21st week of 2016 patent applcation highlights part 68 |
Patent application number | Title | Published |
20160149917 | SECURITY PROFILE MANAGEMENT IN A MACHINE-TO-MACHINE MESSAGING SYSTEM - Techniques and systems for managing security profiles in a machine-to-machine messaging system are provided. For example, computing device, a method, and a computer-program product may be provided for maintaining one or more security profiles, and may include registering one or more IoT devices with a messaging system, generating one or more security profiles for an IoT device, and assigning the one or more security profiles to one or more other IoT devices. A security profile includes a permissions record and one or more sets of restrictions. | 2016-05-26 |
20160149918 | SECURE INFORMATION INTERACTION METHOD FOR ELECTRONIC RESOURCES TRANSFER - The invention proposes a security information interaction method. In the method, a first security information interaction terminal executes a security information interaction procedure based on a direct data communication with a second security information interaction terminal in the form of near field communication so as to realize the transfer of electronic resources. The security information interaction method disclosed by the invention can achieve a direct transfer of electronic resources between security information interaction terminals and has a high safety and reliability. | 2016-05-26 |
20160149919 | TARGETED USER ACCESS CONTROL SYSTEM - A system includes a network interface, at least one processing device, and at least one memory device. The at least one memory device stores instructions that when executed result in initiating creation of a single-use targeted link that provides access to a restricted access data entry system and serves the single-use targeted link through the network interface to a computer system of a targeted user with a time validity constraint. An access request received at the restricted access data entry system through the single-use targeted link is verified as being received within the time validity constraint. A network traffic throttling control reduces network traffic volume received through the single-use targeted link based on determining that the network traffic volume exceeds a traffic volume threshold. An identity control at the restricted access data entry system is applied to confirm entry of at least one identifying characteristic that matches the targeted user. | 2016-05-26 |
20160149920 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 2016-05-26 |
20160149921 | TRUSTED PERIPHERAL DEVICE FOR A HOST IN A SHARED ELECTRONIC ENVIRONMENT - A trusted peripheral device can be utilized with an electronic resource, such as a host machine, in order to enable the secured performance of security and remote management in the electronic environment, where various users might be provisioned on, or otherwise have access to, the electronic resource. The peripheral can have a secure channel for communicating with a centralized management system or service, whereby the management service can remotely connect to this trusted peripheral, using a secure and authenticated network connection, in order to run the above-described functionality on the host to which the peripheral is attached. | 2016-05-26 |
20160149922 | VISUALIZATION OF ACCESS INFORMATION - A request to access a resource is received from a machine. The request contains machine data. Contextual information is retrieved from the request based on one or more computer operations performed on the machine data. The contextual information contains one or more technical terms in computer technology. The contextual information comprises at least one of the following: information indicating a service provider used to send the request; information indicating a type of hardware device used to send the request; and information indicating a configuration of software used to send the request. An object is associated with the retrieved contextual information. The object has a visual component that symbolizes the one or more technical terms of the contextual information in a visual manner. The object is communicated to an entity. | 2016-05-26 |
20160149923 | KEY MANAGEMENT SYSTEM FOR TOLL-FREE DATA SERVICE - A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may perform a validation operation to validate that the network address is associated with the toll-free data service. The validation operation may be based on a key identifier associated with the network address or a network address signature associated with the network address. The key identifier may correspond to a security key used to create the network address signature. The network address signature may be created using the security key. The system may determine whether to bill a first party or a second party for data usage associated with the toll-free data service based on the validation operation. The system may provide information that identifies whether to bill the first party or the second party for the data usage associated with the toll-free data service. | 2016-05-26 |
20160149924 | Systems and Methods for Automatic Discovery of Systems and Accounts - In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying one or more accounts associated with at least one of the plurality of discovered systems, configuring a security appliance to change one or more old passwords to one or more new passwords for the one or more accounts, and changing, with the configured security appliance, the one or more old passwords to the one or more new passwords. | 2016-05-26 |
20160149925 | SYSTEMS AND METHODOLOGIES FOR CONTROLLING ACCESS TO A FILE SYSTEM - A method for controlling access to a file system having data elements, including the steps of maintaining a record of respective actual accesses by users of the file system to the data elements, defining a proposed removal of a set of the users from a superset of the users, wherein members of the superset have common access privileges to a portion of the data elements, and wherein following an implementation of the proposed removal, members of the set retain respective proposed residual access permissions, ascertaining, prior to the implementation of the proposed removal, that at least one of the respective actual accesses are disallowed to the members of the set, or to non-members of the set having actual access profiles which are similar to the actual access profiles of the members of the set, by the respective proposed residual access permissions, and generating an error indication, responsively to the ascertaining. | 2016-05-26 |
20160149926 | Systems and Methods for Facilitating Access to Private Files Using a Cloud Storage System - A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of establishing a connection with a user, providing a client namespace associated with the client to the user, where the client namespace represents objects stored on the cloud storage system and objects stored on a private storage system apart from the cloud storage system, receiving a request from the user to access an object stored on the private storage system, and providing information to the user to facilitate access to the object stored on the private storage system by said user. Other systems and methods are also disclosed. Important advantages of the present invention are facilitated by separating the logic for user access (control plane) from the actual storage (Storage plane). Private file system access can still be managed from the cloud, while keeping the client data private. | 2016-05-26 |
20160149927 | SYSTEM AND METHODS FOR PROTECTING USERS FROM MALICIOUS CONTENT - A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface capable of receiving at least one user-generated interrupt in response to a stimulus generated in response to content received by the device, wherein the action taken upon receiving the user-generated interrupt depends on a classification of the content, the classification identifying the content as trusted or not trusted. The method includes detecting a request for sensitive information in content, determining if an interrupt is generated, determining if the content is trusted, allowing the collection of the sensitive information if the interrupt is generated and the content is trusted, and performing an alternative action if the interrupt is generated and the content is not trusted. The method may include instructions stored on a computer readable medium. | 2016-05-26 |
20160149928 | SECURE GROUP CREATION IN PROXIMITY BASED SERVICE COMMUNICATION - A method of forming a secure group in ProSe communication includes requesting a service request to a ProSe server from a requesting device ( | 2016-05-26 |
20160149929 | Methods, Systems, and Products for Identity Verification - Methods, systems, and products verify an identity claimed by a person. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. Should the signature favorably compare to the reference signature, then the identity is verified. | 2016-05-26 |
20160149930 | SYSTEMS AND METHODS FOR PROTECTING AGAINST UNAUTHORIZED NETWORK INTRUSIONS - The disclosed computer-implemented method for protecting against unauthorized network intrusions may include (1) identifying a signal received by one or more antennas of a network from a transceiver of a device attempting to access the network, (2) detecting one or more signal strengths of the signal received by the antennas of the network in connection with the attempt to access the network, (3) determining, based at least in part on the signal strengths of the signal, that the attempt to access the network is potentially malicious, and then in response to determining that the attempt to access the network is potentially malicious, (4) initiating at least one security measure to address the potentially malicious attempt to access the network. Various other methods, systems, and computer-readable media are also disclosed. | 2016-05-26 |
20160149931 | Methods and Systems For Providing Comprehensive Cyber-Security Protection Using An Open Application Programming Interface Based Platform Solution - Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface. Integration standards for the application programming interface are provided to the third party providers, the integration standards specifying how the computer implemented cyber-security services can be integrated into the platform. First and second computer implemented cyber-security service that are provided by respective first and second of the third party providers are accepted into the platform, each of which is self-certified by the third party provider as being operable through the platform. The first and second computer implemented cyber-security services are then delivered to respective first and second of the customers through the platform. | 2016-05-26 |
20160149932 | MONITORING USE OF A SENSOR OF A COMPUTING DEVICE - Monitoring use of a sensor of a computing device. A sensor obtains information from an environment of the computing device. A co-processor provides functionality for the sensor, and at least one channel connects the co-processor to a central processing unit (CPU) of the computing device. Sensor data transmission is monitored over the at least one channel to determine when a transmission of data changes from a low data transmission mode to a high data transmission mode, and an alert is activated when the transmission of data is in the high data transmission mode. | 2016-05-26 |
20160149933 | COLLABORATIVE NETWORK SECURITY - Security is managed on a collaboration of plural computers that together define a trusted network environment. Each computer presents one or more real services and one or more spoof services which spoof real services on a subset of ports. At any one computer of the plural computers, unauthorized or suspicious activity from a device is detected at the subset of ports. A message is transmitted from the one computer to the plural computers on the network informing of the activity. In response to receiving one or more messages pertaining to the device, each computer individually changes its access rules to block the device. | 2016-05-26 |
20160149934 | ILLEGAL MESSAGE DESTROYER - A communication apparatus for preventing the broadcasting of unauthorised messages on a broadcast bus network, the communication apparatus comprising:
| 2016-05-26 |
20160149935 | DETERMINING A LEGITIMATE ACCESS POINT RESPONSE - A first request is sent from a station to an access point. The station receives a first response from the access point that includes a first sequence number, and stores the first sequence number. The station sends a second request to the access point and sets a waiting period for receiving a response from the access point. The station receives a second response from the access point and a third response from a second access point during the waiting period. The second response includes a second sequence number and the third response includes a third sequence number. The station determines that the second response is a legitimate response by comparing the second and third sequence numbers to the first sequence number. | 2016-05-26 |
20160149936 | METHOD AND SYSTEM FOR DETECTING THREATS USING PASSIVE CLUSTER MAPPING - An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature space to form a network map, generating a client signature at least by placing new client points in the map, setting a threshold, and generating an alarm if one or more client activity points exceed the threshold. In some embodiments, the network map and the client signature are updated using sliding windows and distance calculations. | 2016-05-26 |
20160149937 | SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION - There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection. | 2016-05-26 |
20160149938 | SYSTEM AND METHOD FOR REAL-TIME REMEDIATION RESPECTIVE OF SECURITY INCIDENTS - A system, an apparatus, and a method thereof identifies at least one security threat in an enterprise's network. The system characterizes sources affected by the security threat within the enterprise's network. The identification of the sources affected by the security threat is made based on the forensic data extracted by the system. The system then suspends the affected sources. The system also stores the affected sources in a separate memory to prevent execution thereof. | 2016-05-26 |
20160149939 | Detecting the Introduction of Alien Content - A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served. | 2016-05-26 |
20160149940 | METHOD AND SYSTEM TO MODIFY FUNCTION CALLS FROM WITHIN CONTENT PUBLISHED BY A TRUSTED WEB SITE - A network-based publication system, to publish data over a communications network, includes an interface to receive, via the communications network and from a first user, user data to be published by a network-based publication system. The publication system further includes a publisher component to generate publication data (e.g., an HTML document) including the user data and function modifying code. The publisher component generates the publication data in accordance with a publication format. The interface publishes the publication data via the communications network. The function modifying code is interpreted and executed, at a browser application, to disable (or modify) least one function of programming language supported by the browser application. | 2016-05-26 |
20160149941 | SECURITY LOG MINING DEVICES, METHODS, AND SYSTEMS - Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control system, features of structured and non-structured data associated with system access events for a number of users into a combined data set, generating, using an anomaly detection engine of the access control system, a model of behavior for the number of users based on the combined data set, and comparing, using the anomaly detection engine of the access control system, real time behavior for the number of users to the model for the number of users to determine whether the real time behavior for the number of users is anomalous behavior for the number of users. | 2016-05-26 |
20160149942 | Unauthorized/Malicious Redirection - Method(s) and apparatus are described for use in preventing unauthorised redirection and/or routing of packets transmitted in a communication network. Packets generated by one or more devices in the communications network are intercepted by an apparatus. The intercepted packets are inspected and it is detected whether at least one of the intercepted packets is associated with redirection based on an unauthorised destination. For each intercepted packet, packet and protocol inspection may be used to determine the originally intended destination of the packet and to determine any other destination(s) associated with redirection of the packet. For each intercepted packet, if the any other destination(s) are not associated with one or more authorised destinations corresponding to the originally intended destination, then the intercepted packet is associated with redirection to an unauthorised destination. Those detected intercepted packets associated with redirection based on the unauthorised destination are blocked or corrected. | 2016-05-26 |
20160149943 | SYSTEM AND METHOD FOR NETWORK DATA CHARACTERIZATION - Described herein are embodiments of a system and method for network data characterization and/or classification that overcome the defects of the prior art. These and other advantages are achieved by a method for network data characterization. The method includes receiving network events, wherein at least some of the events include content, converting the received content into data messages, in which at least some of the data messages include the content and metadata describing an event and the content, routing the data messages to a plurality of analyzers based on specified message criteria to which each analyzer subscribes, each of one or more analyzers that received the routed data messages analyzing the content within the data messages in order to characterize the content, in which the one or more analyzers include at least one machine-learning analyzer that classifies the content with a confidence percentage that indicates the probability that the content is malign or the confidence that a prediction that the content is malign is correct, outputting the characterization results of the one or more analyzers, and comparing the output characterization results against a plurality of criteria to determine subsequent action to take based on the characterization results. | 2016-05-26 |
20160149944 | Method For Intrusion Detection In Industrial Automation And Control System - A method and system for automatic signalling an alert when a possible intrusion occurs in an industrial automation and control system, based on security events which occur in the industrial automation and control system or are externally fed into the system. The method includes the steps of: (a) determining a correlation of a first and second security event and storing the correlation in an event database, wherein the correlation includes a probability that the first security event is followed by the second security event within a normalised time period, (b) identifying a candidate event as the first security event, based on event information of the candidate event, upon occurrence of the candidate event, (c) classifying the candidate event as anomalous when the probability exceeds a predetermined threshold and no second security event follows the candidate event within the normalised time period, and (d) signalling the alert indicating the candidate event. | 2016-05-26 |
20160149945 | DIGITAL DYE PACKS - Embodiments relate to systems and methods for providing digital dye packs in connection with a transaction via a device user interface. In an embodiment, a system includes a communication module of a remote server that interacts with a device that receives, from a user of the device, specific identifier information in connection with conducting a transaction with a recipient server; wherein the specific identifier information is associated with an alert of potential risk of the transaction. The system also includes a non-transitory memory comprising a database storing specific identifier information with corresponding actions that are executed based on the specific identifier information. The system further includes at least one hardware processor for executing an action in response to receiving corresponding identifier information associated with the alert of potential risk from the device in connection with the transaction. | 2016-05-26 |
20160149946 | PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION - A system and program product are described herein for various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, the techniques include detecting, via the processor, a read operation executed on a resource using an instrumentation mechanism and returning, via the processor, a malicious script in response to the read operation. The techniques also include detecting, via the processor, a write operation executed on the resource using the instrumentation mechanism and detecting, via the processor, a script operation executed by the malicious script that results in resource data being sent to an external computing device from a client device. Furthermore, the techniques include receiving, via the processor, metadata indicating the execution of the read operation, the write operation, and the script operation. | 2016-05-26 |
20160149947 | PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION - Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the processor, a read operation executed on a resource using an instrumentation mechanism and returning, via the processor, a malicious script in response to the read operation. The method also includes detecting, via the processor, a write operation executed on the resource using the instrumentation mechanism and detecting, via the processor, a script operation executed by the malicious script that results in resource data being sent to an external computing device from a client device. Furthermore, the method includes receiving, via the processor, metadata indicating the execution of the read operation, the write operation, and the script operation. | 2016-05-26 |
20160149948 | Automated Cyber Threat Mitigation Coordinator - Various computer systems and networks may benefit from an automated cyber threat mitigation coordinator. A related method can include receiving, at a server, data from at least one first sensor or tool. The data can be configured to inform the server of an actual or potential threat to at least one computer system or network. The method can also include processing, by the server, the data to determine at least one confirmation action to be taken with respect to the data. The method can further include performing, at the server, the determined confirmation action. The action can include communicating with at least one second sensor or tool. The method can additionally include receiving, at the server, a response to the communicating with the at least one second sensor or tool. The method can also include generating and outputting consolidated data to a user of the server, based on the response. | 2016-05-26 |
20160149949 | SYSTEMS, DEVICES, AND METHODS FOR IMPROVED NETWORK SECURITY - Embodiments relate to systems, devices, and computing-implemented methods for providing DoS mitigation using a list of persistent clients generated using network flow data. Daily flow counts can be incremented once per date for unique flow combinations in the network flow data that are associated with at least one network interaction that occurred on that date. A candidate list of persistent clients can be created based on the daily flow counts, and the candidate list of persistent clients can be filtered and ranked, and the list of persistent clients can be selected based on the rankings. | 2016-05-26 |
20160149950 | DYNAMIC SECURITY SANDBOXING BASED ON INTRUDER INTENT - A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices. | 2016-05-26 |
20160149951 | SECURE TRANSMISSION METHOD AND SYSTEM - A secure transmission method and system that can reduce the channel capacity of an eavesdropper even in an environment in which there is no direct path between a source and a destination. In the secure transmission method, all of a plurality of relays between a source and a destination receive a transmission signal including first artificial noise from the source, and decode the transmission signal. All the relays forward decoded signals to the destination. The source outputs second artificial noise while all the relays are forwarding the decoded signals to the destination. The second artificial noise is received only by an eavesdropper. | 2016-05-26 |
20160149952 | NETWORK-BASED SECURE INPUT/OUTPUT (I/O) MODULE (SIOM) - A Secure Input/Output (I/O) Module (SIOM) is networked-enabled providing secure communications with terminals and peripherals integrated into the terminals. Communications between devices are securely made through encrypted communication sessions provisioned, defined, and managed through a secure protocol using the network-based SIOM. In an embodiment, a single-tenant network-based SIOM is provided. In an embodiment, a hybrid dual single-tenant and multi-tenant network-based SIOM is provided. In an embodiment, a multi-tenant network-based SIOM is provided. In an embodiment, a cloud-based SIOM is provided. | 2016-05-26 |
20160149953 | CLIENT/SERVER POLYMORPHISM USING POLYMORPHIC HOOKS - Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server computers through an intermediary computer using one or more polymorphic protocols. In an embodiment, a computer system comprises a memory; a processor coupled to the memory; a processor logic coupled to the processor and the memory, and configured to: intercept, from a server computer, a first file and a second file, wherein the first file defines a first object with a first identifier and the second file comprises a reference to the first object by the first identifier; generate a second identifier; replace the first identifier with the second identifier in the first file; add one or more first instructions to the first file; remove the reference to the first identifier from the second file; add, to the second file, one or more second instructions, which when executed cause the one or more first instructions to be executed and produce the second identifier. | 2016-05-26 |
20160149954 | SECURE DATA REDACTION AND MASKING IN INTERCEPTED DATA INTERACTIONS - A system, and computer program product for modifying intercepted data interactions are provided in the illustrative embodiments. At a security application executing in a security data processing system, an intercepted packet of data arranged according to a protocol is received from an intercepting agent executing in an intercepting data processing system. A security policy is applied to the intercepted packet. In an instruction according to a coding grammar, a modification of the intercepted packet is encoded. The instruction is suited for the encoding under a circumstance of the modifying. The instruction is sent to the intercepting agent. The intercepting agent at the intercepting data processing system performs the modification according to the security policy and independently of the protocol. | 2016-05-26 |
20160149955 | COMMUNICATIONS SECURITY SYSTEMS - A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client computer receives one or more security policies relating to the web server. A client application examines the client computer and preferably configures one or more aspects of the client computer in order to make it comply with the security policies. Once the web server receives the results of this examination and/or configuration process, it can determine whether the secure communications are to be established and whether any restrictions need to be placed on this communication and/or the activity conducted via the communication. | 2016-05-26 |
20160149956 | MEDIA MANAGEMENT AND SHARING SYSTEM - The distribution of media clips stored on one or more servers is controlled using updateable permissions or rules defined by a content owner. The clip is made available from a server via a website, app or other source, for an end-user to view; the permissions or rules stored in memory are then updated; the permissions or rules are reviewed before the clip is subsequently made available, to ensure that any streaming or other distribution of the clip is in compliance with any updated permissions or rules. | 2016-05-26 |
20160149957 | SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES - A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module configured to detect the launch or request to access a network by an application. A workstation application server receives data associated with the application from the workstation. The application server module can determine one or more policies or categories to associate with the application by referencing an application inventory database. Once the application server module has the category or policy, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the application to control network access by the application. | 2016-05-26 |
20160149958 | SHARING DATA ACROSS PROFILES - Systems, methods, and software can be used to share data across profiles. In some aspects, a first request from a first application for application data associated with a second application is received at a first hybrid agent. The first application and the first hybrid agent are associated with a first profile on a mobile device. The second application is associated with a second profile. A second request for the application data is sent to a second hybrid agent. The second hybrid agent is associated with the second profile. The application data from the second hybrid agent is received from the second hybrid agent. The application data is sent to the first application. The application data is used by the first application to generate a graphical interface for presentation on the mobile device. The graphical interface includes a unified view of data associated with the first and second profiles. | 2016-05-26 |
20160149959 | Controlling a PBX Phone Call Via a Client Application - In one or more embodiments, a hit test thread which is separate from the main thread, e.g. the user interface thread, is utilized for hit testing on web content. Using a separate thread for hit testing can allow targets to be quickly ascertained. In cases where the appropriate response is handled by a separate thread, such as a manipulation thread that can be used for touch manipulations such as panning and pinch zooming, manipulation can occur without blocking on the main thread. This results in the response time that is consistently quick even on low-end hardware over a variety of scenarios. | 2016-05-26 |
20160149960 | INFORMATION PROCESSING APPARATUS AND DETERMINATION RESULT PROVIDING METHOD - An information processing apparatus includes a determination unit configured to determine whether a first communication port used by a first communication protocol is available and whether a second communication port used by a second communication protocol is available; and a determination result display unit configured to display a determination result for the first communication port and a determination result for the second communication port individually on a display unit. | 2016-05-26 |
20160149961 | ADAPTIVE VOICE COMMUNICATION SYSTEM AND METHOD BASED ON HYPERTEXT TRANSPORT PROTOCOL - A system and method of performing voice communication over a hypertext transport protocol (HTTP)-based network. The adaptive voice communication system includes a web server configured to issue a session identifier (ID), a talk transmission uniform resource locator (URL), and a talk reception URL and transmit an HTTP response in response to an HTTP request and a web client configured to transmit the HTTP request and transmit or receive voice information by using the issued talk transmission URL and talk reception URL. | 2016-05-26 |
20160149962 | APPARATUS, SYSTEM, AND METHOD OF DETERMINING DESTINATION FOR STATE INFORMATION, AND RECORDING MEDIUM - A control system includes a plurality of control apparatuses each capable of controlling a first communication terminal connected to the control apparatus. Each control apparatus transmits search information including terminal identification information for identifying a second communication terminal to other control apparatuses of the plurality of control apparatuses, searches for one of the other control apparatuses that is connected to the second communication terminal based on responses that are transmitted from the other control apparatuses in response to the search information, and transmits state information indicating a state of the first communication terminal connected to the control apparatus to the searched control apparatus connected to the second communication terminal. | 2016-05-26 |
20160149963 | APPARATUS, SYSTEM, AND METHOD OF CONTROLLING SESSION, AND RECORDING MEDIUM - A control apparatus determines one of a plurality of relay devices as a representative relay device to manage a relay destination of content data in a session to be established. In response to receiving a request for starting relay of content data, from a communication terminal, the control apparatus transmits, with a request for starting relay of content data, relay device identification information for identifying the representative relay device to a relay device connected to the communication terminal, to cause the relay device to further transmit the request for starting relay of content data to the representative relay device identified with the relay device identification information of the representative relay device. | 2016-05-26 |
20160149964 | APPARATUS AND METHOD FOR COMMUNICATIONS INVOLVING A LEGACY DEVICE - A gateway receives a message from a first terminal to establish a connection between the first terminal and a second terminal. The gateway sends a second message to the second terminal to offer a connection. After receiving the first message from the first terminal, the gateway receives subsequent third messages from the first terminal that identify candidates for assisting in the formation of the connection. The gateway saves information about these candidates. The gateway either uses such information for facilitating the formation of the connection or forwards that information to the second communication terminal after receiving an answer accepting the establishment of a connection from the second terminal and determining whether the second terminal has a WebRTC client. | 2016-05-26 |
20160149965 | Methods and Apparatus for Implementing a Communication Barring Service - A method of implementing a Communication Barring, CB, service within an IP Multimedia Subsystem, IMS, network in respect of an ongoing IMS session or an IMS session in early session phase. The method comprises, at an Application Sever, AS, within the IMS network, parsing SIP messages relating to the session to detect an attempt to add one or more media streams to the session. CB service rules are applied to determine the allowability of the media stream(s) being added. If the media stream(s) being added is (are) not allowed, action is taken to prevent its addition, and otherwise allowing the media stream addition to proceed. | 2016-05-26 |
20160149966 | SEAMLESS MOVEMENT OF ACTIVE MEDIA SESSIONS BETWEEN TWINNED COMMUNICATION DEVICES - A softphone application is provided that facilitates device switching between devices twinned therewith. In an aspect, a first device employing the softphone application generates a request to switch a media session between a second device and a third device to be between the first device and the third device and the softphone application sends, the request to an application server device associated with a cellular service provider identity. The request comprises a first identifier for the first device, a second identifier for the second device, and a device switch indicator. The request is configured to initiate a switch of the media session to being between the first device and the third device based on a determination that the first device and the second device are associated with a common mobile subscriber identity registered for an account associated with the cellular service provider identity. | 2016-05-26 |
20160149967 | MESSAGING FOR EVENT LIVE-STREAM - A messaging system for a live event is described. A processing device presents a live event having at least one participant. The processing device presents one or more participant messages within a native messaging interface associated with the event. The processing device also presents one or more viewer messages within the native messaging interface. The viewer messages are integrated with the participant messages and the viewer messages are entered via a non-native messaging interface. | 2016-05-26 |
20160149968 | Queued Sharing of Content in Online Conferencing - In one embodiment, a method includes sharing first content from a first computer of a first participant in an online conference. The first content is shared on a second display of a second computer of a second participant in the online conference. During the sharing of the first content, third content from a third computer of a third participant is queued in a queue at the second computer without display on the second display. For a transition from the first participant to the third participant in the online conference, the third content is shared on the second display of the second computer from the queue. | 2016-05-26 |
20160149969 | MULTI-DEVICE COLLABORATION - Aspects of the present invention relate generally to a method of automatically selecting a collaboration mechanism for content to be shared between a source computing device and a destination computing device. The collaboration mechanism may be one of multiple collaboration mechanisms available to a collaboration application. Aspects of the present invention can automatically select the collaboration mechanism that is optimized for the present network conditions, hardware conditions, and quality requirements to share the selected content. Many of the network and processing conditions utilized by aspects of the present invention are not readily available or discernible by a user selecting a method. | 2016-05-26 |
20160149970 | DISTRIBUTED PROGRAMMABLE CONNECTION METHOD TO ESTABLISH PEER-TO-PEER MULTIMEDIA INTERACTIONS - The present invention proposes a technique for establishing peer-to-peer multimedia interactions and data exchanges via a discovery mechanism which relies on a model of (chained) programmable switchboards which may be implemented to enable a step-by-step discovery process until the endpoint of the communication chain is actually reached. The novelty of the proposed system and distinct contrast to known systems is that each endpoint can actually program if, how and when it wants to be reached for each individual user initiating contact, and to provide the information on how to be reached to its potential users initiating contact along its own model. | 2016-05-26 |
20160149971 | INFORMATION MANAGEMENT CHANGE DEPLOYMENT SYSTEM - A method for managing information relating to a change deployment in order to communicate some or all the information to a plurality of users includes providing an interface to users at workstations accessible by the users, receiving information comprising a plurality of messages from users communicating via the workstations during a change deployment session, initiating display of at least one of the messages to the users via the interface, initiating display of task data to the users via the interface, the task data corresponding to at least one task necessary for completing the change deployment, logging event data related to a plurality of events associated with the change deployment conference session, the event data comprising task status data indicating the status of the at least one task necessary for completing the change deployment, and initiating display of at least some of the event data to the users via the interface. | 2016-05-26 |
20160149972 | INFORMATION MANAGEMENT CHANGE DEPLOYMENT SYSTEM - A method for managing information relating to a change deployment in order to communicate some or all the information to a plurality of users includes providing an interface to users at workstations accessible by the users, receiving information comprising a plurality of messages from users communicating via the workstations during a change deployment session, initiating display of at least one of the messages to the users via the interface, initiating display of task data to the users via the interface, the task data corresponding to at least one task necessary for completing the change deployment, logging event data related to a plurality of events associated with the change deployment conference session, the event data comprising task status data indicating the status of the at least one task necessary for completing the change deployment, and initiating display of at least some of the event data to the users via the interface. | 2016-05-26 |
20160149973 | INFORMATION MANAGEMENT DETAILED TASK SCHEDULER SYSTEM - A method for managing information relating to a deployment of changes in order to communicate some or all the information to users includes providing an interface to a plurality of users at a plurality of workstations accessible by one or more of the users, receiving information comprising initiative data corresponding to each of the plurality of changes, the initiative data comprising data relating to a plurality of parameters corresponding to each of the plurality of changes, initiating display of some or all the initiative data corresponding to some or all the plurality of changes, logging event data related to a plurality of events associated with the deployment of the plurality of changes, the event data comprising change status data indicating a status of at least one of the plurality of changes, and initiating display of at least some of the event data to the users via the interface. | 2016-05-26 |
20160149974 | INFORMATION MANAGEMENT DETAILED TASK SCHEDULER SYSTEM - A method for managing information relating to a deployment of changes in order to communicate some or all the information to users includes providing an interface to a plurality of users at a plurality of workstations accessible by one or more of the users, receiving information comprising initiative data corresponding to each of the plurality of changes, the initiative data comprising data relating to a plurality of parameters corresponding to each of the plurality of changes, initiating display of some or all the initiative data corresponding to some or all the plurality of changes, logging event data related to a plurality of events associated with the deployment of the plurality of changes, the event data comprising change status data indicating a status of at least one of the plurality of changes, and initiating display of at least some of the event data to the users via the interface. | 2016-05-26 |
20160149975 | WIDE AREA AGGREGATED COMMUNICATIONS - Methods, systems, and techniques for federating operations, in an optimized way using wide area networks are provided. Example systems provide an API for generating and handling federated requests as an aggregation. In one example Wide Area Network Aggregation System, WANAS provides an API, a connection manager, and connection iterators to manage inter-site connections and requests, and inter-pod requests and messaging. These components cooperate to distribute a task across multiple physically disparate sites using a representative connection to the site and fan out of requests to other pods within the site. | 2016-05-26 |
20160149976 | ELECTRONIC INFORMATION TERMINAL, IMAGE PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - An electronic information terminal includes a transmission storage unit that stores stroke data to be transferred temporarily, a network status management unit that detects and manages a status of a communication network to which the electronic information terminal is connected, and a transmitter that transfers the stroke data read from the transmission storage unit to an image processing apparatus via the communication network in accordance with the status of the communication network detected by the network status management unit. | 2016-05-26 |
20160149977 | System and Method of Video Streaming - A method and system wherein a user can log in to a cloud based server using a selected communications device. Upon log in, a selected plurality of video cameras is activated to simultaneously provide streaming video from each of the cameras to a second cloud based server. Upon designation of a member of the plurality, the designated camera streams video to the user's communications device, and streaming from all other members of the plurality is terminated. | 2016-05-26 |
20160149978 | STREAMING OF SEGMENTED CONTENT - Methods and systems for enabling streaming of segmented content from a content delivery network to an adaptive streaming client on the basis of a manifest file are described wherein the said manifest file may comprise one or more segment identifiers. The method may comprise: selecting at least one segment identifier from said manifest file, said identifier identifying a segment that has not been requested by said client; and, sending pre-announce information to said content delivery network for announcing in advance that said segment may be requested by said client, said pre-announce information comprising said at least one segment identifier, said pre-announce information being further arranged for triggering said content delivery network to ensure availability of said segment upon receiving said request. | 2016-05-26 |
20160149979 | INTERWORKING BETWEEN FIRST PROTOCOL ENTITY OF STREAM RESERVATION PROTOCOL AND SECOND PROTOCOL ENTITY OF ROUTING PROTOCOL - A method for interworking between a first protocol entity ( | 2016-05-26 |
20160149980 | CONTENT DISTRIBUTION SYSTEM AND METHOD - There are described methods and systems for distributing content in a network, in particular a multicast network. One method includes delivering content from a source to a destination in a content delivery network. A request for an item of content is received and a first multicast stream is identified or established, the first multicast stream comprising a first copy of the content. At least one second multicast stream is also identified or established, the second stream comprising a second copy of the content. The second copy of the content is time-shifted by a time, M, from corresponding portions of the first copy of the content. The content is then delivered to the destination using both the first and the second multicast streams. | 2016-05-26 |
20160149981 | Systems, Methods, and Media for Controlling Delivery of Content - Methods, systems, and computer readable media for controlling delivery of content are provided. In some embodiments, a system for controlling delivery of content is provided. The system includes processing circuitry configured to: transmit, to a server, a plurality of requests for blocks of the content; while at least some of the plurality of requests are still outstanding: detect a change of a service characteristic of a connection between the system and the server; determine a preferred number of outstanding requests; and cancel at least some of the requests from the plurality that are still outstanding based on the preferred number and a count of the requests from the plurality that are still outstanding. | 2016-05-26 |
20160149982 | DYNAMIC RESIZABLE MEDIA ITEM PLAYER - Described herein is a method for managing media item playback. A method includes receiving a media request to play a media item via a first user interface (UI) on a mobile device. The method further includes causing a media player in a second UI to play the media item. The method also includes displaying a representation of the media item in a first portion of the first UI, the first portion of the first UI being associated with the media player in the second UI. The method includes receiving, via a second portion of the first UI, an activity request to perform an activity that is independent of the viewing of the media item. The method further includes and presenting content associated with the requested activity in the first UI while continuing to display, in the first portion of the first UI, the representation of the media item played in the media player in the second UI. | 2016-05-26 |
20160149983 | METHOD AND APPARATUS FOR PROVIDING ENHANCED STREAMING CONTENT DELIVERY WITH MULTI-ARCHIVE SUPPORT USING SECURE DOWNLOAD MANAGER AND CONTENT-INDIFFERENT DECODING - A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically fetched, material specific, data handlers (e.g., download assistants). A download assistant fetches a data stream from a remote location and processes the streamed data iteratively using buffers and multi-threaded processes through the decoder (e.g., codec), allowing source material-specific processing of the data as it is streamed from one or more download sources as well as content-indifferent and platform-indifferent decoding. To minimize versioning issues, payload construction for secure delivery is simplified to packing and encrypting a directory tree containing any number of files or other digital media into an archive and, when needed, dividing a payload into multiple files or archives with a descriptor that lists the archives. | 2016-05-26 |
20160149984 | METHOD AND SYSTEM FOR PROVIDING REMOTE TRANSCODING OF MEDIA DATA ON A VOIP SYSTEM - Techniques for providing remote transcoding of call media data on a communications network are disclosed. The techniques include a communication module receiving a call request from a first communication device, transmitting a call invite to a second communication device, receiving a response from the second communication device, determining a first media encoding requirement for media transmitted to the first communication device and a second media encoding requirement for media transmitted to the second communication device, and transmitting information regarding the first communication device, the second communication device, the first media encoding requirement, and the second media encoding requirement to a transcoding module operating on a computer server. The techniques include the transcoding module receiving first call media data from the first communication device, transcoding the first call media data, and transmitting the transcoded first call media data to the second communication device. | 2016-05-26 |
20160149985 | SYSTEM AND METHOD FOR END-TO-END RTCP - Systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol (RTCP) to obtain end-to-end session information. The system receives an RTCP extension that is associated with an RTCP packet in a communication session. The RTCP extension may include an instruction for transmitting RTCP data based on a triggering event. The RTCP extension can be configured to propagate along the communication session. Next, in response to the triggering event, the system can transmit the RTCP data to an address defined by the instruction as a destination address for receiving information associated with the triggering event. | 2016-05-26 |
20160149986 | Method Of Retrieving Service Capability in Bulk - A method of retrieving service capability in bulk is provided. The method includes a client sending a request to create a group of contacts whose service capability is desired to an application server. The application server sends a response to the client indicating that the group of contacts has been created. The client then sends a request to retrieve the service capability of each of the contacts within the group to the application server. The application server sends a response identifying the service capability of each of the contacts within the group to the client. | 2016-05-26 |
20160149987 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR AUTOMATIC GENERATION OF PROGRAMMING-LANGUAGE-NEUTRAL REPRESENTATION OF WEB APPLICATION PROTOCOL INTERACTIONS THAT IMPLEMENT NETWORK TEST - The subject matter described herein includes methods, systems, and computer readable media for generating a programming-language-neutral representation of web application protocol interactions that implement a network test. One method includes receiving, at a web server, test configuration information for configuring a test for testing at least one network device. The method further includes generating, based on the test configuration information a programming-language-neutral representation of web application protocol interactions that implement the test. The method further includes outputting the representation of the web application protocol interactions to a user or to a translator for translation into at least one target programming language. | 2016-05-26 |
20160149988 | PERSISTENT USER PERSONALIZATION - A system and method for facilitating personalization of one or more multi-instance software applications in a networked enterprise computing environment. An example method includes providing a first user option to specify one or more adjustments to a rendering of a software application; identifying one or more servers that are employed to obtain content for the rendering; and selectively providing information specifying the one or more adjustments to the one or more servers, such that the one or more adjustments appear in a rendering provided when a user accesses the software application from any of the one or more servers. In a more specific embodiment, the information specifying the one or more adjustments to the one or more servers include customization metadata (also called personalization metadata) stored on a first server, called the gateway server. | 2016-05-26 |
20160149989 | METHOD FOR TRANSFERRING DATA BETWEEN AN ELECTRICAL MEASURING DEVICE AND A CONTROL COMPUTER - The invention relates to a method for transferring data between an electrical measuring device ( | 2016-05-26 |
20160149990 | Method, Device and System for Controlling Web Page Access - A method, device and system for controlling web page access. The method includes receiving an access request message of a user, obtaining an Internet access account of the user according to the access request message, obtaining a corresponding user rank identifier according to the Internet access account, and sending the access request message with the user rank identifier to a content provider server, so that the content provider server returns corresponding web page information to the user according to the user rank identifier. | 2016-05-26 |
20160149991 | BULK UPLOAD OF COLLABORATIVE DOCUMENTS TO AN ONLINE DOCUMENT MANAGEMENT SYSTEM - Embodiments describe bulk upload capabilities from a computing device to an online document management system utilizing a batch file. In one embodiment, a computing device identifies a local folder and a batch file in the local folder that defines a plurality of files to upload to the management system. The computing device parses the batch file to identify a local file in the local folder, and parses the batch file to identify a remote folder at the management system for storing a remote copy of the local file. The computing device parses the batch file to identify metadata assigned to the local file, transmits a first Remote Procedure Call (RPC) request to the management system to upload the local file to the remote folder, and transmits a second RPC request to the management system to assign the metadata to the remote copy of the local file. | 2016-05-26 |
20160149992 | ELECTRONIC DEVICE AND METHOD FOR DOWNLOADING FILE - A method for downloading a file from a server device using a client device. The client device includes a plurality of electronic devices. The method includes sending a file downloading request to the server device from one of the electronic devices, and sending an assist request to each of the other electronic devices of the client device, thus, enabling each of the electronic devices to receive a segment of the file from the server device. A complete file can be generated according to the segments of the file from the server device received by the electronic devices. | 2016-05-26 |
20160149993 | COOPERATIVE NETWORK ARCHITECTURE - A method for transmitting information relating to a communication network, implemented by a first server of a communication network, the method comprising the following steps: storing a data table matching identifiers of subnetworks of the communication network associated with respective qualities of service, with at least one network address of a user terminal, the network address comprising an IP address of the user terminal; receiving a request from a second server of a service provider, the request requesting information linked to said communication network; transmitting at least a part of the data table to the second server, the part comprising the matches between each subnetwork identifier and the at least one network address of a user terminal. | 2016-05-26 |
20160149994 | TRANSMITTING APPARATUS, TRANSMITTING METHOD, RECEIVING APPARATUS AND RECEIVING METHOD - A transmission stream is generated. In the transmission stream, a first transmission packet where transmission media is included in a payload and a second transmission packet where information relating to the transmission media is included in the payload are time division multiplexed. The transmission stream is transmitted to a receiving side through a predetermined transmission path. If the transmission media included in the payload of the first transmission packet is file data configuring the predetermined contents, information relating to the predetermined contents is inserted into a header thereof. At the receiving side, the first transmission packet including the file data configuring the predetermined contents can be acquired easily and accurately based on the information. | 2016-05-26 |
20160149995 | Transfer and synchronization of media data - Improved methods and systems that facilitate transfer and synchronization of data, namely, media data, between a host device (e.g., host computer) and a portable media device (e.g., portable media player) are disclosed. By coupling the portable media device to different host devices at different times, media data can be transferred between the different host devices. Synchronization of media data between a host device and a portable media device can also take into consideration one or more user synchronization related settings. | 2016-05-26 |
20160149996 | SYSTEM FOR DIAGNOSIS OF ROBOT STATE - A robot data transfer method includes the step of collecting data from each of a plurality of robots in a multi-robot production facility in real-time. The data collected from the robots is then transferred in real-time from a controller of each of the robots to a first data collection device. Within the first data collection device, the data is buffered using a multi-segment queueing mechanism. The queueing mechanism is configured with a retention policy. The data is then transferred to a second data collection device based on the retention policy of the queueing mechanism of the first data collection device. The second data collection device analyzes the data and determines whether maintenance or optimization is necessary for any of the robots. | 2016-05-26 |
20160149997 | METHOD FOR WEB SITE PUBLISHING USING SHARED HOSTING - A method for publishing the web sites on remote server using shared hosting in cases of unexpected server timeouts. A list of elements (work items) to be published is generated. The list is sorted out according to dependencies of elements from one another. Then, the work items are sorted out by the priority. The work item from the top of the list (with the highest priority) is processed first. After the work is performed with this work item, the work item is marked as closed if the process has executed successfully. Then, the process moves to the next work item and so on. The process has a library of the work items. Thus, in case of a server timeout, the process knows exactly which work items have been processed prior to the timeout and can start the processing from the next work item. | 2016-05-26 |
20160149998 | FEDERATED UPTAKE THROTTLING - In a first enterprise joined in a distributed, federated network of second enterprises, a system is provided for managing data flow between enterprises, the system including a data management server in the first enterprise having access to sets of rules for managing data flow to and from the first enterprise, a first data interface in the first enterprise dedicated to data transfer to a paired second dedicated data interface at a neighboring second enterprise in the federation, wherein the first data interface manages data sent to the second interface and/or data incoming from the second interface according to the sets of rules for managing data flow. | 2016-05-26 |
20160149999 | Downloadable Cartridges for a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for downloadable cartridges for a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes parsing a cartridge manifest corresponding to a cartridge to determine a source location of files of the cartridge and causing the files of the cartridge to be obtained from the determined source location for use by at least one node of a multi-tenant PaaS system. | 2016-05-26 |
20160150000 | LOAD-BALANCING CLUSTER - A load-balancing cluster includes a switch having a plurality of ports; and a plurality of servers connected to at least some of the plurality of ports of the switch. Each server is addressable by the same virtual Internet Protocol (VIP) address. Each server in the cluster has a mechanism constructed and adapted to respond to connection requests at the VIP by selecting one of the plurality of servers to handle that connection, wherein the selecting is based, at least in part, on a given function of information used to request the connection; and a firewall mechanism constructed and adapted to accept all requests for the VIP address for a particular connection only on the server that has been selected to handle that particular connection. The selected server determines whether it is responsible for the request and may hand it off to another cluster member. | 2016-05-26 |
20160150001 | Method and Apparatus for Data Transmission - A data transmission method and apparatus avoids uneven loading of stored data, supports allocation of storage spaces with load balancing, and supports fast access to data. The method may include receiving, by a distributed storage system, data and a corresponding data key sent by a client. Nodes are allocated to the data according to load conditions of nodes in the distributed storage system. The data is stored in the corresponding nodes. A constructed key is generated for the data, which includes the data key and node routing information corresponding to a location where the data is stored. The constructed key is returned to the client. The client uses the constructed key to acquire the stored data. The distributed storage system receives the constructed key, retrieves the stored data based on the routing information in the constructed key and sends the data to the client. | 2016-05-26 |
20160150002 | Cross-Platform Scheduling with Long-Term Fairness and Platform-Specific Optimization - Methods, systems, and computer program products for cross-platform scheduling with fairness and platform-specific optimization are provided herein. A method includes determining dimensions of a set of containers in which multiple tasks associated with a request are to be executed; assigning each of the containers to a processing node on one of multiple platforms based on the dimensions of the given container, and to a platform owner selected from the multiple platforms based on a comparison of resource requirements of each of the multiple platforms and the dimensions of the given container; and generating container assignments across the set of containers by incorporating the assigned node of each container in the set of containers, the assigned platform owner of each container in the set of containers, one or more scheduling requirements of each of the platforms, one or more utilization objectives, and enforcing a sharing guarantee of each of the platforms. | 2016-05-26 |
20160150003 | WORKLOAD SELECTION AND CACHE CAPACITY PLANNING FOR A VIRTUAL STORAGE AREA NETWORK - Exemplary methods, apparatuses, and systems receive characteristics of a plurality of input/output (I/O) requests from a workload, including logical address distance values between I/O requests and data lengths of the plurality of I/O requests. Based upon the characteristics, a data length value representative of the data lengths of the plurality of I/O requests is determined and an access pattern of the plurality of I/O requests is determined. A notification that the first workload is suitable for a virtual storage area network environment is generated based upon the characteristics. The first workload is selected as suitable in response to determining the data length value for the data lengths of the plurality of I/O requests is less than a data length threshold and/or the access pattern of the plurality of I/O requests is more random than an access pattern threshold on the spectrum from random access to sequential access. | 2016-05-26 |
20160150004 | Integrity Check of DNS Server Setting - There are provided measures for enabling/realizing an integrity check of a DNS server setting, thereby enabling/realizing detection of DNS hacking or hijacking. Such measures could exemplarily include triggering a DNS resolution operation by a service device configured to provide a service using the DNS server setting, wherein the DNS server setting is used for DNS resolution or DNS forwarding in service provisioning, acquiring the IP address of a DNS server device, which is configured to perform DNS resolution in service provisioning, by reading the IP address of the DNS server device included in a DNS message as part of the triggered DNS resolution operation by the service device, and processing the acquired IP address of the DNS server device for evaluating integrity of the DNS server setting used in service provisioning. | 2016-05-26 |
20160150005 | The Managed Peer-To-Peer Sharing in Cellular Networks - A method, system and apparatus are provided for performing peer-to-peer (P2P) data sharing operations between user equipment (UE) devices in a wireless-enabled communications environment. A first client node comprises content data and operates in a server peer mode to provide content data. A second client node submits a request to a P2P application server (P2P AS) for the content data. In response, the P2P AS provides the address of the first client node to the second client node. The second client node then uses the provided address to submit a request to the first client node to provide the content data. The first client node accepts the request and then provides the content data to the second client node. | 2016-05-26 |
20160150006 | DEVICE DATA TRANSFER VIA A WIRELESS INTERFACE - Mobile device data transfer via a wireless network is disclosed. A data manager component (DMC) on a carrier-side of an air interface can receive a request for data from a device located on a client-side of the air interface. The DMC can collect data related to the data request. Data can be collected by the DMC from remotely located servers. The collected data can be parsed to facilitate determining additional data that can be collected based on the request for data. The collected data and additional data can be bundled and returned via the air interface to the device on the client-side. Bundling the collected data and additional data can be in accord with an IND scheme, an ONLD scheme, a PARCEL(X) scheme, etc. This can improve load times associate with the requested data and can also reduce power consumption associated with the data transfer over the air interface. | 2016-05-26 |
20160150007 | OPTIMIZING RESOURCE DOWNLOADS OR STREAMS USING A COLLECTION OF TRUSTED NETWORK CONNECTED ENDPOINTS - In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints. | 2016-05-26 |
20160150008 | CLOCK SYNCHRONIZATION USING WIFI BEACONS - Provided are methods and systems for synchronizing clocks between data modules operating in parallel on an access point using Wi-Fi beacons as a reference. The methods and systems are designed to achieve and maintain highly accurate synchronization (e.g., <20 microseconds (μs)) between different modules by utilizing Wi-Fi beacons generated by the access point as a reference when estimating rendering time. Using such Wi-Fi beacons as a reference only, and not as the actual clock, ensures that all of the data modules' clocks remain synchronized, thus allowing for coherent rendering of data across all modules included in the system. | 2016-05-26 |
20160150009 | ACTIONABLE SOUVENIR FROM REAL-TIME SHARING - A souvenir is provided to enable participants in a real-time sharing session to retain access to the shared content and experiences when the real-time sharing is completed in a fully actionable manner in which all of the functionality and interactivity of the content and experiences are maintained as when they were originally shared. Each of the sharing participants can get a souvenir that can be used to initiate access to the shared content such as a photo or replay an experience such as a telling of a bedtime story. In cases where user generated content (UGC) such as mark-ups, annotations, commentary, content links, highlights, animations, graphics, drawings, directions, points-of-interest, etc., were part of the real-time sharing session—for example, an annotated webpage, a marked-up map, voice commentary over a video recording of a live event, etc.—such UGC can be maintained as part of the post-sharing actionable souvenir experience too. | 2016-05-26 |
20160150010 | INFORMATION PROCESSING APPARATUS, DATA SAVE METHOD, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus includes a memory; and a processor coupled to the memory and configured to: receive first data from a client device; determine whether the information processing apparatus is a master device that is to store the first data, by referring to assignment information indicating a correspondence relationship between a range of a hash value and a storage destination; store the first data when it is determined that the information processing apparatus is the master device; identify a replica device that is to store a replica of the first data; transmit the replica of the first data to the identified replica device; identify a first information processing device used as the master device when it is determined that the information processing apparatus is not the master device; transmit the first data to the identified first information processing device; and store the replica of the first data. | 2016-05-26 |
20160150011 | MEDIA OUTPUT DEVICE TO TRANSMIT AND SYNCHRONIZE PLAYBACK OF A MEDIA CONTENT STREAM THAT IS RECEIVED OVER A POINT-TO-POINT CONNECTION ON MULTIPLE INTERCONNECTED DEVICES - Examples described herein provide for a media output device to transmit and synchronize playback of a media content stream that is received over a point-to-point connection on multiple interconnected devices at one time. | 2016-05-26 |
20160150012 | CONTENT-BASED REPLICATION OF DATA BETWEEN STORAGE UNITS - Methods, systems, and computer programs are presented for replicating data across storage systems. One method includes an operation for transferring a snapshot of a volume from an upstream array to a downstream array. The method further includes an operation for comparing an upstream snapshot checksum of the snapshot in the upstream array with a downstream snapshot checksum of the snapshot in the downstream array. When the upstream snapshot checksum is different from the downstream snapshot checksum, a plurality of chunks in the snapshot are defined. Further, for each chunk in the snapshot, a comparison is made of an upstream chunk checksum calculated by the upstream array with a downstream chunk checksum calculated by the downstream array. When the upstream chunk checksum is different from the downstream chunk checksum then the data of the chunk is sent from the upstream array to the downstream array. | 2016-05-26 |
20160150013 | PROVISIONAL EXECUTION OF DYNAMIC CONTENT COMPONENT - Expediting content delivery is disclosed. A request for content is received from a requestor. A cached component of the requested content that includes at least some cached executable content is identified. The cached component of the requested content is provided to the requestor for provisional execution. It is determined whether a change, if any, in the requested content may invalidate the provisional execution; and | 2016-05-26 |
20160150014 | DATA STORAGE DESTINATION - In one example, a computing apparatus is configured to receive at least one contextual parameter. The computing apparatus is configured to receive an action from the user of the apparatus for a data item. The computing apparatus is configured to associate the at least one contextual parameter to the data item so as to establish a tag. The tag is configured to determine two or more data storage destinations of the data item. The computing apparatus is configured to output the suggested two or more data storage destinations of the data item for the user. One of the two or more data storage destinations is highlighted according to the tag. The data item destination may be automatically or manually selected to the appropriate data destination. | 2016-05-26 |
20160150015 | METHODS FOR INTEGRATING APPLICATIONS WITH A DATA STORAGE NETWORK AND DEVICES THEREOF - A method, non-transitory computer readable medium, and application server computing device that receives a request identifying an operation to be performed on an application and a plugin associated with the application. The operation corresponds to an application task in a workflow for a data storage network action. An operating system call is generated to execute the plugin, wherein the call comprises at least one argument that identifies the operation. A standard-out output is obtained from the plugin, wherein the output comprises at least an indication of a status of the operation. The output is parsed, a result object is generated based on the parsed output, and the result object is returned in response to the received request. The result object includes at least the indication of the status of the operation. | 2016-05-26 |
20160150016 | METHOD AND DEVICE FOR COMMUNICATING VIA A SHARED INTERACTION SPACE - The invention relates to a method for communicating between at least a first terminal (T | 2016-05-26 |