17th week of 2014 patent applcation highlights part 64 |
Patent application number | Title | Published |
20140115589 | SYSTEM AND METHOD FOR BATCH EVALUATION PROGRAMS - A batching module that inspects call stacks within a stack evaluator to identify current expressions that can be evaluated in batch with other expressions. If such expressions are identified, the corresponding stacks are blocked from further processing and a batch processing request for processing the expressions is transmitted to the application server. The application server processes the expressions in batch and generates a value for each of the expressions. The blocked stacks are then populated with the values for the expressions. | 2014-04-24 |
20140115590 | METHOD AND APPARATUS FOR CONDITIONAL TRANSACTION ABORT AND PRECISE ABORT HANDLING - A method for executing a transaction in a data processing system initiates the transaction by a transactional-memory system coupled to that memory component. The method includes initiating the transaction by a transactional-memory system that is part of a memory component of the data processing system. The transaction includes instructions for comparing multiple parameters, and aborting the transaction by the transactional-memory system based upon a comparison of the multiple parameters. | 2014-04-24 |
20140115591 | APPARATUS, SYSTEM AND METHOD FOR PROVIDING FAIRNESS IN TASK SERVICING - A storage system that is configured to fairly service requests from different host systems particularly in congested situations. To balance the processing of tasks between different clients, the system sorts tasks received from different clients into task lists. In particular, the system sorts the incoming tasks based on the ITL (Initiator, Target, LU) nexus information associated with each task. In some instances, a new task list is created for each ITL nexus. The sorting of tasks may provide for a more even distribution of tasks and thus a more fair processing of tasks. More specifically, because tasks from each list are processed in round-robin fashion, tasks arriving from even the slowest clients are given a substantially equal chance of being processed as the tasks arriving from the faster clients. | 2014-04-24 |
20140115592 | METHOD FOR ESTIMATING JOB RUN TIME - A process controller adapted to provide an estimated prediction of a processing time for a data processing job to be run on one or more of a plurality of data processing devices that operate within a distributed processing system having a range of platforms, the process controller being in communication with a job prediction engine adapted to calculate an estimated processing time associated with the data processing job, wherein the process controller uses the estimated processing time to determine the estimated prediction and is further adapted to control the assignment of the data processing job to the data processing devices upon acceptance of the estimated prediction by a user. | 2014-04-24 |
20140115593 | AFFINITY OF VIRTUAL PROCESSOR DISPATCHING - In an embodiment, a request is received for a first partition to execute on a first virtual processor. If the first physical processor is available at a first node, the first virtual processor is dispatched to execute at the first physical processor at the first node that is the home node of the first virtual processor. If the first physical processor is not available, a determination is made whether the first physical processor is assigned to a second virtual processor and a home node of the second virtual processor is not the first node. If the first physical processor is assigned to a second virtual processor and the home node of the second virtual processor is not the first node, execution of the second virtual processor is stopped on the first physical processor and the first virtual processor is dispatched to the first physical processor. | 2014-04-24 |
20140115594 | MECHANISM TO SCHEDULE THREADS ON OS-SEQUESTERED SEQUENCERS WITHOUT OPERATING SYSTEM INTERVENTION - Method, apparatus and system embodiments to schedule OS-independent “shreds” without intervention of an operating system. For at least one embodiment, the shred is scheduled for execution by a scheduler routine rather than the operating system. A scheduler routine may run on each enabled sequencer. The schedulers may retrieve shred descriptors from a queue system. The sequencer associated with the scheduler may then execute the shred described by the descriptor. Other embodiments are also described and claimed. | 2014-04-24 |
20140115595 | SYSTEM AND METHOD FOR CONTROLLED SHARING OF CONSUMABLE RESOURCES IN A COMPUTER CLUSTER - In one embodiment, a method includes empirically analyzing a set of active reservations and a current set of consumable resources belonging to a class of consumable resources. Each active reservation is of a managed task type and includes a group of one or more tasks requiring access to a consumable resource of the class. The method further includes, based on the empirically analyzing, clocking the set of active reservations each clocking cycle. In addition, the method includes, responsive to the clocking, sorting a priority queue of the set of active reservations. | 2014-04-24 |
20140115596 | CODELETSET REPRESENTATION, MANIPULATOIN, AND EXECUTION - METHOD, SYSTEM AND APPARATUS - Codeletset methods and/or apparatus may be used to enable resource-efficient computing. Such methods may involve decomposing a program into sets of codelets that may be allocated among multiple computing elements, which may enable parallelism and efficient use of the multiple computing elements. Allocation may be based, for example, on efficiencies with respect to data dependencies and/or communications among codelets. | 2014-04-24 |
20140115597 | MEDIA HARDWARE RESOURCE ALLOCATION - Apparatus, computer readable medium, and method of allocating media resources, the method including determining a media resources allocation table based on one or more media hardware resources and predetermined benchmarks of media hardware resources for performing media operations; in response to receiving a request for media resources from a first application, comparing the requested media resources with the media resources allocation table; and if the comparison indicates that the requested media resources are available, then allocating the requested media resources to the first application in the media resources allocation table, and sending a response to the request for media resources to the first application indicating the requested media resources are allocated to the application. If the comparison indicates that the requested media resources are not available, then sending indicating to the first application that the requested media resources are not allocated to the first application. | 2014-04-24 |
20140115598 | SYSTEM AND METHOD FOR CONTROLLED SHARING OF CONSUMABLE RESOURCES IN A COMPUTER CLUSTER - In one embodiment, a method includes empirically analyzing, by a computer cluster comprising a plurality of computers, a set of active reservations and a current set of consumable resources belonging to a class of consumable resources. Each active reservation is of a managed task type and comprises a group of one or more tasks task requiring access to a consumable resource of the class. The method further includes, based on the empirically analyzing, clocking the set of active reservations each clocking cycle. The method also includes, responsive to the clocking, sorting, by the computer cluster, a priority queue of the set of active reservations. | 2014-04-24 |
20140115599 | SUBMITTING OPERATIONS TO A SHARED RESOURCE BASED ON BUSY-TO-SUCCESS RATIOS - In an embodiment, an average busy-to-success ratio is calculated for partitions that submitted operations to a shared resource during a first time period. A first busy-to-success ratio for a first partition during the first time period is calculated. If the first busy-to-success ratio is greater than the average busy-to-success ratio and a difference between the first busy-to-success ratio and the average busy-to-success ratio is greater than a threshold amount, a throttle amount for the first partition is increased. A first operation from the first partition during a first time subdivision of a second time period is received. If a number of operations received from the first partition during the first time subdivision of the second time period is greater than the throttle amount for the first partition, a busy indication is returned to the first partition and the first operation is not submitted to the shared resource. | 2014-04-24 |
20140115600 | SUBMITTING OPERATIONS TO A SHARED RESOURCE BASED ON BUSY-TO-SUCCESS RATIOS - In an embodiment, an average busy-to-success ratio is calculated for partitions that submitted operations to a shared resource during a first time period. A first busy-to-success ratio for a first partition during the first time period is calculated. If the first busy-to-success ratio is greater than the average busy-to-success ratio and a difference between the first busy-to-success ratio and the average busy-to-success ratio is greater than a threshold amount, a throttle amount for the first partition is increased. A first operation from the first partition during a first time subdivision of a second time period is received. If a number of operations received from the first partition during the first time subdivision of the second time period is greater than the throttle amount for the first partition, a busy indication is returned to the first partition and the first operation is not submitted to the shared resource. | 2014-04-24 |
20140115601 | DATA PROCESSING METHOD AND DATA PROCESSING SYSTEM - A data processing method that is executed by a processor includes determining based on a size of an available area of a first memory whether first data of a first thread executed by a first data processing apparatus among a plurality of data processing apparatuses is transferable to a first memory; transferring second data that is of a second thread and stored in the first memory to second memory, when at the determining, the first data is determined to not be transferrable; and transferring the first data to the first memory. | 2014-04-24 |
20140115602 | INTEGRATION OF A CALCULATION ENGINE WITH A SOFTWARE COMPONENT - Various embodiments of systems and methods for integrating a calculation engine of an in-memory database with a software component are described herein. A control unit schedules and triggers jobs to be processed by an operational unit. The control unit and the operational unit are at an application level. The operational unit divides a job workload corresponding to a job trigger into work packages based on one or more parameters. The work packages are sent to a calculation engine in an in-memory database. At the in-memory database, operations are performed on the work packages and an output is generated. A log in the control unit is updated based on the output. | 2014-04-24 |
20140115603 | METHOD, APPARATUS, AND SYSTEM FOR SCHEDULING PROCESSOR CORE IN MULTIPROCESSOR CORE SYSTEM - The present invention discloses a method, an apparatus, and a system for scheduling a processor core in a multiprocessor core system, which relate to the field of multiprocessor core systems, and can meet the demand for real-time network I/O processing, thereby improving the efficiency of the multiprocessor core system. The method for scheduling a processor core in a multiprocessor core system includes: obtaining, in the running process of the multiprocessor core system, a first control parameter, a second control parameter, a third control parameter, and a fourth control parameter; transferring a packet of a data flow that enters the multiprocessor core system to an idle processor core for processing based on the first control parameter, the second control parameter, and the third control parameter; and switching over the processor core in the multiprocessor core system between an interruption mode and a polling mode based on the fourth control parameter. | 2014-04-24 |
20140115604 | METHODS AND SYSTEMS TO IDENTIFY AND REPRODUCE CONCURRENCY VIOLATIONS IN MULTI-THREADED PROGRAMS - Methods and systems to identify and reproduce concurrency violations in multi-threaded programs are disclosed. An example method disclosed herein comprises determining whether a condition is met and serializing an operation of a first thread of a multi-threaded program relative to an operation of a second thread of the multi-threaded program. The serialization of the operations of the first and second threads results in a concurrency violation or bug thereby causing the multi-threaded program to crash. In this way, the operations of the first and second threads of the multi-threaded program that are responsible for the concurrency violation are identified and can be revised to remove the bug. | 2014-04-24 |
20140115605 | ADAPTABLE MASS DATA MESSAGE RECEIPT AND HANDLING SYSTEM AND METHOD - Compact event code messages are generated by sources, which may include human users, system components or any other sources. The event code messages include an event type, a source type, and a date. The messages are initially processed based on this information. The messages also include payload data that is not considered during initial processing, rendering initial processing fast and efficient. The messages may then be listed or queued and further processed by specialize event handlers, which may consider the payload data and may draw upon other resources. The system components, including the event handlers may be increased or decreased as needed and dynamically as messages are received and processed. New events, rules for event processing, event handlers and other system components may be added at any time to expend the number and types of events that can be handled, and the particular handling performed on them. | 2014-04-24 |
20140115606 | MULTI-PLATFORM MOBILE AND OTHER COMPUTING DEVICES AND METHODS - The invention provides, in some aspects, a computing device that includes a central processing unit that is coupled to a hardware interface and that executes a native operating system including one or more native runtime environments within which native software applications are executing. A first native software application executing within the one or more native runtime environments defines one or more hosted runtime environments within which hosted software applications are executing. One or more further native software applications (“IO proxies”), each executing within the one or more native runtime environments and each corresponding to a respective one of the one or more hosted software applications, receives the graphics generated by the respective hosted software application and effects writing of those graphics to the video frame buffer for presentation on the display of the computing device. | 2014-04-24 |
20140115607 | METHODS AND APPARATUS TO DETECT UNINSTALLATION OF AN ON-DEVICE METER - Example methods and apparatus to detect uninstallation of an on-device meter are disclosed. An example method includes identifying, at a second application on a mobile device, a first notification that the first application is to be uninstalled. A prompt is displayed asking whether the second application is to be uninstalled in response to the first notification. An uninstallation notification is transmitted to a remote data collector, the uninstallation notification including an identifier to identify at least one of the mobile device associated with the uninstallation or a user of the mobile device | 2014-04-24 |
20140115608 | MEDIUM, IMAGE PROCESSING APPARATUS, IMAGE FORMING SYSTEM, AND IMAGE FORMING APPARATUS - A non-transitory computer readable medium stores a driver installer to install a program that causes a computer to execute functional units for operating an image processing apparatus. The driver installer includes a driver installing unit and a plug-in installing unit. The driver installing unit is for retrieving a printer driver package including a file necessary for operating a printer driver, and for installing the file as the printer driver. The plug-in installing unit is for retrieving a plug-in package including a plug-in information file and a plug-in file for adding a function, and for registering the plug-in information file and the plug-in file. | 2014-04-24 |
20140115609 | METHOD FOR STORING APPLICATION DATA AND TERMINAL DEVICE - Embodiments of the present disclosure provide a method for storing application data and a terminal device, and relate to the field of communications, so that installation of an application having a default specified path and storage of data that is generated after the application is run are enabled to be located in the same storage space. The method includes: receiving an instruction for running a local application, wherein the instruction is triggered by a user; determining an actual path of a storage space in which the application is installed; running the application, and acquiring data that is generated after the application is run; and storing the data that is generated after the application is run in the actual path of the storage space in which the application is installed. The embodiments of the present disclosure are applied to use of a mobile phone. | 2014-04-24 |
20140115610 | SYSTEM AND METHOD FOR BATCH EVALUATION PROGRAMS - A batching module that inspects call stacks within a stack evaluator to identify current expressions that can be evaluated in batch with other expressions. If such expressions are identified, the corresponding stacks are blocked from further processing and a batch processing request for processing the expressions is transmitted to the application server. The application server processes the expressions in batch and generates a value for each of the expressions. The blocked stacks are then populated with the values for the expressions. | 2014-04-24 |
20140115611 | TESTING DEVICE AND METHOD - A testing method tests a disc loading and transferring mechanism having a tray. The testing method includes steps of: transmitting a tray-out instruction and a tray-in instruction in that order to drive the tray to alternate between a closed position and a opened; counting a first period of the tray moving from the closed position to the opened position and a second period of the tray moving from the opened position to the closed position; determining whether the first counted period and the second counted period are in conformity with predetermined and expected standards, and outputting test results for indicating the disc loading and transferring mechanism is not in conformity with predetermined and expected standards when the first counted period and the second counted period are in conformity with predetermined and expected standards. | 2014-04-24 |
20140115612 | DISC LOADING DEVICE AND OPTICAL DISC DRIVE INCLUDING THE SAME - Provided is a disc loading device and optical disc drive using the same. The disc loading device includes a loading roller for loading a disc in a main frame, an eject lever for discharging the disc out of the main frame, and a main slider operating the eject lever, and moving in a direction by a disc emergency ejection pin inserted from outside of the main frame. | 2014-04-24 |
20140115613 | OPTICAL DISC DEVICE AND CONTROLLING METHOD THEREOF - An optical disc device includes a pickup, a driving mechanism that drives the pickup, and a driving controlling portion that applies an initial driving voltage to the driving mechanism over a specific time interval up until the pickup arrives at an outermost position on an outer peripheral side, the initial driving voltage causing the pickup to arrive at the outermost position. After the specific time interval has elapsed, the driving controlling portion applies, to the driving mechanism, an adjustment driving voltage of a voltage amplitude less than a voltage amplitude of the initial driving voltage or a driving frequency less than a driving frequency of the initial driving voltage. | 2014-04-24 |
20140115614 | DATA STORAGE DEVICE TAPE PATH CLEANER - A tape cartridge is provided with a reel mounted for rotation in a housing. Tape with a length, a width and a thickness, is wound upon the reel in a length direction of the tape. A leader is mounted to a free end of the tape. The leader has at least one portion with a width greater than the tape width to clean a tape path, such as a guide and/or a lens. Another tape cartridge is provided with a reel mounted for rotation in a housing. Tape is wound upon the reel in a length direction of the tape. A leader is mounted to a free end of the tape. A brush is mounted to a portion of the leader for cleaning a tape path. | 2014-04-24 |
20140115615 | METHODS, APPARATUS, AND SYSTEMS TO COLLECT AUDIENCE MEASUREMENT DATA - Methods, apparatus, and systems to collect audience measurement data are disclosed. A disclosed example method includes collecting first media data and audience identification data, the audience identification data being collected by prompting audience members in the monitored household to self-identify using a meter while the audience members are exposed to first media provided by a first media system. Audience member behavior is developed data based on the first media data and the audience identification data. The meter is deactivated after the audience member behavior data has been developed. Second media data is collected after the audience member behavior data has been developed without collecting audience identification data, the collecting of the second program identification data occurring while the audience members are exposed to second media. The audience members associated with the second media data are identified based on the audience member behavior data. | 2014-04-24 |
20140115616 | METHODS AND APPARATUS FOR USING AUDIENCE MEMBER BEHAVIOR INFORMATION TO DETERMINE COMPLIANCE WITH AUDIENCE MEASUREMENT SYSTEM USAGE REQUIREMENTS - Example methods, apparatus, and articles of manufacture determine compliance with usage guidelines of an audience measurement system. Initially, location information associated with an audience member is obtained. It is then determined whether the audience member is in compliance with the usage guidelines based on the location information. Media monitoring information corresponding to the location information is then tagged as non-compliant if the audience member is not in compliance with the usage guidelines. | 2014-04-24 |
20140115617 | METHODS AND APPARATUS FOR USING AUDIENCE MEMBER BEHAVIOR INFORMATION TO DETERMINE COMPLIANCE WITH AUDIENCE MEASUREMENT SYSTEM USAGE REQUIREMENTS - Example methods, apparatus, and articles of manufacture determine compliance with usage guidelines of an audience measurement system. Initially, location information associated with an audience member is obtained. It is then determined whether the audience member is in compliance with the usage guidelines based on the location information. Media monitoring information corresponding to the location information is then tagged as non-compliant if the audience member is not in compliance with the usage guidelines. | 2014-04-24 |
20140115618 | VIDEO PROCESSING SYSTEM, ADVERTISEMENT ACQUISITION METHOD, VIDEO PROCESSING DEVICE, AND METHOD FOR CONTROLLING SAME - A variety of advertisement information is associated with a scene being played back and the advertisement information is provided. | 2014-04-24 |
20140115619 | DIGITAL VIDEO SIGNATURE APPARATUS AND METHODS FOR USE WITH VIDEO PROGRAM IDENTIFICATION SYSTEMS - Digital video signature apparatus and methods for use with video program identification systems are disclosed. The example apparatus and methods generate a signature associated with a video program. An example system includes a frame scanner to scan video frames associated with the video program. The frame scanner is to select a video frame based on a number of intra-coded macro blocks within the video frame. The example system also includes an intra-coded macro block extractor to extract intra-coded macro blocks from the video frame and a scaled image extractor to extract a scaled image from the intra-coded macro blocks. A signature generator is also included in the example system to calculate a plurality of centroids associated with video frame based on the scaled image and to form the signature based on the plurality of centroids. | 2014-04-24 |
20140115620 | Identifying an End of a Television Program - Systems, methods, and non-transitory computer-readable storage mediums storing at least one program for identifying an end of a television program is described. In some implementations, a method comprises: periodically obtaining subtitles for a plurality of television programs during respective predetermined time intervals that include respective times when respective television programs in the plurality of television programs are scheduled to end; identifying sequences of strings from the subtitles for the plurality of television programs in accordance with predefined criteria associated with the plurality of television programs; and updating an aggregation of subtitles indicating that a television program in the plurality of television program has ended, with the identified sequences of strings. In some implementations, the method is implemented at a computing device having at least one processor and memory storing at least one program for execution by the at least one processor. | 2014-04-24 |
20140115621 | Intra-Video Ratings - A system and method is provided for receiving and displaying voting data with respect to online hosted videos. Viewers vote on portions within various videos stored in an online video hosting website. Voting data can represent different types of votes, such as unipolar, bipolar, or categorical. The prior voting data, including that submitted by other viewers, can be displayed in a number of ways, such as gradations of color, or charts such as bar graphs. The voting data may be associated with demographic categories, such as a voter's age, sex, or political affiliation. Further, a video may be selectively played to display portions of most interest to given demographic categories, as indicated by voting patterns of those categories. | 2014-04-24 |
20140115622 | Interactive Video/Image-relevant Information Embedding Technology - An interactive video/image-relevant information embedding technology contains: a server side including a user client-server operation interface module for interacting with the client side; a video/image database for saving videos/images; a label database for saving external information; a video/image content analysis module for segmenting, tracking, recognizing specified items in the videos/images; an external-information retrieval engine for retrieving external information from the public search engine, label database, or additional database; a video/image-external information relation analysis module for creating on-the-fly labels for the specified items in videos/images; a client side which includes: a client-server operation interface module for interacting with the server side; a user operation interface module for interacting with the user/label creator; an original video/image database for saving videos/images; a label information database for saving external information; a video/image content analysis module for segmenting, tracking, recognizing specified items in the videos/images; a label-embedding engine for creating label files for the videos/images. | 2014-04-24 |
20140115623 | Integration of Untrusted Framework Components With a Secure Operating System Environment - A set top box or like device incorporating an untrusted software framework as a client of a secure operating system kernel. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment having a secure kernel. The software framework can be executed using a variety of process isolation techniques depending on performance and isolation requirements. A secure access client/server interface may also be provided to support interactions between the untrusted software framework (and applications utilizing the untrusted software framework) and secure or trusted portions of the device. The secure access interface can be configured to perform operations such as handle validation, heap pointer validation, non-pointer parameter validation, heap isolation, and resource release relating to terminated processes. In further embodiments, a software framework aggregator is used to support a plurality of additional software frameworks for use in the set top box. | 2014-04-24 |
20140115624 | Security and Certification in a Set Top Box Device Having a Mixed Operating System or Framework Environment - A set top box or similar device incorporating key management and certification support functions for establishing and maintaining compliance and flexibility with respect to applicable certification procedures and security measures when integrating untrusted components with an underlying secure operating system environment of the device. In various embodiments, the device incorporates untrusted software framework, such as an Android framework supported by a secure Linux operating system environment. The key management and certification support system operates to select hardware and software components of the device for use in establishing media pathways conforming to a desired level of security, and may be further operable to restrict access to a pathway in response to detection of an attempt to exploit the media pathway in an unauthorized manner. In one embodiment, a service operator or content provider may provide requisite certification or security requirements, or otherwise assist in selection of pathway components. | 2014-04-24 |
20140115625 | METHOD AND SYSTEM FOR INSERTING AN ADVERTISEMENT IN A MEDIA STREAM - Certain aspects of a system and method for inserting an advertisement in a media stream may include a content access server. The content access server may receive the media stream from one or more content providers. The media stream may comprise one or more pre-determined positions for inserting the advertisement. The content access server may insert the advertisement in the media stream at one of the one or more pre-determined positions. The advertisement is selected from one or more advertisements in real-time based on a first metadata associated with the media stream, a location of the one or more pre-determined positions in the media stream, and one or more parameters associated with a user. | 2014-04-24 |
20140115626 | METHOD AND SYSTEM FOR ENHANCING REDISTRIBUTED AUDIO/VIDEO CONTENT - A method and a system for recognizing, by a broadcasting platform, content sequences of an input linear content stream by retrieving content information determined by small fingerprints of portions of the linear content and comparing the small fingerprint with reference fingerprints stored in a database. The output stream transmitted to the user units is modified by the addition of a synchronization stream including at least identifiers of the content sequences and associated temporal information determined on the basis of the reference fingerprints. The content information is exploited by the broadcasting platform or the users units for replacing a sequence by anther one, removing predefined sequences, skipping or forcing viewing content sequences, The initial linear content stream is thus enriched with accurate content information allowing the viewer to navigate and select the content to play either in live or replay mode. A back in time feature may also be introduced allowing navigating back and forward inside a content currently played. | 2014-04-24 |
20140115627 | SYSTEM AND METHOD FOR PROVIDING INFORMATION RELATED TO AN ADVERTISEMENT INCLUDED IN A BROADCAST THROUGH A NETWORK TO A CLIENT TERMINAL - The present invention relates to a system and method for providing information related to an advertisement included in a broadcast over a network. The present invention provides a system for providing information related to an advertisement included in a broadcast to a client terminal, including a display unit, broadcast reception means and network connection means, over a network (hereinafter referred to as an “advertisement-related information provision system”), the system including a related information management unit configured to store related information corresponding to each advertisement included in a broadcast that is provided via a broadcast channel; an advertisement information identification unit configured to identify whether an advertisement stored in the related information management unit is being played during the broadcast that is provided via the broadcast channel; and a related information transmission unit configured to transmit related information, stored in the related information management unit for the advertisement identified by the advertisement information identification unit, to the client terminal over the network; wherein the client terminal includes a related information display unit configured to perform control so that the received related information is displayed on the display unit, and a method using the same. | 2014-04-24 |
20140115628 | Remote Control with User Profile Capability - A control unit ( | 2014-04-24 |
20140115629 | System and Method for Displaying and Searching Multimedia Events Scheduling Information - Disclosed are computer implemented method, systems, and non-transitory media for presenting information representing a plurality of time-bounded events in (i) a first grid and (ii) a second grid. The first grid has a first size and represents a first set of time-bounded events in the plurality of time-bounded events. The second grid has a second size smaller than the first size. The second grid represents a second set of time-bounded events in the plurality of time-bounded events. This second set of time-bounded events includes a greater number of time-bounded events than the first set of time-bounded events. | 2014-04-24 |
20140115630 | INFORMATION RECEPTION APPARATUS, INFORMATION RECEPTION METHOD, COMPUTER PROGRAM FOR INFORMATION RECEPTION, AND INFORMATION DISTRIBUTION APPARATUS - An information reception apparatus which allows a user to easily understand, from an electronic program guide, the information announced in a broadcast program, and which contributes to increasing viewer ratings of the broadcast program. The information reception apparatus (broadcast reception apparatus) is provided with: an electronic program information acquisition unit (tuner, control unit) for acquiring electronic program information; an announcement information acquisition unit (control unit, DEMUX unit) for acquiring information announced in the broadcast program from information included in the electronic program information acquired by the electronic program information acquisition unit or from information transmitted together with the electronic program information; and an announcement information output unit (control unit, AV output unit) for outputting the electronic program information and for outputting information indicating the presence or absence of the announcement information, based on the information acquired by the announcement information acquisition unit. | 2014-04-24 |
20140115631 | USER CONTROL OF AD SELECTION FOR SUBSEQUENT AD BREAK OF A STREAMING VIDEO - During or prior to streaming of video content to a client device, a server provides data configuring an interactive object on the client device. When activated by user input, the interactive object enables a user to select one or more video ads to be streamed to the client device during an upcoming ad break, during play of the streaming video. The interactive object enables the user to perform the selection without interrupting viewing of the video. | 2014-04-24 |
20140115632 | CONTENT MANAGEMENT APPARATUS, CONTENT MANAGEMENT METHOD, PROGRAM, AND CONTENT DISPLAY METHOD - A content management apparatus according to the present disclosure manages a list of AV content files including at least one of an image, audio, and a moving image. The content management apparatus includes: a metadata classifying unit classifying metadata aspects of the AV content files included in the list into one or more groups based on details indicated by the metadata aspects; a consolidating list creating unit creating, based on a metadata aspect which belongs to at least one of the one or more groups classified by the metadata classifying unit, a consolidating list which groups and consolidates the AV content files included in the list; and an outputting unit outputting the created consolidating list | 2014-04-24 |
20140115633 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-04-24 |
20140115634 | IDENTIFYING INSTANCES OF MEDIA PROGRAMMING AVAILABLE FROM DIFFERENT CONTENT SOURCES - Systems and methods are provided for identifying instances of media programming available within a media distribution system. An exemplary method involves searching a listing of media programming available from a first content source using search criteria indicative of a desired media program to identify an instance of the desired media program available from the first content source, obtaining a target program identifier associated with the desired media program from that instance, identifying another instance of the desired media program in a second listing of media programming available from another content source using the target program identifier, and providing a combined search result that indicates availability of the desired media program from the content sources. | 2014-04-24 |
20140115635 | PROGRAM RECOMMENDATION DEVICE AND PROGRAM RECOMMENDATION PROGRAM - The program recommendation device includes a search term receiver that receives at least one search term designated by a user, a partial match searcher that searches an electronic program list for programs having program information with words and phrases partially matching the search term designated by the user and outputs a partial match search result set, a language analyzer that performs a language analyzing process on the program information of each of the programs contained in the partial match search result set and outputs an analyzed search result set, an exact match searcher that searches the analyzed program information contained in the analyzed search result set for programs with words and phrases exactly matching the search term designated by the user and outputs an exact match search result set. A recommended program display displays programs contained in the exact match search result set as recommended programs. | 2014-04-24 |
20140115636 | VIDEO PLAYBACK DEVICE FOR USE WITH A MOBILE COMMUNICATION DEVICE - A digital video recorder (DVR) has a memory manager to determine a particular date and a particular video program in a download schedule for which the DVR will reach a low memory condition based on the download schedule and an amount of unoccupied memory space in the DVR. The DVR outputs a display signal to indicate the particular date and the particular video program. | 2014-04-24 |
20140115637 | SYSTEM AND METHOD FOR BROADCAST RECEPTION MANAGEMENT - A system and method for broadcast reception management. In some embodiments, a database may provide information for advising a wireless electronic device of the accessible channels on which content is provided over licensed and/or unlicensed spectrum for a given location, as well as the associated channel numbers for the channels. By using the database, the wireless electronic device may identify the accessible channels and associated channel numbers for a given location without having to perform a scanning and identification process. In other embodiments, the database may provide information for advising a content management device of an available broadcast resource on which the content management device may effectuate broadcast of content to the wireless electronic device. | 2014-04-24 |
20140115638 | NETWORK AV RECEIVER DEVICE - [Problem] To provide a network AV receiver device capable of preventing the suspension of the playback of music when the music can no longer be inputted from a media server that is inputting the music, the network AV receiver device playing back the music inputted from the media server, which is connected via a network and accumulates music. [Solution] A network AV receiver device is provided with a music information storage unit for storing the music information of the music recorded in each media server connected to a network, an input state detecting unit for detecting the input state of a media server which inputs the music currently being played back, and a control unit, wherein when the input state detecting unit detects that the input state of the music data currently being played back is not normal, a media server of the music data currently being played back is switched to music data recorded by another media server on the basis of the music information of the music recorded in the media server stored in the music information storage unit. | 2014-04-24 |
20140115639 | MULTI-VISION VIRTUALIZATION SYSTEM AND METHOD - A multi-vision virtualization system includes a multi-vision virtualization server and two or more scene clients. The multi-vision virtualization server includes a multi-vision virtualization server configured to generate virtual machines for decoding processes based on image content segments, generate synchronous reproduction information for synchronization between two or more scene clients, transmit the generated synchronous reproduction information to a first scene client among the two or more scene clients, and decode the image content segments to generate decoded image segments; and the two or more scene clients including the first scene client that parses the received synchronous reproduction information, and shares the parsed synchronous reproduction information with remaining scene clients, and being configured to reproduce the decoded image segments on screens based on the parsed synchronous reproduction information. | 2014-04-24 |
20140115640 | SYSTEM AND METHOD FOR NETWORKED PVR STORAGE AND CONTENT CAPTURE - A content management system for managing content stored by a number of networked Personal Video Recorders (PVRs) associated with a user community is provided. More specifically, the storage space of each of the personal video recorders is physically or logically partitioned into a personal space and a community space. The content management system manages the community spaces of the PVRs such that content relevant to the user community is stored in the collective community space of the PVRs and available to the user community. | 2014-04-24 |
20140115641 | Personal Content Sharing Method, System, Server, and Terminal Device - The present invention provides a personal content sharing method, system, server, and terminal device. The method includes receiving a first request message sent by a first terminal device, where the first request message includes attribute information of a personal content in a first personal content database, generating and storing configuration information of the first personal content database according to the attribute information, receiving a second request message sent by a second terminal device, where the second request message includes a content identifier of a target personal content in the first personal content database, and providing the second terminal device with the target personal content according to the configuration information. | 2014-04-24 |
20140115642 | FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - Systems and methods allow playback of a placeshifted media stream received via a network. The placeshifted media stream is received and stored in a buffer prior to playback. Responsive to receiving the user command to change the content of the media stream, the buffer is flushed prior to receiving the changed content in the placeshifted media stream. | 2014-04-24 |
20140115643 | APPARATUS AND METHOD FOR MEDIA CONTENT PRESENTATION - A method that incorporates teachings of the subject disclosure may include, for example, accessing, by a system comprising at least one processor, a content display configuration corresponding to a plurality of feed selections from a plurality of media content feeds available from a service provider network, a plurality of display selections from a plurality of available displays, and a plurality of pairing selections assigning each feed selection of the plurality of feed selections to at least one display selection of the plurality of display selections, transmitting a plurality of displayable content streams according to the content display configuration, modifying the content display configuration according to a request, and transmitting the plurality of displayable content streams according to the content display configuration. Other embodiments are disclosed. | 2014-04-24 |
20140115644 | APPARATUS AND METHOD FOR PROCESSING AN INTERACTIVE SERVICE - A method of processing an interactive service and an apparatus thereof are disclosed. The present invention includes sending a discovery message to a second screen application, receiving a request for descriptions of the second screen support services, sending a response with the descriptions, receiving a trigger, and delivering the trigger to the second device using a trigger service. | 2014-04-24 |
20140115645 | DIGITAL MEDIA DISTRIBUTION DEVICE - A digital media distribution device that includes an encoder, a decoder coupled to the encoder, and a transcoder coupled to the decoder. The encoder is configured to encode input data that is received by the digital media distribution device into a first data format. The decoder is configured to decode output data to be output by the digital media distribution device. The transcoder is configured to convert the encoded input data from the first data format into a second data format. The digital media distribution device is configured to be coupled to a computer network. | 2014-04-24 |
20140115646 | Integration of Untrusted Applications and Frameworks with a Secure Operating System Environment - A set top box or like device utilizing trusted applications in conjunction with an untrusted software framework. In one implementation, trusted or certified applications are received from a service provider for execution by a software framework of the device. Certification of a trusted application may entail, for example, verifying that the application is executable by the device in a manner consist with the industry standard certification process. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment and isolated in a Linux resource container. A secure access client/server interface may also be provided to support interactions between the software framework and trusted portions of the device. In further embodiments, both trusted applications and a set top box application utilized by the device to perform traditional set top box operations are implemented in at least one version of an Android or like framework. | 2014-04-24 |
20140115647 | MEDIA CONTENT TRANSCEIVING METHOD AND TRANSCEIVING APPARATUS USING SAME - The present invention relates to a method and apparatus for transceiving media content through the Internet. A media transmitting method according to one embodiment of the present invention transmits media content through the Internet, and comprises the steps of: configuring the media content with a plurality of representations; dividing each of the plurality of representations into a plurality of segments; dividing each of the plurality of segments into a plurality of sub-segments; generating a plurality of time reference values corresponding to each of the plurality of sub-segments; and transmitting any one of the representations, wherein the representation being transmitted comprises the plurality of time reference values. According to the one embodiment of the present invention, media content can be seamlessly played back due to switching a bit stream when the state of a network changes. | 2014-04-24 |
20140115648 | METHOD AND APPARATUS FOR BROADCAST TV CONTROL - A method, apparatus and system to provide the ability for a user to have improved OTA reception of TV signals. The system employs an antenna, a media receiver/player and/or display, and a datacenter. The antenna is placed with line of sight to broadcast towers and is provided with clean wiring from the antenna through the building to a the TV. A high performance TV tuner and a demodulator are included in the TV or STB. A datacenter located in relevant Television Market Area is incorporated to receive, process and make available correction packets over a network. Under typical circumstances, an OTV television signal as broadcast contains degradation in the form of a number of error packets in the broadcast stream by the time it is received by an antenna. The system employed detects and marks of error packets and replaces them with good packets delivered over a network. | 2014-04-24 |
20140115649 | APPARATUS AND METHOD FOR PROVIDING REALISTIC BROADCASTING - Provided is an apparatus for providing realistic broadcasting, the apparatus including a realistic broadcasting platform configured to divide received content into one or more modalities, curate the content with respect to each of the divided modalities, and generate a scenario based on the curated content and information about one or more realistically reproducing devices which are currently available; and an immersive media gateway configured to generate the information about one or more realistically reproducing devices, and provide a realistic broadcasting service to a user based on the curated content and the information about one or more realistically reproducing devices. | 2014-04-24 |
20140115650 | MEDIA DATA CONTROL METHOD AND APPARATUS - The present invention discloses a media data control method and apparatus. The method includes: receiving a control request message sent by a terminal, where the control request message carries identification information of a substream and a uniform resource identifier URI of a media stream to which the substream belongs; obtaining the identification information of the substream and the URI of the media stream to which the substream belongs; determining, according to the identification information of the substream and the URI of the media stream to which the substream belongs, media data of the substream; and performing, based on the media data, a control operation requested by the terminal, for the substream. With the present invention, independent control can be implemented for data of different features under the same type in the case where the data of different features is transmitted through the same media stream. | 2014-04-24 |
20140115651 | METHOD FOR PROVIDING SEMANTIC APPLICATION - The present invention relates to a method for providing a digital broadcast, and for providing a semantic application from a receiver for executing the semantic application, which is provided independently from the digital broadcast, and comprises the steps of: (a) executing at least one first semantic application based on a first event while providing the digital broadcast; (b) executing at least one second semantic application based on a second event while executing step (a); and (c) managing the state of the at least one first semantic application depending on the property of same while executing step (b). According to the present invention, a plurality of semantic applications can be provided, and the state of each of the plurality of semantic applications can be managed according to the property and execution mode of the semantic applications, even in an environment where the plurality of semantic applications are executed, thereby efficiently using a system resource of the receiver. | 2014-04-24 |
20140115652 | Real-Time Module Protection - Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections. | 2014-04-24 |
20140115653 | METHODS AND SYSTEMS FOR IMPLEMENTING SECURITY POLICIES ON A MOBILE DEVICE - Methods and devices for implementing security policies on a wireless device. The wireless device may include a non-volatile memory comprising a security type hard-coded in the non-volatile memory. Based on the security type, it may be determined whether a received security policy governing behavior of one or more resources designated as personal is applicable to the one or more resources designated as personal. If the security type is determined to indicate that the received security policy is not applicable to the one or more resources designated as personal, the security policy may not be applied to the one or more resources designated as personal. | 2014-04-24 |
20140115654 | METHODS AND SYSTEMS FOR PROTECTING A SECURED NETWORK - Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets. Performing the at least one of multiple packet transformation functions specified by the dynamic security policy on the packets may include performing at least one packet transformation function other than forwarding or dropping the packets. | 2014-04-24 |
20140115655 | SYSTEMS AND METHODS FOR THE RAPID DEPLOYMENT OF NETWORK SECURITY DEVICES - A configuration service comprises a deployment package and a production configuration for a network security device. One or more configuration parameters of the production configuration may be defined by an administrator of the network security device (e.g., the customer). The network security device may be preconfigured with a network address and identifier. The network security device may be configured to automatically request and apply the deployment package at deployment time by use of the preconfigured network address and identifier. The network security device may automatically request and apply the production configuration from the configuration service in response to applying the deployment package. | 2014-04-24 |
20140115656 | SECURITY MANAGEMENT UNIT, HOST CONTROLLER INTERFACE INCLUDING SAME, METHOD OPERATING HOST CONTROLLER INTERFACE, AND DEVICES INCLUDING HOST CONTROLLER INTERFACE - A method of operating a host controller interface includes receiving a buffer descriptor including sector information from a main memory, fetching data by using a source address included in the buffer descriptor, selecting one of a plurality of entries included in a security policy table by using the sector information, and determining whether to encrypt the fetched data by using a security policy included in the selected entry. | 2014-04-24 |
20140115657 | Method of Reducing Fraud in System User Account Registration - Provided is a method of reducing the creation of inappropriate or fraudulent accounts within a digital system. The method prompts a user for input of key biographical data and then initiates capture of a live video of the user. Video capture is accomplished via activation of a user's own webcam or other audio-video capture device. System software activates the audio-video capture device and instructs the device to continue recording for a predetermined period of time. The resultant multimedia file is stored in conjunction with the submitted biographical data in a database. System administrators review the multimedia file or appropriateness of content and check the file contents against the provided biographical data. If the file is inappropriate or the data does not match the file contents, the account creation request is denied and the account is deleted prior to activation on the system. | 2014-04-24 |
20140115658 | Multi-User Interactive Multimedia Chat - Provided is a method of establishing a multimedia interactive chat room populated with a pseudo-random sampling of available participants. The pool of available participants is defined as the group composed of members of an online community whose user accounts have been reviewed by system administrators for appropriateness of content and consistency between captured videos and submitted biographical data. Results of sample selection are displayed to the requesting user, who can then decide to begin multimedia interactive chat sessions with one or more users, or may select a “reshuffle” option, which results in the display of a new sample of available members. Requesting users can limit the type of persons displayed by selecting filters such as interest based filters. Users are thus provided with the ability to speak with other community members without all participants having to actively enter a chat room website. | 2014-04-24 |
20140115659 | System and Methods for Secure Utilization of Attestation in Policy-Based Decision Making for Mobile Device Management and Security - Policy-based client-server systems and methods for attestation in managing and scouring mobile computing devices. Attestation provides the means to make efficient, secure, and reproducible use of knowledge possessed by trust expert parties and authorities within the expression and enforcement of policies for controlling use of and access to, onboard software and hardware, network capabilities, and remote assets and services. Aspects of secure attestation of applications that use shared and dynamically loaded libraries are presented, a well as potential business models for attestation used in such a policy-based system. | 2014-04-24 |
20140115660 | METHODS AND SYSTEMS FOR FORCING AN APPLICATION TO STORE DATA IN A SECURE STORAGE LOCATION - The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting the write requests, the data included in those requests can be stored in the secure storage area of a client computer. In some embodiments, the methods and systems can include determining whether an application issuing the request is a trusted application that requires data to be stored in a secure storage repository. Upon making this determination, a filter driver can identify a secure storage area on a client computer and can redirect the write request to this secure storage. In other embodiments, the filter driver may deny requests of trusted applications to write to unsecure storage areas. | 2014-04-24 |
20140115661 | USER AUTHENTICATION METHOD AND SYSTEM FOR USING WEB MULTI CONTENTS - The present invention relates to an information protection technology for management of a web mashup content authority. An exemplary embodiment of the present invention provides a user authentication method for using a web multi content, which includes: confirming whether to include authority information of a user for at least one content to request a domain which supplies the content to verify an authority of the user; performing authentication for the user who wants to use the content; verifying whether a request of the user to use the content is within an authenticated authority; and decoding the content to be supplied. According to the present invention, in a web service environment where only one protocol is used by the same origin policy, access control for data convergence is provided. In a web convergence service environment, a modification or plagiarism of a content (data or code) is prevented in advance. | 2014-04-24 |
20140115662 | Mechanism for Detecting Human Presence Using Authenticated Input Activity Timestamps - When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature. | 2014-04-24 |
20140115663 | METHOD FOR DETECTING UNAUTHORIZED ACCESS AND NETWORK MONITORING APPARATUS - A method for detecting unauthorized access is executed by a network monitoring apparatus connected to a network in which packets are transmitted between a plurality of information processing apparatuses. The method includes obtaining, by the network monitoring apparatus, packets regarding at least one access performed from a first information processing apparatus to a second information processing apparatus. The method includes selecting at least one condition from among predefined at least two conditions. The selection is performed according to a combination between the first information processing apparatus as an access source and the second information processing apparatus as an access destination. The method includes determining whether each of the obtained packets satisfies the selected at least one condition. The method includes determining a possibility that unauthorized access has been performed on the second information processing apparatus, based on a number of conditions determined to be satisfied. | 2014-04-24 |
20140115664 | INSTRUCTION-BASED WEB SERVICE ROUTING SYSTEM THAT ENABLES DEVICES TO CONTROL THE FLOW OF CONTENT - A method and apparatus is disclosed herein for directing flow of data collected from a data acquisition device on a network are disclosed. In one embodiment, the method comprises directing the flow of data collected from a data acquisition device in response to a connector, where the connector represents a user selected and parameterized workflow template that specifies one or more web services to perform processing on the data or storage of the data, including receiving the data after the data acquisition device pushes the data to the network in response to the connector, and controlling processing flow of the data with at least one of the one or more web services specified by the connector; and storing the data via one of the one or more web services according to the connector. | 2014-04-24 |
20140115665 | MESSAGE-HANDLING SERVER AND METHOD FOR HANDLING SECURE MESSAGE ATTACHMENTS FOR A MOBILE DEVICE - A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device. | 2014-04-24 |
20140115666 | SECURE PROTOCOL EXECUTION IN A NETWORK - For secure configuration of network nodes from a backend with low connectivity requirements and workload at the backend and reduced communication overhead, a system, a control unit for a segment controller and a method for secure protocol execution in a network are provided, wherein protocol information is provided to a segment controller ( | 2014-04-24 |
20140115667 | METHOD AND SYSTEM FOR PROVIDING A SERVICE FOR A MOBILE DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - An online service providing system, a method, a server, and a mobile device thereof, and a computer program product are provided. The method includes sending a verification link corresponding to a user account that is not verified; after receiving a verification request corresponding to the verification link, determining whether a device identification sent by the mobile device that has logged in the user account is received; when receiving the device identification, confirming whether the user account is verified according to the device identification; after confirming that the user account is verified, when receiving a service request sent by a terminal device logging the user account into a service website, determining a homepage of the service website according to the device identification, and providing the online service corresponding to the mobile device to the terminal device through the service website. | 2014-04-24 |
20140115668 | Systems and Methods for Controlling Network Access - Disclosed are various embodiments for systems and methods for controlling access of networks. In one embodiment, an access control service receives requests to access network beacons from client devices. In response, the access control service determines whether the client devices satisfy authorization rules associated with the network beacons. If the access control service determines that the client devices satisfy the authorization rules associated with the network beacons, the access control service authorizes the client devices to access the network beacons. Subsequently, if the client devices cease to satisfy the authorization rules associated with the network beacons, the access control service terminates the authorization of the client devices to access the network beacons. | 2014-04-24 |
20140115669 | INTEGRATED USER CHALLENGE PRESENTATION FOR DDOS MITIGATION SERVICE - Systems and methods are disclosed for providing distributed denial-of-service (DDoS) mitigation service. The systems and methods may receive a request to access a web server from a user host, generate an integrated user challenge page including a user challenge test and a web page image of the web server, and transmits the integrated user challenge page to the user host. The systems and methods may further receive an answer to the user challenge test from the user host, determine whether the answer to the user challenge test is correct or not. When the answer to the user challenge test is correct, the systems and methods may establish a connection between the user host and the web server. | 2014-04-24 |
20140115670 | AUTHENTICATION METHOD OF FIELD CONTENTS BASED CHALLENGE AND ENUMERATED PATTERN OF FIELD POSITIONS BASED RESPONSE IN RANDOM PARTIAL DIGITIZED PATH RECOGNITION SYSTEM - An interactive method for authentication is based on a shared secret which is in the form of an enumerated pattern of fields on a frame of reference. An instance of the frame of reference comprises an array of characters in which the characters are arranged in a random or other irregular pattern on a grid of content fields. An authentication challenge includes characters from the character set, and is delivered in- or out-of-band. The authentication response includes the enumerated position numbers on the enumerated pattern of the field locations on the grid at which the challenge characters are found. | 2014-04-24 |
20140115671 | MAP BASED NEIGHBORHOOD SEARCH AND COMMUNITY CONTRIBUTION - A method, apparatus and system of map based neighborhood search and community contribution are disclosed. In one embodiment, a neighborhood communication system is described. This embodiment includes a privacy server to apply an address verification algorithm associated with each user of the online community to verify that each user lives at a residence associated with a claimable residential address of an online community formed through a social community module of the privacy server using a processor and a memory. The privacy server automatically determines a set of access privileges in the online community associated with each user of the online community by constraining access in the online community based on a neighborhood boundary determined using an algorithm of the privacy server. The privacy server may constrain the particular user to communicate through the online community only with a set of neighbors having verified addresses using the privacy server. | 2014-04-24 |
20140115672 | Storing and Accessing Licensing Information in Operating System-Independent Storage - Licensing information that guides the operation of a software application may be stored in operating system-independent storage of a device on which the software application is installed. The operating system-independent storage may be independent of the device's file system and may include storage that is implemented as part of a chipset of the device. The licensing information may be written to the device's operating system-independent storage by a remote device over a communications network regardless of the state of the device. The licensing information may be subsequently accessed by the software application to determine whether functionality requested by a user of the application is supported by the licensing information. | 2014-04-24 |
20140115673 | AUTHENTICATION PROCESS - A first network device is configured to receive a request for content from a user device, determine that the user device is not authenticated, and send information to the user device that the user device requires authentication. The first network device is configured further to receive authentication information for the user device from a second network device. The first network device is configured further to generate a secret key, authenticate the user device. The first network device is configured further to request user knowledge information from the user device, validate the user knowledge information and send the content to the user device. | 2014-04-24 |
20140115674 | WIRELESS COMMUNICATION SYSTEM, PORTABLE TERMINAL, DIGITAL CAMERA, COMMUNICATION METHOD, AND COMPUTER-READABLE STORAGE DEVICE - A generation unit generates the wireless network connection setting information from the first information based on the conversion rule. The encoding unit encodes the first information to generate a code image. A display unit displays the code image. An imaging unit captures the code image. A decoding unit decodes the code image captured by the imaging unit and acquires the first information. A second storage unit stores a conversion rule that is the same as the conversion rule stored in the storage unit. A second generation unit generates the wireless network connection setting information from the first information acquired by the decoding unit based on the conversion rule stored in the second storage unit. A communication unit connects to a wireless network using the wireless network connection setting information generated by the second generation unit. | 2014-04-24 |
20140115675 | SMART CARD SERVICE METHOD AND APPARATUS FOR PERFORMING THE SAME - Provided are a smart card service method and an apparatus for performing the same. The smart card service method includes receiving a certificate generation request from a terminal, transmitting the certificate generation request to an authentication processing device, and storing credential information with respect to the generated certificate in a virtual machine associated with the terminal in response to a certificate generation success message provided from the authentication processing device. Thus, it is possible to reduce costs in accordance with manufacturing smart card hardware, and support smart card services in a more enhanced security environment. | 2014-04-24 |
20140115676 | DEVICE AUTHENTICATION METHOD AND DEVICES - In a method for authenticating a device on a wireless local area network (WLAN) there is a once-off registration phase in which the device sends registration data in a MO SMS via the mobile network to the authentication system, and the authentication system performs a query to this mobile network to validate the subscriber and resolve the subscriber and device identifiers. The device receives network access information from the authentication system, allowing it to generate network access credentials on an on-going basis. This is permanent unless the registration is revoked due, for example, to the device being stolen. The network access information may be provided by the authentication system generating and signing a unique subscriber certificate during registration, and the device downloading it. The device uses the signed certificate to generate and encrypt the network access credentials for the network access. | 2014-04-24 |
20140115677 | TOKEN AUTHENTICATION SYSTEM AND METHOD - A method for calculating a One Time Password. A secret is concatenated with a count, where the secret is uniquely assigned to a token. The secret can be a private key or a shared secret symmetric key. The count is a number that increases monotonically at the token with the number of one-time Passwords generated at the token. The count is also tracked at an authentication server, where it increases monotonically with each calculation of a one-time Password at the authentication server. An OTP can be calculated by hashing a concatenated secret and count. The result can be truncated. | 2014-04-24 |
20140115678 | Methods and Apparatus for Authenticating Identity of Web Access From a Network Element - A network configuration having various network elements and user equipments configured to authenticate web access requests is disclosed. Upon receipt of web addresses from various subscribers, the web addresses such as online advertisements are stored in a memory. The network traffic in the communication network is monitored in accordance with the web addresses stored in the memory. After detecting a website assess request such as a click of an online advertisement, an authentication record which authenticates the origin of the network equipment issuing the request. The authentication record is forwarded to a subscription partner via a predefined messaging mechanism. | 2014-04-24 |
20140115679 | AUTHENTICATION METHOD OF ENUMERATED PATTERN OF FIELD POSITIONS BASED CHALLENGE AND ENUMERATED PATTERN OF FIELD POSITIONS BASED RESPONSE THROUGH INTERACTION BETWEEN TWO CREDENTIALS IN RANDOM PARTIAL DIGITIZED PATH RECOGNITION SYSTEM - An interactive method for authentication is based on two shared secrets, both shared secrets in the form of an ordered path on the frame of reference. An instance of the frame of reference comprises a set of characters which is arranged in a random or other irregular pattern. The first step of authentication that a user performs requires the user to remember one or all of the characters in the displayed instance of the frame of reference found in the locations in the random subset of the first ordered path by indicating characters either in these locations, or any other locations having the same characters. The second step of authentication requires that a user enter the position of the second ordered path, which only they know during an authentication session, where the challenge identifying the position of the ordered path is the single or multiple values that matches the value of the digital content of the frame of reference. | 2014-04-24 |
20140115680 | SERVER DEVICE - One object is to restrain unauthorized logins without significantly reducing usability. In accordance with one aspect, the server device according to an embodiment includes: an information storage unit for storing information; an information generating unit for generating login authentication information in response to a display request for a login screen sent from a terminal device; a sending unit for sending login screen data for displaying the login screen on the terminal device; a receiving unit for receiving login information from the terminal device; and a determination unit for determining whether a login is permitted based on the received login information. The login screen data includes an instruction for converting the login authentication information. | 2014-04-24 |
20140115681 | System and method for alternative distribution of a PIN code - System and method for distribution of a PIN code comprising an application end user in communication with an application server comprising at least one PIN code generating mechanism for authentication of an application end user, and a portable telecommunication device further characterized by that said application server is in communication with a synthetic voice PIN server also in communication with said portable telecommunication device. | 2014-04-24 |
20140115682 | User Verification Processing Method, User Equipment, and Server - A user verification processing method, a user equipment, and a server, where the method includes: receiving from a server a notification message that includes an action verification code instruction; obtaining sensor data generated when a user performs an action corresponding to the action verification code instruction; and feeding back verification information to the server according to the sensor data. The user verification processing method, the user equipment, and the server provided in the embodiments of the present invention can increase difficulty of cracking a verification code and improve security of the verification code. | 2014-04-24 |
20140115683 | SYSTEMS AND METHODS FOR PEER-TO-PEER ONLINE VERIFICATION USING THIRD PARTY AUTHENTICATION - The present disclosure is directed to methods and systems for indicating bias-less trust levels to online users for the purpose of facilitating safe and secure online purchase transactions within an online community. | 2014-04-24 |
20140115684 | MULTIPLE ACCESS POINT ZERO SIGN-ON - The ability to connect a device to the Internet or another type of network from various network access points in a convenient manner is contemplated. The device may be conveniently connected to the desired network without requiring user input of a username and password when connecting to the various network access points. | 2014-04-24 |
20140115685 | SMART SPACE ACCESS METHOD, SYSTEM, CONTROLLER, AND SMART SPACE INTERFACE SERVER - The present disclosure provides a smart space access method, a system, a controller, and a smart space interface server. The smart space access method includes: determining, by a controller that the controller enters a smart space in a smart space list; receiving a main mobile code corresponding to the smart space; and loading and executing the main mobile code, displaying a main service interface, generating a smart space request according to a service number of a selected application, sending the smart space request to the interface server, executing a result mobile code sent by the interface server, and displaying a processing result of the selected application. According to the present disclosure, access to different smart applications in different smart spaces can be implemented in a uniform manner by using a single controller without preinstalling a control program of a smart space, thereby providing a good expansibility. | 2014-04-24 |
20140115686 | Method for Managing Connections in Firewalls - The disclosure relates to a method for managing connections in a firewall. The method includes receiving packets from an external network; generating a connection table; determining the total number of currently established connections; determining a level of firewall load by comparing the number of established connections with a threshold; identifying new and established connections based on two-way exchange of packets between a client and server; identifying closed connections based on processing ICMP error messages or flags in a TCP header; and dynamically determining current timeout values for connections from the network protocol type, the connection state, and the firewall load level. The method also includes modifying the last packet processing timestamp if any packet is passed within a given connection or a group of connections; and removing the connection if the last packet processing timestamp differs from the current time by a value greater than the timeout of said connection. | 2014-04-24 |
20140115687 | INTRUSION AND MISUSE DETERRENCE SYSTEM EMPLOYING A VIRTUAL NETWORK - A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence System (IMDS) operating on the network. The IMDS is a system that creates a synthetic network complete with synthetic hosts and routers. It is comprised of a network server with associated application software that appears to be a legitimate portion of a real network to a network intruder. The IMDS consequently invites inquiry and entices the intruder away from the real network. Simulated services are configured to appear to be running on virtual clients with globally unique, class “C” IP addresses. Since there are no legitimate users of the virtual network simulated by the IMDS, all such activity must be inappropriate and can be treated as such. Consequently, the entire set of transactions by an intruder can be collected and identified rather than just those transactions that meet a predefined attack profile. Also, new exploits and attacks are handled just as effectively as known attacks, resulting in better identification of attack methodologies as well as the identification and analysis of new attack types. Since the IMDS only has to be concerned with the traffic going to its simulated hosts it additionally eliminates the bandwidth limitation that plagues a traditional IDS. | 2014-04-24 |
20140115688 | MULTI-METHOD GATEWAY-BASED NETWORK SECURITY SYSTEMS AND METHODS - Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection. | 2014-04-24 |