28th week of 2014 patent applcation highlights part 62 |
Patent application number | Title | Published |
20140196037 | GANG MIGRATION OF VIRTUAL MACHINES USING CLUSTER-WIDE DEDUPLICATION - Datacenter clusters often employ live virtual machine (VM) migration to efficiently utilize cluster-wide resources. Gang migration refers to the simultaneous live migration of multiple VMs from one set of physical machines to another in response to events such as load spikes and imminent failures. Gang migration generates a large volume of network traffic and can overload the core network links and switches in a data center. The present technology reduces the network overhead of gang migration using global deduplication (GMGD). GMGD identifies and eliminates the retransmission of duplicate memory pages among VMs running on multiple physical machines in the cluster. A prototype GMGD reduces the network traffic on core links by up to 51% and the total migration time of VMs by up to 39% when compared to the default migration technique in QEMU/KVM, with reduced adverse performance impact on network-bound applications. | 2014-07-10 |
20140196038 | VIRTUAL MACHINE MANAGEMENT IN A DATA STORAGE SYSTEM - Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system. | 2014-07-10 |
20140196039 | VIRTUAL MACHINE CATEGORIZATION SYSTEM AND METHOD - Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system. | 2014-07-10 |
20140196040 | VIRTUAL MACHINE CRASH FILE GENERATION TECHNIQUES - Techniques for creating crash data in a virtualized environment are disclosed. In an embodiment of the present disclosure the techniques can be used when a guest operating system within a virtual machine may not have a sufficient mechanism for generating crash data. | 2014-07-10 |
20140196041 | VIRTUAL MACHINE MANAGEMENT DEVICE, AND VIRTUAL MACHINE MOVE CONTROL METHOD - A virtual machine management device includes an acquiring unit, a specifying unit, and a move processing unit. The acquiring unit acquires an amount of communication data that is exchanged between multiple virtual machines running in multiple server devices and that is used for communication with each other. The specifying unit specifies, on the basis of the communication distance between each of the server devices, a server device that has a shorter communication distance from a server device, which executes one of a pair of the virtual machines whose amount of the communication data is equal to or greater than a predetermined amount, than a communication distance between the server devices in which the pair of the virtual machines are running. The move processing unit moves the other one of the pair of the virtual machines to the specified server device. | 2014-07-10 |
20140196042 | SERVER DEVICE, LOG TRANSFERRING METHOD, AND LOG TRANSFERRING SYSTEM - A server device includes a virtualization control unit, a storing unit, and a transferring unit. The virtualization control unit operates a virtual machine that is a virtualized computer to control a migration of the virtual machine with another server device. The storing unit stores therein a log, in an associated manner with the virtual machine, that is created by the virtual machine. When the virtual machine is migrated to the other server device, the transferring unit transfers, to the other server device, the log of the virtual machine targeted for a migration stored in the storing unit. | 2014-07-10 |
20140196043 | SYSTEM AND METHOD FOR RE-FACTORIZING A SQUARE MATRIX INTO LOWER AND UPPER TRIANGULAR MATRICES ON A PARALLEL PROCESSOR - A system and method for re-factorizing a square input matrix on a parallel processor. In one embodiment, the system includes: (1) a matrix generator operable to generate an intermediate matrix by embedding a permuted form of the input matrix in a zeroed-out sparsity pattern of a combination of lower and upper triangular matrices resulting from a prior LU factorization of a previous matrix having a same sparsity pattern, reordering to minimize fill-in and pivoting strategy as the input matrix and (2) a re-factorizer associated with the matrix generator and operable to use parallel threads to apply an incomplete-LU factorization with zero fill-in on the intermediate matrix. | 2014-07-10 |
20140196044 | SYSTEM AND METHOD FOR INCREASING THROUGHPUT OF A PaaS SYSTEM - Systems and methods are disclosed for managing the throughput of a platform as a service (PaaS) system. A plurality of PaaS nodes receives deployment jobs, such as from an interface by way of a load balancer. The PaaS nodes extract deployment actions and an action count and post the deployment actions to a queue. The PaaS nodes also initiate, in a coordinator, a counter for the deployment job. The PaaS nodes retrieve deployment actions from the queue and execute them, such as in one of a plurality of threads in a flexible thread pool. Upon completing the action, the PaaS nodes report update the counter corresponding to the deployment job of the action. When a counter for a deployment jobs reaches the action count for the job, completion is reported. | 2014-07-10 |
20140196045 | PROCESSOR AND PROGRAM EXECUTION METHOD CAPABLE OF EFFICIENT PROGRAM EXECUTION - A processor executes a plurality of tasks by switching a timeslot and iterating a plurality of timeslots. The processor includes a table in which tasks are defined in correspondence with timeslots. In the table, the number of timeslots to be held in one iteration is defined, for each of the timeslots a total time period during the predetermined number of iterations is designated, and a plurality of tasks are defined in correspondence with at least one of the timeslots. A timeslot is switched every time a predetermined period elapses. One task is selected and executed by referring to the table in correspondence with switching of timeslot. | 2014-07-10 |
20140196046 | SCHEDULING AND/OR ORGANIZING TASK EXECUTION FOR A TARGET COMPUTING PLATFORM - Techniques are generally described relating to methods, apparatuses and articles of manufactures for scheduling and/or organizing execution of tasks on a computing platform. In various embodiments, the method may include identifying successively one or more critical time intervals, and scheduling and/or organizing task execution for each of the one or more identified critical time intervals. In various embodiments, one or more tasks to be executed may be scheduled to execute based in part on their execution completion deadlines. In various embodiments, organizing one or more tasks to execute may include selecting a virtual operating mode of the platform using multiple operating speeds lying on a convexity energy-speed envelope of the platform. Intra-task delay caused by switching operating mode may be considered. Other embodiments may also be described and/or claimed. | 2014-07-10 |
20140196047 | COMPUTING JOB MANAGEMENT BASED ON PRIORITY AND QUOTA - In one embodiment, the invention provides a method of managing a computing job based on a job priority and a submitter quota. | 2014-07-10 |
20140196048 | IDENTIFYING AND THROTTLING TASKS BASED ON TASK INTERACTIVITY - The described implementations relate to processing of electronic data. One implementation is manifest as a system that can include logic and at least one processing device configured to execute the logic. The logic can be configured to receive a first task request to execute a first task that uses a resource when performed. The first task can have an associated first level of interactivity. The logic can also be configured to receive a second task request to execute a second task that also uses the resource when performed. The second task can have an associated second level of interactivity. The logic can also be configured to selectively throttle the first task and the second task based upon the first level of interactivity and the second level of interactivity. | 2014-07-10 |
20140196049 | SYSTEM AND METHOD FOR IMPROVING MEMORY USAGE IN VIRTUAL MACHINES - A method (and system) for managing memory among virtual machines in a system having a plurality of virtual machines, includes providing at least one memory optimization mechanism which can reduce memory usage of a virtual machine at a cost of increasing CPU usage. Information on memory usage and CPU usage of each virtual machine is periodically collected. In response to detecting that a first virtual machine exhibits a high level of memory use, at least one second virtual machine with extra CPU capacity is identified. The at least one memory optimization mechanism is applied to the at least one second virtual machine, to reduce memory used by the at least one second virtual machine, thereby providing a portion of freed memory. The portion of freed memory is then allocated to the first virtual machine. | 2014-07-10 |
20140196050 | PROCESSING SYSTEM INCLUDING A PLURALITY OF CORES AND METHOD OF OPERATING THE SAME - A system and method of allocating resources among cores in a multi-core system is disclosed. The system and method determine cores that are able to process tasks to be performed, and use history of usage information to select a core to process the tasks. The system may be a heterogeneous multi-core processing system, and may include a system on chip (SoC). | 2014-07-10 |
20140196051 | RESOURCE MANAGEMENT USING ENVIRONMENTS - Apparatus, systems, and methods may operate to receive time-based reservation requests for predefined resource environments comprising resource types that include hardware, software, and data, among others. Additional activities may include detecting a conflict between at least one of the resource types in a first one of the predefined resource environments and at least one of the resource types in a second one of the predefined resource environments, and resolving the conflict in favor of the first one of the predefined resource environments by reserving additional resource elements in a cloud computing architecture and/or reserving a less capable version of the second one of the predefined resource environments. Additional apparatus, systems, and methods are disclosed. | 2014-07-10 |
20140196052 | COMPUTER SYSTEM - In the present invention, a management apparatus includes a unit configured to store management information including a throughput of each of a plurality of computers, a unit configured to acquire a request value which includes a throughput that is required for executing a program from a program execution computer to which execution of a program has been assigned among a plurality of computers, a selecting unit configured to select a computer of a throughput compliant with the request value from among a plurality of computers, and a switchover control unit configured to allocate the program allocated to the program execution computer to the selected computer. | 2014-07-10 |
20140196053 | THREAD-AGILE EXECUTION OF DYNAMIC PROGRAMMING LANGUAGE PROGRAMS - Methods, systems, and products are provided for thread-agile dynamic programming language (‘DPL’) program execution. Thread-agile DPL program execution may be carried out by receiving, in a message queue, a message for an instance of a DPL program and determining whether the host application has a stored state object for the instance of the DPL program identified by the message. If the host application has a stored state object for the DPL program, thread-agile DPL program execution may also carried out by retrieving the state object; preparing a thread available from a thread pool for execution of the instance of the DPL program in dependence upon the state object and an execution context for the instance of the DPL program; providing, to an execution engine for executing the DPL program, the state object and the prepared thread; and passing the message to the execution engine. | 2014-07-10 |
20140196054 | ENSURING PERFORMANCE OF A COMPUTING SYSTEM - A system includes a plurality of computing systems, wherein each computing system comprises memory, a network interface and a processor. At least one computing system is configured to issue a command to run abbreviated measurements of performance for one or more computing nodes to determine whether a number of the computing nodes is adequate to perform a computing job. The at least one computing system is configured to assign the computing job to a set of the number of computing nodes if each of the set of the number of computing nodes is adequate to perform the computing job according to performance measurement results of the abbreviated measurements. For any of the one or more computing nodes that is inadequate to perform the computing job according to performance measurement results of the abbreviated measurements, the at least one computing system is configured to indicate those computing nodes as low performing. | 2014-07-10 |
20140196055 | HIGH PERFORMANCE LOG-BASED PROCESSING - Each of a plurality of Worker processes are allowed to perform any and all of the following tasks involving logged work items: (1) reading a subset of the work items from a log; (2) sequentially ordering work items for corresponding data objects; (3) applying a sequentially ordered set of work items to a corresponding data object; and (4) transmitting a subset of work items to a Worker process running on another database server in a cluster, if necessary. These tasks can be performed concurrently, at will, and as available, by the Worker processes. An improved checkpointing technique eliminates the need for the Worker processes to get to a synchronization point and stop. Instead, a Coordinator process examines the current state of progress of the Worker processes and computes a past point in the sequence of work items at which all work items before that point have been completely processed, and records this point as the checkpoint. | 2014-07-10 |
20140196056 | VIRTUAL SERVER AGENT LOAD BALANCING - Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system. | 2014-07-10 |
20140196057 | Managing Job Execution - This disclosure describes monitoring the execution of jobs in a work plan. In an embodiment, a system maintains a risk level associated with the critical job to represent whether the execution of a job preceding the critical job has a problem, and it maintains the list associated with the critical job so as to quickly identify the preceding job which may cause a delay to the critical job execution. | 2014-07-10 |
20140196058 | AUXILIARY DISPLAY DEVICE DRIVER INTERFACE - In a main computer system coupled to an auxiliary display device, described is an interface set for implementation by an auxiliary display device driver, to couple the driver to an auxiliary display platform. Commands received from the auxiliary display platform may be handled by code external to the driver, such as a class extension object. For example, the class extension object may interpret and/or translate commands received from the auxiliary display platform into a format understood by the driver code. The auxiliary display device driver may then provide corresponding command information including data to the auxiliary display device via the transport. Event data may be returned from the auxiliary display device driver via the interface set to the class extension object, such that corresponding event information, e.g., received at the auxiliary display device, may be returned to the auxiliary display platform. | 2014-07-10 |
20140196059 | CAPABILITY BASED DEVICE DRIVER FRAMEWORK - Enforcing limitations on hardware drivers. The method includes from a system kernel, assigning I/O resources to the system's root bus. From the root bus, the method further includes assigning a subset of the I/O resources to a device bus. Assigning a subset of the I/O resources to a device bus includes limiting the device bus to only be able to assign I/O resources that are assigned to it by the root bus. From the device bus, the method includes assigning I/O resources to a device through a device interface. | 2014-07-10 |
20140196060 | WEB SERVICE API FOR UNIFIED CONTACT STORE - An Application Programming Interface (API) provides functions for interacting with contact lists and contacts that are stored in a unified contact store by a primary contact service. For example, a client of a unified communications service may use the API to access contact information that is stored with a primary contact service (e.g. a messaging application/service). The contact information is maintained by the primary contact service. The API includes functions such as, but not limited to: adding a new IM contact to a group, adding a new IM group, removing an IM contact from a group, adding a distribution group to an IM list, getting an IM item list, and tagging an IM contact. The contacts may be obtained from the primary contact service and temporarily stored by the client (e.g. within a cache) of a different service. | 2014-07-10 |
20140196061 | METHOD AND SYSTEM FOR INTEGRATING VISUAL CONTROLS WITH LEGACY APPLICATIONS - A method is provided for controlling a legacy application. The method includes visually capturing a series of movements. The method also includes recording the series of movements at a first time as a recorded series of movements. Moreover, the recorded series of movements includes at least a command that is configured to control a legacy application. Furthermore, the method includes invoking the recorded series of movements at a second time. | 2014-07-10 |
20140196062 | SYSTEMS AND METHODS FOR SETTING PRICES IN DATA DRIVEN MEDIA PLACEMENT - System and methods are presented for setting pricing in an advertising campaign with an audience management module. In some embodiments, a plurality of data structures is stored in a memory, each data structure representing one of a plurality of advertising slots. The audience management module stores in each of the plurality of data structures a price value associated with a respective advertising slot. A user input of a fixed value is received and stored as the price value of a first data structure of the plurality of data structures. The audience management module automatically updates the price value of each of the plurality of data structures without changing the price value of the first data structure. | 2014-07-10 |
20140196063 | METHOD FOR GENERATING A MENU FOR PRESENTING AUDIOVISUAL PROGRAMS PAID FOR BY SEVERAL USERS, DEVICE AND COMPUTER PROGRAM FOR IMPLEMENTING THE METHOD - A method is provided for generating a presentation menu for presenting audio and audiovisual contents on the screen of a receiver, which are downloadable from a broadcasting network or from dedicated sites. A user selects accessible contents and makes payment to make these contents available at the receiver. The receiver retrieves information on availability of all the contents from the receiver and requests display of a presentation menu presenting a list of available contents. Thus each user gets to know all the available contents from the receiver, including those purchased by other users. The presentation menu can visually associate each document with the identity of the user who made the document available. The presentation menu can display an indication that the replay of an available content has already begun and has been interrupted at a certain point in time. This point in time is made available at the display. | 2014-07-10 |
20140196064 | Content Marketplace And Customization Of Content Acquisition - Aspects of the disclosure relate to customization of content acquisition in a content marketplace. Such customization can provide access that is user-specific. In one aspect, the content marketplace can permit a consumer to inspect (e.g., browse or search) and acquire content offerings by customizing the user's access package using one or more user devices and according to various price propositions. | 2014-07-10 |
20140196065 | MOBILE VIDEO STREAMING ENHANCEMENT IN A NETWORK CODING-CAPABLE WIRELESS NETWORK - A method of mobile video streaming according to an exemplary embodiment of the present invention includes three parts. The first part is for AP to measure the information of all clients such as ETX (Expected Transmission count metric) and RSSI (Receive Signal Strength Indicator) periodically for long-term channel quality and mobility patterns of each client. In the second part, AP estimates the buffer status, short-term channel quality, and mobility detection of each client based on only feedback from the target client and first part result. And lastly, AP performs a practical online scheduling to select the best network code set satisfying high Peak Signal-to-Noise Ratio (PSNR), a standard metric of video quality, during a GoP (Group of Picture) at all clients based on I-frame priority. | 2014-07-10 |
20140196066 | Data Highlighting and Extraction - We are facing an explosion in availability of online content, in particular accessing audio, video, and other data is considered to be driving the expansion of the Internet to accommodate access needs. However, time availability for accessing such data remains constrained and it is becoming more imperative that a technology be utilized to package the data for example, as a Collective Cut, to facilitate its consumption by pre-identifying portions of the data that are expected to be interesting to a consumer. Such packaging has many possibilities. For example, in the audio context, audio data could be presented to a consumer with specific portions of an audio presentation highlighted as the best portions to listen to if the consumer lacks sufficient time to listen to the entire presentation. In the video context, video highlights for a movie or other consumable data may be provided, allowing a consumer to electively skip through the highlights if there is insufficient time and/or interest in viewing the entire presentation. | 2014-07-10 |
20140196067 | UNIVERSAL MULTIPLEXER FOR CONTENT CHANNELS VIA INJECTING - An interface for a single network point that provides channels of content and services to a subscribing user while maintaining the functionality of the channels of content as separate entities. Channels of content and services include, but are not limited to audio and video via cable and broadcast over the air, satellite broadcasts, cell phone service, GPS, Internet, and voice over Internet Protocol (VoIP). Content based on context is injected via a switching device between a content provider device, for example cable provider set top box and a projection unit, for example TV. Remote control devices such as a smart phone or mobile communication device, provide a management function and user control with an application resident on the remote control device. A remote control may be configured to select a content channel, store user selection states, project or display computer content onto a TV for web browsing. | 2014-07-10 |
20140196068 | System and Method for Providing Program Recommendations Through Multimedia Searching Based on Established Viewer Preferences - A system and method is disclosed for processing viewer profiles and program metadata from a number of sources to provide viewing suggestions and recommendations to one or more viewers. | 2014-07-10 |
20140196069 | CONTENT RECOMMENDATION METHOD AND APPARATUS - A method for making a content recommendation to at least one user commences by first establishing a location for the at least one user. Thereafter a check occurs to determine which devices are available to the at least one user to use (e.g., consume) the content at the location. Next, the content available to the at least one user is determined based on at least the user's location and available devices available to the at least one user. A content recommendation is then made among the available content based on at least one attribute of the at least one user. | 2014-07-10 |
20140196070 | SYSTEM AND METHOD FOR AUTOMATED BROADCAST MEDIA IDENTIFICATION - An media identification system, operable by a network entity, receives media data for broadcast program segments including at least one of video data or audio data. The media identification system encodes a reference fingerprint based on the media data and receives a program log associated with the media data, the program log including segment names and broadcast times for the broadcast program segments. The media identification system associates the reference fingerprint with a segment name for a program segment based at least in part on the program log. | 2014-07-10 |
20140196071 | RENDERING DEVICE WITH CONTENT SUBSTITUTION - A device for rendering content from a first source comprising a first input for receiving the content from the first source, a second input for receiving a substitution content item from a second source, a substitution module for substituting a segment of the content with the substitution content item, and rendering means for rendering the content wherein the segment is substituted with the substitution content item. The rendering device has monitoring module for monitoring the reception of the segment, and controlling the substitution module dependent on whether the segment is being received, such that the substitution module ceases the substitution upon failure to receive the segment. | 2014-07-10 |
20140196072 | DIGITAL MULTIMEDIA CONTENT INTEGRATION SYSTEM CLAIM OF BENEFIT TO PRIOR APPLICATION - Some embodiments include a process for providing free, consumer-controlled multimedia content to consumers and a digital multimedia content integration system that integrates subsystems for content distribution, advertising, marketing, and sales in each of a set of multimedia content platforms. Using the system, a content viewer can watch new content free of monetary charge. The content viewer is hosted, in some embodiments, by an announcer associated with one or more content items. The content watched by the viewer is free of commercial interruptions and the viewer gets rewarded sweepstakes points for every click and view, including branded and charity content associated with a content item episode. In some embodiments, each show episode directly benefits a local charity. | 2014-07-10 |
20140196073 | Customized Moderation of Electronic Content Published Via A Media Portal - Systems and methods are provided for providing customized moderation of electronic content published via a media portal. The content management application can access a feed that includes multiple electronic content items. The content management application can determine, based on an approval descriptor associated with the feed, that additional content provided to the feed is provided by a publisher account that must be approved by a moderator account rather than an additional publisher account for which other additional content is automatically approved without requiring moderator approval. The content management application can require approval of the additional content by the moderator account. The moderator account has permission to moderate electronic content provided to the feed based on a moderator descriptor associated with the feed. | 2014-07-10 |
20140196074 | APPARATUS AND METHOD FOR PARENTAL CONTROL USING V-CHIP PLUS+ AND MASTER PASSWORD - A method and apparatus for exercising access control over television programs using a parental control user interface that has different functions is provided. The method requires a password to enter into a master mode for obtaining access to all the functions of the parental control user interface. Once in the master mode, the user may enter a criterion for blocking a television program from being viewed or recorded or the user can override an already blocked television program. | 2014-07-10 |
20140196075 | CONTROL METHOD, DEVICE, AND SYSTEM BASED ON USER PERSONAL ACCOUNT - A control method based on a user personal account may include receiving a first control message, including first user personal account information and first control information, from a first terminal, logging into a first user personal account corresponding to the first user personal account information based on the first user personal account information included in the first control message, and performing an operation corresponding to the first control information based on predetermined first user service policy information associated with the first user personal account. | 2014-07-10 |
20140196076 | DIGITAL BROADCASTING SYSTEM AND METHOD OF PROCESSING DATA IN DIGITAL BROADCASTING SYSTEM - A digital broadcasting system and a method for processing data in the same are disclosed. A method for controlling a digital television (DTV) located in one independent space among a plurality of independent spaces physically separated from one another is disclosed. The method includes receiving display type information from a compact wireless device, wherein the display type information is type information of data capable of being processed by the compact wireless device, transmitting the received display type information to a management server, receiving general additional information and additional information dependent on the display type information from the management server, and controlling the general additional information to be displayed on the DTV and transmitting the additional information dependent on the display type information to the compact wireless device. | 2014-07-10 |
20140196077 | AUTHORIZING DEVICES BASED ON IDENTIFYING CONTENT DISTRIBUTOR - Methods and systems to authorize devices and/or perform other actions based on identifying content distributors are described. In some example embodiments, the methods and systems access video content playing at a client device, calculate fingerprints of a portion of the video content, identify a distributor of the video content based on the fingerprints, and perform an action in response to the identification of the distributor of the video content, such as actions to authorize the client device or other associated devices (e.g., second screens) to receive content from the distributor, actions to present sponsored content to the client device or associated devices, and so on. | 2014-07-10 |
20140196078 | SECURED MEDIA DISTRIBUTION SYSTEM AND METHOD - A media distribution system provides controlled distribution of media owned by various parties hosted on a local media access device. The media access device may store temporary media, such as rented or leased media, on a separate provider controlled storage partition. This gives the media provider control over rented or leased media even though it is locally hosted. The media access device can download media from providers at various predefined times so as to limit its use of bandwidth. | 2014-07-10 |
20140196079 | VIDEO DISTRIBUTION AND PLAYBACK - Systems and methods are disclosed for providing a content delivery network with one or more network-connected audiovisual players. A content delivery network provider can provide an access module residing within a network-connected audiovisual player wherein the access module can be configured to control the player. The access module can be configured to function within a gateway environment on the player such that the gateway environment passes commands from the access module to the firmware or secure module on the player operating in a secure environment. As a result, each player with the access module can become a part of the content delivery network as the content delivery network provider can control the network-connected audiovisual players. The content delivery network can implement multi-level access controls to licenses and encryption keys to secure audiovisual content. | 2014-07-10 |
20140196080 | SYSTEM AND METHOD FOR PROVIDING A DATA MALL - A system and method for providing content providers with network distribution nodes for distributing content to subscribers of a communications service provider may include maintaining multiple network nodes by the communications service provider, where the network nodes may be in communication with the Internet and be configured to enable subscribers of the communications service provider to access and download content over a controlled service provider network without the content having to be communicated over the Internet. Multiple respective content service providers may be enabled to store content at the network nodes for subscribers local to each respective network node to download the content. Multiple customer databases configured to store information associated with subscribers of the communications service provider may be operated. Limited access to the information stored in the customer databases may be provided to prevent the respective content providers from accessing personal information of the subscribers. | 2014-07-10 |
20140196081 | SYSTEMS AND METHODS FOR PROVIDING AN INTERFACE FOR DATA DRIVEN MEDIA PLACEMENT - System and methods are presented for providing an interface to select advertising slots in an advertising campaign. In some embodiments, a user equipment device generates for display a plurality of cells in a grid arrangement. Each cell is associated with an advertising slot corresponding to a content source and a time period, and each cell includes a representation of an audience of the associated advertising slot. The user equipment device receives a user selection of a first cell of the plurality of cells, a function is executed with respect to a first advertising slot associated with the first cell. | 2014-07-10 |
20140196082 | COMMENT INFORMATION GENERATING APPARATUS AND COMMENT INFORMATION GENERATING METHOD - A comment information generating apparatus includes: a video obtaining unit which receives a video; a comment input receiving unit which receives position information of an object in the video and a comment that is displayed with the object and is caused to track the object starting from a predetermined timing; a target time determining unit which determines, to be a target value indicating a time length, a target time during which the comment is displayed, based on the comment; an object motion determining unit which determines, for the object, a motion trajectory having a time length substantially equal to the target time and along which the comment is caused to track the object; a comment information generating unit which generates comment information including the comment and the motion trajectory of the object; and an output unit which outputs the comment information. | 2014-07-10 |
20140196083 | CONTENT-BASED CONTROL SYSTEM - Generally this disclosure describes a method for controlling the operation of a system based on a determination of content that is airing on a channel. A method may include transmitting at least one message including instructions to sample content from a channel, receiving a message indicating that certain content on the channel is complete, and activating a notification indicating that the certain content on the channel is complete. Another method may include receiving a message including instructions to sample content from a channel, sampling content from the channel, transmitting a message including the content sample, receiving a message comprising information related to the content sample, and determining whether certain content is complete on the channel based on the received information. | 2014-07-10 |
20140196084 | SYSTEM AND METHOD FOR WORD RELEVANT CONTENT DELIVERY FOR TELEVISION MEDIA - A system and method for delivering relevant content receives media data for television broadcasts comprising video or audio data and to extract target words from the media data. The system determines word relevant content based on the extracted target words and transmits the word relevant content to a user equipment. | 2014-07-10 |
20140196085 | INSERTING ADVERTISEMENTS INTO VIDEO CONTENT - Methods and systems to insert advertisements and/or other supplemental or replacement content into a stream of video content are described. In some example embodiments, the methods and systems receive a request to replace a portion of video content currently playing at a client device with supplemental video content, such as an advertisement. In response to the request, the methods and systems determine one or more fingerprints of the video content plating at the client device, identify one or more frames of the video content at which to insert the supplemental video content based on the one or more fingerprints, and insert the supplemental video content at the identified one or more frames of the video content. | 2014-07-10 |
20140196086 | HAND-HELD POINTING DEVICE AND OPERATION METHOD THEREOF - A hand-held pointing device includes a main body, a processing circuit, a light emitting device and two image sensing devices. The main body has a first surface and a second surface for lying on an operating surface. The two image sensing devices are disposed in the main body and configured to sense first and second images through first and second transparent areas thereof, respectively. The light emitting device, disposed in the main body, is configured to emit a light source through the second transparent area. The processing circuit is configured to determine and operate the hand-held pointing device in a remote controller mode or a mouse mode according to whether the first image contains an image of a reference light source and/or the second image contains an image of the operating surface reflecting the light source. An operation for a hand-held pointing device is also provided. | 2014-07-10 |
20140196087 | ELECTRONIC APPARATUS CONTROLLED BY A USER'S VOICE AND CONTROL METHOD THEREOF - An electronic apparatus is provided. The electronic apparatus includes a voice input which is configured to receive a user's voice, a display configured to provide a user interface (UI) screen including at least one object, and a controller which is configured to determine whether or not it is possible for the user's voice to call the object, assign to the object an identification tag which identifies the object based on a result of the determination, and display the identification tag-assigned object. | 2014-07-10 |
20140196088 | SYSTEM AND METHOD FOR PROVIDING USER-DEFINABLE AUDIO INDICATORS FOR MULTIMEDIA CHANNEL SELECTIONS - A method includes providing a user interface to a set-top box. The user interface facilitates an association of an audio indicator with a channel selection action. The method includes receiving, via the user interface at the set-top box, a first user input indicating an association of a selected audio indicator with a selected channel selection action. The method also includes providing the selected audio indicator for audible output via the set-top box in response to receiving a second user input corresponding to the selected channel selection action. | 2014-07-10 |
20140196089 | User Interface - A method is described. The method includes: displaying a user interface on a first display device associated with a client device, the user interface enabling user interaction with the client device; enabling an electronic device to control the client device; detecting an orientation change of the electronic device; and displaying the user interface on a second display device associated with the electronic device upon detecting the orientation change. Related methods and apparatus are also disclosed. | 2014-07-10 |
20140196090 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - According to one embodiment, an information processing apparatus includes a first display controller, second display controller, and third display controller. The first display controller displays a program guide in a first area of a screen and program information about a program in a second area of the screen. The second display controller displays, in the first area, detailed information of the program information displayed in the second area. The third display controller displays, when detailed information about another program or another title is displayed in the first area, program information about the other program or the other title in the second area. | 2014-07-10 |
20140196091 | SERVER AND METHOD FOR CONTROLLING SERVER - A display apparatus and a server which implements an interactive system are disclosed. The server includes a communicator which receives text information corresponding to a user voice collected at the display apparatus from the display apparatus, and a controller which extracts an utterance component from the text information and controls so that a query to search contents is generated using the extracted utterance component and transmitted to an external server which categorizes metadata of the content under each item and stores the same, in which the controller generates the query by adding a preset item to a criteria to search a content, when a number of criteria to categorize the content under an item corresponding to the extracted utterance component is less than a preset number. | 2014-07-10 |
20140196092 | DIALOG-TYPE INTERFACE APPARATUS AND METHOD FOR CONTROLLING THE SAME - A dialog type interface apparatus providing contents corresponding to a voice signal received from the display apparatus is disclosed. The dialog type interface apparatus includes a communicator which receives a voice signal corresponding to a user's voice collected in the display apparatus; and a controller which determines the user's utterance intentions using the voice signal, and which controls to generate a query for searching contents corresponding to the determined utterance intentions, divide metadata on the contents, and transmit the divided metadata to an external server, wherein the controller extracts an utterance element for determining the utterance intentions from the voice signal, and converts the extracted utterance element to correspond to contents dividing criteria of each item to generate the query. | 2014-07-10 |
20140196093 | UNIFIED ELECTRONIC PROGRAM GUIDE - A device may receive a request for an electronic program guide from a user device and determine a location of the user device. The device may determine, based on the determining that the user device is located in a first location, a group of different types of networks available to the user device and may provide, based on the determined group of different types of networks available to the user device, the electronic program guide for display. The electronic program guide may include a network identifier for each of one or more available channels associated with each of the determined group of different types of networks, and a content identifier associated with a respective one of the one or more available channels associated with each of the determined group of different types of networks. | 2014-07-10 |
20140196094 | METHOD AND APPARATUS FOR AUTOMATICALLY SWITCHING CHANNELS - A method and apparatus for automatically switching channels are provided. The method includes detecting an advertisement from content of a current channel that is displayed on a screen of a display apparatus; scanning at least one channel of a predetermined channel list to detect an advertisement-free channel, in response to the advertisement being detected on the current channel; and switching the current channel to the detected advertisement-free channel. | 2014-07-10 |
20140196095 | SERVER AND CLIENT PROCESSING MULTIPLE SETS OF CHANNEL INFORMATION AND CONTROLLING METHOD OF THE SAME - A technical method related to a server and a client processing multiple sets of channel information is disclosed. Herein, An apparatus of processing multiple channel information according to an exemplary embodiment of the present invention includes a decoder decoding encoded data received from a server, a demultiplexer demultiplexing video data, audio data and metadata for each channel from the decoded data, a controller extracting video data, audio data and metadata for a channel group for on-screen display (OSD) data, the channel group including one or more channels, an OSD generator generating OSD data based on the extracted video data, audio data and metadata for the channel group, and a display module displaying the generated OSD data on a predetermined section along with a broadcast screen of a currently selected channel. | 2014-07-10 |
20140196096 | BROADCAST WAVE RECEIVING DEVICE AND METHOD, BROADCAST WAVE TRANSMITTING DEVICE AND METHOD, PROGRAM, AND RECORDING MEDIUM - The present technique relates to a broadcast wave receiving device and method, a broadcast wave transmitting device and method, a program, and a recording medium that realize universal tuning that enables selection of multi-segment broadcasting only through broadcast reception while utilizing existing infrastructures. | 2014-07-10 |
20140196097 | METHOD AND SYSTEM FOR SYNCHRONIZATION FOR DVB-S2 FRAME AND ITS ASSOCIATED FRAME STRUCTURE - A communication system using the DVB-S2 standard, and its associated frame structure, comprises at least two users Ui, characterized in that the super-frame ST | 2014-07-10 |
20140196098 | Video Entertainment System - An entertainment system including one or more display devices. Each display device may have a media player to play the content of a disc or media inserted in the media player. Each display device may also have a storage unit to store the media content. The media content can be shared between different display devices. The connection between display devices can be either by plurality of cables or by a wireless network. Each display device receives its power from a power filter. The power filter is connected to a power source. | 2014-07-10 |
20140196099 | METHODS AND APPARATUS FOR SUPPORTING TRICK PLAY FUNCTIONS IN DEVICES WITHOUT LOCAL STORAGE - Methods and apparatus for providing playback devices with trick play functionality are described. The system includes a playback device, e.g., without recording capability, and a gateway device with multiple tuner-demodulators and/or a cable modem and recording capability. During normal playback, in some embodiments, both the playback device and gateway receive content in parallel with the gateway recording content at the request of the playback device and supplying the content over the local network when a user of the playback device requests a trick play operation. A single gateway, with multiple tuner demodulator pairs and/or a cable modem, supports trick play functions. In some embodiments if the number of playback devices exceeds the number of tuner-demodulator pairs in the gateway, the playback device can stream content to the gateway for recording and to be returned via the local network in the event of a request for a trick play operation. | 2014-07-10 |
20140196100 | ELECTRONIC DEVICE FOR PROVIDING MEDIA RECOMMENDATIONS AND A METHOD THEREIN - An object of the present invention is to provide a mechanism in a first electronic device ( | 2014-07-10 |
20140196101 | SYSTEM, METHOD AND APPARATUS FOR ENHANCED INTERNET BROADCASTING - An internet broadcast system, method and apparatus provides a presentation tool that offers program content to viewers in a rich, interactive and exciting way while still offering the benefits of cost effectiveness, convenience, and which meets or exceeds the experience of live, in-person programming. At least two synchronized images are presented in multiple windows and an editable image selected from one of the at least two synchronized images, wherein the other of the at least two synchronized image(s) adjust to remain in sync with the edited image. A production panel includes an Administrative Section and a Viewer Section. The Administrative Section includes set of production tools which allow an administrator to create and modify programming that a viewer observes and engages with through the Viewer Section via a remote digital viewing device. Information flows between the production panel and viewing devices via the cloud-based software. | 2014-07-10 |
20140196102 | METHOD FOR TRANSMITTING VIDEO SIGNALS FROM AN APPLICATION ON A SERVER OVER AN IP NETWORK TO A CLIENT DEVICE - A method for transmitting a video signal from an application running on a server over an IP network to a client device. The application is drawing its content, in a plurality of sequential drawing events, into a virtual frame buffer. Simultaneously, each drawing event is registered in a list of drawing events and each drawing event is associated with an address (location) of each area that was affected by this drawing event. The list is repetitively checked and if any area have changed since previous periodic check, such area is retrieved, segmented into blocks of standardized size and transmitted, together with its address in a frame, over the IP network to the client. On the client side the encoded blocks are received and combined, using the address data, into frames of an encoded video stream that can be directly fed into an industry standard decoder of client device. | 2014-07-10 |
20140196103 | GENERATING ROLE-BASED ACCESS CONTROL POLICIES BASED ON DISCOVERED RISK-AVERSE ROLES - Generating role-based access control policies is provided. A user-permission relation is generated by extracting users and permissions assigned to each of the users from a stored access control policy. A user-attribute relation is generated by mapping the users to attributes describing the users. A permission-attribute relation is generated by mapping the permissions to attributes describing the permissions. The set of risk-averse roles, assignment of the set of risk-averse roles to the users, and assignment of the permissions to the set of risk-averse roles are determined based on applying a risk-optimization function to the generated user-permission relation, the generated user-attribute relation, and the generated permission-attribute relation. A role-based access control policy that minimizes a risk profile of the set of risk-averse roles, the assignment of the set of risk-averse roles to the users, and the assignment of the permissions to the set of risk-averse roles is generated. | 2014-07-10 |
20140196104 | GENERATING ROLE-BASED ACCESS CONTROL POLICIES BASED ON DISCOVERED RISK-AVERSE ROLES - Generating role-based access control policies is provided. A user-permission relation is generated by extracting users and permissions assigned to each of the users from a stored access control policy. A user-attribute relation is generated by mapping the users to attributes describing the users. A permission-attribute relation is generated by mapping the permissions to attributes describing the permissions. The set of risk-averse roles, assignment of the set of risk-averse roles to the users, and assignment of the permissions to the set of risk-averse roles are determined based on applying a risk-optimization function to the generated user-permission relation, the generated user-attribute relation, and the generated permission-attribute relation. A role-based access control policy that minimizes a risk profile of the set of risk-averse roles, the assignment of the set of risk-averse roles to the users, and the assignment of the permissions to the set of risk-averse roles is generated. | 2014-07-10 |
20140196105 | CLOUD SYSTEM WITH ATTACK PROTECTION MECHANISM AND PROTECTION METHOD USING FOR THE SAME - A cloud system includes a security center server, a monitoring server, and a host. The host is deployed by the monitoring server after booting to install a detecting procedure and execute a local security policy therein. The host provides a self-monitoring operation through the detecting procedure and replies to the monitoring server when any monitoring data therein exceeds a threshold value according to the local security policy. The monitoring server judges whether the host is attacked or not, and notifies the security center server when the host is judged to be attacked. After receiving the notification, the security center server analyzes attack types, and generates a new security policy according to analyzed results. Finally, the security center server redeploys the host by the new generated security policy, so as to update the local security policy in the host, and protects the host from the attack. | 2014-07-10 |
20140196106 | Location-Based Security Rules - Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request. | 2014-07-10 |
20140196107 | SECURE DIGITAL COMMUNICATIONS - Policies are used when performing a transaction between a first and a second device, the first device having an established trusted communication relation with a first trusted device and the second device having an established trusted communication relation with a second trusted device, and the first and the second trusted device each having an established trusted communication relation with a third trusted device. A policy defines a set of constructs for creating rules to control the boundaries of a transaction. The policy defines role definition stipulating what interacting identities must have been validated as for the transaction to occur. The policy also defines a set of digest method algorithms or data referral methods to be used in the transaction. | 2014-07-10 |
20140196108 | SECURITY POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard. | 2014-07-10 |
20140196109 | Method and device for the authentication of at least two agricultural devices coupled via a data bus - A method for the authentication of at least two agricultural devices coupled via a data bus includes subjecting the each of the agricultural devices to authentication, automatically and independently of every of the agricultural device by use of an authentication device, which is also coupled to the data bus. The method also includes allowing a direct data exchange or indirect data exchange between the successfully authenticated agricultural devices, automatically. If authentication of the at least two data devices is unsuccessful, data exchange between the unsuccessfully authenticated agricultural devices is disallowed. | 2014-07-10 |
20140196110 | TRUST-BASED AUTHENTICATION IN A SOCIAL NETWORKING SYSTEM - A social networking system determines whether a user is a real public figure or is the correct “public persona” of an individual who is famous within a particular domain. The system selects one or more trusted agents. A trusted agent is a user who has been confirmed or is otherwise trusted within the system. The system traverses the social graph of the trusted agent to score and identify additional users who have a sufficient connection to the trusted agent to authenticate them as other confirmed public personas/figures. The system computes confidence scores of the connections of the trusted agent, considering the strength of the connections and other relevant factors. The system provides confidence scores for one or more target users in the social network based on the confidence scores of the friends or connections connecting the trusted agent and the target user. | 2014-07-10 |
20140196111 | SECURED ELECTRONIC DEVICE - Methods, systems, and apparatus for communicatively pairing and securing an electronic device to a vehicle based electronic system. The pairing can enable the electronic device to seamlessly communicate with the electronic device and can provide infotainment to users of the vehicle. | 2014-07-10 |
20140196112 | DEPLOYING WIRELESS DOCKING AS A SERVICE - A method includes establishing, by a wireless docking center, a secure wireless communication connection with a wireless dockee, receiving, by the wireless docking center, from the wireless dockee, an ASP session request for a wireless docking service of the wireless docking center, receiving, by the wireless docking center, from the wireless dockee, a passphrase for authenticating with the wireless docking service, determining, by the wireless docking center, whether the wireless dockee is authorized to access the wireless docking service based on the received passphrase, responsive to determining that the wireless dockee is not authorized to access the wireless docking service, denying, by the wireless docking center, the wireless dockee access to the wireless docking service, and responsive to determining that the wireless dockee is authorized to access the wireless docking service, granting, by the wireless docking center, the wireless dockee access to the wireless docking service. | 2014-07-10 |
20140196113 | Secure on-demand supply method and system and traffic type acquisition method - A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics. The system of the disclosure satisfies security requirements of various users and various traffics, provides personalized security assurances for the users, and enhances user experience. | 2014-07-10 |
20140196114 | ELECTRONIC CONTROL DEVICE FOR A VEHICLE - An electronic control device for a vehicle configured to be able to rewrite a program related to vehicle control by connecting an external device with the vehicle and by accessing an in-vehicle LAN includes a portable authentication terminal separated from the external device; an in-vehicle authentication system connected with the in-vehicle LAN, configured to authenticate the portable authentication terminal and to be able to transmit a authentication result to the in-vehicle LAN; a repeater configured to relay communications between the external device and the in-vehicle LAN; and a communication authorization unit connected to the in-vehicle LAN and configured to authorize the communications between the external device and the in-vehicle LAN through the repeater if receiving the authentication result of a successful authentication of the portable authentication terminal by the in-vehicle authentication system. | 2014-07-10 |
20140196115 | Monitoring of Authorization-Exceeding Activity in Distributed Networks - A network security layer with a role mapping component with a current role mapping between services and access permissions is provided between a user and the services. A multi-tenancy module with current membership mapping is also provided. The security layer has a network authentication protocol for user authentication at log-in. Snapshots of a baseline role mapping between services and permissions are taken at certain times. The role mapping component verifies snapshots at set intervals, and when the user performs certain actions, the current role mapping is compared with the baseline role mapping. Upon discrepancy, the role mapping component executes a set of rules, including forceful log-out to prevent system intrusion. Comparison of current membership mapping with a baseline membership mapping can also be applied. The security layer can thus monitor authorization-exceeding modifications to baseline policies attempted by logged-in and initially authorized users. | 2014-07-10 |
20140196116 | Distance-Dependent or User-Dependent Data Exchange Between Wireless Communication Devices - In one embodiment, a method includes sending, by a first wireless device associated with a first user, first data such that the first data are only available to one or more second wireless devices respectively associated with one or more second users and within a first distance from the first wireless device. The method further includes sending, by the first wireless device associated with the first user, second data such that the second data are only available to one or more third wireless devices respectively associated with one or more third users and within a second distance from the first wireless device. | 2014-07-10 |
20140196117 | RECOVERY OR UPGRADE OF A CLOUD CLIENT DEVICE - In one embodiment, a cloud client device sends authentication data to a cloud services system. When the cloud services system determines the cloud client device is authenticated, the cloud client device receives data for configuring the cloud client device from the cloud services system, the data including one or more software modules associated with a communication protocol. When the cloud services system determines the cloud client device is not authenticated, the cloud client device conducts a data wipe of the cloud client device. | 2014-07-10 |
20140196118 | APPARATUS, SYSTEM AND METHOD FOR SECURE PAYMENT - Embodiments of the invention generally relate to apparatus, systems and methods for authentication, in particular, apparatus, systems and methods for authenticating an entity for computer and/or network security, secure authorization of a payment or for funds transfer and for selectively granting privileges and providing other services in response to such authentications. In addition, embodiments of the invention relate generally to apparatus, systems and methods for the communication of information between a mobile user-device and a point-of-sale device to securely provide authorization for a financial transaction. | 2014-07-10 |
20140196119 | Method And Computer Program For Providing Authentication To Control Access To A Computer System - The present invention relates to a method and computer program for providing authentication to control access to a computer. system including online services accessed via a portal, cloud based systems and browser accessed systems using for example HTML5, and relates particularly, but not exclusively, to authentication systems for mobile computer and telecommunications devices. | 2014-07-10 |
20140196120 | COMMUNICATION DEVICE, COMMUNICATION METHOD, COMMUNICATION SYSTEM AND SERVICE ISSUING METHOD - A communication device includes an antenna for transmitting and receiving signals with a reader/writer of a service issuing terminal; a recording unit recorded with data, and also recorded with a pattern in which information specifying an authentication key and access attribute indicating whether or not a readout process or a write process on the data is possible using the authentication key are corresponded; and a control unit for, when receiving one or plural information specifying a region of the data from the reader/writer of the service issuing terminal via the antenna, holding the received one or plural information specifying the region of the data. | 2014-07-10 |
20140196121 | FEDERATION AMONG SERVICES FOR SUPPORTING VIRTUAL-NETWORK OVERLAYS - Computerized methods, systems, and computer-readable media for promoting cooperation between a first and second virtual network overlay (“overlay”) are provided. The first overlay is governed by a first authority domain and includes members assigned virtual IP addresses from a first address range. The second overlay is governed by a second authority domain, which is associated with a second federation mechanism, for negotiating on behalf of the second overlay. The second federation mechanism is capable of negotiating with, or soliciting delegation of authority from, a first federation mechanism that is associated with the first authority domain. When negotiations are successful or authority is delegated, the second federation mechanism establishes a communication link between the second overlay and the first overlay or joins a member of the second overlay to the first overlay. Joining involves allocating a guest IP address from the first address range to the member. | 2014-07-10 |
20140196122 | SYSTEMS AND METHODS FOR DEPLOYING RICH INTERNET APPLICATIONS IN A SECURE COMPUTING ENVIRONMENT - Systems and methods for deploying rich internet applications in a secure computing environment. An example distributed computer system may comprise: a first computer system comprising a run-time environment executing one or more rich internet applications; a second computer system communicatively coupled to the first computer system, the second computer system executing an administration server; wherein the run-time environment is configured to query the administration server to perform at least one of: authenticating a user of the first computer system, determining whether an application is allowed to be executed within the run-time environment, or determining whether an application being executed by the run-time environment is allowed to access a certain function exposed by an application-programming interface (API) of the run-time environment. | 2014-07-10 |
20140196123 | DOMAIN ISOLATION THROUGH VIRTUAL NETWORK MACHINES - A method and device for communicating information resources between subscriber end stations and nodes belonging to different network domains is described. The device instantiates different virtual network machines for different network domains using separate independently administrable network databases. Each of the administrable chores of the separate independently administrable network databases includes the assignment of access control and the configuration of the policies for those network databases. The policies include traffic filtering policies to indicate what kind of information payloads can be carried, traffic and route filtering policies to indicate what paths through the network will be used for each payload carried. Each of the network domains includes one of the different virtual network machines and each of the different network domains is virtually isolated from other network domains. | 2014-07-10 |
20140196124 | CLOUD COMPUTING SECURE DATA STORAGE - Method and implementations for providing a secure data storage service in a cloud computing environment are generally disclosed. The method comprises: partitioning a data resource into data particles, assigning logic groups to the data particles, assigning physical storage groups to the data particles, and/or storing each physical storage group at corresponding storage resource, receiving a request for the data resource, determining whether the request for the data resource is valid, and if the request is valid, transmitting the data particles of the data resource to the client. The method enables improved security for accessing data, and also improves the user experience in cloud computing environments. | 2014-07-10 |
20140196125 | DEPLOYING WIRELESS DOCKING AS A SERVICE - A wireless dockee device may include a memory, and at least one processor configured to authenticate the wireless dockee to a wireless docking service using a Wi-Fi direct service (WFDS) application service platform (ASP). A wireless docking center device may include a memory, and at least one processor configured to authenticate a wireless dockee to a wireless docking service of a wireless docking center using a Wi-Fi direct service (WFDS) application service platform (ASP). | 2014-07-10 |
20140196126 | FACILITATING WIRELESS NETWORK ACCESS BY USING A UBIQUITOUS SSID - The disclosed embodiments provide a system that facilitates wireless network access. The system includes a trusted network access and tunneling service (TNATS) associated with a ubiquitous static service set identifier (SSID). The system also includes a proximate wireless access point (WAP). During operation, the system enables the TNATS on the proximate WAP, which then broadcasts the ubiquitous static SSID. Next, the proximate WAP receives a request from a guest device to access the TNATS through the proximate WAP. The proximate WAP then initiates an authentication process with the TNATS for a user of the guest device. If the authentication succeeds, the proximate WAP allows the guest device to access a network through the proximate WAP. | 2014-07-10 |
20140196127 | Service Access Authentication Method and System - An access authentication system for authenticating a subscriber of a service, the access authentication system comprising an operator access authentication system and one or more private access authentication systems, each private access authentication system being communicatively connectable with the operator access authentication system, the operator access authentication system being adapted to provide one or more authentication functions for facilitating authentication of subscribers of the service based on respective subscriber authentication data items associated with credentials of the subscriber; wherein each private access authentication system is adapted to communicate one or more subscriber authentication data items to said operator access authentication system; and wherein each private access authentication system is further adapted to communicate one or more verification data items indicative of the private access authentication system operating in at least one predetermined state. | 2014-07-10 |
20140196128 | SYSTEMS AND METHODS FOR DISTRIBUTED AUTHENTICATION OF VIDEO SERVICES - Various embodiments of the present invention provide systems and methods for providing distributed authentication of subscribers of a content operator to a content provider. In particular instances, a subscriber of the content operator may visit a website of the content provider and various embodiments of the systems and methods facilitate providing the subscriber with a customized website based on the subscription of the subscriber with the content operator and/or content provider. Further, various embodiments of the systems and methods facilitate streaming high quality content to the subscriber while the subscriber is visiting the website. | 2014-07-10 |
20140196129 | USER CREDENTIAL MANAGEMENT SYSTEM AND METHOD THEREOF - The present invention provides a user credential management system and a method thereof. The system includes a profile creation module configured to facilitate creation of one or more context specific user profiles. Each context specific user profile comprises a set of user credentials. A profile linking module is configured to link the one or more context specific user profiles to a web browser. A profile selection module is configured to facilitate a selection of a context specific user profile from one of web account creation and a first time access to existing web account post creation of the context specific user profiles. The selection is subsequent to display of a web form associated with the web account. The profile selection module is further configured to populate entries corresponding to one or more credential entry fields on the web form based on the selected context specific user profile and auto populate the web form at the subsequent access to the web account. | 2014-07-10 |
20140196130 | TECHNIQUES FOR CREDENTIAL GENERATION - Systems and methods for managing credentials distribute the credentials to subsets of a set of collectively managed computing resources. The collectively managed computing resources may include one or more virtual machine instances. The credentials distributed to the computing resources may be used by the computing resources to perform one or more actions. Actions may include performing one or more functions in connection with configuration, management, and/or operation of the one or more resources, and/or access of other computing resources. The ability to use credentials may be changed based at least in part on the occurrence of one or more events. | 2014-07-10 |
20140196131 | USER AUTHENTICATION BASED ON A WRIST VEIN PATTERN - Technology is described for authenticating a user based on a wrist vein pattern. A wrist contact sensor device detects a wrist vein pattern. The wrist contact sensor device may be wearable by being positioned by a wearable support structure like a wristband. One or more pattern recognition techniques may be used to identify whether a match exists between a wrist vein pattern being detected by the sensors and data representing a stored wrist vein pattern. A user may be authenticated based on whether a match is identified satisfying matching criteria. | 2014-07-10 |
20140196132 | DISCONNECTED CREDENTIAL VALIDATION USING PRE-FETCHED SERVICE TICKETS - One or more user service tickets are obtained (i.e. pre-fetched) from an authentication server and stored in a ticket cache. The user service tickets facilitate a login device communicating with one or more users or group members associated with the login device. Login credentials for the users or group members may be subsequently authenticated against the user service tickets within the ticket cache thereby eliminating the need for immediate access to the authentication server or a previous login session by the users or group members. The user service tickets within the ticket cache may be refreshed as needed. In one embodiment, the user service tickets are refreshed daily and also in response to login attempts if the authentication service is readily accessible. | 2014-07-10 |
20140196133 | COGNITIVE-BASED CAPTCHA SYSTEM - Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. Persistent plugins and tests may be used to continuously verify human users. | 2014-07-10 |
20140196134 | VERIFICATION METHOD FOR VERIFYING VALIDITY OF PROGRAM, AND VERIFICATION SYSTEM - A verification method pertaining to the present invention is executed by a terminal device and is used for determining the validity of a control program used for remotely controlling an appliance via a server. Verification data generated from: a unique identifier which is assigned to a user of the terminal device; a parameter which is generated by the server device and is assigned to the control program; and partial data which is at least a portion of the control program, is compared with comparison data generated from: the ID of the user stored in the server device; the parameter; and a portion of a program corresponding to the partial data of the control program. When a mismatch occurs, the remote control of the appliance will be prohibited. | 2014-07-10 |
20140196135 | SECURE AUTHENTICATION SYSTEMS AND METHODS - Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid. | 2014-07-10 |
20140196136 | Unlocking Virtual Items for Online Use and in Video Games - There is provided a system and method for providing access to a virtual object corresponding to a real object. There is provided a method comprising authenticating a user account for a networked application, confirming a validity of a user provided code, wherein the code is visible on the real object or on accompanying materials of the real object, and granting the user account access to the virtual object for use in the networked application in response to the confirming of the validity. As a result, users are enabled to enjoy interactions with real objects as well as corresponding virtual objects both in an offline video game context and in an online network application context. | 2014-07-10 |