23rd week of 2015 patent applcation highlights part 60 |
Patent application number | Title | Published |
20150156094 | Determining Available User Interface Functionality Based on Backend Server Load - An approach is provided for an information handling system to convey user interface functionality based upon a backend server load. The approach receives, over a computer network, a request from a client that utilizes a user interface. The approach further identifies a current resource utilization of a backend server resource that corresponds to the request and then transmits an indicator to the user interface with the indicator conveying the current resource utilization. In response to an overload condition being detected at the backend server resource, the approach transmits a substitute task recommendation to the user interface as a possible alternative request instead of the received request. | 2015-06-04 |
20150156095 | CLOUD SYSTEM - A cloud system includes a resource module, a control module and a monitoring module. The control module electrically connected to the resource module is configured to control the resource module to adjust the cloud resource according to metric parameters and a resource request command. The monitoring module electrically connected to the resource module and the control module is configured to detect the resource module to produce metric parameters. The cloud system can further include an environment module and/or a power module. The module can monitor and detect at least one environment metric parameter. The control module can adjust the cloud resource according to at least one environment metric parameter. | 2015-06-04 |
20150156096 | VIRTUALIZATION SERVICE APPARATUS AND METHOD OF PROVIDING VIRTUALIZATION SERVICE - Disclosed herein is a virtualization service apparatus including: a network monitoring unit receiving a virtualization service request for a content and network delay time information from a terminal; a content monitoring unit setting a delay limitation depending on a type of the content; a transmission rate controlling unit setting a transmission rate depending on an available bandwidth of a network; a content bit rate controlling unit setting a content bit rate depending on the transmission rate, the delay limitation, and the network delay time; an encoding configuration controlling unit setting a resolution and a frame rate depending on the content bit rate and the type of the content; a content quality controlling unit encoding the content depending on the resolution and the frame rate; and a transmitting unit transmitting the encoded content to the terminal. | 2015-06-04 |
20150156097 | Time Monitor - A method and system for measuring latency is provided. A monitor node is used to measure latency in a computer network or in a computing device by time stamping signal messages sent from nodes in the computer network and/or tasks in a particular node or device. The time stamps are generated using a system clock of the monitor node to reduce any discrepancies in timing. In addition, the monitor node may compensate for latencies between the monitor node and each of the one or more nodes or devices across which latency is to be measured. Signal messages may include a data message ID and/or a node ID identifying the message that is being tracked and for which latency is being measured. Latency may further be measured across multiple tasks being performed in the same or different nodes or devices by transmitting signal messages for each of the multiple tasks. | 2015-06-04 |
20150156098 | SYSTEM AND METHOD FOR REAL-TIME ANALYSIS OF NETWORK TRAFFIC - A mirrored live-data flow of the live-data flow passing through a selected point within a network is monitored at a first processing node. The live-data flow comprises data that is in active transmission between endpoints in the network and prior to exit from the network and onward storage of the data in a database. Each packet within the mirrored data flow is decoded at the first processing node according to each protocol associated with a packet. Packets having a plurality of protocols associated therewith are decoded in parallel with each other. Each of the decoded packets are compared at the first processing node to a set of predetermined or deduced conditions. A predetermined or deduced response is executed based upon detection of a predetermined or deduced condition within the decoded packets. At least a portion of the decoded packets of the live-data flow causing execution of the predetermined or deduced response are processed at a second processing node to determine a manner for controlling an operation of the network at a same time the live-data flow is in active transmission between the endpoints in the network. The operation of the network is controlled in response to the processing step. | 2015-06-04 |
20150156099 | TECHNIQUE FOR MONITORING COMPONENT PROCESSING - The present invention provides a technique for measuring the efficiency of components in a computer. An echo server is provided which comprises several units. A socket generation unit generates a receiving server socket on the basis of information on a correspondence between a plurality of components in a computer. And generates a client socket that is a dedicated socket inheriting information of the receiving server socket when data is transmitted. A stream acquisition unit acquires a transmission path for acquiring data transmitted and received between components. A thread generation unit generates a transmission path by coupling streams. A transfer execution unit transfers data acquired via a thread to an original destination component. Using these units, the technique monitors and running verifies behavior by observing data running on the network. | 2015-06-04 |
20150156100 | NODE-ENABLED MONITORING OF A PIECE OF EQUIPMENT USING A HIERARCHICAL NODE NETWORK - Methods and systems are described for monitoring a piece of equipment using a hierarchical node network having at least an ID node, a master node, and a server. The ID node is associated with the equipment, can monitor equipment operations, and communicate directly with the master node but is unable to directly communicate with the server. The master node can directly communicate with the server and separately communicate with the ID node. The master node associates with the ID node when the master node detects a signal broadcast from the ID node. The server then determines a location of the ID node. The ID node detects an actionable event related to the operation of the equipment, and transmits a message reporting the actionable event to the master node. The master node notifies the server about the actionable event. Thereafter, the server initiates a responsive action based upon the notification. | 2015-06-04 |
20150156101 | Device Lock Mode - A system, method, and computer program for remotely managing a digital device is provided. One or more digital devices are monitored. At least one matter associated with the one or more digital devices is identified. A resolution to address the at least one matter is generated. The resolution is then distributed from a remote location. | 2015-06-04 |
20150156102 | A Method of and Network Server for Detecting Data Patterns in an Input Data Stream - Computer controlled method, network server ( | 2015-06-04 |
20150156103 | LOCATING A NETWORK CABLE CONNECTOR - A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable. | 2015-06-04 |
20150156104 | SECURE MEDIA ADDRESS LEARNING FOR ENDPOINTS BEHIND NAPT DEVICES - A first media packet from a first endpoint of an access network behind a NAPT device is received by a media device between a core network and the access network. The first media packet includes a first source IP address and port combination identifying the first endpoint. An UPDATE request or a reINVITE request is transmitted by the media device. A second IP address and port combination for the media device to receive future media packets from the first endpoint is negotiated. The media device compares a first IP address of the first source IP address and port combination to a second IP address of a second source address and port combination for a second media packet received on the second IP address and port combination. If the first and second IP addresses match, the media device relays media packets from the core network to the first endpoint. | 2015-06-04 |
20150156105 | OSPF POINT-TO-MULTIPOINT OVER BROADCAST OR NBMA MODE - A network device identifies an Open Shortest Path First (OSPF) link between the network device and a layer 2 network as one of a point-to-multipoint over broadcast interface or a point-to-multipoint over non-broadcast multi access (NBMA) interface, and performs database synchronization and neighbor discovery and maintenance using one of a broadcast model or a NBMA model. The network device also generates a link-state advertisement for the network device, where the link-state advertisement includes a separate link description for each point-to-point link within the layer 2 network; and sends the link-state advertisement to each fully adjacent neighbor in the layer 2 network. | 2015-06-04 |
20150156106 | METRIC BIASING FOR BANDWIDTH AWARE TIE BREAKING - A method is implemented in a network element for modifying the characteristics of tree construction for use in virtual network connectivity in a network that includes the network element. A virtual network is associated with a set of virtual network attachment points that are mapped to network elements in a topology of the network where the virtual network is individually associated with an equal cost tree (ECT) set. The method generates individual ECT sets to interconnect sets of virtual network attachment points for connectivity establishment and maintenance of the connectivity in the network. The method modifies link metrics across the topology of the network to be used for computing an ECT set to bias a tie-breaking process for selecting between equal cost paths toward either producing minimal cost shortest path multicast trees or maximizing unicast path diversity in the multiple ECT sets that are generated. | 2015-06-04 |
20150156107 | Method, Controller, and System for Processing Data Packet - A method, a controller, and a system for processing a data packet are disclosed. The method includes receiving, by a controller, a data packet that is reported by a switch and does not match a forwarding rule; after it is determined that a type of the data packet is a broadcast data packet, generating a forwarding rule for the data packet, where the forwarding rule includes an action attribute being discarded; and sending the forwarding rule of the data packet to the switch, so that when receiving the data packet again, the switch discards the data packet according to the action attribute of the forwarding rule. In the present invention, a broadcast storm on a network can be avoided without shielding a port of a switch. Therefore, for a fully-connected network, a forwarding capability of a port and a quantity of available transmission links on the network are ensured. | 2015-06-04 |
20150156108 | Forwarding Packets - A service instance in a BEB device is allocated B-VLANs. Each of the B-VLANs may be mapped to a different ECT algorithm. For each B-VLAN of the service instance, BEB device calculates a forwarding path between the BEB device and a remote BEB device to obtain different forwarding paths for different B-VLANs of the service instance. The BEB device forwards a data flow in a first forwarding path of the service instance, and switches the data flow from the first forwarding path to a second forwarding path of the service instance if a link failure is detected in the first forwarding path. | 2015-06-04 |
20150156109 | Hierarchical Sensor Network for a Grouped Set of Packages Being Shipped Using Elements of a Wireless Node Network - Methods and systems are described for creating a hierarchical sensor network for enhanced monitoring of a grouped set of packages being shipped, the hierarchical sensor network using a wireless node network having a mobile master node, an ID node and a server. The mobile master node can communicate directly with the server over a first communication path, and is placed within a package in the grouped packages. The ID node can communicate directly with the master node over a second communication path but cannot communicate directly with the server over the first communication path. The ID node is placed within another package in the grouped packages. The mobile master node and the ID node are enabled with power, and the hierarchical sensor network for the grouped packages is activated by causing the server to associate the mobile master node with the ID node. | 2015-06-04 |
20150156110 | SYSTEM AND METHOD FOR STORING FLOW ENTRIES IN HARDWARE TABLES - A system and method for storing flow entries in hardware tables includes one or more controllers, memory, a first flow table for storing first flow entries, and a second flow table for storing second flow entries that override the first flow entries. The first flow table implements a fixed priority and the second flow table a flexible priority. The one or more controllers is configured to determine whether a third flow entry with a first priority can only be stored in the second flow table. When the third flow entry can only be stored in the second flow table, the one or more controllers is further configured to add the third flow entry to the second flow table and move any first flow entries with priorities higher than the first priority that overlap the third flow entry to the second flow table. | 2015-06-04 |
20150156111 | Methods and Nodes For Handling an Address of a Resource - A method in gateway node ( | 2015-06-04 |
20150156112 | FILTERING AND ROUTE LOOKUP IN A SWITCHING DEVICE - Methods and devices for processing packets are provided. The processing device may Include an input interface for receiving data units containing header information of respective packets; a first module configurable to perform packet filtering based on the received data units; a second module configurable to perform traffic analysis based on the received data units; a third module configurable to perform load balancing based on the received data units; and a fourth module configurable to perform route lookups based on the received data units. | 2015-06-04 |
20150156113 | Communication System, Control Apparatus, Communication Method, Control Method and Program - A communication system includes a plurality of control apparatuses that determine a packet handling operation; a plurality of packet processing units that process packets in accordance with the packet handling operation notified by the control apparatus; an assignment unit that assigns, with respect to each of the packet processing unit, a control apparatus that controls the packet processing unit concerned; and a database that is shared by the plurality of control apparatuses and that stores information related to the packet handling operation; wherein each of the control apparatuses refers to the database to determine the packet handling operation. | 2015-06-04 |
20150156114 | MANAGEMENT OF BANDWIDTH EFFICIENCY AND FAIRNESS IN CLOUD COMPUTING - Technologies are generally described to manage bandwidth efficiency and fairness in cloud computing. According to some examples, bottleneck links may be determined in a network connecting communication device pairs. A first bandwidth allocation may be determined of a first subset of the communication device pairs communicating through the bottleneck links. A second bandwidth allocation may be determined of a second subset of the communication device pairs unable to communicate through the bottleneck links. Then, the first bandwidth may be adjusted based on an analysis of the first bandwidth, the second bandwidth, a first weight attribute associated with the first subset and a second weight attribute associated with the second subset. | 2015-06-04 |
20150156115 | NETWORK CONTROL OF APPLICATIONS USING APPLICATION STATES - Application states of applications associated with a communication device can be network controlled. An application agent, associated with an application used by the communication device, controls transitioning the application between application states based on network indicators received or network events detected from a communication network. The application states include active state or doze state. An application management component associated with the communication network at least partially controls transitioning the application between application states to facilitate controlling network traffic or reducing network congestion. The application agent or application management component can map application states to various factors, including radio states, congestion level, application performance indicators, network policies, or user policies, to facilitate determining which application state to apply to an application at a given time. The application agent can be in a centralized location, or at a same or different location as the application source. | 2015-06-04 |
20150156116 | ROUTING CONTROL METHOD AND APPARATUS - Disclosed herein is a routing control method for balancing the load of links in a network. For each link, a load rate is periodically measured through one or more switches on the network. Based on a trigger signal generated while measuring, a packet flow passing through an overloaded link is selected. At least one substitute link through which the packet flow is to pass is determined based on the load rates, a source address, and a destination address of the packet flow. A packet handling table of at least one substitute switch on the substitute link is configured so that the packet flow passes through the substitute link. | 2015-06-04 |
20150156117 | HIGH DENSITY SERVER SYSTEM - A high density server system is disclosed, each of the server nodes on the node back plate and the midplane is established with its separate information transmission channels without any interference to one another, assuring that the network of every such node has a sufficient bandwidth. For those management traffic network signals having a relatively smaller data amount, tracks are incorporated, assuring the technical efficacies of assuring a network transmission speed of the overall server and reducing a space taken up by the transmission tracks. | 2015-06-04 |
20150156118 | Method and Apparatus for Dynamic and Distributed Tunnel Routinge - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-06-04 |
20150156119 | Autonomic Traffic Load Balancing in Link Aggregation Groups - Mechanisms are provided for performing traffic load balancing on ingress traffic directed to a Link Aggregation Group (LAG). The mechanisms monitor a ingress traffic load across a plurality of links of the Link Aggregation Group (LAG). The mechanisms determine if the ingress traffic load across the plurality of links is unbalanced. Moreover, the mechanisms, in response to determining that the ingress traffic load across the plurality of links is unbalanced, send a message to a switch associated with the LAG requesting the switch to modify routing of ingress traffic to the LAG to perform ingress traffic load balancing. | 2015-06-04 |
20150156120 | LOCALIZED CONGESTION EXPOSURE - A method of localized congestion exposure within a local loop in a cellular network that is performed by a localized congestion exposure sender node of the local loop. The method includes receiving downlink packets that are destined for a downstream user device. The method also includes receiving packets that have feedback indicating a congestion level from a downstream node of the cellular network. The method further includes inserting a declaration of an expected downstream congestion level into headers of the received downlink packets; and forwarding the downlink packets that have the declaration of the expected downstream congestion level inserted into the headers toward the downstream user device. | 2015-06-04 |
20150156121 | MULTI-SOLUTION BASED RADIO SYSTEM - A multi-solution based radio system is provided. A radio system adaptively selects a solution to be used in a communication method based on a quality of service (QoS). The radio system estimates a QoS, such as by using information about at least one of a channel state, a signal state, a performance using a current solution, a complexity using a current solution, and a power consumption of a terminal with respect to a current solution. When the estimated QoS does not satisfy a predetermined condition, the radio system changes a current solution to an alternative solution or changes a parameter value applied to the current solution using feedback information. | 2015-06-04 |
20150156122 | UNIFIED NETWORKING SYSTEM AND DEVICE FOR HETEROGENEOUS MOBILE ENVIRONMENTS - Method for unified networking for a device in heterogeneous mobile environments includes maintaining and monitoring active network interfaces, managing the location of the device, managing network access security, enabling disruption tolerance support for applications, enabling service sharing and session mobility, managing system parameters for one or more active application sessions, managing storage functionality in one or more memory devices, and maintaining a mapping for one or more flows corresponding to the one or more active application sessions, maintaining one or more policies, and performing flow control decisions based upon the policies using a policy engine. The method can also include monitoring for network events, evaluating whether to perform a handover based upon policies, and providing seamless secure handovers in a heterogeneous mobile environment. A device, non-transitory computer-readable medium, and a system for unified networking are also provided. | 2015-06-04 |
20150156123 | SYSTEM AND METHOD FOR THROTTLING SERVICE REQUESTS USING WORK-BASED TOKENS - A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. An admission control mechanism may manage requests based on tokens, each of which represents a fixed amount of work. The tokens may be added to a token bucket at rate that is dependent on a target work throughput rate while the number of tokens in the bucket does not exceed its maximum capacity. If at least a pre-determined minimum number of tokens is present in the bucket when a service request is received, it may be serviced. Servicing a request may include deducting an initial number of tokens from the bucket, determining that the amount of work performed in servicing the request is different than that represented by the initially deducted tokens, and deducting additional tokens from or replacing tokens in the bucket to reflect the difference. | 2015-06-04 |
20150156124 | QOS CONTROL SYSTEM, QOS CONTROL METHOD, AND PROGRAM - Provided is a QoS control system, a QoS control method, and a program suitable for use in a server virtualization environment in which an I/O virtualization technology can be used. The QoS control system includes a network interface and a network interface management unit. The network interface holds a QoS (Quality of Service) parameter giving identification information for identifying traffic, a priority value to be applied to a packet belonging to the traffic, and information indicating the storage location of the priority value in the packet, stores the priority value in the packet belonging to the traffic, and then transmits a resulting packet. The network interface management unit holds a QoS policy including a QoS parameter to be applied to each traffic, and manages the network interface. | 2015-06-04 |
20150156125 | METHOD FOR MANAGING A QUEUE BASED ON A CHANGE RATE PARAMETER - It is presented a queue manager arranged to manage a queue associated with a single radio access bearer of a mobile communication system. The queue manager comprises: a queue detector arranged to provide a change rate parameter indicating a rate of change of a size of the queue; a discard determiner arranged to determine a first discard condition based on the change rate parameter; and a packet discarder arranged to discard a packet in the queue when the first discard condition is satisfied. Corresponding method, radio base station, radio network controller and user equipment are also presented. | 2015-06-04 |
20150156126 | WIRELESS COMMUNICATION SYSTEM - A data signal is transmitted in a wireless communication system from a primary station to a secondary station. The data signal comprising a medium access control header (MAC-hs header) and a protocol data unit associated with the medium access control header. The medium access control header comprising a set at least one field (e.g. TSN, SEG, LI, FMT, LCid), wherein a size allocated to at least one field of the set is determined based on a length of the protocol data unit. For example, the size allocated to a segmentation indication field (SEG) determined for a protocol data unit of a first length is less than the size determined for a protocol data unit of a second length, the second length being higher than the first length, the segmentation indication depending on a number of segments that the protocol data unit is subdivided into. | 2015-06-04 |
20150156127 | Autonomic Traffic Load Balancing in Link Aggregation Groups - Mechanisms are provided for performing traffic load balancing on ingress traffic directed to a Link Aggregation Group (LAG). The mechanisms monitor a ingress traffic load across a plurality of links of the Link Aggregation Group (LAG). The mechanisms determine if the ingress traffic load across the plurality of links is unbalanced. Moreover, the mechanisms, in response to determining that the ingress traffic load across the plurality of links is unbalanced, send a message to a switch associated with the LAG requesting the switch to modify routing of ingress traffic to the LAG to perform ingress traffic load balancing. | 2015-06-04 |
20150156128 | SCHEDULING MODULE AND METHOD THEREOF - A scheduling module arranged to schedule the transmission of data from a plurality of data sources over a serial communication interface. The scheduling module comprises a register array and is arranged to selectively couple one of the data sources to the serial communication interface based at least partly on a source identifier value stored within a currently selected register within the register array. The scheduling module is further arranged to select a next sequential register within the register array upon receipt of a trigger signal. | 2015-06-04 |
20150156129 | COMMUNICATION NODE - A communication node disposed on a packet transfer path through which packets flow between an end of a transmitting side and an end of a receiving side according to a specific protocol under which flow control and congestion control using a window size are performed, the communication node including a communication interface configured to perform processing for receiving a packet from a link on the transfer path and processing for transmitting a packet to the link, a storage device configured to store a queue in which a packet in accordance with the specific protocol received from the link or a packet in accordance with the specific protocol transmitted to the link is temporarily accumulated, and a controller configured to adjust a period of time for retaining the packet accumulated in the queue on the basis of the current bandwidth of the link on the receiving side. | 2015-06-04 |
20150156130 | ORDERING TRAFFIC CAPTURED ON A DATA CONNECTION - Ordering partial network traffic. In an embodiment, data packets are received from a network tap and separated into two queues. For each queue, a push-sequence is maintained to represent a sequence number that must be pushed in order to maintain a consecutive order. When both push-sequences are equal to the sequence number of their first packets, if the acknowledgement number of the first packet on one queue is greater than the push-sequence for the other queue and less than or equal to the push-sequence of the one queue, data is pushed off the other queue. Otherwise, a queue having the earlier timestamp is identified as a first queue, the existence of a next acknowledgement number is determined for the second (other) queue, and data is pushed off the first queue according to the existence of the next acknowledgement number. Gap packets may be generated to force progress. | 2015-06-04 |
20150156131 | METHOD AND SYSTEM OF GEOGRAPHIC MIGRATION OF WORKLOADS BETWEEN PRIVATE AND PUBLIC CLOUDS - A database contains available cloud environments to which a virtual image workload may be deployed. The database includes ratings for each available cloud option, such as cost, distance, reliability, which workloads that environment may handle. A table of attributes and weights is used to create a rating of the requested deployment. This rating determines where the image is deployed. The invention discloses techniques for gathering additional information from the user about the virtual image workload to be deployed. A mapping algorithm applies the attributes and weights to the gathered information to create a rating for the deployment. An algorithm is then used to determine to which available cloud environment the workload will be deployed. | 2015-06-04 |
20150156132 | Determining Available User Interface Functionality Based on Backend Server Load - An approach is provided for an information handling system to convey user interface functionality based upon a backend server load. The approach receives, over a computer network, a request from a client that utilizes a user interface. The approach further identifies a current resource utilization of a backend server resource that corresponds to the request and then transmits an indicator to the user interface with the indicator conveying the current resource utilization. In response to an overload condition being detected at the backend server resource, the approach transmits a substitute task recommendation to the user interface as a possible alternative request instead of the received request. | 2015-06-04 |
20150156133 | METHOD FOR PROVIDING A CONNECTION OF A CLIENT TO AN UNMANAGED SERVICE IN A CLIENT-SERVER REMOTE ACCESS SYSTEM - Systems and methods for providing a connection of a client to an unmanaged service in a client-server remote access system. An unmanaged service may register at a remote access server and open a communication connection there between remote access server may be configured for providing remote access to the unmanaged service by a client. The remote access server receives keep-alive messages from the unmanaged service over the communication connection, which may serve to indicate that the unmanaged service is operational. The remote access server may a request for a client connection to the unmanaged service, after which, a terminate keep-alive message is communicated to the unmanaged service to terminate the sending of keep-alive messages from the unmanaged service in response to the request for the client connection to the unmanaged service. | 2015-06-04 |
20150156134 | Method For Transmitting Data In A Packet-Oriented Communications Network And Correspondingly Configured User Terminal In Said Communications Network - A method for transmitting data in a packet-oriented communications network, in particular of a motor vehicle and to a user terminal configured for carrying out the method. In the method, data packets are transmitted without a guaranteed transmission time for the data packets and with a guaranteed maximum transmission time for the data packets in said communications network. For a data transmission with a guaranteed transmission time, a specific quality of service is reserved prior to the data transmission by reservation request from the sender of the data to the receiver of the data and the data transmission with a guaranteed transmission time is only started once a confirmation of the reservation request sent by the sender has been received. In addition, selected data that is to be transmitted in a guaranteed transmission time is sent directly as a data stream of data packets and a reservation request is sent after the start of the data stream. | 2015-06-04 |
20150156135 | REPUTATION-BASED MEDIATION OF VIRTUAL CONTROL PLANES - Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be modularized. Control plane modules may be supplied with data from standardized sensors, and required to generate standardized resource configuration requests responsive to solicitations with specified response latencies. Custom control plane modules may be selected to replace or complement default control plane modules. Financial and computational costs associated with control plane modules may be tracked. Competing resource configurations may be mediated by a control plane supervisor. Such mediation may be based on control plane module reputation scores. Reputation scores may be based on customer feedback ratings and/or measured performance with respect to module goals. Mediated configuration parameter values may be based on a combination of competing configuration parameter values weighted according to reputation. Contribution of individual modules to goal achievement may be tracked and rewarded accordingly. | 2015-06-04 |
20150156136 | CLUSTER FEDERATION AND TRUST - An improved scalable object storage system allows multiple clusters to work together. In one embodiment, a trust and federation relationship is established between a first cluster and a second cluster. This is done by designating a first cluster as a trust root. The trust root receives contact from another cluster, and the two clusters exchange cryptographic credentials. The two clusters mutually authenticate each other based upon the credentials, and optionally relative to a third information service, and establish a service connection. Services from the remote cluster are registered as being available to the cluster designated as the trust root. Multi-cluster gateways can also be designated as the trust root, and joined clusters can be mutually untrusting. Two one-way trust and federation relationships can be set up to form a trusted bidirectional channel. | 2015-06-04 |
20150156137 | PROXY APPLICATION WITH DYNAMIC FILTER UPDATING - The disclosure describes a proxy server application that supports the dynamic modification of proxy rules implemented by a proxy server. The proxy rules implemented by the proxy server specify network behaviors to be performed at various points during the handling of requests from client applications. A proxy server implements the proxy rules by processing one or more user-generated network traffic filters for managing network traffic. In an embodiment, users generate network traffic filters by creating network traffic filter source code that specify processing steps to be performed by a proxy server relative to network messages the proxy server receives. In an embodiment, user-generated network traffic filters may be added, removed, reordered, or otherwise modified in a proxy server application at runtime in order to respond to current network conditions or to achieve other desired proxy configurations. | 2015-06-04 |
20150156138 | METHOD FOR ACTIVATING AND DEACTIVATING CLIENT-SIDE SERVICES FROM A REMOTE SERVER - A system, apparatus, and method for controlling the operation of a service in a client device. The invention uses an existing protocol which is used for communications between an application resident in the device and a remote server to convey information about the service to the application. The information may be relevant to a service specific function, such as configuration or provisioning, or an activation or de-activation instruction, for example. The application receives the service related information, processes the information and then provides the information to the service via a notification channel. The service related information may be incorporated into a message sent from the remote server to the client device by using an element of the protocol, for example, by appending a text string to a header. | 2015-06-04 |
20150156139 | Dynamic Management Of Groups For Entitlement And Provisioning Of Computer Resources - Methods, systems, and techniques for managing groups of entities, such as individuals, employees, or systems, and providing entitlement and access to computer resources based on group membership are provided. Example embodiments provide a Group Management System having a Group Management Engine “GME,” an Entitlement Engine, and a Provisioning Engine, which work together to allow simplified grouping of entities and providing entitlement and access to the entities based upon the group membership. In one embodiment, the GME leverages dynamic programming techniques to enable accurate, scalable systems that can manage near real time updates and changes to the group's status or to the entities' status. These components cooperate to enable provisioning of applications based upon current entitlement. | 2015-06-04 |
20150156140 | INTELLIGENT CHASSIS MANAGEMENT - A modular system uses point-to-point communication between field-programmable gate arrays (FPGAs) on a control module and each port module, respectively, to manage basic module functions, such as power, environmental monitoring, and health checks on the modules and their components. This allows a chassis to be managed without fully powering each card first, frees processors on the modules from having to perform health checks, allows dedicated resources to rapidly monitor the health of each card, and prevents one bad card from disabling management of all cards. | 2015-06-04 |
20150156141 | DATA PROCESSING DEVICE AND DATA PROCESSING METHOD - A data processing device includes a splitter in which an input stream made up of a plurality of packets is split, so as to generate split streams of a plurality of channels, of which the smallest increment is base band frames (BBFs) where the packets of the input stream are placed in consecutive order in a data field of the BBF which is the object of forward error correction (FEC). | 2015-06-04 |
20150156142 | METHOD AND SYSTEM FOR REDUCING PACKET LOSS IN A SERVICE PROTECTION SCHEME - A method for reducing packet loss includes: performing automatic and real-time adjustment to cost values of a first route and a second route, so that the cost value of the corresponding route of the primary PW is lower than that of the corresponding route of the secondary PW. A corresponding system is also provided. Automatic and real-time adjustment to cost values of the first route and the second route, enable the cost value of the corresponding route of the primary PW to be lower than that of the corresponding route of the secondary PW, and therefore enable the downlink traffic not passing through the PW that just recovers from a failure, thereby reducing packet loss when the downlink traffic passes through the PW while the primary PW just recovers from a failure. | 2015-06-04 |
20150156143 | SYSTEM AND METHOD FOR SIDE DISPLAY ON A MULTI-DISPLAY MOBILE DEVICE - Embodiments of the present invention are operable to display content related to an application using side display screens installed on a multi-display mobile device. As such, embodiments of the present invention can make use of the display surface areas associated with side display screens to render content (e.g., notifications associated with an application) in a power efficient manner. Also, by using separate display buffers for side display screens, embodiments of the present invention can independently render content while other components of the mobile device (e.g., the main display screen) operate within low power mode or “sleep state.” As such, by using side display screen in this fashion, embodiments of the present invention can efficiently utilize the power and computational resources of the mobile device. | 2015-06-04 |
20150156144 | Methods and Systems for Social Messaging - The methods and systems in this invention apply to messaging systems that are used by people to communicate between a plurality of mobile devices and/or computers. Methods and systems are presented for communicating with participants in a manner that allows for more open discussion and gossiping. The methods and systems permit a conversation between a plurality of users in a manner such that one or more users in the system are excluded from participating in the said conversation. The methods and systems also allow one or more users to participate in a conversation without revealing identity by choosing to be anonymous, choosing an alias, or by impersonating another user or reverting to original identity at any point during the gossip. The methods and systems presented also provide for the option for other users to know if a user is participating by impersonating or via an alias. The methods and systems also allow for any user in the system to delete any message posted by the said user in a conversation. Further the originator of the conversation may also delete the entire conversation. | 2015-06-04 |
20150156145 | METHOD AND APPARATUS FOR PROCESSING MESSAGES IN A SOCIAL NETWORK - In one embodiment, the present invention is a method and apparatus for knowledge generation and deployment in a distributed network. In one embodiment, a method for processing messages in a social network includes receiving a new message from a first node in the network, the new message including a query, providing the first node with an answer to the query, if the answer is located in a repository, and initiating generation of the answer, if the answer is not located in the repository. | 2015-06-04 |
20150156146 | THREADED MESSAGE HANDLING SYSTEM FOR SEQUENTIAL USER INTERFACES - A method for presenting a plurality of messages to a user includes constructing a tree of the plurality of messages, wherein each of the plurality of messages is a different node. Each of the plurality of messages is in one of a plurality of threads in the tree. The nodes representing a subset of the plurality of messages that are already read and their ancestor nodes are designated as do-not-read. A reading order of the plurality of messages is determined by traversing the tree in a depth-first manner while appending a tree separator at each terminal node and skipping any do-not-read nodes. The plurality of messages are then presented to the user based upon the reading order. | 2015-06-04 |
20150156147 | METHOD, SYSTEM AND APPARATUS FOR ADDING NETWORK COMMENT INFORMATION - Method and device of facilitating user comments on webpages are disclosed. The method includes: a device displaying a visual object as part of a webpage; detecting a user request for commenting on the visual object displayed in the webpage, the user request comprising a predetermined user input directed to the visual object displayed on the webpage; in response to the user request for commenting on the visual object, displaying a comment entry region overlaying at least part of the webpage; receiving a user comment in a graphical form through the comment entry region; and revising the visual object displayed in the webpage by sending the user comment in the graphical form to a server managing the webpage. | 2015-06-04 |
20150156148 | METHOD OF AUTOMATICALLY AUGMENTING AN ELECTRONIC MESSAGE - A method of automatically augmenting an electronic message, such as an email message, webmail, IM message, posting on a social network site, webpage or message in any other medium or format with automatically generated content (a ‘Donation Mechanic’) within the footer of consumer emails. The recipient of the message can select the Donation Mechanic to trigger an event, such as a payment from the Brand to the Cause. | 2015-06-04 |
20150156149 | METHOD AND APPARATUS FOR SHARING CONTENT FROM THIRD PARTY WEBSITES VIA MESSAGING - A method, computer-readable storage device and apparatus for sending a content of a third party website via a messaging service are disclosed. For example, the method provides a source code to the third party website to enable the sending of the content via the messaging service, receives a request to send the content to a mobile endpoint device of a recipient via the messaging service, wherein the request originates from the third party website, receives a telephone number of a mobile endpoint device and sends the content to the mobile endpoint device associated with the telephone number of the recipient as a message via the messaging service, wherein the message is identified as being sent from a mobile endpoint device of a sender. | 2015-06-04 |
20150156150 | Time Based Personal Communication - A computer implemented method and a personal communication system (PCS) for generating and delivering a personalized communication based on a time condition are provided. The PCS configures a preliminary time condition and determines an optimal time condition from the preliminary time condition, a sender configured time condition, and a recipient configured time condition. The PCS detects a sender's attempt to generate and send the personalized communication based on media content received from a sender device. The PCS times the composition of the personalized communication, generates a timing verification report that verifies whether the optimal time condition is met, and performs an action based on the verification. The action includes rendering a notification to the sender device for instructing the sender to continue composing the personalized communication until the optimal time condition is met, or generating and delivering the personalized communication to recipient devices when the optimal time condition is met. | 2015-06-04 |
20150156151 | EMAIL DYNAMIC CONTENT RIBBON - A method and system for sending email messages to a recipient, wherein the email messages contain interactive dynamic content that can be displayed by the recipient's email client on the recipient's email-reading device without requiring the recipient to launch additional applications. Embodiments of the invention feature a dynamic “ribbon” containing multiple images that automatically scroll across the screen to display a changing subset of the multiple images without requiring the recipient to manually scroll. The recipient can click or tap on an image at any time to obtain more detailed information about a product or service represented by an image. | 2015-06-04 |
20150156152 | REDUCING PHOTO-TAGGING SPAM - A photo spam detector detects illegitimate non-natively captured images through extracting image features and feeding the extracted features into a probabilistic model. The probabilistic model categorizes the photo as legitimate or illegitimate. Requests to tag one or more users in a photo are analyzed by a tag analyzer that assesses relationships between the tag requests themselves, social relationships between the tagged users, and the presence or absence of faces within the regions specified by the tag requests. Based on the classification of images or tags as illegitimate, a social networking system applies one or more social media distribution policies to the image or tags to suppress or prohibit distribution. | 2015-06-04 |
20150156153 | COLLABORATIVE E-MAIL - A collaborative e-mail technique can include receiving, at a computing device in communication with a network, a collaborative e-mail request for a plurality of senders. A draft of a collaborative e-mail can be stored at a database in communication with the computing device. The plurality of senders can be notified of the collaborative e-mail request and can be provided access to the draft via the computing device. Approval of the draft can be received from the plurality of senders at the computing device and the collaborative e-mail can be sent, via the computing device, to a recipient from the plurality of senders after approval is received. | 2015-06-04 |
20150156154 | STORAGE AND RETRIEVAL OF ELECTRONIC MESSAGES USING LINKED RESOURCES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing and retrieving electronic messages. In one aspect, a method includes receiving a query, searching summary representations of resources that are linked to by electronic messages, for matches with the query, selecting one or more of the electronic messages that link to the resources whose summary representations match the query, inferring information that references the selected messages, and providing the information that references the selected electronic messages. | 2015-06-04 |
20150156155 | METHODS FOR DELIVERING ELECTRONIC MAILS ON REQUEST, ELECTRONIC MAIL SERVERS AND COMPUTER PROGRAMS IMPLEMENTING SAID METHODS - Method for delivering electronic mails on request from an electronic mail server to at least one remote client via an internet network, said method being characterized in that said electronic mail server exchanges data with at least one storage server and in that it comprises a delivery step comprising the operations of:
| 2015-06-04 |
20150156156 | SYSTEM AND METHOD FOR MANAGING CONTACT INFORMATION REQUESTS - In example embodiments, a system and method for managing contact information requests in a network are provided. Accordingly, a request is received at a contact management system from a user device of a user. The request is for a value for a contact that corresponds to an individual in an address book of the user. An electronic message is sent to and an electronic response received from the individual. Based on the electronic response being a reply in a same format as the electronic message and the reply including the value, the reply is parsed to obtain the value. Based on the electronic response being an indication of activation of a link provided in the electronic message, a form is provided with a field for entering the value. The value obtained from the individual may be automatically provided to the user for updating of their address book. | 2015-06-04 |
20150156157 | ASSOCIATION METHOD AND DEVICE FOR COMMUNICATIONS MODES - Disclosed are an association method and device for communication modes, the method comprising: receiving a first operation instruction, the first operation instruction being used for instructing the establishment of an association of identification numbers in a first Internet application; responding the first operation instruction, and acquiring a first identification number of a first e-mail box and a second identification number of a second e-mail box; establishing an association between the first identification number and the second identification number in the first Internet application. | 2015-06-04 |
20150156158 | SUBSCRIPTION GROUPS IN PUBLISH-SUBSCRIBE SYSTEM - Disclosed is a technology for publishing subscriptions in a publish-subscribe system in accordance with subscription groups. The technology may include (i) determining a consumption characteristic by which each of multiple subscribers in a publish-subscribe system consumes a subscription published by a publisher; (ii) identifying the subscribers whose consumption characteristics satisfy a specified similarity criterion; (iii) defining multiple subscription groups, each of which includes subscriptions of those of the subscribers whose consumption characteristics satisfy the specified similarity criterion; (iv) storing the subscriptions in multiple logical partitions of a storage system where each of the logical partitions contains a separate non-overlapping subset of the subscriptions; and (v) transmitting the subscriptions to the subscribers in accordance with the subscription groups. | 2015-06-04 |
20150156159 | SYSTEMS AND METHODS FOR TEXT TO SOCIAL NETWORKING SITE TO BUY - Methods and systems for publishing content received via a cellular message to a social networking server to convert visitors of the published content into customers are provided. An agent executing on a device including one or more processors receives, via a cellular communication channel, a cellular message to publish content included in the cellular message to a server of a social networking web site. The agent identifies, from the cellular message, an entity corresponding to one of a tag or address included in the cellular message. The agent identifies a uniform resource locator (URL) of the entity based on the content included in the cellular message. The agent communicates a request to publish the content included in the cellular message to the server. The request includes the URL of the entity to direct traffic from the server to a resource of the entity corresponding to the URL. | 2015-06-04 |
20150156160 | COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR COMMUNICATING FEED INFORMATION TO ONE OR MORE RECIPIENTS - Disclosed are systems, apparatus, methods and computer-readable media for communicating feed information to one or more recipients. In some implementations, an instruction to communicate an information update to one or more identified first recipients is received. In some instances, an additional recipient indicator is identified and an identification of one or more second recipients based on the additional recipient indicator is generated. In some instances, the one or more second recipients are provided access to the information update. | 2015-06-04 |
20150156161 | ASCERTAINING EVENTS IN MEDIA - Disclosed are various embodiments relating to the identification of events that occur within a media item. A plurality of messages are received from client devices, wherein each of the messages comprises a timestamp indicating a time relative to a media item. The existence of an event in the media item is determined based at least in part on a clustering of at least a subset of the messages received. Points are awarded to a subset of users based at least in part upon the timestamp and the clustering of messages received. | 2015-06-04 |
20150156162 | SMART NAVIGATION FOR SHORTENED URLS - The present invention generally relates to a system for, and method of, obtaining, from a first identifier in a first name space, a second identifier in a second name space. The disclosed technique involves obtaining the first identifier in the first name space from a source, applying a rule to the first identifier in the first name space, such that a second identifier in a second name space is obtained, and providing the second identifier, such that the source obtains the second identifier without resolving the first identifier using a domain name system (DNS). | 2015-06-04 |
20150156163 | Information Messaging System - A method of transmitting contact information to an approved mobile communication device includes receiving an input representative of desired contact information located on a first web page and an input representative of the identity of a desired mobile communication device. The method also includes saving information representative of the desired contact information in a contact information database. The method also includes determining whether the desired mobile communication device is an approved device and transmitting to the desired mobile communication device information representative of a notification to send the information representative of the desired contact information. The method also includes receiving an input from the desired mobile communication device information representative of an acceptance to receive the information representative of the desired contact information, and transmitting to the desired mobile communication device information representative of the desired contact information. | 2015-06-04 |
20150156164 | COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, COMMUNICATION RELAY SYSTEM, AND COMMUNICATION RELAY CONTROL METHOD - A communication system | 2015-06-04 |
20150156165 | Local Device Identity Allocation for Network Assisted Device-to-Device D2D Communication - A method of a network node adapted to provide assistance of device-to-device communication is disclosed. The method comprises receiving, from a first wireless communication device adapted to perform device-to-device communication, one or more first global device identities associated with the first wireless communication device and allocating one or more first local device identities to the first wireless communication device based on the received global device identities ( | 2015-06-04 |
20150156166 | COMMUNICATION METHOD AND MOBILE ELECTRONIC DEVICE USING THE SAME - A communication method and a mobile electronic device are provided. The communication method includes: receiving a message packet; determining whether or not the received message packet is an abnormal packet; and when the received message packet is determined out as the abnormal packet, increasing a count value; keeping to receive the message packets and determine whether or not the received message packet is an abnormal packet; and when the count value is greater than an upper-limit value, re-deriving an IP address. | 2015-06-04 |
20150156167 | NAT TRAVERSAL METHOD, COMPUTER-READABLE MEDIUM, AND SYSTEM FOR MEDIATING CONNECTION - Disclosed herein is a network address translation (NAT) traversal method. A node sends a first, second, and third detection message from a local port to a first, second, and third response server, respectively, in order to receive from the response servers a first, second, and third response message, which respectively include a first, second, and third proximal external port number (EPN). The node then deduces a rule for proximal EPNs based on the received ones. Also disclosed is a system for mediating connection. The system assists a first node on a network in NAT traversal and includes at least three response servers, which receive detection messages from the first node and send back response messages that include EPNs. | 2015-06-04 |
20150156168 | SUGGESTING NAME IDENTIFIERS USING INTERACTIVE KEYWORDS - A method for creating, displaying, and registering name identifiers, such as domain names or social media handles, using interactive tokens and keywords is presented. A user may enter a user search into a data entry field on a webpage of a website. The user search may be tokenized, with each token representing an entity or word in the user search. A plurality of keywords, typically synonyms or related words, are found for one or more of the tokens. The tokens and keywords are displayed on a webpage along with methods for selecting tokens and/or keywords to be used to spin a batch of name identifiers. The user may add, delete, edit, reorder, and/or lock tokens and select keywords. The tokens and/or selected keywords, along with selected or determined domain name extensions, are combined to create a plurality of name identifiers. The user may select one or more of the name identifiers for registration. | 2015-06-04 |
20150156169 | METHOD FOR DETERMINING VALIDITY OF COMMAND AND SYSTEM THEREOF - Disclosed are method and system for determining the validity of a command line, comprising the steps of: maintaining a first IP address database including first IP address information or at least one terminal specification information associated with the first IP address information, in which the first IP address information includes IP address information of a proxy server or that of a terminal using a dynamic IP address; receiving a command line from a terminal of a user; extracting a request content, second IP address information, or second terminal specification information included in the command line; generating log information including the request content, the second IP address information, the second terminal specification information or input time point information with respect to the input time point of the command line recording the log information associated with the command line in a log database; identifying the terminal by referring to the first IP address database and the log database; and determining the validity of the command line in association with the identified terminal. | 2015-06-04 |
20150156170 | Security Event Routing In a Distributed Hash Table - Embodiments include components of a computer defense network (CND) architecture, e.g. a content addressable network (CAN) gateway, a CAN peer or a CND controller. The gateway is configured to receive from a host a security event log that includes a protocol tag, and to securely forward the log to a selected one of a plurality of CAN peers based on the protocol tag. The CAN peer is configured to configured to filter the events based on an assigned communication protocol, and to produce a security report from the filtered events. The CND controller is configured to receive the filtered report from the peer and to defend the network against a threat based on the report. | 2015-06-04 |
20150156171 | METHOD AND APPARATUS FOR PROVIDING PRIVACY ADAPTATION BASED ON RECEIVER CONTEXT - An approach is provided for determining a communication session established between at least one first device of at least one first user and at least one second device of at least one second user, wherein the at least one first device and the at least one second device are in a collaborative context detection relationship. The privacy platform causes, at least in part, a detection of a presence of at least one third user within a proximity threshold of the at least one first device, the at least one second device, the at least one first user, the at least one second user, or a combination thereof, wherein the detection is performed via the collaborative context detection relationship. The privacy platform also determines one or more modifications to one or more privacy profiles for information exchanged over the communication session based, at least in part, on the detection of the presence of the at least one third user. | 2015-06-04 |
20150156172 | ARCHITECTURE OF PRIVACY PROTECTION SYSTEM FOR RECOMMENDATION SERVICES - Method(s) and system(s) for providing privacy to personal information of end users while utilizing recommendation services and personalized content are described. According to the present subject matter, the system(s) implement the described method(s) for providing privacy to personal information of end users. The method for privacy protection includes receiving user consumption data associated with one or more end users where the user consumption data comprises at least a slice of interest profile and associated interest group id of the slice of interest profile; and where the user consumption data is received through a network anonymization layer. The method may further include routing the user consumption data to an interest group aggregator node from amongst a plurality of intermediary nodes based on distributed hash table routing mechanism, and wherein the interest group aggregator node is associated with the interest group id present in the user consumption data. | 2015-06-04 |
20150156173 | Communication system utilizing fingerprint information and use thereof - The invention discloses a communication system utilizing fingerprint information, which comprises a fingerprint sensor and a communication application unit, the communication application unit includes a communication software, an encrypting software and a decrypting software reverse to the encrypting software. The communication system comprises a step (A) of adding friends, a step (B) of encrypting and sending a message, and a step (C) of decrypting and recognizing a message. According such system of the invention, encryption and decryption management can be performed by utilizing fingerprint information, thereby, anyone who doesn't have matching fingerprint information can not read the encrypted message(s), and thus the privacy and safety of user information can be improved greatly on the basis of original systems. | 2015-06-04 |
20150156174 | DATA TRANSFER OPTIMIZATIONS - Data transfer between a first computer system and a second computer system utilize parallel servers of the second computer system. A plurality of data chunks collectively comprise a data object. The data chunks may be encrypted and sent over parallel channels to the second computer system, which may be a data storage service of a computing resource service provider. The data object, or a portion thereof, may be downloaded from the data storage system in parallel. | 2015-06-04 |
20150156175 | METHODS FOR SECURING A COMMUNICATION TO A SOCIAL MEDIA APPLICATION AND DEVICES THEREOF - The present invention provides a method and system for securing communication of data to a social media application. A set of network routing parameters are configured for the communication. An encrypted response containing a sensitive data is routed from a secure entity to the social media application through a middleware. The encrypted response is intercepted by a decrypting entity based on the configured set of network routing parameters. The encrypted response is decrypted by the decrypting entity and the sensitive data is retrieved. The sensitive data is transmitted by the decrypting entity to the social media application. | 2015-06-04 |
20150156176 | METHOD AND SYSTEM FOR SECURE TRANSMISSION OF REMOTE NOTIFICATION SERVICE MESSAGES TO MOBILE DEVICES WITHOUT SECURE ELEMENTS - A method for receiving and processing a data message includes: storing at least an encryption key; receiving a data message, the data message including at an encrypted message and a message authentication code, the message authentication code generated using at least a portion of the encrypted message; generating a reference authentication code using at least a portion of the encrypted message included in the received data message; validating the received data message based on a check of the message authentication code included in the received data message against the generated reference authentication code; and decrypting the encrypted message included in the received data message using the stored encryption key to obtain a decrypted message. | 2015-06-04 |
20150156177 | METHOD AND SYSTEM FOR AUTOMATIC GENERATION OF CONTEXT-AWARE COVER MESSAGE - One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system receives, at the receiving device, a benign message sent over a communication channel from the sending device. Next, the system computes a digest from the benign message by hashing the benign message. The system then queries a cover message server with the computed digest to determine whether the benign message indicates that an encrypted message is available at a secure message server. Subsequently, the system obtains the encrypted message from the secure message server, responsive to determining that the benign message indicates that the encrypted message is available at the secure message server. | 2015-06-04 |
20150156178 | COMPRESSING ENCRYPTED DATA WITHOUT THE ENCRYPTION KEY - A method, system and computer program product are disclosed for compressing encrypted data, wherein the data is encrypted by using a block encryption algorithm in a chained mode of operation, and the encrypted data is comprised of a set of N encrypted blocks, C | 2015-06-04 |
20150156179 | SECURITY KEY GENERATOR - A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data are encrypted using a security key. The first device comprises a first key generator generating a first embodiment of the key independently of a second embodiment of the key generated by a second generator of the second device, the second embodiment being generated independently of the first, which depends on parameter(s) characterizing a first transmission quality of the channel when receiving a first set of unencrypted data sent by the second device. The second embodiment depends on parameter(s) characterizing a second transmission quality of the channel when receiving a second set of unencrypted data sent by the first device, the first set being different from the second set. | 2015-06-04 |
20150156180 | HANDHELD VIDEO VISITATION - A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process. | 2015-06-04 |
20150156181 | METHODS AND DEVICES FOR SECURITY KEY RENEWAL IN A COMMUNICATION SYSTEM - A method is provided for security key renewal performed in a key management device of a communication system. The communication system includes two or more communication devices communicating data packets by using a first security key for transmission and reception. The method includes transmitting, to the two or more communication devices, a second security key for transmission and reception of the data packets; transmitting, to the two or more communication devices, an activation message for activating use of the second security key for reception of the data packets; transmitting, to the two or more communication devices, an activation message for activating use of the second security key for transmission of the data packets; transmitting, to the two or more communication devices; a deactivation message for deactivating use of the first security key for transmission of the data packets; and transmitting, to the two or more communication devices, a deactivation message for deactivating use of the first security key for reception of the data packets. | 2015-06-04 |
20150156182 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND COMPUTER PROGRAM - Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time. | 2015-06-04 |
20150156183 | SYSTEM AND METHOD FOR FILTERING NETWORK COMMUNICATIONS - Embodiments of a secure network gateway system and a filtering method using the system are disclosed. The secure network gateway system includes a tunneling front end node capable of establishing a communication tunnel with a client access point and authenticating a user to allow the user to access to a wide area network via the communication tunnel. The system also includes a plurality of filter nodes. A plurality of filtering rules are associated with the authenticated user. The tunneling front end node is capable of determining how to handle transmissions to and from the authenticated user according to these filtering rules and passing the transmissions to the appropriate filter nodes. The filter nodes are capable of filtering transmissions according to the filtering rules and passing the filtered transmissions to the tunneling front end node for forwarding to the authenticated user via the communications tunnel. | 2015-06-04 |
20150156184 | PHYSICS-BASED AUTHENTICATION - In some examples, a controller is configured to generate a key based on a physics-based output of a component. The controller may, for example, use the key to authenticate communication between at least two nodes, to encrypt data, or to decrypt data. In some examples, the component includes one or more subcomponents, each subcomponent including a cell filled with a gas, a light source configured to transmit a light through the gas cell, and a photodetector configured to sense light transmitted through the gas cell. The photodetector of each subcomponent is configured to generate an electrical signal that changes as a function of one or more properties of the light sourced by the light source, transmitted through the gas cell. The output of the component can is based on the signals generate by the one or more photodetectors. | 2015-06-04 |
20150156185 | TRUSTWORTHINESS OF PROCESSED DATA - A method and/or computer program product indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to a data item to be processed to provide a weighted data item, the first trust weight representing a level of trust in the data item. A second trust weight is assigned to the processing rule to provide a weighted processing rule, the second trust weight representing a level of trust in the processing rule. The weighted data item is processed in accordance with the weighted processing rule to generate a data output and an indication of a level of trust in the data output. | 2015-06-04 |
20150156186 | SYSTEM AND METHOD FOR COMMUNICATION OVER COLOR ENCODED LIGHT PATTERNS - The present invention includes a light communication method and system wherein messages are transmitted via color code flashes. The light communication may be used in multiple factor authentication for network communication between a client and server computer. | 2015-06-04 |
20150156187 | LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE - Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection. | 2015-06-04 |
20150156188 | METHODS AND SYSTEMS FOR PROVIDING SECURE TRANSACTIONS - Methods and systems to provide secure electronic document transactions are described. In one embodiment, a processor creates a first data storage container capable of being nested as a component file of a second data storage container. In one embodiment, the first data storage container comprises: a unique first data storage container identifier; at least one unique component file identifier to identify at least one component file of the first data storage container, and the component file is an electronic document or another data storage container. In one embodiment, the first data storage container further comprises: at least one component file hash value for the at least one component file; a first attribute set; and a first data storage container hash value calculated based on features including the at least one unique component file identifier, the at least one component file hash value, and the first attribute set. | 2015-06-04 |
20150156189 | PERSONAL CASTING SYSTEM - A profit redistribution device, profit redistribution method, program storage medium, profit redistribution system, content providing device, content providing method, program storage media, and content providing system are disclosed. Profit redistribution processing is performed according to the accumulated points proportionate to the number of times the content with a commercial video is provided to a client PC. Thus, a fair profit redistribution can be easily performed. A preset content with a commercial video is provided to a user when requested from the client PC, and it is possible to provide advertisement information without the user being aware of the commercial. | 2015-06-04 |
20150156190 | DYNAMICALLY MAPPING USERS TO GROUPS - Methods and systems for authenticating users and assigning authenticated users to groups are provided. A method receives a user credential and email address. The method forwards an authentication request including the email address and credential to a remote authentication provider. Based in part on the presence of a full user name in a received response, the method determines that the user is authenticated. Another method extracts a domain name from a received email address of an authenticated user. In response to determining that the domain name is associated with a group, the method assigns the user to the group. A system includes memory with instructions for assigning an authenticated user to a group. The system receives the user's email address and extracts a domain name from the email address. In response to determining that the domain name is associated with a group, the system assigns the user to the group. | 2015-06-04 |
20150156191 | METHOD AND SYSTEM FOR ACCESSING SERVICE/DATA OF A FIRST NETWORK FROM A SECOND NETWORK FOR SERVICE/DATA ACCESS VIA THE SECOND NETWORK - The present invention relates to a method for accessing service/data of a first network from a second network for service/data access via the second network, comprising the steps of a) Pairing of a user device with the first network, b) Attaching the user device to the second network, c) Authenticating the user device with the second network, d) Providing connectivity information for services/data of the first network to the second network, e) Providing available services/data information by the first network to the second network, f) Accessing a service and/or data of the first network by the second network. The present invention relates also to a system for accessing service/data of a first network from a second network for service/data access via the second network. | 2015-06-04 |
20150156192 | FEDERATED IDENTITY CREATION - A user may have multiple identities used to access multiple services or accounts. The user may use the multiple identities online from a device. The system may detect that the multiple identities connect from the device and determine that the multiple online identities all have associated relationships with the user. A federated user identifier may, accordingly, be created. Based on the common identification, various features may be enabled, including fraud detection and targeted advertising. | 2015-06-04 |
20150156193 | CREATING AND MANAGING CERTIFICATES IN A ROLE-BASED CERTIFICATE STORE - Embodiments are directed to managing shared certificates of a role certificate store, accessing and implementing certificates provided by a role certificate store and to managing role-based shared certificates using a role certificate store. In one scenario, a computer system establishes a role certificate store. The role certificate store is configured to store role-based shared certificates, where each role-based shared certificate corresponds to instances of a specified role. The computer system receives a request for a role-based shared certificate from an instance of the specified role, where the request is redirected from a local data store to the role certificate store. The computer system then verifies that the request was received from an instance of the specified role and sends the requested role-based shared certificate to the role instance. | 2015-06-04 |