27th week of 2015 patent applcation highlights part 71 |
Patent application number | Title | Published |
20150188810 | METHOD AND DEVICE FOR POLICY-BASED ROUTING - A mobile device performs a method for policy-based routing. The method includes creating a first set of marking rules based on routing policy data provisioned in the mobile device, wherein each marking rule indicates labeling for packets, wherein the labeling is used in selecting one of a plurality of active network interfaces in the mobile device to route the packets over a set of access networks available to the mobile device. The method further includes creating a first set of routing tables corresponding to the labeling indicated by the first set of marking rules, wherein each routing table directs the mobile device to a different one of the active network interfaces of the plurality of active network interfaces. | 2015-07-02 |
20150188811 | VIRTUAL PORT GROUPING FOR VIRTUAL CLUSTER SWITCHING - One embodiment of the present invention provides a switch. The switch includes a port that couples to a server hosting a number of virtual machines. The switch also includes a set of virtual port grouping information and a virtual port grouping mechanism. During operation, the virtual port grouping mechanism determines whether a frame is traveling from a virtual port group to the same virtual port group. If the frame is not traveling to the same virtual port group, the virtual port grouping mechanism prevents the frame from being forwarded. | 2015-07-02 |
20150188812 | METHOD AND APPARATUS FOR GENERATING FORWARDING ENTRIES FOR DEVICES IN OPTICAL NETWORK - Embodiments of the present invention provide a method and an apparatus for generating forwarding entries for devices in an optical network. The optical network includes a virtual access node AN, where the virtual AN includes a first access device, a second access device, and an access port management apparatus. The access port management apparatus acquires a virtual AN forwarding entry sent by an access management device; generates a first forwarding entry for a first device in the first access device and the second access device according to the virtual AN forwarding entry; and generates a second forwarding entry for a second device in the first access device and the second access device according to the virtual AN forwarding entry. The virtual AN may automatically generate forwarding entries for the first access device and second access device in the virtual AN according to the virtual AN forwarding entry. | 2015-07-02 |
20150188813 | METHOD AND APPARATUS FOR SCALABLE CONTENT ROUTING AND MOBILITY IN NAMED DATA NETWORKS - Various disclosed embodiments include methods, systems, and computer-readable media for named data network (NDN) inter/intra-domain mobility. A complete de-coupling of identity and addressing space is established. This provides separation of control and forwarding allowing rich policy based routing, using SDN principles, as well as policy based global resolution. In one embodiment, the de-coupling of identity from location is achieved by a changeable forwarding label field in a header that can have nodal/domain/global scope. This disclosure provides content routing/mobility to be handled with a high degree of flexibility. This disclosure also provides mobility as a service for a component of a name space. | 2015-07-02 |
20150188814 | SYSTEM, METHOD AND APPARATUS PROVIDING BI-DIRECTIONAL FORWARDING DETECTION SUPPORT TO UNNUMBERED IP INTERFACES - A system, method and apparatus providing BFD support to unnumbered IP Interfaces in MPLS networks using a newly defined interface identifier (IF-ID) sub-object included within one or more BFD protocol messages to extend the use of BFD protocol to unnumbered IP interfaces. | 2015-07-02 |
20150188815 | Packet Forwarding Method and System - A packet forwarding method and system. A first network device encapsulates a to-be-forwarded packet as a first packet, and sends the first packet to a second network device, where the first packet carries a destination Media Access Control (MAC) address encapsulation instruction, the destination MAC address encapsulation instruction is used to instruct the second network device to encapsulate a destination MAC address for the first packet, the to-be-forwarded packet carries a destination internet protocol (IP) address, and the destination MAC address is a MAC address of a destination host corresponding to the destination IP address; the second network device generates a second packet containing the destination MAC address according to the destination MAC address encapsulation instruction carried by the received first packet, and forwards the second packet to the destination host corresponding to the destination MAC address. | 2015-07-02 |
20150188816 | LOOK-ASIDE PROCESSOR UNIT WITH INTERNAL AND EXTERNAL ACCESS FOR MULTICORE PROCESSORS - A method and a system embodying the method for information lookup request processing at a look-aside processor unit comprising storing a received lookup transaction request in a first buffer; rebuilding the lookup transaction request into a request packet; transmitting the request packet; receiving a packet; determining whether the received packet comprises a response packet or an exception packet; and processing the received packet in accordance with the determining is disclosed. Furthermore, a method and a system embodying the method for exception packet processing at a look-aside processor unit comprising storing at least one received lookup transaction request in a first buffer; receiving a packet; determining that the received packet comprises an exception packet; and associating the exception packet with one of the at least one stored lookup transaction request in accordance with an identifier of the first buffer is disclosed. | 2015-07-02 |
20150188817 | TABLE-DRIVEN ROUTING IN A DRAGONFLY PROCESSOR INTERCONNECT NETWORK - A multiprocessor computer system comprises a dragonfly processor interconnect network that comprises a plurality of processor nodes and a plurality of routers. The routers are operable to route data by selecting from among a plurality of network paths from a target node to a destination node in the dragonfly network based on one or more routing tables. | 2015-07-02 |
20150188818 | DISTRIBUTED VIRTUAL NETWORK GATEWAYS - Computerized methods, systems, and computer-readable media are provided for distributing virtualized gateway functionality to multiple nodes within a physical network. Initially, drivers that carry out the gateway functionality are provisioned to cooperate with endpoints instantiated on the network nodes, while a directory service is implemented to maintain a mapping between virtual internet protocol (IP) addresses and location-dependent addresses, as well as a table enumerating transformation actions according to known pathways connecting the endpoints within a network. In operation, the directory service replies to requests from the driver (carrying source and destination IP addresses of data packets) with the appropriate location-dependent addresses (utilizing the mapping) and the appropriate transformation action(s) (utilizing the table). The transformation action(s) include rewriting headers of the data packets to include the location-dependent addresses, encapsulating the data packets as inner data packets within respective outer data packets, or configuring the data packets with a tunneling protocol. | 2015-07-02 |
20150188819 | Method and Apparatus for Deciding Network Coding Method Based on Link Utilization - A method and apparatus for deciding a network coding method based on link utilization are disclosed herein. The method may include a step of setting up an output link utilization reference value of a network intermediate node, a step of calculating an average utilization of output links for each network intermediate node, a step of deciding a network coding method in accordance with the average utilization of the output link for each network intermediate node, a step of consistently updating the average utilization of the output link for each network intermediate node, and a step of changing the network coding method, when a value of the average utilization value is changed. | 2015-07-02 |
20150188820 | QUANTIZED CONGESTION NOTIFICATION (QCN) EXTENSION TO EXPLICIT CONGESTION NOTIFICATION (ECN) FOR TRANSPORT-BASED END-TO-END CONGESTION NOTIFICATION - According to one embodiment, a method for handling congestion in a network includes determining that there is congestion on a first device in a network, setting a congestion indicator in a header of a packet to indicate an amount of congestion at the first device, sending the packet to all devices that send traffic to the first device, receiving the packet having the multi-bit indicator in a header thereof at a device that sends traffic to the first device, and reducing a congestion window by a factor of between about 5% and about 50% based on a severity of the congestion indicated by the multi-bit indicator, wherein the congestion window is reduced by a greater factor when the congestion is indicated as being more severe. Other systems and methods for handling congestion in a network are described according to more embodiments. | 2015-07-02 |
20150188821 | LOW-LATENCY LOSSLESS SWITCH FABRIC FOR USE IN A DATA CENTER - In one embodiment, a switch includes a processor and logic integrated with and/or executable by the processor, the logic being configured to cause the processor to receive a packet at an ingress port of the switch, forward the packet to a buffered switch when at least one congestion condition is met, where the buffered switch is configured to evaluate congestion conditions of a fabric network, and forward the packet to a low-latency switch when the at least one congestion condition is not met, where the low-latency switch includes an additional policy table provided with forwarding decisions based on the congestion conditions of the fabric network. Other switches, systems, methods, and computer program products for providing low latency packet forwarding with guaranteed delivery are described according to more embodiments. | 2015-07-02 |
20150188822 | CHOICE OF INITIALIZATION TECHNIQUE FOR LOAD BALANCING ATTEMPTS - A cable network facilitates communication between a CMTS and cable modems over a plurality of channels. The Data Over Cable Service Interface Specification (DOCSIS) protocol access system for load balancing in a cable network transmits a change request directing movement of a cable modem to a different channel. The change request indicates an initialization technique for the cable modem to perform once synchronized to the different channel(s). If the cable modem is not successfully initialized on the different channel or channel set, the CMTS is configured to iteratively transmit subsequent retry requests. The subsequent retry requests may indicate an initialization technique based on a list of initialization techniques. | 2015-07-02 |
20150188823 | Virtual private network (VPN)-as-a-service with load-balanced tunnel endpoints - A mechanism to facilitate a private network (VPN)-as-a-service, preferably within the context of an overlay IP routing mechanism implemented within an overlay network. The overlay provides delivery of packets end-to-end between overlay network appliances positioned at the endpoints. During such delivery, the appliances are configured such that the data portion of each packet has a distinct encryption context from the encryption context of the TCP/IP portion of the packet. By establishing and maintaining these distinct encryption contexts, the overlay network can decrypt and access the TCP/IP flow. This enables the overlay network provider to apply one or more TCP optimizations. At the same time, the separate encryption contexts ensure the data portion of each packet is never available in the clear at any point during transport. According to another feature, data flows within the overlay directed to a particular edge region may be load-balanced while still preserving IPsec replay protection. | 2015-07-02 |
20150188824 | LINK AGGREGATION (LAG) INFORMATION EXCHANGE PROTOCOL - In one embodiment, a switch includes a processor and logic integrated with and/or executable by the processor to receive details about which link aggregation (LAG) information about a first peer switch will be exchanged with the switch, send to the first peer switch, prior to receiving the LAG information about the first peer switch, details about which LAG information about the switch will be exchanged with the first peer switch, receive the LAG information about the first peer switch, store the LAG information about the first peer switch, and use the LAG information about the first peer switch and the LAG information about the switch to determine load balancing across one or more connections between the switch and the first peer switch. | 2015-07-02 |
20150188825 | ELASTIC TRAFFIC MARKING FOR MULTI-PRIORITY PACKET STREAMS IN A COMMUNICATIONS NETWORK - Routers in a communications network mark packets of a multi-priority stream to establish a drop precedence of the packets during network congestion. For each packet received, a router employs one of two types of packet-marking mechanisms to associate low drop precedence with a high-priority, out-of-profile packet. One type, called “token bucket with loan bucket,” uses a token bucket to determine whether a packet is in conformance, i.e., in-profile, with a traffic profile and at least one loan bucket to determine whether a high priority, out-of-profile packet may borrow bandwidth. Another mechanism type, called “token bucket with color-exchange queue,” uses a color-exchange queue to delay packet forwarding for a fixed period. During this delay, a high-drop-precedence marking of an out-of-profile, high-priority packet may be exchanged with a low-drop-precedence marking of an in-profile, low-priority packet. The packet-marking mechanisms are useful in improving the quality of video viewing. | 2015-07-02 |
20150188826 | Methods and Apparatus for Improving Idle Mode Performance Using Deep Packet Inspection (DPI) Idle Mode Agent - A network configuration capable of prioritizing and categorizing paging messages using a deep packet inspection (“DPI”) idle mode agent (“IMA”) is disclosed. In one embodiment, upon redirecting a downstream packet stream to a DPI agent after discovery of destination end user (“EU”) equipment is in an idle mode, the legitimacy of the downstream packet stream is determinate in accordance with previously stored information. The downstream packet stream is subsequently categorized to a high priority paging category, a medium priority paging category, or a low priority paging category in response to the legitimacy of the downstream packet stream. | 2015-07-02 |
20150188827 | DS Domain Generating Method, Device and System - A differentiated service (DS) domain generating method, a device, and a system. A network management device obtains device attribute information of multiple DS devices; determines according to the device attribute information of the multiple DS devices, a DS device that belongs to a first DS domain; and sends a notification message to the DS device that belongs to the first DS domain, so that the DS device that belongs to the first DS domain joins the first DS domain according to the notification message, thereby implementing automatic determining and generation of a DS domain, reducing workload of configuring quality of service (QoS) parameters in a DS domain including a relatively large number of devices, and improving efficiency in generating and maintaining the DS domain. | 2015-07-02 |
20150188828 | SYSTEM AND METHOD FOR REPORTING PACKET CHARACTERISTICS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc. | 2015-07-02 |
20150188829 | PRIORITY-BASED ROUTING - Disclosed herein is a router configured for priority-based routing. The router is configured to receive a plurality of packets, wherein each packet is assigned a priority value. The router includes an output circuit configured to select the packet with the highest priority value. The output circuit is configured to forward the priority value of the selected packet to a second router. The output circuit is configured to transfer the selected packet to the second router when the link between the first router and the second router is available. | 2015-07-02 |
20150188830 | Systems And Methods For Managing Congestion - Systems and methods for managing congestion in a network are disclosed. One method can comprise establishing a connection between a first network device and a second network device, wherein the first network device has an associated data limiter value such as a congestion window (CWND). The size of the CWND can be modified, for example, at a first rate, when no congestion is detected. In response to the congestion window size exceeding a threshold value associated with the connection, the size of the CWND can be modified based on round trip time (RTT) associated with the connection. If congestion on the connection is detected, the congestion window size can be modified to a value based on at least in part the bandwidth and RTT of the connection between the first network device and the second network device. | 2015-07-02 |
20150188831 | System and Method for Traffic Engineering Using Link Buffer Status - Embodiments are provided for implementing traffic engineering (TE) using link buffer status. The link buffer status for each link is used to identify links with buffer build-ups. One or more of the capacity and resource parameters at the links with buffer build-ups are then reserved. This is achieved by modifying the capacity and resource input parameters to the TE model according to the level of build-ups in the link buffers, as reflected by the buffer status information from the links and nodes. The modified input capacity or resource parameters are then fed to a TE engine to calculate the routing of traffic across all links and paths. As such, the reserved capacity or resource is considered in the TE routing technique to route the traffic accordingly, leading to the depletion of link buffers with build-ups at all or multiple considered paths at the same time. | 2015-07-02 |
20150188832 | SYSTEM AND METHOD FOR ORDERING OF DATA TRANSFERRED OVER MULTIPLE CHANNELS - A multiple channel data transfer system ( | 2015-07-02 |
20150188833 | OVERHEAD MANAGEMENT FOR VIRTUAL MACHINES - A method includes loading a guest virtual machine onto a host system, determining, with the host system, an encapsulation method to be used in association with a virtual network associated with the guest virtual machine, determining an overhead value based on the encapsulation method, determining an adjusted maximum transmission unit (MTU) value based on the overhead value, and passing, information related to the adjusted MTU value from the host system to the guest virtual machine. | 2015-07-02 |
20150188834 | DATA TRANSMISSION APPARATUS, DATA DIVISION APPARATUS AND DATA DIVISION METHOD - A data transmission apparatus ( | 2015-07-02 |
20150188835 | METHOD AND APPARATUS FOR DEBLOCKING AND BLOCKING TRANSMISSION OF FRAMES FROM A NETWORK DEVICE - A network device including first and second queues, a timing module, and deblocking and blocking shapers. The first and second queues respectively store first and second frames. The timing module generates: a first priority timing signal indicating when transmission of the first frame is permitted; and a second priority timing signal indicating when transmission of the second frame is not permitted. The deblocking shaper, based on the first priority timing signal, permits transmission of the first frame during a predetermined window. The blocking shaper includes a counter indicating an amount of time until a start of the predetermined window. The blocking shaper, based on the second priority timing signal, a value of the counter and a size of the second frame, determines whether to permit transmission of the second frame prior to the predetermined window or block forwarding of the second frame until after the predetermined window. | 2015-07-02 |
20150188836 | MULTICAST TO UNICAST CONVERSION TECHNIQUE - A technique allows stations to utilize an equal share of resources (e.g., airtime or throughput). This prevents slow stations from consuming too many resources (e.g., using up too much air time). Fairness is ensured by selective dropping after a multicast packet is converted to unicast. This prevents slow stations from using more than their share of buffer resources. Multicast conversion aware back-pressure into the network layer can be used to prevent unnecessary dropping of packets after multicast to unicast (1:n) conversion by considering duplicated transmit buffers. This technique helps achieve airtime/resource fairness among stations. | 2015-07-02 |
20150188837 | Hierarchical Software-Defined Network Traffic Engineering Controller - Hierarchical Software Defined Network (SDN) architectures can be used to reduce complexity of traffic engineering in large or divers network environments. In hierarchical SDN architectures, a network is sub-divided into multiple regions, and each region is assigned to a different SDN controller. Network status information is collected and consolidated at a regional level, and fed upstream through the SDN control plane until it reaches a root SDN controller. The root-SDN controller computes cost-based parameters, which are distributed to regional SDN controllers for local provisioning. The cost-based parameters can include Lagrangian variables estimations or other parameters that constrain regional traffic engineering optimization in a manner that advances global traffic engineering objectives. | 2015-07-02 |
20150188838 | Disabling Network Connectivity on Student Devices - In a classroom, students may bring their own electronic devices and use them to augment classroom instruction by connecting to a classroom network and interacting with various network resources. During certain periods of time, such as testing or pop quizzes, a teacher may assure that students do not cheat by accessing network resources by sending a command to each student device to block access to the classroom network. At the end of the time period, a command may be provided to allow the student devices to again access the network. | 2015-07-02 |
20150188839 | VIRTUALIZATION IN A STORAGE AREA NETWORK - Embodiments of the present invention provide a storage device and a method therefor, the storage device comprising at least one port and a plurality of storage resources. In the storage device, the plurality of storage resources are divided into a plurality of storage resource sets, and each of the plurality of storage resource sets is configured to be associated with one or more ports of the at least one port, such that each of the storage resource sets can be accessed only through the one or more ports associated with it. | 2015-07-02 |
20150188840 | MANAGING RESOURCE ALLOCATION IN HIERARCHICAL QUOTA SYSTEM - A method for managing resource allocation in a hierarchical quota system, comprising n layers of quota nodes, n being a positive integer greater than 1, and comprises at a first quota node in an i | 2015-07-02 |
20150188841 | AGGREGATED ADAPTIVE BIT RATE STREAMING - Systems, methods and devices provide efficient bandwidth allocation on a satellite, mobile telephone or other data connection by allowing nodes to share bandwidth for commonly-requested data. A transmission center, uplink or other gateway suitably recognizes when content requests from multiple different nodes are simultaneously requesting delivery of the same content. When the same content is recognized, the gateway device allocates shared bandwidth on the data transmission link for the requested content that is accessible to both the first and second nodes. | 2015-07-02 |
20150188842 | FLEXIBLE BANDWIDTH ALLOCATION IN A CONTENT DISTRIBUTION NETWORK - Methods and systems to improve the efficiency of a content delivery system. A local distribution node is introduced to the network, between the content provider and the end user device (i.e., the leaf node). The local distribution node is responsible for servicing a localized subset of the leaf nodes that would otherwise be serviced by a conventional server of the content delivery system. Requests for content are received at the local distribution node from leaf nodes, and content is received at the local distribution node for transmission to the leaf node(s). Content may be cached at the local distribution node to allow faster service of subsequent requests for this content. Caching may also be used to make the channel surfing process more efficient. If demand is high, a leaf node may be promoted to serve as an additional local distribution node. Leaf nodes may also share content among themselves. Bandwidth may be allocated and reallocated by the local distribution node for the local population of leaf nodes. | 2015-07-02 |
20150188843 | User Account-Based Access to Real-Time Communications - Access to real-time communication services associated with real-time communication addresses may be provided based on a user account. A user logging in to a user account on one computing device may be provided with access to real-time communication services associated with a real-time communication address even when that real-time communication address is a real-time communication address for another device. Once logged in, the user may receive or initiate real-time communications for that real-time communication address at the computing device. The user may also add another real-time communication address that is not specific to any device to the user account. Communications to the other real-time communication address are routed to whatever device the user is logged in to. Also, the user may download a wireless communication application to a computing device to provide access to real-time communications over a telecommunication network that might otherwise be unavailable. | 2015-07-02 |
20150188844 | System to Share Network Bandwidth Among Competing Applications - The present invention pertains to the allocation of bandwidth on a global large scale network. Systems and methods are provided to base bandwidth allocation on the predicted bandwidth demands of the network users. In allocating bandwidth, each user is assigned a user weight value, and is to be allocated bandwidth in proportion to that value. In addition, the bandwidth allocation is enforced so as to ensure that bandwidth allocation policies are maintained. | 2015-07-02 |
20150188845 | MITIGATING BANDWIDTH DEGRADATION IN A SWITCHING DEVICE - A switching device is operable to mitigate bandwidth degradation while it is oversubscribed. Due to a latency involved with notifying a scheduler that a queue has transitioned from an active state to an empty state, the scheduler may inadvertently schedule an empty queue for processing, which may result in a degradation of bandwidth of the switching device. To avoid such degradation, the switching device may be configured to control the flow of data provided from the queue to the scheduler so that the data is provided to the scheduler as a burst transaction. For example, the switching device may be configured to delay the provision of certain indicators provided by a queue in order to defer the notification to the scheduler of when the queue receives and stores data. This may enable the queue to store more data, which can be provided to the scheduler as a burst transaction. | 2015-07-02 |
20150188846 | TECHNIQUES FOR PROVIDING DYNAMIC ACCOUNT AND DEVICE MANAGEMENT - Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device. | 2015-07-02 |
20150188847 | STREAMING BRIDGE DESIGN WITH HOST INTERFACES AND NETWORK ON CHIP (NoC) LAYERS - Systems and methods described herein are directed to streaming bridge design implementations that help interconnect and transfer transaction packets between multiple source and destination host interfaces through a Network on Chip (NoC) interconnect, which includes a plurality of NoC router layers and virtual channels (VCs) connecting the router layers. Implementations are configured to support a variety of different traffic profiles, each having a different set of traffic flows. Streaming bridge design implementation can divide streaming bridge into a streaming TX bridge and a streaming RX bridge, wherein TX bridge is operatively coupled with host TX interfaces and RX bridge is operatively coupled with host RX interfaces, and where TX bridge forwards transaction packets from host TX interfaces to different router layers/VCs of NoC, and RX bridge, on the other hand, receives packets from NoC router layers/VCs and transmits the packets to host RX interfaces based on Quality of Service. | 2015-07-02 |
20150188848 | MATRIX OF ON-CHIP ROUTERS INTERCONNECTING A PLURALITY OF PROCESSING ENGINES AND A METHOD OF ROUTING USING THEREOF - Embodiments of the present invention relate to a scalable interconnection scheme of multiple processing engines on a single chip using on-chip configurable routers. The interconnection scheme supports unicast and multicast routing of data packets communicated by the processing engines. Each on-chip configurable router includes routing tables that are programmable by software, and is configured to correctly deliver incoming data packets to its output ports in a fair and deadlock-free manner. In particular, each output port of the on-chip configurable routers includes an output port arbiter to avoid deadlocks when there are contentions at output ports of the on-chip configurable routers and to guarantee fairness in delivery among transferred data packets. | 2015-07-02 |
20150188849 | VIRTUAL SWITCH ENABLING COMMUNICATION BETWEEN EXTERNAL OBJECTS AND SIMULATION OBJECTS - Enabling communication between real and simulated elements of a process control system. Software instructions stored in a memory device are executed by a processor to represent a virtual switch. The virtual switch connects to a real element of a process control system and to a simulated element of a process control system. The virtual switch receives communication from the real element intended for the simulated element and forwards the communication to the proper simulated element. The virtual switch receives communication from the simulated element intended for the real element and forwards the communication to the proper real element. | 2015-07-02 |
20150188850 | Ultra Low Latency Network Buffer Storage - Buffer designs and write/read configurations for a buffer in a network device are provided. According to one aspect, a first portion of the packet is written into a first cell of a plurality of cells of a buffer in the network device. Each of the cells has a size that is less than a minimum size of packets received by the network device. The first portion of the packet can be read from the first cell while concurrently writing a second portion of the packet to a second cell. | 2015-07-02 |
20150188851 | DETERMINING STRENGTH OF ASSOCIATION BETWEEN USER CONTACTS - Methods and apparatus related to identifying one or more messages sent by a user, identifying two or more contacts that are associated with one or more of the messages, determining a strength of relationship score between identified contacts, and utilizing the strength of relationship scores to provide additional information related to the contacts. A strength of relationship score between a contact and one or more other contacts may be determined based on one or more properties of one or more of the messages. In some implementations, contacts groups may be determined based on the strength of relationship scores. In some implementations, contacts groups may be utilized to disambiguate references to contacts in messages. In some implementations, contacts group may be utilized to provide suggestions to the user of additional contacts of a contacts group that includes the indicated recipient contact of a message. | 2015-07-02 |
20150188852 | OUT-OF-OFFICE (OOO) AUTOMATION FOR AN E-MAIL APPLICATION - A computer system enables a business to support the automation of out-of-office (OOO) messaging when a recipient of e-mail is unavailable. An out-of-office message configurator operates in co-operation with the e-mail application for out-of-service messaging so that configuration information is automatically requested to specify the content of an OOO message before a first person logs off the computer system. The configured OOO message may then be analyzed to verify that the message complies with a set of rules such as an e-mail policy in a business environment. Consequently, when an e-mail message is received from a second person and the first person is unavailable, an OOO message may be returned to the second person. Different variations of an OOO message may also be selected based on the specifics of the second person. | 2015-07-02 |
20150188853 | MAIL PROCESSING METHODS AND SERVER - Mail processing methods and a server are described. The server receives a mail reply request sent from a client, determines whether a new contact and an original attachment are present in the mail reply request, and if it determines that the new contact and the original attachment are present in the mail reply request, generates a data packet based on a predetermined rule for non-regular mails, and transmits the data packet to a destination. | 2015-07-02 |
20150188854 | PROVIDING ADDITIONAL INFORMATION RELATED TO A VAGUE TERM IN A MESSAGE - Methods and apparatus related to providing additional information related to a vague term in a message. For example, in some implementations, one or more messages sent by a sender and received by one or more recipients may be identified, a vague term in the message may be identified, a user-restricted database may be identified that is associated with the sender or a recipient, and additional information related to the vague term may be determined from the user-restricted database. A vague term is a term which may have multiple meanings and that can be clarified with additional information. In some implementations, user-restricted databases may include additional information that is associated with the user that may be utilized to replace the vague term with a clarified term. In some implementations, a user-restricted database may be utilized to identify additional information in another database that may be utilized to clarify the vague term. | 2015-07-02 |
20150188855 | Systems and Methods for Instant Messaging - Systems and methods are provided for instant messaging. For example, a first association relationship with at least one first apparatus client for instant messaging is established; and a first control instruction is transmitted to the at least one first apparatus client to trigger the at least one first apparatus client to control, according to the first control instruction, an intelligent apparatus connected to the at least one first apparatus client to execute one or more predetermined operations. | 2015-07-02 |
20150188856 | CURATING COMMUNICATIONS - A computer-implemented method includes notifying a first person that a significant event is going to occur with respect to a second person; receiving from the first person, the second person, or another person a communication that relates to the significant event and to the first person and that has been curated at least in part from information that has been accumulated automatically from online resources; and sending the curated communication to the communication target. | 2015-07-02 |
20150188857 | GEOGRAPHICALLY LIMITED COMMUNICATIONS SYSTEM AND METHOD - A geographically limited communications system comprises a server for receiving one or more posts or messages from one or more location-enabled portable devices. The server may store these posts and retrieve them based on location information stored along with the posts. This allows only posts left at a particular location to be viewed by users at that location. In addition, posts may only be left at a user's current location in one or more embodiments. The server may notify a user when another user leaves a post near or at one of the user's previous posts. | 2015-07-02 |
20150188858 | COMMUNICATION METHOD, COMMUNICATION APPARATUS, AND PROGRAM - When a chat service initiation request arrives from a user terminal, the most suitable communication modality is determined based on registration information stored in memory and the message transmitted from the user terminal is converted to this communication modality and then transmitted to the remote party. In principle, if the destination party is a registered member, the chat modality is selected as the communication modality employed when communicating with the remote destination party. On the other hand, if the destination party is an unregistered member, a modality is selected that corresponds to the information registered in memory in association with the unregistered member. | 2015-07-02 |
20150188859 | PRESENTING INFORMATION PERTAINING TO A PLURALITY OF TABS IN AN INSTANT MESSAGING APPLICATION - Presenting information in an instant messaging (IM) application includes loading a tab configuration file comprising attribute information pertaining to a plurality of tabs in a main interface in the IM application, the attribute information comprising presented content information associated with the plurality of tabs; receiving a selection of one of a plurality of tabs in the main interface; retrieving attribute information that corresponds to the selected one of the plurality of tabs based at least on the tab configuration file information; and dynamically creating an extended window for the tab; and displaying the presented content information of the selected tab in the extended window. | 2015-07-02 |
20150188860 | INSTANT MESSAGING INTERACTION METHOD, SYSTEM, SERVER, AND STORAGE MEDIUM - The present disclosure provides an instant messaging interaction method, system, server, and storage medium. The method includes: receiving, by a client side, an answer character string corresponding to a particular question input by a user via a first account; sending, by the client side, the answer character string and corresponding user property information to a server; searching, by the server, the particular question and a target answer thereof according to the user property information, and matching and verifying, by the server, the answer character string with the target answer; and when the verification is successful, returning, by the server, a first notice to a client side for displaying, and scoring preset property of the first account based on a preset rule. The instant messaging interaction method, system, and server provided in the present disclosure stimulate the question-and-answer interaction between instant messaging users, which improves the effectiveness of the interaction. | 2015-07-02 |
20150188861 | MECHANISM FOR FACILITATING DYNAMIC GENERATION AND TRANSMISSION OF CANNED RESPONSES ON COMPUTING DEVICES - A mechanism is described for facilitating a dynamic selection and transmission of canned messages according to one embodiment. A method of embodiments, as described herein, includes selecting, at a computing device, a canned message from a plurality of canned messages, where the canned message includes a text message having one or more of a default message, a variable, and a symbol, wherein the selection is to be performed without a keyboard at the computing device, and transmitting the selected canned message. | 2015-07-02 |
20150188862 | Apparatus and Method for Multi-Format Communication Composition - This disclosure relates generally to apparatuses, methods, and computer readable media for composing communications for computing devices across multiple formats and multiple protocols. More particularly, but not by way of limitation, this disclosure relates to apparatuses, methods, and computer readable media to permit computing devices, e.g., smartphones, tablets, laptops, and the like, to send communications in a number of pre-determined and/or ‘determined-on-the-fly’ communications formats and/or protocols via a single, seamless user interface. Determinations of outgoing communication formats and/or protocols may be based on, e.g., the format of the incoming communication, the preferred format of the recipient and/or sender of the communication, an optimal format for a given communication session/message, and/or economic considerations of format/protocol choice to the recipient and/or sender. The techniques disclosed herein allow communications systems to become ‘message-first,’ as opposed to ‘protocol-first,’ eventually allowing consideration of message protocol to fall away entirely for the sender of the communication. | 2015-07-02 |
20150188863 | METHOD FOR CONTROLLING DATA AND ELECTRONIC DEVICE THEREOF - A method for controlling an application using an electronic device is provided. The method includes providing a message application through the electronic device. The method also includes acquiring a message list comprising information about one or more messages transmitted or received by the electronic device, based on an input configured to transmit a file to an external device for the electronic device through the message application. The method further includes attaching to the message application at least a part of message information about the at least one message as the file, based on an input of selecting at least one message among the message list. | 2015-07-02 |
20150188864 | SYSTEM AND METHOD FOR UNFILTERING FILTERED STATUS MESSAGES - An approach for unfiltering a filtered electronic communication is provided. In one aspect, a computer system receives filtered electronic communication, wherein the filtered electronic communication is a status message. Moreover, the computer system determines a requestor of the filtered electronic communication. The computer system also detects an attempt made to communicate with the requestor. Furthermore, the computer system unfilters, in response to the attempt, the filtered electronic communication. | 2015-07-02 |
20150188865 | System and Method for Regulating Electronic Messages - A system for regulating e-mail comprises a database of information profiling legitimate e-mail usage. When an e-mail is received at the system, it is scrutinized relative to the information in the database. If the e-mail is found to be legitimate based upon this evaluation, it is delivered to the intended recipient. If, however, the e-mail appears on the basis of the evaluation to be the last in a series of illegitimate e-mails or otherwise has characteristics inconsistent with the profile of legitimate e-mail usage, the e-mail may not be delivered and the postmaster and administrator at the source of the e-mail is contacted. | 2015-07-02 |
20150188866 | MESSAGE FOCUSING - A method and apparatus of a device that focuses messages is described. In an exemplary method, the device receives a first and second group of message. The device further selects a related message from the second group of messages that is related to each message in the first group. This selecting is based on an affinity group, where the affinity group includes a message address that occurs in at least one of the messages in the second group and the affinity group is determined using the message addresses contained in the first and second groups. | 2015-07-02 |
20150188867 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING TARGET DEVICE - An electronic device and method for collectively controlling target devices are provided. The electronic device includes a communication unit configured to communicate data, and a processor configured to initiate a group conversation to control at least one target device, and, upon reception of a control command to control a function of the at least one target device, to transmit the control command to the at least one target device through the group conversation. | 2015-07-02 |
20150188868 | METHOD AND SYSTEM FOR TRIGGERING A SEARCH REQUEST - A method and system providing a response to an unrestricted request for information responsive to an unrestricted triggering condition. A request is associated with a condition which initiates an information search. A result associated with a request and a condition may be provided to a user via any or all communication services and/or devices associated with the user. A response may be delivered according to instructions from a user. | 2015-07-02 |
20150188869 | SYSTEMS AND METHODS FOR DISPLAYING UNSEEN LABELS IN A CLUSTERING IN-BOX ENVIRONMENT - Systems and methods for displaying electronic messages are disclosed. In some embodiments, a method includes, at a computing device, concurrently displaying (i) a user interface object that represents a group of messages and (ii) one or more first indicia of a number of messages that have a predefined display status, in the group of messages while foregoing displaying more than one message of the group of messages. The method also includes receiving a selection of the user interface object; and, in response to receiving the selection of the user interface object, displaying messages in the group of messages. The method further includes, in accordance with displaying the messages in the group of messages, modifying the one or more displayed first indicia of the number of messages, which have the predefined display status, in the group of messages. | 2015-07-02 |
20150188870 | SYSTEMS AND METHODS FOR PROGRESSIVE MESSAGE FLOW - Systems and methods for managing electronic messages are disclosed. In some implementations, a method includes, at a computing device, causing an electronic message to be displayed to a user in an electronic message folder. Responsive to detecting that the user has read at least a portion of the electronic message, without user intervention, the electronic message is removed from the electronic message folder. In some implementations, the electronic message folder is a message inbox and the electronic message is removed from the message inbox to an archive or delete folder. In some implementations, the computing device includes one or more processors and memory storing one or more programs for execution by the one or more processors. | 2015-07-02 |
20150188871 | Methods, Systems, and Media for Managing Notifications Directed to Multiple Applications Installed on a User Device - Methods, systems, and media for managing notifications directed to multiple applications installed on a user device are provided. In some embodiments, a method for managing notifications is provided, the method comprising: receiving, using a hardware processor, a first notification for a first application; determining a first user device associated with the first application; receiving a second notification for a second application; determining a second user device associated with the second application; determining that the first user device and the second user device are the same device; determining that the first notification and the second notification are corresponding notifications; determining that the first notification has priority over the second notification; sending the first notification to the first user device upon determining that the first notification has priority over the second notification; and inhibiting the second notification from being sent to the first user device. | 2015-07-02 |
20150188872 | SYSTEM AND METHOD FOR DETECTING CONFIDENTIAL INFORMATION EMAILS - Systems and methods are disclosed for detecting confidential information emails. In accordance with one implementation, a method is provided for detecting confidential information emails. The method includes obtaining a sender address of an electronic message, the sender address comprising a first username and a first domain name, and obtaining at least one recipient address of the electronic message, the recipient address comprising a second username and a second domain name. The method also includes determining whether the recipient address and the sender address are different addresses of a user, and based on the determination, flagging the electronic message. | 2015-07-02 |
20150188873 | Systems and Methods to Control the Lifetime of Online Posts - Systems and methods to control the lifetime of social networking posts. The viewable range and/or duration of a post is determined as a function (e.g., Gaussian) of the viewer location/position relative to the post location/position and other factors, such as, local content density power of the poster, net likes, etc. The expiration time of the post at the viewer location/position is extended when content density is low, and reduced when content density is high. Posts are retained for a fixed duration in server; and zone-relevant content is delivered to clients based on local content density. Content from distant cells is highlighted by graphics that distinguish it from local range posts. | 2015-07-02 |
20150188874 | Identifying Message Deliverability Problems Using Grouped Message Characteristics - Disclosed are various embodiments for identifying a message deliverability problem. Responses are received from one or more client devices that include information that identifies whether a respective response is associated with a first group of messages or a second group of messages. A message deliverability problem for at least one of the first group of messages or the second group of messages may be identified based at least in part on the information included in at least a portion of the plurality of responses. | 2015-07-02 |
20150188875 | SYSTEMS AND METHODS FOR THROTTLING DISPLAY OF ELECTRONIC MESSAGES - Systems and methods for throttling display of clustered electronic messages are disclosed. In some implementations, a method includes, at a computing device detecting occurrence of one or more cluster throttling trigger events for a first message cluster, of a first cluster type, in an email application. The method further includes updating a set of properties for the first message cluster in accordance with the one or more cluster throttling trigger events and comparing the updated set of properties for the first message cluster to one or more cluster display throttling rules associated with the first message cluster. The method further includes, in accordance with a determination that the set of properties for the first message cluster satisfies the one or more cluster display throttling rules, refreshing display of the first message cluster within a listing of electronic messages. | 2015-07-02 |
20150188876 | CALENDARING SYSTEMS AND METHODS - Various types and implementations of calendaring systems and methods employ electronic mail. | 2015-07-02 |
20150188877 | APN-BASED DNS QUERY RESOLUTION IN WIRELESS DATA NETWORKS - Systems and methods for APN-based DNS query resolution for wireless data networks are disclosed. Some implementations include receiving a domain name system (DNS) query for a domain name from a device having a source IP address, the DNS query being associated with an access point name, determining whether the source IP address is within a predetermined IP address range, upon determining the source IP address is within the predetermined IP address range, updating the DNS query to include an updated domain name unique to the predetermined IP address range, forwarding the updated DNS query to a DNS server for resolution, receiving an IP address corresponding to the updated DNS query from the DNS server, the IP address being different from an IP address associated with the DNS query, and providing the device with the IP address corresponding to the updated DNS query. | 2015-07-02 |
20150188878 | STATELESS AUTOCONFIGURATION OF HOSTNAMES OF NETWORK DEVICES - Techniques are disclosed for dynamically determining or learning hostnames. According to embodiments described herein, a solicitation message is received at a first network device. Based on the solicitation message, a hostname is determined for a second network device that sent the solicitation message. A first network address is also determined for the second network device that sent the solicitation message. A mapping between the hostname and the first network address is stored at the first network device. | 2015-07-02 |
20150188879 | APPARATUS FOR GROUPING SERVERS, A METHOD FOR GROUPING SERVERS AND A RECORDING MEDIUM - According to an embodiment of present invention server grouping device includes a packet collection module for collecting or capturing communication packets transceiving between at least one wireless terminals and servers; a pattern grouping module grouping the servers into one or more groups by analyzing the packets; a matching information detecting module for detecting, from the at least one wireless terminals, server matching information corresponding to a service or an application; and a server grouping module for matching the service or the application to each groups based on the server matching information. | 2015-07-02 |
20150188880 | COMMUNICATION INFORMATION DETECTING DEVICE AND COMMUNICATION INFORMATION DETECTING METHOD - A communication information detecting device includes: a receiving unit that receives an address resolution request message transmitted from a start-point communication device through L2 broadcast and having an IP address of a target communication device set therein as a target address for L2 address resolution; a generating unit that generates an address resolution request message having the IPv6 address of the target communication device, which is set in the received address resolution request message, set therein as a target address for L2 address resolution; a follow-up processing unit that transmits this address resolution request message through L2 broadcast; a receiving unit that receives an address resolution reply message returned from the target communication device in response to the address resolution request message; and a detecting unit that extracts an L2 address and an IP address concerning the target communication device from the address resolution reply message. | 2015-07-02 |
20150188881 | CONTENT NODE SELECTION BASED ON CLASSLESS PREFIX - Systems, methods, apparatuses, and software that announce prefixes associated content nodes of a content delivery network are provided herein. In one example, a method of operating a communication system comprising Internet service providers configured to exchange content requests between end user devices and content nodes is presented. The method includes assigning a content node of the content delivery network a first Internet Protocol (IP) address having an associated first short prefix and a first long prefix, and assigning the content node a second IP address having an associated second short prefix and a second long prefix. The method also includes announcing the first short prefix and the first long prefix to a first Internet service provider communicatively coupled to the content node, and announcing the second short prefix and the second long prefix to a second Internet service provider communicatively coupled to the content node. | 2015-07-02 |
20150188882 | METHOD AND APPARATUS FOR NETWORK ADDRESS TRANSLATION AND FIREWALL TRAVERSAL - Various disclosed embodiments include methods and systems for network address translation traversal. The method comprises receiving, at a Voice over Internet Protocol (VoIP) server, a registration message from a first user equipment (UE). The registration message includes an Interactive Connectivity Establishment (ICE) capability of the first UE, and a request that the VoIP server generate ICE parameters for the first UE when the first UE makes a call to a second UE. The ICE parameters include a Traversal Using Relays around NAT (TURN) long-term credential. The method comprises sending, from the VoIP server, the TURN long-term credential to the first UE. | 2015-07-02 |
20150188883 | METHOD AND SERVICE SYSTEM FOR IMPLEMENTING DOMAIN NAME REGISTRATION AND RESOLUTION BASED ON DOMAIN NAME GROUP - The disclosed method and system implement domain name registration and resolution based on a domain name group. The system comprises a registration client terminal, a registration server, and a resolution server. The registration server processes single domain name registration information and generates a unique identification for domain name group information, stores the domain name group information and stores registrant information and resolution information associated with the domain names, and feeds back a processing result to the registration client terminal. The resolution server acquires the domain names in the domain name group and resolution data shared by the domain names, and writes the domain names and the resolution data into resolution files according to top-level domain suffixes. The present invention can bind, register and resolve domain names, ensures that the bound domain names belong to the same registrant, and facilitates registration, resolution and subsequent processing of the domain names. | 2015-07-02 |
20150188884 | TIMING MANAGEMENT IN A LARGE FIREWALL CLUSTER - A firewall cluster comprises three or more firewall processing nodes, which report primary node status based on the reporting node's membership in a preexisting cluster. A controller uses the reported status to assign a primary node in the distributed firewall cluster. Reported primary node status includes reported primary node eligibility if the node is a member of a preexisting cluster, reported primary node status comprising reporting primary node ineligibility if the node is not a member of a preexisting cluster, reported primary node status if the node is a primary node in a preexisting cluster, and reported primary node eligibility in a node that has timed out. | 2015-07-02 |
20150188885 | EXAMINING AND CONTROLLING IPv6 EXTENSION HEADERS - Methods and systems for selectively blocking, allowing and/or reformatting IPv6 headers by traversing devices are provided. According to one embodiment, a traversing device receives an Internet Protocol (IP) version 6 (IPv6) packet or packet fragment. One or more security checks are applied to extension headers of the IPv6 packet or packet fragment. If a security check of the one or more security checks is determined to be violated, then one or more appropriate countermeasures are identified and performed. | 2015-07-02 |
20150188886 | IDENTIFYING AND BLOCKING PROHIBITED CONTENT ITEMS IN A CONTENT MANAGEMENT SYSTEM - To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the generated content item fingerprint to a blacklist of content item fingerprints for prohibited content items. If the generated content item fingerprint matches any of the content item fingerprints included in the blacklist, the content management system can determine that the content item is prohibited. The content management system can deny requests to share prohibited content items and/or requests to assign prohibited content items to a user account on the content management system. The content management system can generate the content item fingerprint using the content item as input in a fingerprinting algorithm that was used to generate the content item fingerprints on the blacklist. | 2015-07-02 |
20150188887 | OPTIMIZING CONNECTIONS OVER VIRTUAL PRIVATE NETWORKS - The disclosed embodiments provide a system that provides a virtual private network (VPN). The system includes a routing apparatus on a public network. The routing apparatus accepts a first connection with a client on the VPN and a second connection with a gateway in a private network extended by the VPN. Next, the routing apparatus receives a first set of packets from the client over the first connection, wherein the first set of packets is encrypted. The routing apparatus then routes the first set of packets to the gateway. The system also includes the gateway, which establishes the second connection with the routing apparatus. Next, the gateway decrypts the first set of packets and routes the decrypted first set of packets to a host in the private network. | 2015-07-02 |
20150188888 | VIRTUAL PRIVATE NETWORK GATEWAY AND METHOD OF SECURE COMMUNICATION THEREFOR - A VPN (Virtual Private Network) gateway virtualizes a logical gateway corresponding to a VPC (Virtual Private Cloud) group of a connected user terminal, based on a virtual address of the user terminal, and logically connects the logical gateway to the database corresponding to the VPC group to provide VPC service to the user terminal. | 2015-07-02 |
20150188889 | METHODS, SYSTEMS, AND MEDIA FOR SECURE CONNECTION MANAGEMENT AND AUTOMATIC COMPRESSION OVER METERED DATA CONNECTIONS - Methods, systems and media for facilitating compression over a metered data connection are provided. In some embodiments, the methods comprise: detecting a new wireless network connection; determining that the new connection is metered; sending, via a proxy server, requests for content to a content server using the metered data connection; receiving, via the proxy server, content from the content server compressed by the proxy server using the metered data connection; detecting a second new wireless network connection; determining that the second new wireless network connection is not a metered data connection; causing the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection. | 2015-07-02 |
20150188890 | CLIENT SIDE ENCRYPTION IN ON-DEMAND APPLICATIONS - A client side encryption for on-demand applications is described. The encryption is targeted to the business object attributes flagged as critical in the application metadata repository. This approach is applicable to a wide range of enterprise applications that are provided on-demand in the cloud and makes them attractive to security sensitive customers. | 2015-07-02 |
20150188891 | AUTHENTICATION APPARATUS WITH A BLUETOOTH INTERFACE - Methods, apparatus, and systems for securing the interactions of a user with an application using a Bluetooth enabled authentication device are disclosed. | 2015-07-02 |
20150188892 | LOW LATENCY ACTIVE NOISE CANCELLATION SYSTEM WITH CLIENT INTERCOMMUNICATION - A system and method for providing load balanced secure media content and data delivery ( | 2015-07-02 |
20150188893 | Secure Gateway - A secure gateway includes data storage for outgoing data and encrypted incoming data. SCIT server(s) rotate through unexposed mode(s) and exposed mode(s). If there is outgoing data in the data storage: the unexposed mode(s) retrieve outgoing data from the data storage; retrieve an encryption key from a key server; generate encrypted outgoing data by encrypting the outgoing data with the encryption key; delete the encryption key; and delete the outgoing data from the data storage. If there is encrypted incoming data in the data storage, the unexposed mode(s): retrieve encrypted incoming data from the data storage; retrieve a decryption key from the key server; generate incoming data by decrypting the encrypted incoming data with the decryption key; delete the decryption key; and delete the encrypted incoming data. The exposed mode: receives encrypted incoming data over an exposed interface; and transmits encrypted outgoing data over an exposed interface. | 2015-07-02 |
20150188894 | METHOD AND DEVICE FOR QUALITY ASSESSMENT OF ENCRYPTED STREAMING MEDIA FLOWS - A device, computer program product and a method, the method may include: Extracting first size information about sizes of different frames of a first segment of an encrypted first streaming media flow that has a first CBR. Extracting second size information about sizes of different frames of a second segment of a second streaming media flow that has a second CBR that equals the second CBR. The extracting of the first and second size information and the determining of the relationship are executed without decrypting the first and second encrypted streaming media flows. Determining, based on first and second size information and on the first and second type information, a relationship between qualities of the first and second streaming media flows based on the first and second size information. Extracting first type information indicative of which frame of the first segment is the first reference frame and which frames of the first segment are the first non-reference frames. Extracting second type information indicative of which frame of the second segment is the second reference frame and which frames of the second segment are the second non-reference frames. | 2015-07-02 |
20150188895 | REAL-TIME ENCRYPTION OF VOICE AND FAX OVER IP - A method for encrypting application layer packets, including UDPTL data used by T. | 2015-07-02 |
20150188896 | METHOD FOR ASSOCIATING AN IMAGE-FORMING DEVICE, A MOBILE DEVICE, AND A USER - Systems, methods, and devices for associating an image forming device and a mobile device receive, at a first device, a request to establish a connection with a second device; generating an optically-readable code that encodes a first set of data, wherein the first set of data includes first key-derivation data; display the optically-readable code of the first set of data; establish a communication channel with the second device; receiving a second set of data from the second device via the established communication channel, wherein the second set of data includes second key-derivation data, and wherein the second key-derivation data is generated in response to receiving the first key-derivation data at the second device; and determine the common key from the first key-derivation data and the second key-derivation data. | 2015-07-02 |
20150188897 | COOKIELESS MANAGEMENT TRANSLATION AND RESOLVING OF MULTIPLE DEVICE IDENTITIES FOR MULTIPLE NETWORKS - The determination of a unique user is discussed in response to receiving a dataset comprising multiple user identifiers (IDs). In some cases the user IDs may be of a different type. User IDs may be compared directly to determine whether they correspond to a unique user. Network transactions and attributes associated with those network transactions may be compared to determine a probability of whether two user IDs correspond to a unique user. Network transactions and attributes associated with those network transactions may also be compared to determine that two user IDs do not correspond to a unique user. | 2015-07-02 |
20150188898 | GENERATING CHALLENGE RESPONSE SETS UTILIZING SEMANTIC WEB TECHNOLOGY - Embodiments of the present invention relate to generating challenge response sets utilizing semantic web technology. In response to detecting an authentication session for a user, a computing device generates a first challenge question that is semantically related to a second challenge question previously responded to by the user, wherein the authentication session seeks to validate an identification of the user. The computing device determines whether a response to the challenge question by the user is valid. In response to determining that the response to the challenge question by the user was valid, the computing device generates a third challenge question or a notification that the response to the challenge question validates the identification of the user. | 2015-07-02 |
20150188899 | METHODS, SYSTEMS, AND MEDIA FOR PROVIDING ACCESS CONTROL FOR A COMPUTING DEVICE - Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for a computing device are provided, the methods comprising: receiving a first request to authenticate the computing device from a first sender device; authenticating the computing device based at least in part on the first request; transmitting a session identifier and a session key to the first sender device; receiving an application identifier associated with the sender device from the computing device; determining, using a hardware processor, whether a sender application executing on the sender device is valid based at least in part on the application identifier; and transmitting the session key to the computing device in response to determining that the sender application is valid. | 2015-07-02 |
20150188900 | SESSION MANAGMENT IN A MULTI-TENANT, MULTI-DATA CENTER ENVIRONMENT SYSTEM AND METHOD - A system and method for session management across multiple servers in multiple data centers is disclosed. In this system, API transactions are received from a client system at an API gateway. The gateway is employed to authenticate incoming traffic based on a previously provided key and to route the traffic to a data center that is local to the user. The data center uses transaction-related properties to create and encrypt a token. The token is then passed between the systems thereafter identifying the data center comprising the session. | 2015-07-02 |
20150188901 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for obtaining a secure communication session includes a first member computing device receiving, via a first communication channel, a first input from a second member computing device, sending, via a second communication channel, a second input to the second member computing device, and receiving, via the first communication channel, the second input from the second member computing device. The secure communication session is initiated based on the first input and second input. | 2015-07-02 |
20150188902 | CONTROLLING ACCESS TO TRAVERSAL USING RELAYS AROUND NETWORK ADDRESS TRANSLATION (TURN) SERVERS USING TRUSTED SINGLE-USE CREDENTIALS - Embodiments disclosed provide access to Traversal Using Relays around Network Address Translation (TURN) servers using trusted single-use credentials, and related methods, systems, and computer-readable media. In one embodiment, a method comprises receiving, by a TURN authentication agent, a request for a TURN server credential. Responsive to determining that the request is authorized, the agent generates a trusted single-use credential and transmits it to the requestor. Using this trusted single-use credential allows untrusted clients to access a TURN server without exposing a userid/password combination. In another embodiment, a method comprises receiving, by the TURN server, a request for a TURN service. The server challenges the request, and receives a userid and a password. Responsive to determining that the userid and the password constitute a trusted single-use credential and responsive to determining that the request is authorized, the server provides the TURN service for the requestor. | 2015-07-02 |
20150188903 | METHOD AND SYSTEM FOR GENERATING A PASSWORD FOR AN IMAGE FORMING APPARATUS - A method and system for generating a password for an image forming apparatus is disclosed, the method includes the steps of: providing a password setting mode on the image forming apparatus configured to automatically generate a password for the image forming apparatus after the image forming apparatus is ready to operate for image formation; determining if the password setting mode on the image forming apparatus is enabled or disabled; confirming a status of the image forming apparatus being ready to operate for image formation; and if the password setting mode is enabled, automatically generating the password for the image forming apparatus after confirming the status. | 2015-07-02 |
20150188904 | AUTHENTICATION SYSTEM PRESERVING SECRET DATA CONFIDENTIALITY - For authenticating a user of a communication device implementing a client application connected to an application server through a telecommunication network, the application server having sent a challenge to the client application to authenticate the user, a user device associated with the communication device establishes a connection with the client application that invites the user to enter secret data on a screen of the communication device, retrieves the challenge from the client application, prompts the user to enter secret data, calculates a response to the challenge, based on secret data entered by the user and the retrieved challenge, and sends the response to the client application that forwards the response to the application server. | 2015-07-02 |
20150188905 | MULTI-FACTOR AUTHENTICATION - According to some embodiments, a method provides a designated link in a notification to an intended recipient of the message. The designated link includes a unique identifier associated with the message. Upon receiving a request to access the message, the method authenticates the request. Authentication includes verifying whether the request corresponds to the designated link provided in the notification. If the request passes authentication, the method communicates the message. | 2015-07-02 |
20150188906 | MULTI-DOMAIN APPLICATIONS WITH AUTHORIZATION AND AUTHENTICATION IN CLOUD ENVIRONMENT - A multi-domain application requiring SSO and SLO operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (MDS) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (SLOs) on the domains of the multi-domain application and to invalidate the user sessions on the domains. A cookie that includes the multi-domain application URL is generated to reach the assertion consumer service (ASC) and the single logout service (SLO) that receive an identity assertion response from the identity provider. Domain specific SLOs are provided. A trust between these domain specific SLOs and the SLO is provided based on service provider keys. The SAML mechanism for a logout scenario is reused for communication between the SLO and the domain specific SLOs, where the SLO plays a role of a local IDP. | 2015-07-02 |
20150188907 | REMOTE AUTHENTICATION METHOD WITH SINGLE SIGN ON CREDENTIALS - Systems and methods for remote authentication using Single Sign-On (SSO) credentials are disclosed. An implementation includes transmitting a request for an identification code from an application to a wireless service provider, the request provided through an encrypted transport protocol, receiving the identification code as a messaging service message from the wireless service provider, securely routing the received identification code to the requesting application, upon receipt of the identification code at the application, retrieving an authentication token for the application through the encrypted transport protocol and providing the authentication token to an application content server to allow content transfer between the application content server and the application. | 2015-07-02 |
20150188908 | SINGLE SIGN-ON METHOD IN MULTI-APPLICATION FRAMEWORK - A method for permitting single sign-on to multiple independent applications in a single framework. | 2015-07-02 |
20150188909 | System and Method for Mobile Single Sign-On Integration - Improved methods and systems for integrating client-side single sign-on (SSO) authentication security infrastructure with a mobile authorization protocol are disclosed that provide clients with secured SSO mobile access to third-party services. Embodiments of the present invention leverage SSO authentication protocols that are utilized at many client-side systems already and integrate these SSO authentication protocols with a mobile SSO authorization protocol, thereby effectively extending the SSO framework to mobile service requests of web services at third-party service provider systems. Embodiments of the present invention provide a secure and automated solution which may be implemented in any existing client-side SSO frameworks with minimum cost and time, while providing a lightweight and secure solution that provides users using either native applications or mobile web application to access third-party web services. | 2015-07-02 |