operating system creates the new object with the object label in the file system of the computing device. When the process is not authorized to create the new object with the object label, an error message is generated. | 2014-03-13 |
20140075496 | MOBILE PLATFORM WITH SENSOR DATA SECURITY - Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data. | 2014-03-13 |
20140075497 | Early Policy Evaluation of Multiphase Attributes in High-Performance Firewalls - A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined. | 2014-03-13 |
20140075498 | SECURITY MEDIATION FOR DYNAMICALLY PROGRAMMABLE NETWORK - A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches. | 2014-03-13 |
20140075499 | SECURITY INFRASTRUCTURE FOR CLOUD SERVICES - A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during processing of a customer's subscription order is described. The framework orders the security zones of components based on security levels and protects the transfer of information between components in security zones with different security levels. The assignment of a component to a security zone is based upon the sensitivity of the data handled by the components, the sensitivity of functions performed by the component, and the like. | 2014-03-13 |
20140075500 | REPUTATION-BASED AUDITING OF ENTERPRISE APPLICATION AUTHORIZATION MODELS - Reputation metrics are used to gauge risk of individuals to an organization, such as employees of a business. The reputation metrics may be calculated from both internal and external data sources, including social network profiles of the individuals. Calculations of risk are used to make determinations regarding the activities the individuals are authorized to engage in. | 2014-03-13 |
20140075501 | LDAP-BASED MULTI-TENANT IN-CLOUD IDENTITY MANAGEMENT SYSTEM - A multi-tenant identity management (IDM) system enables IDM functions to be performed relative to various different customers' domains within a shared cloud computing environment and without replicating a separate IDM system for each separate domain. The IDM system can provide IDM functionality to service instances located within various different customers' domains while enforcing isolation between those domains. A cloud-wide identity store implemented as a single LDAP directory can contain identity information for multiple customers' domains. This single LDAP directory can store identities for entities for all tenants, in separate partitions or subtrees of the LDAP directory, each such partition or subtree being dedicated to a separate identity domain for a tenant. Components of the cloud computing environment ensure that LDAP entries within a particular subtree are accessible only to service instances that have been deployed to the identity domain that corresponds to that particular subtree. | 2014-03-13 |
20140075502 | RESOURCE MANAGEMENT OF EXECUTION ENVIRONMENTS - Techniques for managing resources on a computing device may include a resource management module that can identify an asset available for use by the computing device. The asset can be classified based on one or more properties of the asset, and the value of the asset is determined based on the classification. The resource management module may determine that the value of the asset has changed, and the asset is ranked based on the value of the asset. The appropriate execution environment for the asset can be determined based on the ranking, and the asset can be dynamically migrated from one execution environment to another execution environment based on the dynamic value of the asset. | 2014-03-13 |
20140075503 | SYSTEM, ARRANGEMENTS AND METHODS RELATING TO ACCESS HANDLING - A core network access packet data node and a core network access edge node are described herein. The core network access packet data node and/or the core network access edge node is/are adapted to hold or receive access priority related information comprising a subscriber related access allocation priority parameter relating to a subscriber requesting a network resource. Further, the core network access packet data node and/or the core network access edge node is/are adapted to have a preliminary access decision unit being provided for deciding if a network resource request is to be handled. Moreover, the core network access packet data node and/or the core network access edge node is/are adapted to have a final decision unit being provided for making a final decision relating to grant/rejection of a request to be handled, i.e. given preliminary access. | 2014-03-13 |
20140075504 | METHOD AND SYSTEM FOR DYNAMIC SECURITY USING AUTHENTICATION SERVERS - Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from security databases and from Network Monitoring Systems, processing said data according to a dynamic security policy and using said processing outcome to determine the access level which will be granted to an access point in the network. | 2014-03-13 |
20140075505 | SYSTEM AND METHOD FOR ROUTING SELECTED NETWORK TRAFFIC TO A REMOTE NETWORK SECURITY DEVICE IN A NETWORK ENVIRONMENT - A method provided in one example includes receiving a request for configuration information for a host in a first network, determining whether the request was sent over a quarantine virtual local area network (VLAN) in the first network, and providing to the host a network address of a first domain name system (DNS) server if the request was sent over the quarantine VLAN in the first network. In addition, the first DNS server translates a domain name in a query from the host to a network address of a network security device in a second network. In more specific embodiments, the domain name in the query is mapped to a different network address in a second DNS server. The method may also include providing a network address of the second DNS server if the request was sent over a production virtual local area network (VLAN) in the first network. | 2014-03-13 |
20140075506 | Extensible and Scalable Distributed Computing and Communication Remote Services Platform for Telemetry Collection Adaptive Data Driven Application Hosting, and Control Services - A global, broadband communications and computing system Platform for commercial aircraft selects a “current best” communication link from multiple available links. Onboard network access components, such as Wi-Fi and GSM pico-cells, enable wired/wireless devices to use the aircraft's broadband communications links. The Platform uses virtualization and distributed systems computing technology to create a system of systems that extends an airline company's ground communications and computing systems server(s) onboard aircraft in the fleet, regardless of model, age, or manufacturer. The Platform can host airline operational applications and services onboard the aircraft. An onboard system collects data from multiple aircraft systems, tags it with trusted time and origin metadata, and securely transmits it to a ground portion of the Platform in real time (or as links are available), and receives data for distribution to appropriate onboard systems. Core components on an aircraft are not affected by operation of the Platform. | 2014-03-13 |
20140075507 | METHOD AND DEVICE FOR CONNECTING TO A HIGH SECURITY NETWORK - The present invention relates to the field of access to a high-security network, and more particularly to a device allowing secure access, for example for management and maintenance operations. | 2014-03-13 |
20140075508 | DELEGATING OR TRANSFERRING OF ACCESS TO RESOURCES BETWEEN MULTIPLE DEVICES - A gatekeeper device delegates an ability to access a resource to an access device by transmitting metadata, which includes access information for accessing the resource. The access device uses the metadata to retrieve the associated resource from a resource server. By transmitting the metadata in lieu of the resource, flexible use of the resources is implemented while enabling compliance with various restriction schemes. The system may condition the delegation or transfer of resource access on one or more factors, such as proximity between the gatekeeper device and the access devices. Using information about an access device, the resource server may optimize the resources for the receiving access device. | 2014-03-13 |
20140075509 | PERFORMING A GROUP AUTHENTICATION AND KEY AGREEMENT PROCEDURE - Provided are a method, a corresponding apparatus and a computer program product for performing a group authentication and key agreement procedure. A method comprises initiating, by a master device in a group of devices, a group authentication and key agreement procedure towards an authentication entity, wherein a shared group key is defined for use in the group authentication and key agreement procedure; performing mutual authentication between the master device and the authentication entity based upon the shared group key; and performing mutual authentication between the authenticated master device and other devices in the group based upon the shared group key for completion of the group authentication and key agreement procedure. With the claimed invention, the impact of the signaling overhead on a network can be significantly decreased without substantive modification to the existing architecture of the network. | 2014-03-13 |
20140075510 | COMMUNICATION SYSTEM, CONTROL DEVICE, COMMUNICATION METHOD, AND PROGRAM - A communication system includes an information acquisition unit that acquires information for determining an isolation level to which a user terminal belongs, from the user terminal; an isolation level determination unit that determines an isolation level to which the user terminal belongs, based on the acquired information; an isolation level information storage unit that defines whether or not access is possible to respective access destinations for each isolation level; an access control unit that causes a forwarding node(s) to implement forwarding or dropping of a packet, in accordance with whether or not access is possible to the respective access destinations; and a forwarding node(s) that forwards a packet in accordance with control of the access control unit. Stepwise access control is realized using isolation levels. | 2014-03-13 |
20140075511 | SECURE WIRELESS COMMUNICATION APPARATUS - Aspects of various embodiments are directed to the communication of wireless data. In a particular embodiment, an apparatus includes a master/wireless communication circuit and a slave circuit that carries out a secure function. The master generates session initiation commands, and the slave is responsive to these commands by generating and storing a session ID. In response to the receipt and validation of user-input data, the slave accesses and locally stores the session ID. Upon the initiation of and/or during a wireless communication process, the slave again accesses the session ID and compares the accessed session ID with the locally stored session ID, and facilitates communication based on the comparison (e.g., communication is not permitted if the comparison does not indicate a match). | 2014-03-13 |
20140075512 | Dynamic Secure Login Authentication - A system for performing a secured transaction using a network including a server in communication with the network is provided. The server has a processor and a memory to store private account information from registered users and store commands that when executed by the processor cause the server to perform a method including: providing a login configuration to a user, including a matrix of dynamic symbols; determining an expected password for the user based on a trace pattern from the user and the symbols in the matrix; receiving a password from the user; and determining whether the password matches the expected password. A non-transitory machine-readable medium including a plurality of machine-readable instructions which when executed by one or more processors of a server controlled by a service provider are adapted to cause the server to perform a method as above is also provided. | 2014-03-13 |
20140075513 | DEVICE TOKEN PROTOCOL FOR AUTHORIZATION AND PERSISTENT AUTHENTICATION SHARED ACROSS APPLICATIONS - Various techniques for providing a device token protocol for authorization and persistent authentication shared across applications are disclosed. In some embodiments, a device token protocol for authorization and persistent authentication shared across applications includes sending user credentials to a remote server to authenticate a user on a device for a plurality of applications; and receiving a device token from the remote server for the user to authenticate the user for the plurality of applications on the device, in which the device token facilitates authentication and authorization. | 2014-03-13 |
20140075514 | DISTRIBUTED HANDHELD SECURITY SYSTEM AND METHOD OF USE - A handheld security system comprises a set of handheld devices positioned at a group of access points to a secure area. The handheld device comprises a set of input/output devices including a text and graphics display, a camera, a local security database and a set of security devices including an RFID reader, a bar code reader, a magnetic stripe card reader and a biometric scanner. The set of handheld devices are communicatively connected through wireless signaling and protocol to one another and to a server operating a global a global security database. The local security database is synchronized to the global security database. A location stack table is continuously updated with security events and monitored for violation of a set of anti-passback rules. An association table associates a set of assets and a set of personnel, allowing for visitor tracking and asset tracking on a schedule. | 2014-03-13 |
20140075515 | SYSTEMS, DEVICES AND METHODS FOR AUTHORIZING ENDPOINTS OF A PUSH PATHWAY - An apparatus, system, and method for authorizing endpoints of a push pathway for push notifications are described herein. In one example embodiment, an identity provider element authenticates a first endpoint of the push pathway, determines an authentication token associated with the first endpoint, and determines a channel identifier in response to a successful validation of the authentication token associated with the first endpoint. In this embodiment, the identity provider element also authenticates a second endpoint of the push pathway, determines an authentication token associated with the second endpoint, and determines a handle for the push pathway in response to a successful validation of both the authentication token associated with the first endpoint and the authentication token associated with the second endpoint. The push pathway is established for transmission of push notifications from the first to the second endpoint upon establishing the handle for the push pathway. | 2014-03-13 |
20140075516 | SYSTEM AND METHOD FOR PROVIDING CONTROLLED APPLICATION PROGRAMMING INTERFACE SECURITY - A system and method for providing access to data of a user or services relevant to a user. A customer data key is created by a server that is specific to an application, the user of the application, and the device upon which the application resides. The server may receive an application programming interface call to create the customer data key; however, any call accessing or affecting user-specific data which does not contain a valid and authorized customer data key may be rejected. To authorize access to the offered data or services, the user conducts an entirely separate transaction not mediated by the application. During this separate transaction, the customer data key may be activated, permitting access to the data or services using the activated customer data key. | 2014-03-13 |
20140075517 | AUTHORIZATION SCHEME TO ENABLE SPECIAL PRIVILEGE MODE IN A SECURE ELECTRONIC CONTROL UNIT - A system and method for by-passing a security code to allow developmental software to be installed on a production controller without having to authenticate the software. The method includes requesting information from the controller and creating an information ticket in the controller in response to the request that identifies the controller. The information ticket is sent to a secure server that creates an authorization ticket that identifies the controller from the information ticket and creates a security code for the ticket. The authorization ticket is presented to the controller and if the security code is verified by the controller, the controller allows the developmental software to be installed. | 2014-03-13 |
20140075518 | OPERATOR PROVISIONING OF A TRUSTWORTHY WORKSPACE TO A SUBSCRIBER - Methods, systems and apparatuses for an operator provisioning a trustworthy workspace to a subscriber are disclosed. One method includes providing the subscriber with the trustworthy workspace, where in the trustworthy workspace comprises a virtualized content repository with trustworthy workflows for storing, sharing and processing a digital content across a plurality of repositories. The method further includes allowing the subscriber authority to sub-provision the trustworthy workspace to one or more authorized parties, wherein only the one or more authorized parties can view or modify at least a portion of the digital content. | 2014-03-13 |
20140075519 | SECURITY MEDIATION FOR DYNAMICALLY PROGRAMMABLE NETWORK - A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches. | 2014-03-13 |
20140075520 | SYSTEM AND METHOD FOR PROVIDING WHITELIST FUNCTIONALITY FOR USE WITH A CLOUD COMPUTING ENVIRONMENT - A system and method for providing whitelist functionality for use with a cloud computing environment. In accordance with an embodiment, software applications being deployed to the cloud are restricted from using certain classes or application program interfaces (APIs). During provisioning by, e.g., a Java cloud services (JCS) infrastructure, or another component of the cloud environment, an application's resources, such as its classes or API calls, can be matched against a whitelist of acceptable resources. If the application fails to be validated against the whitelist, it will not be deployed to the cloud, and the customer/user notified accordingly. In accordance with an embodiment, a whitelist functionality can be packaged within a software development kit (SDK), which customers/users can use during development of their applications, to verify that the applications will comply with, or successfully validate against the whitelist, prior to attempting to deploy the applications to the cloud. | 2014-03-13 |
20140075521 | SYSTEM AND METHOD FOR SHARING LOGIN STATUS BETWEEN AN APPLICATION PLATFORM AND AN APPLICATION - A method for sharing login status between an application platform and an application, both running on a client device, is performed at a computer. In response to a login request from the client device, the computer analyzes the login request to determine whether the login request is associated with the application platform or the application. If the login request is with the application platform, the computer then establishes a first connection with an application platform server and forwards the login request to the application platform server. Upon receiving a login key from the application platform server, the computer returns the login key to the client device. If not, the computer establishes a second connection with an application server and forwards the login request to the application server. Upon receiving a login key from the application server, the computer then returns the login key to the client device. | 2014-03-13 |
20140075522 | RELIABLE VERIFICATION OF HYPERVISOR INTEGRITY - A virtual trusted platform module (VTPM) requests a security state from a virtual machine manager. The security state is indicative of the integrity of at least a portion of software and hardware configurations of the virtual machine manager. The VTPM then receives, from the virtual machine manager, a signed security state comprising trusted platform credentials, and communicates the security state with the authentication server. The VTPM also, based on a secret received from the authentication server, initializes a process using the secret. | 2014-03-13 |
20140075523 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR SHARING WIRELESS NETWORK CREDENTIALS - Example method, apparatus, and computer program product embodiments are disclosed to improve user experience and security in sharing Wi-Fi network credentials. A method embodiment comprises receiving in a wireless device, a wireless message including private credential information to access a wireless network; determining by the wireless device, that the received private credential information is not stored in a cache of known network access points in the wireless device; and storing by the wireless, the received private credential information, in a credential database for network access points. | 2014-03-13 |
20140075524 | SYSTEM AND METHOD TO ESTABLISH AND USE CREDENTIALS FOR A COMMON LIGHTWEIGHT IDENTITY THROUGH DIGITAL CERTIFICATES - A system and method for authentication of a user using “lightweight” identities. The system and method provides for establishment of user credentials for a particular electronic mail address by an identity server through the recordation of a mail token and private token after receiving a request for credentials from the user. The identity server sends a private token to the user and sends a verification message to the user containing a specific link to the identity server for verification of the user along with the mail token, and then can verify the user by confirming that a mail token and private token recorded by the identity server match a mail token and a private token received from the user. After the verification process is successful, the identity server issues credentials that consist of a certificate either with or without a private key to the user which serves as an authenticated, unique, lightweight identity that a user can assume to access various services. | 2014-03-13 |
20140075525 | STRONG AUTHENTICATION BY PRESENTATION OF THE NUMBER - Authentication method by one-time password from a user ( | 2014-03-13 |
20140075526 | METHOD FOR CONTROLLING CONTENT AND DIGITAL DEVICE USING THE SAME - A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible. | 2014-03-13 |
20140075527 | METHOD FOR CONTROLLING CONTENT AND DIGITAL DEVICE USING THE SAME - A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible. | 2014-03-13 |
20140075528 | LOGIN TO A COMPUTING DEVICE BASED ON FACIAL RECOGNITION - A method of logging a first user in to an computing device includes receiving a an image of the first user via a camera operably coupled with the computing device and determining an identity of the first user based on the received image. If the determined identity matches a predetermined identity, then, based at least on the identity of the first user matching the predetermined identity, the first user is logged in to the computing device. | 2014-03-13 |
20140075529 | HOME REALM DISCOVERY IN MIXED-MODE FEDERATED REALMS - The authentication of identities within a realm in which some identities are authenticated using direct authentication, and some identities are authenticated using federated authentication. Requests for service from valid identities in the realm that are to be authenticated by direct authentication are responded to with a direct authentication interface. Requests for service from valid identities in the realm that are to be authenticated by federated authentication are responded to with a federated authentication interface. Requests for service from invalid identities are responded to pseudo-randomly with either the direct authentication interface or the federated authentication interface. | 2014-03-13 |
20140075530 | VOICE OVER IP BASED VOICE BIOMETRIC AUTHENTICATION - A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using the remote system. A selective determination is made to request, over a network, authentication of the party by a remote biometric system. A request is sent to the remote system for the party to provide a biometric sample responsive to determining to request authentication of the party. The service is provided contingent upon authentication of the party by the remote biometric system. | 2014-03-13 |
20140075531 | USING IDENTITY/RESOURCE PROFILE AND DIRECTORY ENABLERS TO SUPPORT IDENTITY MANAGEMENT - Embodiments of the present invention provide methods, system and machine-readable media for dynamically providing identity management or other services. According to one embodiment, dynamically providing services can comprise receiving a request related to an unknown principal. A service to which the principal is known can be selected. Once a service to which the principal is known has been located, an identity management result can be obtained from the selected service. The method can further comprise determining based on the identity management result whether the principal is authorized to access a requested resource. In response to determining the principal is authorized, the requested resource can be accessed. | 2014-03-13 |
20140075532 | Authentication Server and Communication Device - There is provided an authentication server. The server includes a receiving unit configured to receive a request from a network apparatus. The request includes a subscription identity. The server further includes a determination unit configured to determine whether the received subscription identity is a predetermined subscription identity and an obtaining unit configured to obtain, when it is determined that the received subscription identity is the predetermined subscription identity, a key and a subscription identity. The key is derived by applying a key derivation function to a random number and a key associated with the predetermined subscription identity. The server further includes a storage unit configured to store the obtained key and the obtained subscription identity and a response unit configured to send a response including the random number and an authentication token to the network apparatus. The authentication token includes the obtained subscription identity. | 2014-03-13 |
20140075533 | ACCESSING RESOURCES THROUGH A FIREWALL - Systems, methods, and computer-readable storage media for providing access to a firewalled resource are provided. A system includes a controller configured to be positioned outside of the firewall and configured to communicate with the client device and a mediator configured to communicate with the controller via a communications network. The mediator is configured to communicate with the resource and is configured to be positioned behind the firewall such that communications between the mediator and the resource do not traverse the firewall and communications between the mediator and the controller traverse the firewall. The mediator is configured to open a bidirectional connection between the mediator and the controller through which communications between the client device and protected resource may be transmitted. Requests forwarded by the mediator to the resource may be formatted in a manner such that they appear to the resource to be received from the client device. | 2014-03-13 |
20140075534 | DIRECTORY SERVER FOR AUTOMATIC NETWORK INFORMATION ACCESS SYSTEMS - Systems, apparatus and methods are described for providing information access to network devices. A directory server registers identification information about a first network device coupled to a first network. The first network and the directory server may be coupled to a second network, which may include a wide area network, public network, or the Internet. The identification information may include a network address of the first network device on the first network, or a network address of the first network on the second network. The directory server may receive and process requests for identification information about registered network devices, and may selectively reply to the requests based on status information of the first network device. | 2014-03-13 |
20140075535 | METHOD AND APPARATUS FOR STREAMING VIDEO SECURITY - A streaming video security device is provided that comprises an input LAN interface, at least one streaming video decoder, an output LAN interface, at least one streaming video encoder coupled at one side to said LAN interface for streaming video output and coupled at the other side to a raw video display-compatible output interface; and unidirectional data flow element coupled at the transmitting side to the streaming video decoder through the raw video display-compatible output interface and coupled at the receiving side to one or more video encoder through the raw video display-compatible input interface. | 2014-03-13 |
20140075536 | DETECTION OF INFECTED NETWORK DEVICES VIA ANALYSIS OF RESPONSELESS OUTGOING NETWORK TRAFFIC - The present disclosure describes one or more systems, methods, routines and/or techniques for detection of infected network devices via analysis of responseless outgoing network traffic. A computer implemented method may include executing a routine that receives as input first packet information. The method may include executing a routine that analyzes the first packet information to determine whether the first packet information identifies an outgoing network packet that is associated with the initiation of a network communication. The method may include executing a routine that causes storage and/or tracking, in one or more data stores, of the first packet information if the first packet information is determined to be a potential responseless packet. The method may include executing a routine that causes removal and/or ends tracking of the first packet information if the first packet information is determined to not be a responseless packet based on analysis of second packet information. | 2014-03-13 |
20140075537 | METHOD AND APPARATUS FOR CONTROLLING BLOCKING OF SERVICE ATTACK BY USING ACCESS CONTROL LIST - An attack blocking control method uses an access control list (ACL). The method includes investigating the ACL if a packet is input, and checking whether or not the packet is registered in the ACL, comparing a current time count value with a blocking time of the packet if the packet is determined to be registered in the ACL. Further, the method includes increasing the number of blocking times of the packet by 1 if the current time count value is smaller than or equal to the blocking time. Further, the method includes automatically renewing the blocking time, and removing registration information for the packet from the ACL if the current time count value is greater than the blocking time. | 2014-03-13 |
20140075538 | IP SPOOFING DETECTION APPARATUS - An IP spoofing detection apparatus is provided. The IP spoofing detection apparatus comprising, a tunnel information extracting unit which extracts a first TEID and a user equipment IP address from a payload of a first GTP packet, and an abnormal packet detecting unit which extracts a second TEID from a header of a second GTP packet, and extracts a source IP address from a payload of the second GTP packet, wherein the abnormal packet detecting unit detects the second GTP packet as an IP spoofing packet if the first TEID and the second TEID are equal to each other, and the user equipment IP address and the source IP address are different from each other. | 2014-03-13 |