38th week of 2015 patent applcation highlights part 68 |
Patent application number | Title | Published |
20150264039 | INFORMATION PROCESSING SYSTEM AND AUTHENTICATION INFORMATION PROVIDING METHOD - An information processing system including an electronic device; a service providing system including information processing devices connected to the electronic device via a network; a requesting unit configured to send a request from the electronic device to the service providing system, to acquire authentication information of an external service that performs a process in cooperation with an application operating in the electronic device; an access control unit configured to receive the request from the requesting unit whose validity has been confirmed, based on a result obtained by using identification information of the requesting unit, in the service providing system; and a data management unit configured to acquire the authentication information of the external service from a storage unit based on the request from the requesting unit that is valid, and to provide the authentication information of the external service to the requesting unit via the access control unit. | 2015-09-17 |
20150264040 | NETWORK AUTHENTICATION - The present invention addresses apparatuses, methods and computer program product for providing improved authentication of a network by a network node. A network node identification and a vendor certificate are configured in a network node, a usage certificate is created for the network node, which is signed by the vendor with a signature, and contains verification information indicating that the usage certificate relates to this network node and authentication information for allowing the network node to authenticate a network, the usage certificate is transmitted to an operator of an operator network, the network node requests the usage certificate from the operator, when the network node is initially connected to the operator network, the network node determines validity of the signature in the usage certificate received upon the request, and the network node checks whether the received usage certificate actually relates to the network node being initially connected to the operator network, based on the information contained in the usage certificate. | 2015-09-17 |
20150264041 | SECURE APPLICATION DELIVERY SYSTEM WITH SECURITY SERVICES INTERFACE IN THE CLOUD - A system is provided to deliver an application, hosted by a private application provider, over a network to a user device comprising: an application delivery system that includes a first network interface, a network security interface, and a second network interface; an application agent is disposed within the private application provider system. wherein the first network interface receives an encrypted user or device request for access to the hosted application sent over the network and to send the user or device request to the network security interface; wherein the network security interface is configured to decrypt the request, to validate request, to re-encrypt the request and to send the encrypted request to the second network interface; wherein the second network interface is configured to send the encrypted request over the network to the agent; and wherein the agent is configured to send the request to the hosted application. | 2015-09-17 |
20150264042 | SECURE INSTANT MESSAGING SYSTEM - A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user's certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient's certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients. | 2015-09-17 |
20150264043 | Token-Based Data Management System and Method for a Network - An apparatus, system, and method to manage data within a wireless network includes sending a token from a master device to a slave device, receiving an archive record only with the token at the master device from the slave device, and storing the archive record from the slave device within an archive record database at the master device. | 2015-09-17 |
20150264044 | ELECTRONIC SIGNATURE TOKEN, SYSTEM AND METHOD - Provided is an electronic signing tool, comprising: a security chip, a read/write component, a communication module and an input/output component, wherein the security chip is connected to the read/write component, the communication module and the input/output component respectively. Also provided is an electronic signing system. The system comprises: a server, a card and an aforementioned electronic signing tool. An electronic signing tool and system provided in the present invention can perform a secure read/write operation on an IC card, a magnetic strip card, etc. remotely, and avoid information being leaked or information being tampered with when performing an operation on the IC card, the magnetic strip card, etc. at the time a remote operation is performed through a public network, thus improving the security and convenience. | 2015-09-17 |
20150264045 | BIOMETRIC PERSONAL AUTHENTICATION - A module for authenticating a person is characterized in that it comprises:
| 2015-09-17 |
20150264046 | METHOD FOR IDENTIFYING/AUTHENTICATING A PERSON USING THE VENOUS NETWORK THEREOF - A person may be identified by at least an identification system including a device for capturing an image of a venous network of a finger and a database containing reference venous network images partitioned by class according to topological characteristics and for each class reference topological characteristics. In one embodiment, an image of the venous network is captured, transmitted to the processing unit, centred relative to a display window, and cut into at least two bands parallel to the finger's axis. A set of each band's topological characteristics is extracted. A distance between the extracted set and all reference topological characteristics of the class is calculated, for each class. The venous network image is classified in the class corresponding to the smallest distance and is compared with each reference venous network image in the class. The authenticity of the person from the result of the comparison step is decided. | 2015-09-17 |
20150264047 | METHOD AND SYSTEM FOR PROVIDING SECURE COMMUNICATION BETWEEN MULTIPLE OPERATING SYSTEMS IN A COMMUNICATION DEVICE - Present disclosure provides a method and system for providing a secure communication between multiple operating systems in a communication device. A primary operating system in the communication device is loaded. An authentication check of one or more secondary operating systems in the communication device is performed through the primary operating system, wherein the one or more secondary operating systems are authenticated based on rule assignation. A secure communication is enables between the one or more secondary operating systems after the authentication. | 2015-09-17 |
20150264048 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - There is provided an information processing apparatus including an authentication process unit configured to obtain an authentication request from another apparatus, and perform an authentication process between the information processing apparatus and the another apparatus in response to the authentication request, and a notification generation unit configured to, when the authentication process unit performs the authentication process between the information processing apparatus and the another apparatus, generate information for notifying a result of the authentication process and information for limiting use of the another apparatus. | 2015-09-17 |
20150264049 | Systems and Methods for Domain- and Auto-Registration - Systems and methods are provided for processing messages for registered users within an allowed domain. The method includes performing domain-registration and auto-registration for non-registered users. The method allows users to utilize messaging services without having to individually register each and every user upfront. | 2015-09-17 |
20150264050 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server. The authentication server transmits notice of authentication and the signed message to the provider server. | 2015-09-17 |
20150264051 | AUTOMATED WIRELESS DEVICE PROVISIONING AND AUTHENTICATION - Automated provisioning and/or authentication of a device to a wireless access point is contemplated. The automated provisioning may be performed in a manner that enables the device to receive provisioning instructions in accordance with HotSpot 2.0, Passpoint or other Wi-Fi related protocols and standards without having to input identification or other user-specific information like a username and password combination. The authentication may be performed in a manner sufficient to enable service-level differentiation for the provisioned devices and/or other devices desiring wireless access, such as but not necessary limited to facilitating assigning different bandwidth speed/priorities according to a service agreement. | 2015-09-17 |
20150264052 | SYSTEM AND METHOD FOR MANAGING MOBILE DEVICE USING DEVICE-TO-DEVICE COMMUNICATION - Provided are a system and method for managing a mobile device using device-to-device (D2D ) communication in which a D2D communication-based mobile device management (MDM) manager is given authority to manage a D2D communication-based MDM client by an MDM server and can directly manage a user mobile device at a short distance based on D2D communication. | 2015-09-17 |
20150264053 | SYSTEMS AND METHODS OF ASSESSING PERMISSIONS IN VIRTUAL WORLDS - Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds. | 2015-09-17 |
20150264054 | COLLABORATION SPACE WITH EVENT-TRIGGER CONFIGURATION VIEWS - Protecting sensitivity of information in a shared collaborative space on a computer network includes associating a set of sensitivity levels to sets of users and to sets of data elements. Access by each user to the shared collaborative space may be restricted to those data elements that have the same sensitivity level as of the user. Where multiple users join a single session, only data elements having a lowest common sensitivity level are made accessible by the users of the session. | 2015-09-17 |
20150264055 | SECURE APPLICATION DELIVERY SYSTEM WITH DIAL OUT AND ASSOCIATED METHOD - A system is provided to deliver an application, hosted by a private application provider system, over a network to a user device, comprising: an application delivery system that includes a first network interface, a network security interface and a second network interface; wherein the network security interface is configured to determine whether a user or device request for access to an application is valid, and in response to determining that the user or device request for access to the first application is valid, to send the user or device request to the application agent. | 2015-09-17 |
20150264056 | SYSTEMS, METHODS, AND COMPUTER MEDIUM TO SECURELY TRANSFER BUSINESS TRANSACTIONAL DATA BETWEEN NETWORKS HAVING DIFFERENT LEVELS OF NETWORK PROTECTION USING BARCODE TECHNOLOGY WITH DATA DIODE NETWORK SECURITY APPLIANCE - Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are provided to transfer contents of transactional data between two or more networks configured to have different levels of network protection using barcode technology with a data diode network security appliance. Generated data barcodes can be decoded to produce contents of transactional data to be transmitted between two or more networks configured to have different levels of network security protection, and decoded contents of the transactional data can then be securely communicated back to the sender for comparison by use of a data diode unit. Generated verification barcodes can then be decoded to produce verification data. Verification data can confirm success of the transmission of contents of the transactional data encoded in the data barcodes. Decoded contents of the transactional data can then be stored responsive to an indication of successful transmission. | 2015-09-17 |
20150264057 | SYSTEMS, METHODS, AND COMPUTER MEDIUM TO SECURELY TRANSFER BUSINESS TRANSACTIONAL DATA BETWEEN PHYSICALLY ISOLATED NETWORKS HAVING DIFFERENT LEVELS OF NETWORK PROTECTION UTILIZING BARCODE TECHNOLOGY - Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are provided to transfer contents of transactional data between two or more networks configured to have different levels of network protection. Generated data barcodes can be decoded to produce contents of transactional data to be transmitted between two or more networks configured to have different levels of network security protection, and decoded contents of the transactional data can then be securely communicated back to the sender for comparison by generating validation barcodes to be decoded by the sender. Generated verification barcodes can then be decoded to produce verification data. Verification data can confirm success of the transmission of contents of transactional data encoded in the data barcodes. Decoded contents of transactional data can then be stored responsive to an indication of successful transmission. | 2015-09-17 |
20150264058 | Systems and Methods for Inhibiting Attacks on Applications - In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of the present invention, input from an input source, such as traffic from a communication network, can be routed through a filtering proxy that includes one or more filters, classifiers, and/or detectors. In response to the input passing through the filtering proxy to the application, a supervision framework monitors the input for attacks (e.g., code injection attacks). The supervision framework can provide feedback to tune the components of the filtering proxy. | 2015-09-17 |
20150264059 | MALWARE DETECTOR - A transparent proxy for malware detection includes a monitor module, a protocol determination module, a challenge generation module, a response determination module, and a data control module. The monitor module examines data originating from an application towards a remote server. The protocol determination module identifies the protocol type used for the data. The challenge generation module produces a challenge for the application based upon the protocol type, sends the challenge to the application, and maintains a state related to the data and the challenge. The response determination module makes a determination if an automatic non-interactive application response is received in response to the challenge from the application. The data control module allows the first data to continue to the remote server when the determination is valid. The data control module reports malware detection and blocks the data to continue to the remote server when the determination is invalid. | 2015-09-17 |
20150264060 | METHOD AND APPARATUS FOR UPLOADING FILES - A method and apparatus for uploading files are disclosed. The method includes: upon receiving a scanning instruction, obtaining unknown files on a client and putting the unknown files in a file upload queue; scanning unknown files in the file upload queue to obtain a risk coefficient for each unknown file; sorting in descending order the unknown files in the file upload queue based on the risk coefficient of the unknown files; and uploading the unknown files in the file upload queue in order to a server. The unknown files in the file upload queue are sorted so that the most suspicious files are uploaded first to ensure that the server will timely receive the most suspicious files, which greatly improves the efficiency of cloud servers in collecting suspicious files. | 2015-09-17 |
20150264061 | SYSTEM AND METHOD FOR DETECTING NETWORK INTRUSIONS USING LAYERED HOST SCORING - Approaches for detecting network intrusions, such as malware infection, Trojans, worms, or bot net mining activities includes: identifying one or more threat detections in session datasets, the session datasets corresponding to network traffic from a plurality of hosts; determining a layered detection score, the layered detection score corresponding to a certainty score and threat score; determining a layered host score, the layered host score corresponding to a certainty score and threat score; and generating alarm data comprising the layered detection score and the layered host score. In some embodiments, the network traffic may be received passively through a network switch; for example, by “tapping” the switch. Other additional objects, features, and advantages of the invention are described in the detailed description, figures and claims. | 2015-09-17 |
20150264062 | VIRUS INTRUSION ROUTE IDENTIFICATION DEVICE, VIRUS INTRUSION ROUTE IDENTIFICATION METHOD, AND PROGRAM - The invention aims to backtrack a virus infection route with more detail than in the conventional case. CPUs of client devices respectively monitor operations, and cause storage devices to store operation histories. The CPU determines, upon detecting a virus, the time and date at which the virus was first saved in the client device based on the operation history stored in the storage device, and determines a virus intrusion route based on the operation content that was executed at the determined time and date. | 2015-09-17 |
20150264063 | SYSTEMS AND METHODS FOR IDENTIFYING ILLEGITIMATE ACTIVITIES BASED ON HISTORICAL DATA - Systems, methods, and non-transitory computer-readable media can acquire historical data including a plurality of features associated with known legitimate activities and with known illegitimate activities. A machine learning technique can be applied to the historical data to gain information about the plurality of features associated with the known legitimate activities and with the known illegitimate activities. A decision tree can be generated based on at least a portion of the information about the plurality of features. A node in the decision tree that satisfies specified precision criteria can be identified. A rule can be created based on the node. One or more illegitimate activities can be identified based on the rule. | 2015-09-17 |
20150264064 | METHOD AND SYSTEM FOR FILTERING SPAM MESSAGES ON PURCHASE PREFERENCES - A method for unblocking spam email messages includes: storing, in an email database, a plurality of email data entries, wherein each email data entry includes data related to an email message including at least message data, content data, and an indication of spam; receiving, by a receiving device, consumer data associated with one or more consumers, wherein the consumer data is based on transaction data for one or more payment transactions involving the associated one or more consumers; identifying, in the email database, one or more email data entries where the included content data corresponds to the received consumer data; and transmitting, by a transmitting device, at least the message data included in each of the identified one or more email data entries. | 2015-09-17 |
20150264065 | SENSITIVE DATA TRACKING USING DYNAMIC TAINT ANALYSIS - A system and method for tracking sensitive data uses dynamic taint analysis to track sensitive data as the data flows through a target application running on a computer system. In general, the system and method for tracking sensitive data marks data as tainted when the data input to the target application is indicated as sensitive. The system and method may then track the propagation of the tainted data as the data is read from and written to memory by the target application to detect if the tainted data is output from the application (e.g., leaked). Dynamic binary translation may be used to provide binary instrumentation of the target application for dynamic taint analysis to track propagation of the tainted data at the instruction level and/or the function level. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment. | 2015-09-17 |
20150264066 | MANAGING A BLOCKED-ORIGINATOR LIST FOR A MESSAGING APPLICATION - Managing a blocked-originator list for a messaging application, including: detecting, by a list management module, a list management initiation event for a blocked-originator list, the blocked-originator list including a plurality of originators from which incoming messages are blocked; determining a number of entries in a blocked-originator list; determining a maximum number of entries in the blocked-originator list; determining whether the number of entries in the blocked-originator list is equal to the maximum number of entries in the blocked-originator list; and responsive to determining that the number of entries in the blocked-originator list is equal to the maximum number of entries in the blocked-originator list: deleting an entry from the blocked-originator list in dependence upon entry removal rules; and adding the new entry to the blocked-originator list. | 2015-09-17 |
20150264067 | WEB SERVER/WEB APPLICATION SERVER SECURITY MANAGEMENT APPARATUS AND METHOD - A security management apparatus and method for a web server/web application server is provided. The security management apparatus includes a connection state table storage unit for, as a web client accesses a web server/web application server, storing connection state information, an access time, and a connection policy. A connection state information inspection unit inspects whether current connection state information is present in connection state information of the connection state table storage unit in which the connection policy is set to blocking. If current connection state information is not present, a web session reuse attack determination unit determines whether a current connection is a web session reuse attack. If the current connection is not the web session reuse attack, an attack pattern analysis unit analyzes whether an attack pattern is present. A blocking unit blocks a connection between the web client and the web server/web application server. | 2015-09-17 |
20150264068 | METHOD AND SYSTEM FOR DETECTING BOT BEHAVIOR - A bot detection engine to determine whether hosts in an organization's network are performing bot-related activities is disclosed. is A bot detection engine can receive network traffic between hosts in a network, and/or between hosts across several networks. The bot engine may parse the network traffic into session datasets and discard the session datasets that were not initiated by hosts in a given network. The session datasets may be analyzed and state data may be accumulated. The state data may correspond to actions performed by the hosts, such as requesting a website or clicking ads, or requesting content within the website (e.g. clicking on a image which forms a HTTP request/response transaction for the image file). | 2015-09-17 |
20150264069 | METHOD AND SYSTEM FOR DETECTING EXTERNAL CONTROL OF COMPROMISED HOSTS - A detection engine may be implemented by receiving network traffic and processing the traffic into one or more session datasets. Sessions not initiated by an internal host may be discarded. The frequency between the communication packets from the internal host to external host may be grouped or processed into rapid-exchange instances. The number of rapid-exchange instances, the time intervals between them, and/or the rhythm and directions of the initiation of the instances may be analyzed to determine that a human actor is manually controlling the external host. In some embodiments, when it is determined that only one human actor is involved, alarm data may be generated that indicates that a network intrusion involving manual remote control has occurred or is underway. | 2015-09-17 |
20150264070 | METHOD AND SYSTEM FOR DETECTING ALGORITHM-GENERATED DOMAINS - A method and system for detecting algorithm-generated domains (AGDs) is disclosed wherein domain names requested by an internal host are categorized or classified using curated data sets, active services (e.g. Internet services), and certainty scores to match domain names to domain names or IP addresses used by command and control servers. | 2015-09-17 |
20150264071 | ANALYSIS SYSTEM AND ANALYSIS APPARATUS - In general, according to one embodiment, an analysis system includes a sampling device disposed in a monitoring-target system. The analysis apparatus is configured to analyze a possibility of occurrence of a security incident, based on communication data sampled by the sampling device. The sampling device includes a transmission unit configured to transmit sample data meeting a rule of data sampling to the analysis apparatus, and a sampling rule setting unit configured to set the rule in accordance with an instruction from the analysis apparatus. The analysis apparatus includes a sampling rule management unit configured to instruct the sampling device to change the rule in accordance with a result of an analysis of the sample data. | 2015-09-17 |
20150264072 | System and Method for Extracting and Preserving Metadata for Analyzing Network Communications - Systems and methods are provided for advanced persistent threat detection on a network. The method includes capturing data packets from a network and performing layered session decoding on the captured packets. Metadata is extracted from the decoded packets and is stored for analysis. Analysis of the metadata is used to detect advanced persistent threats on the network. The system includes a network and a processor coupled to the network. The processor is configured to capture data packets from the network and perform layered session decoding on the captured packets. Metadata is extracted by the processor and stored in a memory coupled to the processor. The metadata may then be analyzed to detect advanced persistent threats on the network. | 2015-09-17 |
20150264073 | SYSTEM AND METHOD FOR DETECTING INTRUSIONS THROUGH REAL-TIME PROCESSING OF TRAFFIC WITH EXTENSIVE HISTORICAL PERSPECTIVE - A real-time perspective engine that can detect network intrusions by accepting network packets as input, organizing the packets, and processing them through a series of detection schemes to identify potentially malicious network behavior. The detection system can implement stateless detection that detects network threats in real-time. The detection system can implement state-full detection that detects network threats which in small amounts may appear innocuous but over time evidence a network attack or malicious activity. | 2015-09-17 |
20150264074 | APPLICATION SECURITY TESTING - Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time modifier determines that a portion of a function to be executed by the AUT is unsafe. The real-time modifier modifies execution of the AUT to not execute the portion. | 2015-09-17 |
20150264075 | MANAGEMENT METHOD, MANAGEMENT DEVICE, AND MANAGEMENT PROGRAM - A management method comprising, extracting, using a processor, psychological characteristics that are characteristic of people who have experienced a certain incident; extracting, using the processor, behavioral characteristics that are characteristic of people who have experienced a certain incident; obtaining, using the processor, a relational expression between each item of the extracted psychological characteristics and a plurality of items of the extracted behavioral characteristics; and calculating, using the processor, a psychological characteristic value from the relational expression of each psychological characteristic item and a value of log data for each user and, distributing, using the processor, to any user whose psychological characteristic value exceeds a predetermined value, a measure devised for the exceeded psychological characteristic. | 2015-09-17 |
20150264076 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 2015-09-17 |
20150264077 | Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure - A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity. Remedial action(s) are performed for the determined computer system(s). | 2015-09-17 |
20150264078 | DETECTING NETWORK RECONNAISSANCE BY TRACKING INTRANET DARK-NET COMMUNICATIONS - A method and system for detecting network reconnaissance is disclosed wherein network traffic can be parsed into unidirectional flows that correspond to sessions. A learning module may categorize computing entities inside the network into assets and generate asset data to monitor the computing entities. If one or more computing entities address a flow to an address of a host that no longer exists, ghost asset data may be recorded and updated in the asset data. When a computing entity inside the network contacts an object in the dark-net, the computing entity may be recorded a potential mapper. When the computing entity tries to contact a number of objects in the dark-net, such that a computed threshold is exceeded, the computing entity is identified a malicious entity performing network reconnaissance. | 2015-09-17 |
20150264079 | DETECTION OF LOCKSTEP BEHAVIOR - Disclosed here are methods, systems, paradigms and structures for determining fraudulent content in a social network. The methods include identifying a plurality of users of the social network who perform a plurality of tasks within the social network in a lockstep manner. In the method, the plurality of users are determined to be performing a given task in the lockstep manner when the plurality of users each perform the given task within a predefined duration of time, where the predefined duration of time is associated with the given task. The method further includes identifying content data generated by the performance of the plurality of tasks by each of the plurality of users. The method further includes determining at least a portion of the content data generated by the performance of the plurality of tasks as fraudulent content. | 2015-09-17 |
20150264080 | Testing Integrity of Property Data of a Device Using a Testing Device - The invention relates to a method and a test system for testing integrity of property data of a device using a testing device within a network, the devices and their respective property data within the network, such as all the measurement or control device distributed inside an industrial automation system, being taken into account in order to simplify testing of a large number of devices. The various property data are tested for an identity and are labelled, and calculations, which are carried out by the testing device for testing purposes, are initiated on the basis of the labelling. By taking other devices in the system into account, security requirements can be fulfilled during testing and the computational effort for the testing device can also be reduced. | 2015-09-17 |
20150264081 | NETWORK DEVICE AND METHOD FOR AVOIDING ADDRESS RESOLUTION PROTOCAL ATTACK - A network device records IP addresses and MAC addresses of a plurality of CPEs to form an address mapping table, sends first ARP request packets to the plurality of CPEs according to the IP addresses in the address mapping table, and receives first ARP response packets. The network device compares the MAC addresses in the first ARP response packets with the corresponding MAC addresses in the address mapping table to identify an unusual MAC address. The network device generates a plurality of IP addresses randomly, sends second ARP request packets according to the plurality of IP addresses, and receives second ARP response packets. In response to a MAC address in the second ARP response packets being same with the unusual MAC address, the network device blocks packets transmission corresponding to the unusual MAC address. | 2015-09-17 |
20150264082 | METHODS FOR DETERMINING CROSS-SITE SCRIPTING AND RELATED VULNERABILITIES IN APPLICATIONS - The invention provides computer-implemented methods and computer systems for testing applications such as web-based (HTTP) applications for cross-site scripting (XSS) and related security vulnerabilities and permits the discovery of previously unknown XSS and related vulnerabilities in applications without relying on known or previously generated static XSS signatures. The invention may be applied to any type of XSS or related vulnerability for any variation of application code. | 2015-09-17 |
20150264083 | MALICIOUS RELAY DETECTION ON NETWORKS - A system and method for detecting malicious relay communications is disclosed. Network communications can be received and analyzed using such network components as a network switch. The received traffic can be parsed into sessions. Relay metadata can be extracted from the sessions and further be used to categorize the sessions into one or more types of relay metadata behaviors. Once a significant amount of sessions are detected an alarm may be triggered and/or alarm data may be generated for analysis by network security administrators. | 2015-09-17 |
20150264084 | SYSTEMS AND METHODS FOR PROTECTING ORGANIZATIONS AGAINST SPEAR PHISHING ATTACKS - A computer-implemented method for protecting organizations against spear phishing attacks may include (1) searching a plurality of websites for user profiles belonging users who are affiliated with an organization and who have access to at least one privileged computing resource controlled by the organization, (2) retrieving, from the user profiles, personal information describing the users, (3) determining, based on the personal information, that a portion of the user profiles belongs to an individual user with access to the privileged computing resource, (4) identifying at least one phishing attack risk factor in the user profiles that belong to the individual user, and (5) assessing, based at least in part on the phishing attack risk factor, a risk of a phishing attack targeting the individual user to illegitimately gain access to the privileged computing resource. Various other methods, systems, and computer-readable media are also disclosed. | 2015-09-17 |
20150264085 | MESSAGE SENDING DEVICE, MESSAGE RECEIVING DEVICE, MESSAGE CHECKING METHOD, AND RECORDING MEDIUM - A message sending device includes a processor that executes a process. The process includes: obtaining an operation characteristic during creating a message; adding, to the message, the operation characteristic obtained at the obtaining; and sending the message, to which the operation characteristic has been added at the adding, to a destination of the message. | 2015-09-17 |
20150264086 | Method of detecting potential phishing by analyzing universal resource locators - A method for detecting potential phishing URLs includes extracting a URL from a document, analyzing the URL context, and comparing the URL to stored trusted URLs and stored known phishing URLs. The URL context includes anchor text and surrounding content associated with the URL. The method further includes generating a phishing alert based on the comparing and the analyzing. | 2015-09-17 |
20150264087 | Systems, Apparatuses, and Methods for Enforcing Security on a Platform - Embodiments of a system, apparatus, and method of platform security are describe. In some embodiments, a system comprises a manageability engine to detect if a software agent of the platform is removed and a software agent enclave, wherein the software agent enclave and manageability engine each include a specific session key to be used for communications between the software agent enclave and the manageability engine. | 2015-09-17 |
20150264088 | IMAGE FORMING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM STORING PROGRAM - An image forming apparatus and a method of controlling the same, when it is instructed that the security policy be enabled, changes a setting item corresponding to the security policy so that the security policy is satisfied, and sets so that a setting value of the setting item cannot be changed, and when it is instructed that the security policy be disabled, controls so that a setting value of the setting item is changed under a condition that a security policy associated with the setting item corresponding to the security policy is disabled. | 2015-09-17 |
20150264089 | Voice Over IP (VoIP) Network Infrastructure Components and Method - A voice over Internet protocol communication system and method provides infrastructure components as intermediaries between networks, the components include multi-protocol session controllers and a multi-protocol signaling switch as well as a management system. The session controllers process calls and participate in the calls that flow through it. The session controllers process calls that are either at the edge of the network or at the core of the voice over Internet protocol network. The session controllers associate calls with one another in call peers for incoming calls as ingress call peers and for outgoing calls as egress call peers. A centralized database of call routing policies is provided to the session controllers. The session controllers provide cost management, topology hiding, and inter-working, or conversion, of calls from SIP networks to H.323 networks for both voice and video. | 2015-09-17 |
20150264090 | EDCA Operation to Improve VoIP Performance in a Dense Network - This disclosure relates to wireless communication techniques for high short packet density scenarios. According to some embodiments, a wireless device may determine whether a wireless medium is experiencing crowded short packet conditions during a first period of time. The wireless device may select an operational mode from at least a first operational mode and a second operational mode based at least in part on whether the wireless medium is experiencing crowded short packet conditions. The wireless device may perform wireless communication on the wireless medium according to the selected operational mode. | 2015-09-17 |
20150264091 | METHOD AND DEVICE FOR CONTROLLING PERIPHERAL DEVICES VIA A SOCIAL NETWORKING PLATFORM - A method and device for controlling peripheral devices via a social networking platform includes a method and device for registering a peripheral device on a social networking platform, which includes: at a user device having one or more processors and memory: executing a social networking client application of the social networking platform on the user device; through the social networking client application, receiving an input identifying a peripheral device; and in response to receiving the input identifying the peripheral device: sending a request to establish a social networking identity for the peripheral device; and upon successful establishment of the social networking identity for the peripheral device, presenting the peripheral device as a social network contact of the user account in a user interface of the social networking client application. | 2015-09-17 |
20150264092 | CONTENT PREVIEW GENERATION USING SOCIAL NETWORK ANALYSIS - Disclosed is a system and method for generating a preview of a digital content item using social network analysis. Members of a social network who acquire the digital content item may identify interesting portions of the digital content. When a member of the social network requests a preview of the digital content item, typically in anticipation of an acquisition of the digital content item, the interesting portions of the digital content item identified by fellow social network members are considered in the generation of the preview. Selection of the interesting content for preview may include more identified content, as well as social network relationship and role magnitudes. The digital content item may include: text, such as books or articles; multimedia such as audio/video; and interactive, such as games or virtual worlds. | 2015-09-17 |
20150264093 | PUBLICATION REVIEW USER INTERFACE AND SYSTEM - Disclosed are systems, apparatus, and methods for managing user reviews of publications within an online user network. Various user interfaces may provide access to view a publication and request a review thereof, solicit and receive reviewing information from the requesting or another user (or multiple users), and provide access to a review generated from the received reviewing information. | 2015-09-17 |
20150264094 | Interaction Method and Application Platform for Social Network Site - An interaction method and application platform for a social network site (SNS) are disclosed. The method includes: receiving a connection instruction of a user, and connecting to the user according to the connection instruction; receiving user information uploaded by the user or acquiring user information locally, and updating the user information to a preset information sharing space; and sharing information and performing anonymous SNS interaction between the current user and at least one other user based on the information sharing space. The present disclosure not only enhances an interaction manner between users, and expands a channel for the users to learn about each other, but also improves a success rate of user matching, and develops user relation chains, thereby generating abundant album resources and users with high quality content from whom high-quality users are extracted to form principally recommended users. | 2015-09-17 |
20150264095 | WEB SERVICE PUSH METHOD AND WEB SERVICE PUSH SERVER AND WEB SERVICE PROVIDING SERVER PERFORMING SAME - A web service push method is performed by a web service push server connected to a web service providing server, a push server, and a user terminal capable of executing a web browser and including a push client. The web service push method includes the steps of: receiving, from the web service providing server, push request information including a location identifier of a web service and a web browser identifier; determining a push identifier relating to the web browser based on the received web browser identifier; generating a web service push message including the location identifier and the determined push identifier; and transmitting the generated web service push message to the push server to enable the user terminal to receive the web service through the web browser. | 2015-09-17 |
20150264096 | Low Latency Live Video Streaming - Techniques are disclosed for low latency live video streaming. A client can be configured to send a single HTTP request for live video streaming to a server. The server can be configured to push one or more video segments to the client in response to the request, following a pre-defined push strategy. For example, using a so-called all-push strategy, the client sends only one request to the server, and in response, the server sends all of the video segments to the client as soon as each segment is complete. The HTTP 2.0 protocol may be used for pushing the video from the server to the client. This technique eliminates the request explosion problem when small segments are used. Further, the number of segments pushed with each request can be varied, which is to facilitate adaptive bitrate switching. | 2015-09-17 |
20150264097 | PROCESSING SYSTEM WITH TRANSPORT STREAM AGGREGATION AND METHODS FOR USE THEREWITH - A processing system includes a transport stream aggregator that receives a plurality of transport streams in a transport stream format and that generates an aggregated transport stream in response. The transport stream aggregator processes transport stream packets of the plurality of transport streams and replaces a packet synchronization field with a customized synchronization field. A processing device is configured to generate a processed video signal from the aggregated transport stream. | 2015-09-17 |
20150264098 | System and Method for Dynamic Effective Rate Estimation for Real-Time Video Traffic - A method for effective flow rate estimation for a plurality of video flows includes determining a first flow rate of each of the plurality of video flows in a first transmission window and receiving quality of experience (QoE) feedback for playing portions of the plurality of video flows in the first transmission window. The QoE feedback is received from a plurality of user equipments (UEs) receiving the plurality of video flows. A dynamic effective flow rate is estimated for each flow in the plurality of video flows in a second transmission window in accordance with at least the first flow rates of the plurality of video flows and the QoE feedback. | 2015-09-17 |
20150264099 | SYSTEMS AND METHODS FOR CONSTRAINING A BITSTREAM - A method for constraining a bitstream by an electronic device is described. The method includes obtaining a message structure. The message structure includes a parameter structure corresponding to a bitstream partition. The method also includes obtaining a parameter structure index referring to the parameter structure. The method further includes determining whether the parameter structure index is within a parameter structure index valid range. The method additionally includes generating a first indication if the parameter structure index is not within the parameter structure index valid range. | 2015-09-17 |
20150264100 | DISTRIBUTION METHOD, PLAYBACK APPARATUS, AND DISTRIBUTION APPARATUS - A distribution apparatus packetizes streaming data of a variable bit rate, and distributes the resulting data to a plurality of playback apparatuses. The distributed streaming data is transferred from one playback apparatus to other one or more playback apparatuses. One playback apparatus measures the communication quality between the one playback apparatus and each of the other playback apparatuses of transfer destinations. One playback apparatus redivides the received streaming data into packets based on a playback data amount for each unit playback time in the received streaming data and on the measured communication quality and transfers the resulting streaming data. | 2015-09-17 |
20150264101 | Distributed Coordination of Network Elements for Packet Encapsulation - In one embodiment, an encapsulator device receives a source stream of encoded packets in a first transport format and converts the source stream to packets of an output stream in a second transport format for communication over a data network. The encapsulator device generates a mapping stream with information indicating which packets in the source stream are used to generate the output stream. The output stream of the encapsulator device is coordinated with the output stream of other encapsulator devices by sending the mapping stream to the other encapsulator devices in the network. The other encapsulator devices use the mapping stream to generate identical output streams. | 2015-09-17 |
20150264102 | Individual Adjustment of Audio and Video Properties in Network Conferencing - Individual adjustment of audio volume and video properties in a computer network conference environment is provided. For audio adjustment, a buffer collects incoming streams; a stream decoder decodes the buffered audio streams, a gain adjustment applies a gain increase or decrease to the individual audio stream, and a mixer combines each of the individual signals together. The gain adjustment module receives input from a user interface control associated with each participant, and adjusts the volume of that participant's stream accordingly. If a requested increase in gain would cause an overflow of the signal, only a gain increase that will avoid such overflow is applied. Video properties such as brightness, contrast and saturation are also adjustable. Properties of the user's transmitted audio and video streams are also adjustable. | 2015-09-17 |
20150264103 | Real-Time Transport Protocol (RTP) Media Conference Server Routing Engine - The RTP Media Conference Server Routing Engine (“MCSRE”) integrates into a standards based RTP Media Server to improve server data throughput of RTP conference routing by factors of tens to hundreds while simultaneously decreasing real-time media delivery delays and significantly decreasing server resource requirements. The RTP MCSRE maintains a conference routing database used to manage a large number of conferences with a list of associated RTP sessions and conference participants. The routing engine also includes a Conference Session Routing Filter (“CSRF”) and a Routing Logic Processor (“RLP”) that selectively route received media streams to each participant in a given RTP conference. The behavior of both the CSRF and the RLP can be modified by executable scripts. The RTP MCSRE imposes floor control rules and packet filtering with regard to both network bandwidth and hardware resources specific to conference participant endpoint devices. | 2015-09-17 |
20150264104 | QUALITY OF EXPERIENCE FOR COMMUNICATION SESSIONS - A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include analyzing network conditions relative to a plurality of codecs and a plurality of network paths. The method may also include determining a quality of experience associated with each of the plurality of codecs across each of the plurality of network paths. The method may further include transacting communication traffic using a codec-network path combination having a quality of experience above a predetermined threshold. | 2015-09-17 |
20150264105 | AUTOMATIC UNIFORM RESOURCE LOCATOR CONSTRUCTION - Techniques are disclosed for automatically constructing a human-friendly and meaningful URL based on the content, context, or both, of the resource. An alternate URL can be constructed by analyzing and extracting keywords or other portions of content from a webpage automatically. The content of the webpage or other resource is obtained and analyzed using keyword extraction filters to derive one or more keywords that uniquely represent the content of the resource. An alternate URL is constructed based on the keywords. The keywords can be extracted from any portion of the content or from dictionary definitions or similar meanings of the content. The alternate URL is constructed such that it is unique among existing URLs. The alternate URL meaningfully represents the content, permitting the user to use or share the alternate URL on social media and elsewhere. | 2015-09-17 |
20150264106 | METHOD OF CONNECTING USER EQUIPMENT TO IMS NETWORK THROUGH WEB BROWSER FOR WEB REAL-TIME COMMUNICATION SERVICE - A method that connects a User Equipment (UE) to an Internet Protocol Multimedia Subsystem (IMS) network through a web browser for a Web Real-Time Communication (WebRTC) service is provided. The method, and a UE adapted to the method, downloads a web app for a WebRTC service and connects to an IMS network through a WebRTC client. The UE connects to the IMS network and is registered in the IMS network in such a way as to use a Universal Resource Locator (URL) of an enhanced Proxy-Call Session Control Function (eP-CSCF) obtained by establishing a Packet Data Network (PDN) connection of the UE through a web browser in the process of obtaining a URL of the eP-CSCF, or the obtained URL of an eP-CSCF to which the WebRTC client can connect by transmitting Public Land Mobile Network (PLMN) information of a network to which the UE is connected to a WebRTC Web Server Function (WWSF). Therefore, the UE can easily use WebRTC services. | 2015-09-17 |
20150264107 | Automatic Genre Determination of Web Content - A mechanism is provided for automatic genre determination of web content. For each type of web content genre, a set of relevant feature types are extracted from collected training material, where genre features and non-genre features are represented by tokens and an integer counts represents a frequency of appearance of the token in both a first type of training material and a second type of training material. In a classification process, fixed length tokens are extracted for relevant features types from different text and structural elements of web content. For each relevant feature type, a corresponding feature probability is calculated. The feature probabilities are combined to an overall genre probability that the web content belongs to a specific trained web content genre. A genre classification result is then output comprising at least one specific trained web content genre to which the web content belongs together with a corresponding genre probability. | 2015-09-17 |
20150264108 | Device management method and apparatus - A device management method and apparatus are described. The method includes the following steps: a terminal detects an access of a device (S | 2015-09-17 |
20150264109 | INFORMATION PROCESSING SYSTEM, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM, INFORMATION PROCESSING METHOD AND INFORMATION PROCESSOR - A first information processor executes a program or a routine which uses wireless communication and transmits, while the program or the routine is being executed, identification information for identifying the program or the routine to an unspecified apparatus. A second information processor receives the identification information transmitted from the first information processor to the unspecified apparatus and selects, from among a plurality of programs or a plurality of routines stored in the second information processor, a program or a routine corresponding to the identification information as a program or a routine to be executed. | 2015-09-17 |
20150264110 | DOCUMENT PROVIDING SYSTEM, PROVIDING-SIDE APPARATUS, AND DISPLAY-SIDE APPARATUS - Provided is a document providing system, a providing-side apparatus, and a display-side apparatus, capable of increasing the usability. The providing-side apparatus | 2015-09-17 |
20150264111 | AUTHORIZING ACCESS BY EMAIL AND SHARING OF ATTACHMENTS - Solutions are provided for authorizing access to and/or sharing of email attachments. An example method may include, by a computing device, detecting an email message with a file attachment. The email message may identify one or more recipients of the file attachment. The file attachment may be stored in a database table. The database table may include at least one permissions entry controlling access by the one or more recipients to the stored file attachment. The file attachment may be replaced in the email message, with a download link to a location in the database table storing the file attachment. The email message may be delivered with the download link to the one or more recipients. | 2015-09-17 |
20150264112 | SYSTEM AND METHOD FOR FORWARDING A FILE - Methods, systems, and computer-readable media are provided. Some embodiments include, after receiving at least a portion of a file at a computing system, obtaining information about the file at a first time. First information is stored in a data structure, the first information comprising information that identifies the file and the information about the file at the first time. Then, information about the file at a second time after the first time is obtained. Second information is stored in a memory of the computing system, the second information comprising information that identifies the file and the information about the file at the second time. It is determined whether the second information matches the first information. In response to determining that the second information matches the first information, the file is sent from the computing system to a predetermined destination. In some embodiments, the file comprises a facsimile communication. | 2015-09-17 |
20150264113 | Dynamic Batching - An application running on a user device may communicate with a server application. The server application may track user actions on the device. The user actions may be transmitted from the user device to the server application using data packets. Each data packet may include header information and information regarding one or more user actions (the “batch”). The number of user actions to include in each batch may be determined by the OS, by the application, by the user, by the network, the number of actions in the batch, the size of the data in the batch, the time elapsed between the first and last action in the batch, or any suitable combination thereof. A communication server may recognize a batch data packet and divide it into individual data packets. | 2015-09-17 |
20150264114 | METHOD AND SYSTEMS FOR PROVIDING DATA TO A REMOTE SITE - A system including a first server, a second server operatively connected over a network to the first server and a gateway component operatively connected over the network to the first server and the second server. The first server is configured to receive a request for data, the request for data specifying the gateway component and including a predetermined port number at the second server, and send the request for data to the gateway component. The second server is configured to receive the data at the predetermined port number, the data being provided by the gateway component. The gateway component is configured to receive the request for data, retrieve the data from a data source, operatively connect, over the network, to a port at the second server, the port corresponding to the predetermined port number, and send the data to the second server. Methods for using the system are also disclosed. | 2015-09-17 |
20150264115 | Analytics-based Update of Digital Content - Content on a client device is updated. Analytics data describing how a user uses the client device to consume digital content are received. The analytics data are generated by the client device responsive to observations of how the user uses the client device to consume digital content. A prediction model is generated based on the analytics data and used to predict when the user will consume digital content on the client device. Prediction data describing the prediction are provided to the client device. The client device uses the prediction data to request updated digital content prior to when the user is predicted to consume digital content on the client device. | 2015-09-17 |
20150264116 | Scalable Address Resolution - One embodiment provides Subnet administrator (SA) proxy logic to be executed by a computer network node. The SA proxy logic includes provider logic that includes path record information of an associated subnet in communication with the computer network node; and provider interface logic to receive an address resolution request from at least one application that includes partial address information. The provider interface logic is also to determine at least one local port of the computer network node to enable packet routing associated with the address resolution request. The provider logic is also to determine at least one subnet associated with the address resolution request. The provider interface logic is also to determine at least one provider logic to utilize to obtain the path record information for at least one subnet associated with the address resolution request. The provider interface logic is also to generate an address resolution response that includes a resolved address, that includes the path record information, and the identity of at least one local port to enable the at least one application to route data packets through the at least one determined subnet. | 2015-09-17 |
20150264117 | PROCESSES FOR A HIGHLY SCALABLE, DISTRIBUTED, MULTI-CLOUD APPLICATION DEPLOYMENT, ORCHESTRATION AND DELIVERY FABRIC - A method of launching a controller unit in an Multi-Cloud Service Fabric includes launching a value added service (VAS) unit, launching a profiler, and sending tier event to the VAS unit with tier information. | 2015-09-17 |
20150264118 | DISTRIBUTION METHOD AND SOURCE ACQUISITION METHOD - A distribution method is executed by a computer. The distribution method includes dividing a program in response to an acquisition request to acquire the program received from a terminal device connected via a network; and transferring the divided program to the terminal device. | 2015-09-17 |
20150264119 | SOLVER FOR CLUSTER MANAGEMENT SYSTEM - A processing device receives a first cluster management operation request, wherein the first cluster management operation request is for a deployment operation of a first cluster and comprises a cluster template, a specified number of nodes to deploy and a configuration. The processing device determines a plurality of constraints from at least one of the cluster template or the configuration. The processing device deterministically solves for and outputs a first cluster layout comprising the specified number of nodes, each of the specified number of nodes comprising a hardware type, an image type and one or more services, wherein the first cluster layout satisfies the plurality of constraints. | 2015-09-17 |
20150264120 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes a communication unit, a storage, an operation reception unit, and a controller. The communication unit is capable of communicating with a different information processing apparatus and a server on a network. The storage is capable of storing data. The operation reception unit is capable of receiving an operation of a user that selects the data. The controller is capable of controlling the communication unit to transmit the selected data to the server and transmit notification information to the different information processing apparatus, the notification information indicating transmission of the data to the server. | 2015-09-17 |
20150264121 | ORGANIZING DATA IN A VIRTUAL COMPUTING INFRASTRUCTURE - Organizing data in a cloud computing environment having a plurality of computing nodes is described. An authorization to service a request is received. The request may be from a user for launching an instance. In response to receiving the authorization and based on the request, an image list is determined. The image list includes information corresponding to a plurality of machine images. At least one machine image is identified from the image list associated with a functional requirement of the request. The instance is launched at the at least one computing node. The at least one machine image is updated after the instance has been launched. | 2015-09-17 |
20150264122 | PROVISIONER FOR CLUSTER MANAGEMENT SYSTEM - A processing device executing a provisioner requests a node level task from a server. The processing device receives an assignment of a first node level task, wherein the first node level task is associated with a cluster management operation for a first cluster. The processing device determines a first plugin capable of performing the first node level task from a plurality of plugins, wherein each of the plurality of plugins comprises a self-contained program for performing a specific set of node level tasks. The processing device performs the first node level task by the first plugin, wherein the first node level task is an operation on a remote target host that does not include software associated with the provisioner. The processing device reports a result of the node level task to the server. | 2015-09-17 |
20150264123 | CHANGING TOPOLOGY OF WIRELESS PEER-TO-PEER GROUP - A device in a peer-to-peer (P2P) group has the role of group owner. A different device in the P2P group may take on the role of group owner without ending the P2P group and create a new P2P group. Multiple P2P groups may be merged into a single P2P group. A single P2P group may be split into multiple independent P2P groups, each with its own group owner. A group owner of a P2P group may notify the client devices in the P2P group that it is about to leave the P2P group. A client device in a P2P group may be appointed in a new role of backup group owner, to take on the role of group owner in the event of a departure of the group owner, thereby providing continuity. Techniques for maintaining upper layer continuity through changes in topology of P2P groups are disclosed. | 2015-09-17 |
20150264124 | APPARATUS AND METHOD OF PERFORMING WAKEUP-ON-LAN OR SLEEP-ON-LAN VIA INTERNET - The present invention discloses a gateway for controlling Wakeup-on-LAN and/or Sleep-on-LAN through the Internet. The gateway comprises a first port for establishing a P2P (point-to-point) connection to the Internet, and a second port for coupling to a Local-Area-Network (LAN) that supports Wakeup-on-LAN and/or Sleep-on-LAN, wherein the gateway collects identifications and addresses of terminal devices in the Local-Area-Network (LAN) for associating the identification codes and the addresses of the terminal devices, so that the gateway can wake up and/or sleep the terminal devices according to messages carrying the identification codes of the terminal devices on the P2P connection. In addition, the gateway can be associated with a UID (Unique identification Code) that is registered in a server, so that a remote device can send a request containing the UID of the gateway to the server to establish a P2P connection between the gateway and the remote device for waking up and/or sleeping the terminal devices in the LAN. | 2015-09-17 |
20150264125 | SYSTEM AND METHOD FOR SESSION SWEEPING BETWEEN DEVICES - An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables an endpoint to sweep an ongoing communication session to another endpoint by transferring session information between the endpoints. | 2015-09-17 |
20150264126 | Autonomous Computer Session Capacity Estimation - Systems and methods are disclosed for estimating and updating the capacity associated with resources in a virtualized computing environment. A capacity estimation value may be stored in computer memory. The capacity estimation value may estimate how many concurrent sessions a resource in the virtualized computing environment has workload capacity to desirably handle. The system may monitor one or more resource consumption metrics of the resource on an ongoing basis. The capacity estimation value may be updated based on, inter alia, the monitoring. The capacity estimation value may be used when a request is received to create a new session in the resource. | 2015-09-17 |
20150264127 | MANAGING FABRIC PRIORITIES ACROSS HETEROGENEOUS SERVER PLATFORMS - Embodiments relate to facilitating a plurality of heterogeneous hosts to use a range of priority values. A method of facilitating a plurality of heterogeneous hosts to use a range of priority values is provided. The method retrieves a plurality of priority ranges from a plurality of network forwarding elements shared by a plurality of heterogeneous hosts. The network forwarding elements provide access to a set of storage devices that stores data for the plurality of heterogeneous hosts. The method generates, by a computer that comprises one of the heterogeneous hosts, a universal priority range from the plurality of priority ranges. The method maps a plurality of workloads performed by the computer to priority values in the universal priority range. The method sends the universal priority range to at least one other host of the heterogeneous hosts. | 2015-09-17 |
20150264128 | SPECIFICATION-GUIDED MIGRATION - A conformance checker is received on a system that contains hostable content, and is executed. One or more results provided by the conformance checker are evaluated; and the hostable content is migrated to a destination host in accordance with the evaluating step. | 2015-09-17 |
20150264129 | INFORMATION PROCESSING SYSTEM, CLIENT APPARATUS, AND METHOD OF PROCESSING INFORMATION - An information processing system includes at least one information processing apparatus; a receiving unit that receives definition information for defining composition elements of an operation screen displayed on an apparatus connected to the information processing system through a network in order to cause the apparatus and a computer system connected to the information processing system through the network to collaborate through the information processing system from a client apparatus used to edit the definition information; a generation unit that generates display data for displaying a first screen including the operation screen in a mode corresponding to a display unit based on the definition information received by the receiving unit; and a sending unit that sends the display data generated by the generation unit to the client apparatus. | 2015-09-17 |
20150264130 | Method to form a real time incident based social group - A method to establish a social group in real time is provided. The method comprises collection of a user's interest information through a software application provided on the user's computing device. The method further matches the user's interest query with interest information of other users kept in the main system server. The system server then identifies various users having common interest information as that of the user and creates a social group of such users. | 2015-09-17 |
20150264131 | USER LOCATION-BASED MANAGEMENT OF CONTENT PRESENTATION - Features are disclosed for managing presentation of content to improve the content consumption experience as a user moves around or when there are multiple users. Based on user positions within a content consumption location and optionally on the layout of the location, presentation of content can be adjusted. The volume of audio content may be raised or lowered based on a user's position. Audio or visual content can be paused or stopped if a user leaves the location or the user's view is obstructed. When multiple users are consuming a content item, one or more users may have priority and any adjustment may be made to first improve the experience of the priority user. In some cases, no user has priority, and adjustments may be made to improve the experience of many or all users. | 2015-09-17 |
20150264132 | System and Method for Random Access - A method for operating a user device adapted to transmit data in a communications system in which available resources are divided into contention resources and non-contention resources includes selecting a first non-contention resource from the non-contention resources in accordance with selection information, the user device configured to transmit data on the first non-contention resource, determining a contention resource from a first plurality of contention resources associated with the first non-contention resource, in accordance with an association between the first plurality of contention resources and the first non-contention resource is known by the user device and a network node in the communications system, and transmitting a message on the contention resource, wherein the message initiates a random access procedure to obtain access to the selected first non-contention resource. | 2015-09-17 |
20150264133 | USER TRIAL FEEDBACK METHOD, ELECTRONIC DEVICE AND COMPUTER-READABLE MEDIUM - A user trial feedback method, an electronic device, and a computer-readable medium are provided. The user trial feedback method includes the following steps. A launch signal is received to record an image of current frame of the touch screen and launch the user trial feedback tool. An information is inputted by the user in the user trail feedback tool, and logs related to the inputted information are collected and upload to a server along with the recorded image of the current frame. | 2015-09-17 |
20150264134 | ENHANCED DISTRIBUTED RESOURCE DIRECTORY - In accordance with an example embodiment, an enhanced distributed resource directory provides resource lookup capabilities without need to know a uniform resource identifier of the resource. For example, a resource directory node may receive a message payload from an endpoint. The message payload includes a registration request or a resource lookup request. The resource directory node may determine keys associated with the message payload. The keys may comprise parameters and values associated with the parameters. Upon determining the keys, the keys may be applied to a hash function to generate mapping information that has identities of peer resource directories. Based on the mapping information, the resource directory may transmit the message payload to peer resource directories. The resource directory may receive responses from the peer resource directories such that an appropriate response may be provided to the requesting endpoint. | 2015-09-17 |
20150264135 | COMPUTING LONG-TERM SCHEDULES FOR DATA TRANSFERS OVER A WIDE AREA NETWORK - Various technologies pertaining to scheduling network traffic in a network are described. A request to transfer data from a first computing device to a second computing device includes data that identifies a volume of the data to be transferred and a deadline, where the data is to be transferred prior to the deadline. A long-term schedule is computed based upon the request, wherein the long-term schedule defines flow of traffic through the network over a relatively long time horizon. A short-term schedule is computed based upon the long-term schedule, where devices in the network are configured based upon the short-term schedule. | 2015-09-17 |
20150264136 | HARDWARE ASSISTED MEDIA PLAYBACK AND CAPTURE SYNCHRONIZATION - Techniques to output a media stream, capture a media stream, or synchronize the output or capture of the media stream at a specified time are described. A media stream output or capture apparatus may include a media processor to receive a media stream to output or a request to capture a media stream and a start time. A buffer generator may be included to generate an input or an output buffer and a media mixer may be included to mix the media stream into the output buffer at the start time or capture the media stream from the input buffer at the start time. | 2015-09-17 |
20150264137 | SERVER AND METHOD FOR PROVIDING DESIGN DATA FOR APPLICATION AND SYSTEM FOR GENERATING APPLICATION - An application design server, method and system are provided. The application design server according to an exemplary embodiment includes a communicator configured to receive design data from a first host device and a controller configured to, in response to receiving a request for the design data from a second host device, transmit the received design data to the second host device, and in response to receiving updated design data corresponding to the design data from the first host device, control the communicator to transmit the updated design data to the second host device. | 2015-09-17 |
20150264138 | GATEWAY MANAGEMENT USING VIRTUAL GATEWAYS AND WILDCARDS - Systems, methods, and media for managing gateways. In an embodiment, a virtual gateway is generated which comprises a representation of each of one or more active scripts and/or device information (e.g., device drivers, and/or definitions and/or configurations for devices, device types, and/or device groups) stored on at least one remote physical gateway. At least one user interface is provided for editing each of the one or more active scripts and/or device information represented in the virtual gateway. Synchronization is automatically maintained, across at least one network, between the one or more active scripts and/or device information represented in the virtual gateway and the one or more active scripts and/or device information stored on the at least one remote physical gateway. | 2015-09-17 |