44th week of 2015 patent applcation highlights part 71 |
Patent application number | Title | Published |
20150312231 | SECURELY CONNECTING CONTROL DEVICE TO TARGET DEVICE - In an approach, a target computing device receives a pairing request from a controller computing device, the pairing request including controller credentials that were previously received by the controller computing device from an authentication server computer and encrypted under a service key. The target computing device forwards the pairing request to the authentication server, the authentication server computer being configured to return a pairing response based at least in part on the controller credentials. The target computing device receives the pairing which includes a shared secret encrypted under a target device key and the same shared secret encrypted under a controller key. The target computing device decrypts the shared secret encrypted under the target device key and forwards the shared secret encrypted under the controller key to the controller device. Using the decrypted shared secret, the target computing device establishes a secure connection to the controller computing device. | 2015-10-29 |
20150312232 | METHOD AND APPARATUS FOR HANDLING KEYS USED FOR ENCRYPTION AND INTEGRITY - A method and an arrangement for providing keys for protecting communication between a terminal ( | 2015-10-29 |
20150312233 | System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added - A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored. | 2015-10-29 |
20150312234 | Authenticating a Device When Connecting it to a Service - There is provided a method and apparatus for authenticating user equipment access to a device over a communications network. The method comprises: sending a first message to the user equipment, the first message requesting the user to power off the device; detecting that the device is not available; sending a second message to the user equipment, the second message requesting that the user power on the device; detecting that the device is available; and if both detections are positive, then authenticating user equipment access to the device. | 2015-10-29 |
20150312235 | METHODS FOR GENERATING AND PUBLISHING A WEB SITE BASED ON SELECTED ITEMS AND DEVICES THEREOF - A method, non-transitory computer readable medium, and web content management server computing device that receives, from a client device, requested data comprising at least a template identifier, information for a custom attribute, and a unique item identifier for an item. A public identifier and a uniform resource locator (URL) comprising at least the public identifier are generated. The public identifier is stored in a requested sites database as associated with the requested data. A preview panel comprising a selectable application indication is generated and sent to the client device. The URL is sent to the client device in response to receiving a selection of the selectable application indication from the client device. | 2015-10-29 |
20150312236 | AUTHENTICATION MECHANISM - A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared with the application. | 2015-10-29 |
20150312237 | System and Method to Associate a Private User Identity with a Public User Identity - The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time, To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record, if they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record. | 2015-10-29 |
20150312238 | METHOD FOR UPDATING A TABLE OF CORRESPONDENCE BETWEEN A LOGICAL ADDRESS AND AN IDENTIFICATION NUMBER - This invention relates to a Method for updating a table of correspondence between a logical address associated to a user unit in a communication network and a unique identification number associated to a user unit of a group of user units managed by a management centre, a method in which messages are exchanged between said management centre and at least one specific user unit of said group by means of said communication network, these messages being forwarded to the specific user unit using the logical address of said user unit in said network, wherein it includes the steps of searching in said table of correspondence for the logical address of the user unit in said communication network corresponding to the unique identification number of the specific user unit; of sending of messages to the user unit having the concerned unique identification number, to the logical address corresponding to said communication network; in the case of incorrect reception of the messages, sending of a request containing an identifier of said specific user unit (STB*), this request being sent to all or part of the user units (STB) forming said group; detection of a return message of a user unit (STB*) whose unique identification number (UA*) corresponds to said identifier contained in the request; determination of the logical address (AD*) in said network, used by the user unit (STB*) having transmitted the return message; verification of the logical address (AD) by establishing a communication between the management centre and the user unit (STB*) and authentication of the specific user unit by the management centre; storage in the table of correspondence (TC) of the management centre of said logical address (AD*) of the user unit in said network, in connection with said unique identification number (UA*) of the user unit (STB*) having transmitted the return messages. | 2015-10-29 |
20150312239 | METHODS, DEVICES, AND COMPUTER READABLE STORAGE DEVICES FOR SHARING SENSITIVE CONTENT SECURELY - Sensitive content is securely shared. A request is received from a first communication device to share sensitive content. The first communication device is associated with an account for a communication service provided by a network provider. A message including a link to the sensitive content is sent to a second communication device associated with a phone number. That message is addressed to the second communication device. An authentication message is received, indicating that the second communication device is associated with the phone number. Responsive to receipt of the authentication message, the sensitive content is made accessible via the second communication device without requiring that the second communication device be associated with an account for the communication service provided by the network provider. | 2015-10-29 |
20150312240 | WIRELESS AUTOMATIC PAIRING METHOD, METHOD OF ESTABLISHING CONNECTION, AND WIRELESS ACCESS POINT DEVICE - The present disclosure illustrates a wireless automatic pairing method, a method of establishing connection, and a wireless access point device which enable an electronic device to connect with a wireless access point device by automatic pairing. The method of establishing connection comprises steps of: establishing a connection from the electronic device to the wireless access point device; transmitting the network identification code from the electronic device to the wireless access point device; in the electronic device, receiving a network name and a password transmitted from the wireless access point device; terminating the connection between the wireless access point device and the electronic device; transmitting a connection request containing the network identification code, the network name, and the password to the wireless access point device; establishing a connection between the electronic device and the wireless access point device. | 2015-10-29 |
20150312241 | IDENTITY BASED TICKETING - A system for identity based ticketing is provided, wherein a user device sends a challenge to a terminal; the terminal updates a filter based on the challenge and sends the contents of the filter to the user device. The user device sends the contents of the filter, relating to the user device and the terminal, to a backend server; and the backend server derives from the contents of the filter information concerning user behavior. | 2015-10-29 |
20150312242 | USER AUTHENTICATION METHOD, SYSTEM FOR IMPLEMENTING THE SAME, AND INFORMATION COMMUNICATION TERMINAL USED IN THE SAME - [Problem] To provide a user authentication technology whereby hacking of a system by a third party is effectively prevented. [Solution] The present invention is a user authentication method and system, wherein: an information communication terminal allocates numerals, etc., which configure a token code which is generated by time synchronizing with an authentication system side to each cell which configures a user's password derivation pattern, and displays upon a user interface a personal identification table whereupon numerals, etc., are allocated which have been randomly generated with other cells; the user, with reference to the personal identification table, selects the numerals, etc., which are allocated to each cell which configures the user's password derivation pattern, and inputs same as a password; and the authentication system carries out an authentication determination upon the inputted password on the basis of the generated time synchronized token code. | 2015-10-29 |
20150312243 | STORAGE SYSTEM AND METHOD OF STORING AND MANAGING DATA - A system for and method of storing and managing data comprising: encoding a file into a plurality of fragments; retrieving storage configuration data from a data management store; retrieving encryption key data from a keystore; identifying a storage strategy using the storage configuration data, the storage strategy associating each fragment with a remote storage volume; and for each fragment: using the encryption key data to identify an encryption key associated with a remote storage volume identified in the storage strategy; encrypting the fragment using the identified encryption key; communicating the encrypted fragment to the associated remote storage volume as identified by the storage strategy; and storing the encrypted fragment at that identified remote storage volume. | 2015-10-29 |
20150312244 | INFORMATION INPUT DEVICE, INFORMATION OUTPUT DEVICE, INFORMATION PROCESSING SYSTEM, AND COMPUTER-READABLE RECORDING MEDIUM - The present invention is concerning to an information processing system includes an information input device and an information output device. The information input device includes a communication module that establishes communication with one or more information output devices, an information acquiring module that acquires device information of the respective information output devices including an identification code used only for identifying the information output device and makes a storage module store therein the device information, an input receiving module that receives an entry of an identification code, and a device specifying module that searches the device information acquired from the respective information output devices to specify the information output device to which the information is to be transmitted based on the identification code received and gives instructions to the communication module to transmit the information using the device information of the information output device specified. | 2015-10-29 |
20150312245 | IDENTIFICATION FOR APPARATUSES - It is inter alia disclosed to provide first identity data stored in an apparatus, the first identity data comprising an identifier and a first certificate, and to provide second identity data stored in the apparatus, the second identity data comprising an identifier and a second certificate, wherein the identifier of the first identity data is the same as the identifier of the second identity data. | 2015-10-29 |
20150312246 | TOKENIZATION IN A CENTRALIZED TOKENIZATION ENVIRONMENT - Data can be protected in a centralized tokenization environment. A request to tokenize sensitive data is received by an endpoint. A token for use in tokenizing the sensitive data is identified. A token certificate store is queried for a token certificate associated with the identified token. The token certificate can include a token status and use rules describing a permitted use of the token. Responsive to the token certificate store storing the queried token certificate, the endpoint tokenizes the sensitive data using the identified token if the token status indicates the token is available, and subject to the use rules included in the token certificate being satisfied. The token certificate is updated based on the tokenization of the sensitive data with the identified token and stored at the token certificate store. | 2015-10-29 |
20150312247 | OBJECT DELIVERY AUTHENTICATION - A method and system for authenticating delivery including the steps of receiving by a receiver a delivery information package from a deliverer over a network during a communication between the receiver and the deliverer, wherein the delivery package includes deliverer identity information, sending an authentication request of the received delivery package from the receiver to an authentication module having a hardware processor, over at least one of a call network and an additional network, and authenticating the received delivery package using the deliverer identity information. | 2015-10-29 |
20150312248 | IDENTITY AUTHENTICATION - A system for authenticating a mobile user's identity is disclosed. The user may be required to log in upon first launching a mobile application. Subsequent launches of the mobile application may not require the user to log in. Upon subsequently launching the mobile application, the mobile device may transmit a token validation request that includes a soft token stored at the mobile application. An authentication server may receive the request and transmit a one-time password to a device that has the phone number associated with the soft token. The authentication server may also transmit a session ID number. When the authentication server receives an identity validation response from the mobile device that includes the session ID number and the one-time password, the authentication server may output requested customer account information. | 2015-10-29 |
20150312249 | PASSWORD RETRIEVAL SYSTEM AND METHOD INVOLVING TOKEN USAGE WITHOUT PRIOR KNOWLEDGE OF THE PASSWORD - A method for managing a master password on a network device, the method stored as a set of instructions executable by a computer processor to: store the master password in a first file in a memory of the network device; store the master password in a second file in the memory of the network device; encrypt access to the first file using a first password; encrypt access to the second file using a second password; send the second password and an identifier associated with the network device over a communications network to a registration server, the registration server configured for storing the second password for subsequent retrieval by the network device; when the first password is unavailable, send a password retrieval request including the identifier; receive the second password configured as a one-time use password; decrypt access to the second file to retrieve the master password; and, initiate a reset process for subsequent storage of the master password in the memory of the network device. | 2015-10-29 |
20150312250 | SOFT TOKEN SYSTEM - Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a unique device ID of a mobile device is obtained by a soft token application via an API of an operating system of the mobile device. A seed for generating an OTP for accessing a secure network resource is requested from a provisioning server by the application via an IP-based network. The seed is received by the mobile device via a first out-of-band channel in encrypted form based on a secret key, the unique device ID and a hardcoded-pre-shared key. The received encrypted seed is decrypted and installed within the application. The OTP is generated by the application based on the seed. The OTP is bound to the mobile device by the application by encrypting the seed with the unique device ID and the hardcoded pre-shared key. | 2015-10-29 |
20150312251 | ENSURING THE SECURITY OF A DATA TRANSMISSION - Ensuring the security of a data transmission by verifying an identity of a user, comprising: a prior step of enrolling a terminal of the user, comprising: an association of a authentic identity data item of the user and a data item of a terminal available to the user and communicating via a network, the association being stored with data for contacting the terminal via the network, and a determination of an identity derived from at least said information, stored in the memory of the terminal, in correspondence with a data item specific to the user, for the purposes of a later strong authentication based on both the data item specific to the user and on the derived identity, as well as a current step of verifying the user identity. | 2015-10-29 |
20150312252 | METHOD OF ALLOWING ESTABLISHMENT OF A SECURE SESSION BETWEEN A DEVICE AND A SERVER - The invention is a method for allowing a user to establish a secure session between a device and a server by using a username/password associated with the user. The user provides the username for the device. In response to a message comprising the username, the server opens a session and generates an identifier of the session and sends the identifier to the device. The identifier is transmitted to a machine distinct from the device. The user provides the password for the machine. The machine sends an authenticating message to the server, the authenticating message comprises the identifier and an authenticating data generated from the password. The server sends a result message reflecting the result of the authenticating data checking to the device. | 2015-10-29 |
20150312253 | Secure Computer Architectures, Systems, and Applications - Secure computer architectures, systems, and applications are provided herein. An exemplary computing system may include a trusted environment having a trusted processor and memory that provides a trusted computing environment that performs computing functions that could expose the computing device to a security risk, and a legacy environment having a secondary processor and memory for providing a legacy computing environment that manages computing functions exposed to unsecure environments. | 2015-10-29 |
20150312254 | Concurrent, Diverse Party Multi-processor Wireless Quality Metric Collection Circuits and Method of Operation - A system includes a bidirectional signal bus controlled by an M×S master/slave bridge circuit. An application processor having at least one core is communicatively coupled by the bidirectional signal bus to a radio processor having at least one virtual machine. The core hosts a master agent. The virtual machine hosts a slave agent. Each master agent is coupled to a collector server by an authenticated connection circuit to receive and store profiles and build and transmit packages. Each master agent is coupled to at least one slave agent and can transmit a profile to the slave agent and request and receive packages which are generated by the slave agent by executing the profile. Each slave agent receives and executes profiles to collect data from radio circuits and upon command builds and transmits data packages to a master agent. | 2015-10-29 |
20150312255 | ENCRYPTING A UNIQUE IDENTIFICATION HEADER TO CREATE DIFFERENT TRANSACTIONAL IDENTIFIERS - A system may receive a content request associated with a user device. The content request may include information that identifies a subscriber associated with the user device and information that identifies a content provider associated with the content request. The system may determine a unique identification header (UIDH), associated with the subscriber, based on the content request. The system may determine randomized information associated with encrypting the UIDH. The system may encrypt the UIDH to create a transactional identifier. The UIDH may be encrypted based on the randomized information and a shared key. The system may insert the transactional identifier and the randomized information in the content request to create a modified content request. The system may provide the modified content request including the transactional identifier and the randomized information. | 2015-10-29 |
20150312256 | Inter-Application Delegated Authentication - Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application. | 2015-10-29 |
20150312257 | FACILITATING USER-CENTRIC IDENTITY MANAGEMENT - Embodiments of the present invention provide systems, methods, and computer storage media for facilitating user-centric identity management. In this regard, various aspects of identity management are designed to be more transparent to users to bolster user assurance with respect to “behind-the-scenes” procedures of identity management. Generally, indications of data flow between service providers, identity providers, and/or user devices can be provided to the user device for presentation to the user. As a result, visual representations of data flow, notifications of data flow, or the like, can be presented to the user to expose various aspects of identity management. In some embodiments, users may be able to control aspects of identity management, for example, by confirming or preventing data flow between providers. | 2015-10-29 |
20150312258 | ACCESS RIGHT SETTING METHOD AND ACCESS RIGHT SETTING SYSTEM FOR USE IN AREA NETWORK - An access right setting method for use in an area network is provided. During the process of establishing a network connection between an active control device and a server-side device, a media access control address information of the active control device is retrieved, and the identity of the active control device is recognized according to the media access control address information. Subsequently, the access right information corresponding to the active control device is set. According to an operating request from the active control device, the server-side device judges whether the operating request complies with the predetermined access right information. Consequently, the server-side device is operated in a corresponding access right operation mode according to the access right information. | 2015-10-29 |
20150312259 | Searching Private Content and Public Content - A method performed by one or more processing devices includes receiving, from a client device controlled by a user, a search query including one or more search terms and user information of the user; accessing, by a server device based on receipt of the search query, a private content index for indexing private content of users; wherein the private content index includes access control lists; identifying, based on a comparison of the access control lists to the user information received, private content that is accessible to the user; identifying private content that is responsive to the one or more search terms and that is accessible to the user; identifying, based on a search of public content by the server device, public content that is responsive to the one or more search terms; and sending, to the client device, search results for the identified private and public content. | 2015-10-29 |
20150312260 | METHODS OF PROVIDING SOCIAL NETWORK SERVICE AND SERVER PERFORMING THE SAME - Methods and apparatuses for sharing content through a chatting space of a social networking service (SNS) are provided. The method includes detecting an access of a plurality of users to the chatting space, and decrypting encrypted content that was previously shared by the plurality of users in the chatting space, in response to the plurality of users accessing the chatting space. | 2015-10-29 |
20150312261 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - An approach is provided for controlling access to a resource. Visual representations of the resource and an entity and a second entity are included in a display. In the display, a movement of the entity visual representation (EVR) to a position proximate to a boundary of the resource visual representation (RVR) is detected. Based on an attribute assigned to the EVR being determined to satisfy an access control requirement (ACR) assigned to the RVR, the EVR is permitted to move across and be placed within the boundary of the RVR. A movement of the second entity visual representation (SEVR) to another position proximate to the boundary of the RVR is detected. Based on an attribute assigned to the SEVR being determined to not satisfy the ACR, the SEVR is prevented from moving across and being placed within the boundary of the RVR. | 2015-10-29 |
20150312262 | DETERMINATION OF USER REPUTATION REGARDING DATA OBJECT EXPOSURE IN CLOUD COMPUTING ENVIRONMENTS - Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. | 2015-10-29 |
20150312263 | SOCIAL NETWORK PRIVACY AUDITOR - A privacy auditor determines discrepancies between user privacy settings in a social network and installed applications. The privacy auditor can employ a privacy determinator that tests an installed application on various privacy levels to determine actual privacy settings of the installed application. The privacy auditor then uses a privacy comparator to derive differences between the actual privacy settings of the installed application and the user privacy settings from the social network. | 2015-10-29 |
20150312264 | METHOD, SYSTEM AND SERVER FOR AUTHORIZING COMPUTING DEVICES FOR RECEIPT OF VENUE-BASED DATA BASED ON THE GEOGRAPHIC LOCATION OF A USER - Methods, systems and servers are disclosed for authorizing access by a user of a service associated with an event at a venue and provided via a computer network based on a determined geographic location of the user. The location of the user can be determined, via a server, based on location information obtained from the held device utilized by the user. The computing device can be authorized to receive the service (e.g., video, concession information, advertisements, statistical information, etc.) based on the location information obtained from the hand held device. | 2015-10-29 |
20150312265 | Method for Verifying Sensitive Operations, Terminal Device, Server, and Verification System - The disclosure, pertaining, to the field of network technologies, discloses a method for verifying sensitive operations, a terminal device, a server, and a verification system. The method includes: receiving by a verification server, a second verification request from a sensitive operation server sending, by the verification server, a verification code to a two-dimensional code server; upon receiving a first verification request from a first terminal device, performing verification by the verification server according to the verification information of the first terminal device and the information in the two-dimensional code; and when the user initiating the sensitive operation is a user determined by the identity information, allowing a sensitive operation initiated by the user determined according to the information in the two-dimensional code. | 2015-10-29 |
20150312266 | ADVANCED PERSISTENT THREAT DETECTION - A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection. | 2015-10-29 |
20150312267 | USING REPUTATION TO AVOID FALSE MALWARE DETECTIONS - A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection. | 2015-10-29 |
20150312268 | INTRUSION DETECTION USING A HEARTBEAT - A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection. | 2015-10-29 |
20150312269 | METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY - Methods, apparatus, systems and articles of manufacture are disclosed to identify candidate boundaries of Internet protocol addresses associated with a malicious Internet protocol address. An example method includes collecting, with a processor, netflow data associated with the Internet protocol addresses within a netblock having a lower boundary Internet protocol address and an upper boundary Internet protocol address, generating, with the processor, a first window of Internet protocol addresses numerically lower than the malicious Internet protocol address, generating, with the processor, a second window of Internet protocol addresses numerically higher than the malicious Internet protocol address, for respective Internet protocol addresses in the first and second windows, calculating, with the processor, occurrence counts associated with behavior features, and identifying candidate boundaries within the netblock based on divergence values caused by the behavior features. | 2015-10-29 |
20150312270 | SECURITY CONTROLS - A network of computers has a network management system which stores metadata comprising at least the identities of software present on computers of the network. A computer of the network runs a monitoring program which accesses the metadata stored in the network management system to provide a measure of the extent to which one or more of a plurality of security controls are implemented in the network. The security controls are the application of Operating System patches, the application of third party software patches, allowing only applications on a list of approved software to run, and limiting administrator privileges. The measure comprises risk ratings dependent on the extents to which the controls are implemented. | 2015-10-29 |
20150312271 | Application Spam Detector - A method for performing an application search. The method includes receiving a search query from a remote device and determining a consideration set of applications based on the search query. The consideration set indicates one or more applications corresponding to the search query. For each application indicated in the consideration set, the method includes determining whether the application is a potential spam application based on one or more developer features indicating features associated with a developer of the application. When the application is determined to be a potential spam application, the method includes applying a penalty to the application. The method further includes generating search results based on the consideration set and any penalties applied to the one or more application indicated in the consideration set and providing the search results. The search results indicate one or more of the applications indicated in the consideration set. | 2015-10-29 |
20150312272 | PROTECTING COMPUTING ASSETS FROM RESOURCE INTENSIVE QUERYING ATTACKS - A method and system for managing data traffic and protecting computing assets. The method and system includes intercepting queries and messages, such as EDNS0 queries, and sending probe queries and reply queries to the originating computing device to determine whether the originating computing device may be sufficiently validated so as to justify forwarding resource-intensive queries and messages to the targeted computing device. | 2015-10-29 |
20150312273 | METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK - Methods and systems for detecting and mitigating high-rate Distributed Denial of Service (DDoS) attacks are herein described. The present invention contemplates a variety of improved techniques for using a flow-based statistical collection mechanism to monitor and detect deviations in server usage data. The method further includes combining multiple anomaly algorithms in a unique way to improve the accuracy of identifying a high-rate DDoS attack. The DDoS solution includes a two-phase approach of detection and mitigation, both of which operate on a local- and a global-basis. Moreover, the anomaly algorithms can be modified or extrapolated to obtain the traffic deviation parameters and therefore, the attack probabilities. | 2015-10-29 |
20150312274 | METHOD AND SYSTEM FOR ENSURING AN APPLICATION CONFORMS WITH SECURITY AND REGULATORY CONTROLS PRIOR TO DEPLOYMENT - Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies. | 2015-10-29 |
20150312275 | SINGLE-STEP CUSTOM CONFIGURATION OF A CLOUD CLIENT DEVICE - In one embodiment, a cloud client device identifies a configuration event. The cloud client device identifies a configuration associated with the configuration event. The cloud client device stores a first security key associated with the configuration and configures the cloud client device in accordance with the configuration. | 2015-10-29 |
20150312276 | WHITE LISTS - A computer has an operating system having a kernel. The operating system is configured to prevent running of software not identified in a list of approved software referred to as a white list. The computer is linked by a communications link to a server which has a comparison program which compares the identities of software present on the computer with software identified in the list to determine what software installed on the computer is not on the white list. A risk determination program determines for each software not on the list whether the software complies with a plurality of risk criteria, and automatically adds to the list the identity of any software determined to be of low risk according to a risk calculation. The list is supplied to the computer. Software absent from the list is prevented from running by the kernel of the operating system. | 2015-10-29 |
20150312277 | SYSTEM FOR POLICY-MANAGED CONTENT PRESENTATION - The invention pertains to a system and method to display content, including data and messaging, based on a secure, policy-managed set of instructions for selecting, distributing, and presenting information on a device. The system accepts one or more streams of data in any digital form from one or more data sources. The content is assessed via a set of policy instructions that may include time, location, hierarchy of ownership, type of content, assessed importance of content, and display availability. Only approved content is transmitted to the device for display. | 2015-10-29 |
20150312278 | REMOTE STATION PROTECTION - Methods, systems, and devices are described for selectively enabling legacy protection in a WLAN. A method may include receiving, by an access point, a DSSS signal from a station, and activating legacy protection within a WLAN of the access point based at least in part on the received DSSS signal. For instance when a station cannot be initially detected, the access point may transmit an OFDM signal indicating a NAV period associated with a remote station initial access period. The access point may then receive a DSSS transmission from a remote station during the remote station initial access period. A method may include receiving, at a wireless station, an indication of a NAV period associated with remote station initial access, monitoring for radio transmissions during the NAV period, and transmitting a DSSS signal during the NAV period based on the monitoring. | 2015-10-29 |
20150312279 | REMOTE STATION PROTECTION - Methods, systems, and devices are described for selectively enabling legacy protection in a WLAN. A method may include receiving, by an access point, a DSSS signal from a station, and activating legacy protection within a WLAN of the access point based at least in part on the received DSSS signal. For instance when a station cannot be initially detected, the access point may transmit an OFDM signal indicating a NAV period associated with a remote station initial access period. The access point may then receive a DSSS transmission from a remote station during the remote station initial access period. A method may include receiving, at a wireless station, an indication of a NAV period associated with remote station initial access, monitoring for radio transmissions during the NAV period, and transmitting a DSSS signal during the NAV period based on the monitoring. | 2015-10-29 |
20150312280 | MEDIA GATEWAY AND MEDIA GATEWAY CONTROL UNIT - A network interface unit (IM-MGW) in which signaling data is separated from useful data by the values of received data. The signaling data is tunneled to a control unit (MGCF). Two different data transmission networks (CS, IMS) can thus be simply combined, in particular, for video telephony. | 2015-10-29 |
20150312281 | METHOD AND SYSTEM FOR SELECTION IN MULTI-DEVICE SCENARIO - According the present invention there may be provided a method of determining which user device (UD) of a plurality of user devices should receive a Session Initiation Protocol, SIP, request (RQ) for a communication service on a telecommunications system, the system comprising: a plurality of user devices (UD) adapted to run a communication service; an application server (AS) in communication with the plurality of user devices on which there is comprised a registry of the plurality of user devices (UD), the registry comprising associations between user devices and SIP instances, each user device being associated with a respective user identity; and, a telecommunication network in communication with the plurality of user devices (UD) and with the application server (AS), wherein the method comprises, at the application server (AS): receiving a SIP request (RQ) for establishing a communication service, the SIP request intended for a user identity from the telecommunication network; and, dynamically determining which SIP instance should receive the SIP request (RQ) based on the user identity for which the SIP request is intended and parameters associated with the user device or SIP instance on the registry. A corresponding application server and computer readable medium are also provided. | 2015-10-29 |
20150312282 | DATA PROCESSING - Measures for use in processing data in a telecommunications network. A request message is received in relation to establishment of a communication session involving a given subscriber. Subscriber configuration data is received in relation to the establishment. The subscriber configuration data includes a set of one or more trigger points at which one or more application services should be invoked in relation to communication sessions for the given subscriber. At least one trigger point from the set of trigger points is encoded into an identifier for the communication session within the request message. The request message including the identifier for the communication session in which the at least one trigger point has been encoded is transmitted. | 2015-10-29 |
20150312283 | System and Method for Generating a Graphical User Interface Representative of Network Performance - The disclosed embodiments include a system and method for monitoring performance of a packet network. In one embodiment, a method includes collecting network performance information from a plurality of network nodes of a packet network, the network performance information being indicative of a health of the network packet network. The method includes storing the network performance information collected from the plurality of network nodes and generating a graphical user interface including a graphical representation of the network performance information, wherein the graphical representation of a network segment is indicated as a line, and wherein a width of the line widens and narrows in accordance with an amount of traffic flow over the network segment. | 2015-10-29 |
20150312284 | COUNTERPART TERMINAL MANAGEMENT SYSTEM, COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COUNTERPART TERMINAL MANAGEMENT METHOD, AND RECORDING MEDIUM STORING COUNTERPART TERMINAL MANAGEMENT PROGRAM - A system, terminal, and method that includes storing terminal identification information for identifying a communication terminal in association with counterpart terminal identification information for identifying one or more candidate counterpart terminals, and transmitting, to a first communication terminal that has left from a session transmitting content data, information indicating terminal identification information for identifying a second communication terminal that participates in the session. The method further includes receiving a request for adding the second communication terminal as a candidate counterpart terminal for the first communication terminal from the first communication terminal, the request for adding being generated based on information indicating that the second communication terminal is not registered as a candidate counterpart terminal for the first communication terminal, and storing the terminal identification information of the second communication terminal in association with the terminal identification information of the first communication terminal in response to the request for adding. | 2015-10-29 |
20150312285 | CREATING VIRTUAL AREAS FOR REALTIME COMMUNICATIONS - Examples that are described herein provide systems and methods for creating virtual areas for realtime communications. Some examples provide a quick and easy process for creating a virtual area for a set of communicants and provisioning those communicants for realtime communications in the virtual area. Some examples provide a quick and easy way for a user to wrap a realtime communications framework around a network service. Through seamless integration of realtime communications (e.g., realtime audio, video, chat, screen sharing, and file transfer) in persistent virtual areas, these examples are able to enhance and improve communicants' experiences with a network service relative to traditional browser based methods of collaborating on network service based projects. | 2015-10-29 |
20150312286 | SOCIAL SHARING OF CONTACTS INFORMATION - Sharing contact information among one or more communities or individuals in a social media environment, in one aspect, may comprise creating contact information associated with contact as social media content based on input from a first user. At least a portion of the contact information may be shared with a plurality of second users via a social media like application. | 2015-10-29 |
20150312287 | Compacting Content in a Desktop Sharing Session - Techniques to enable an attendee device in an online conference session to view display content different from display content displayed on a host device. In one embodiment a method is provided in which display content that is to be shared with at least one attendee device in an online conference session is captured from a host device. An area containing blank space in the display content is identified. The display content is compacted by removing the area containing the blank space from the display content to obtain compacted content. The compacted content is composed to obtain a composed image configured to be shared with the attendee device, and the composed image is thereafter shared with the attendee device. | 2015-10-29 |
20150312288 | CONTENT DISPLAY METHOD, PROGRAM, AND CONTENT DISPLAY SYSTEM - A content information access control unit ( | 2015-10-29 |
20150312289 | METHODS, APPARATUS, AND SYSTEMS FOR INSTANTLY SHARING VIDEO CONTENT ON SOCIAL MEDIA - Methods, apparatus, and systems for instantly posting images or video clips to social media websites during recording of video content are provided. A video capture device is provided for recording video content. A social media integration application is associated with the video capture device. The selection of a still image or video clip during recording of video content is enabled via a one-touch process. The selected still image or video clip is then processed by the social media integration application such that the still image or video clip is at least one of directly forwarded to and posted on one or more pre-selected social media websites via a network or forwarded to and posted on the one or more pre-selected social media websites via a web browser interface. | 2015-10-29 |
20150312290 | SYSTEM AND METHOD TO VISUALIZE ACTIVITIES THROUGH THE USE OF AVATARS - A system and method to visualize activities through the use of avatars. The system includes a display engine configured to display at least one automated activity as an avatar. The system also includes a management system configured to monitor the progress of the at least one automated activity and alter at least one of an appearance and a movement of the avatar in relation to the progress of the at least one automated activity. | 2015-10-29 |
20150312291 | CROWDSOURCED CONTENT PUBLICATION PLATFORM - A system, computer-readable storage medium, and computer-implemented method for creating a crowdsourced content publication. Layout information defining a layout of elements of a crowdsourced content publication is received. Contribution privilege information identifying a group of users of a social networking service as contributors to the crowdsourced content publication is received. The group of users may belong to a common organization as defined by a social graph maintained by the social networking service. Content criteria information specifying one or more criteria for selection of content included in the crowdsourced content publication is then received. The layout information, contribution privilege information, and content criteria information are then processed to generate a template for the crowdsourced content publication. | 2015-10-29 |
20150312292 | Sponsored Stories Unit Creation from Organic Activity Stream - Methods, apparatuses and systems directed to sponsored story generation from an organic activity stream in a social networking site. A user wishing to promote an entry from an organic activity stream may, using a sponsor user interface, specify the types of stories to promote to a portion of the home page displayed to a member of a social network. | 2015-10-29 |
20150312293 | PROVIDING SOCIAL CONTEXT TO CALENDAR EVENTS - A daily connection facility is available to the user either through a webpage or by e-mail in the form of a synopsis of connection identifiers between the user and their contacts. The web-based version presents connection information in the form of an agenda view, an engage view, and a reminder view. Each view type is selectable by corresponding tab on the webpage. The daily connected e-mail presents an agenda of meetings and events by location, title, and time. The daily connected e-mail also presents interesting profile and connection information about the attendees such as their communications in blogs and postings, recent communications with user, including messages and meetings, as well as contact information and a list of other contacts in common. | 2015-10-29 |
20150312294 | Content Message for Video Conferencing - In one embodiment, a decoder or transcoder of a video conference network receives the first video stream and an indication of the ratio of the spatial-to-temporal resolution of the tuning of the encoding. The behavior of the decoder or transcoder is set based on the indication of the ratio. The behavior is for use of the first video stream. | 2015-10-29 |
20150312295 | SYSTEM AND METHOD FOR IMPLEMENTING MEDIA AND MEDIA CONTROL TRANSFER BETWEEN DEVICES - A method to transfer control is presented. The method includes receiving a request to transfer control of a collaborative session from a first user equipment (UE). The method includes sending a request for the transfer of control of the collaborative session in response to the received request to a second UE, and receiving, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session. The method includes sending a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance. | 2015-10-29 |
20150312296 | METHOD AND DEVICE FOR PUSHING MULTIMEDIA RESOURCE AND DISPLAY TERMINAL - A method and device for pushing a multimedia resource and a display terminal, the method including: obtaining, by a cloud server, a device identifier of a mobile terminal upon determining that the mobile terminal has established a connection with a display terminal; searching with the device identifier a device identifier information table for multimedia resource play information corresponding to the device identifier; determining multimedia resources to be played according to the multimedia resource play information; and transmitting the multimedia resources to be played to the display terminal. | 2015-10-29 |
20150312297 | METHODS AND APPARATUS FOR IMPROVED NAVIGATION OF CONTENT INCLUDING A REPRESENTATION OF STREAMING DATA - Methods, apparatuses, and computer program products are herein provided for improved navigation of content with streaming media. A method may include causing presentation of a document with at least one representation of streaming media on a display and causing presentation of a media download indicator on the display that provides an indication of download progress of the representation of streaming media. The method may further include causing presentation of content that does not include the representation of streaming media while causing the media download indicator to remain presented and then receiving an indication that a user desires to view the representation of streaming media. The method may further include causing, in response to the indication, presentation of a portion of the document that includes the representation of the streaming media on the display. Corresponding apparatuses and computer program products are also provided. | 2015-10-29 |
20150312298 | METHOD AND SYSTEM FOR INFORMATION EXCHANGE AND PROCESSING - An system and method for processing and transferring documents of any protocol between nodes in a distributed system, the system including an apparatus having a computer processor, and one of an encoding module and a decoding module corresponding to a schema of a document to be processed by the apparatus. Each of the encoding and decoding modules having a unique identifier corresponding to the schema and any process associated with the schema, the encoding module being configured to encode the document including embedding the unique identifier into the document for processing via the apparatus. The decoding module configured to decode an encoded document of the associated schema including restoring the document to its original form. The apparatus is scalable for transferring and processing documents of any protocol throughout a distributed system simultaneously over a single communication channel. | 2015-10-29 |
20150312299 | Receiving Media Content Based on Media Preferences of Multiple Users - Embodiments are provided for receiving media content based on the preferences of multiple users. In one example, a computing device may identify a plurality of user accounts associated with one or more service providers. The computing device may access a guest list for a social event to identify the plurality of user accounts. The computing device may then send to the one or more service providers, requests for media content based on media preferences associated with the identified plurality of user accounts. In response to the request, the computing device may then receive one or more media items from the one or more service providers. Some or all of the media items may then be added to a playback queue or playlist. | 2015-10-29 |
20150312300 | METHOD AND APPARATUS FOR EXCHANGING BIDIRECTIONAL STREAMS OVER A CONTENT CENTRIC NETWORK - A data-streaming system facilitates establishing a bidirectional data stream over a content centric network (CCN). During operation, the system determines a first routable name prefix associated with a service provider to which the network device desires to establish the bidirectional streaming session. The system also generates a client stream name to provide to the service provider. The client stream name includes a second routable prefix to a local network device, and includes a client stream identifier for a first data stream from the service provider. The system then disseminates an Interest message whose name includes the first routable name prefix and the client stream name. After receiving a Content Object that includes the remote device's response, the system can then communicate with the service provider using a bidirectional stream over the CCN based on the client stream name and the provider stream name. | 2015-10-29 |
20150312301 | OUTAGE NOTIFICATION WITH CLIENT CONTROL MODIFICATION IN AN ABR STREAMING NETWORK - A scheme for modulating an adaptive bitrate (ABR) streaming client engaged in a current ABR streaming session. In one implementation, a determination is made whether a wireless UE device executing the ABR streaming client is approaching a radio white spot area. If so, a video buffer of the ABR client is configured to preload lower quality video segments to last for the duration of the radio white spot area. One or more ABR client controls may be selectively deactivated while the wireless UE device is in the radio white spot area. | 2015-10-29 |
20150312302 | METHOD AND APPARATUS FOR PROVIDING FAULT TOLERANCE DURING LIVE STREAMING - A computer implemented method and apparatus for providing fault tolerance during live streaming. The method comprises creating a global manifest comprising a plurality of first entries extracted from a first manifest, wherein the first manifest comprises one or more entries of a predetermined sequence, each entry corresponding to a media fragment to be played in the predetermined sequence on a media player; identifying a gap in the plurality of first entries; receiving a second manifest; and upon receiving a second manifest comprising at least one second entry, extending the global manifest to include the at least one second entry, wherein the at least one second entry comprises a second entry that is in sequence after a last entry in the global manifest, and the at least one second entry in sequence after the last entry in the global manifest does not include a gap. | 2015-10-29 |
20150312303 | DETERMINING WHETHER TO USE SIDX INFORMATION WHEN STREAMING MEDIA DATA - A device for retrieving media data includes one or more processors configured to determine, for a segment of a representation of media data, whether to use segment index (SIDX) information of the segment, and in response to determining not to use the SIDX information, retrieve media data of the segment without using the SIDX information of the segment. The processors may determine whether to retrieve the SIDX information based on a determination of whether the segment includes SIDX information and/or based on a playback duration of the segment. | 2015-10-29 |
20150312304 | DEVICE AND METHOD FOR SWITCHING FROM A FIRST DATA STREAM TO A SECOND DATA STREAM - A device receives first and second data streams representing an audio and/or video content. The device is configured beforehand so as to disseminate the content from the first stream. Following a command for switching from the first stream to the second stream, the device determines by correlation a reference point in the first stream and in the second stream, and determines an offset in time from time-stamping information associated with the reference point in each of the first and second streams. Before switching, the device: pauses the second stream until the offset in time is absorbed when the offset in time indicates that the first stream is late; decreases a frame rate of the first stream until the offset in time is absorbed when the offset in time indicates that the first stream is in advance. | 2015-10-29 |
20150312305 | METHOD, SYSTEM AND APPARATUS FOR THE TRANSMISSION AND ADAPTION OF DATA - A method for the transmission and adaption of data can include the steps of generating generic requirement documents, identifying a plurality of suitable communication patterns on the basis of the generic requirement documents, determining currently available transport options and their service quality across at least one communication network, and selecting a communication pattern from a plurality of suitable communication patterns based on the network transmission qualities of the at least one communication network. The method can utilize a first functional layer and a second functional layer that are integrated between a software application layer and a network access layer that each receive input documents that are independent of each other. The input documents of the second functional layer can contain transport-related information while the input documents of the first functional layer can contain application-related information. Systems and devices can be configured to facilitate use of embodiments of the method. | 2015-10-29 |
20150312306 | Method and Apparatus for Transmitting Encoded Media Data - A method for transmitting encoded media data on the basis of a layer model includes dividing the media data onto a basic layer and at least one additional enhanced layer, transmitting the basic layer and the at least one enhanced layer via at least two network accesses, selecting a first network access to transmit the basic layer that has a network quality and/or stability that is sufficient for transmitting the basic layer; and selecting at least one second network access from among the network accesses depending upon the bandwidth of the first network access and the quality and stability of the network accesses for transmitting the at least one enhanced layer. An apparatus can be configured to execute the method. In some embodiments, the apparatus can include a communication system, a server computer device and/or a mobile terminal. | 2015-10-29 |
20150312307 | METHOD FOR STREAMING PACKET CAPTURES FROM NETWORK ACCESS DEVICES TO A CLOUD SERVER OVER HTTP - A system for streaming packet captures over the Internet includes multiple network access devices, each operating as one of a gateway device, a wireless access point, and a network switch, and a management server communicatively coupled to the network access devices over the Internet for managing the network access devices. The management server maintains a persistent hypertext transport protocol (HTTP) connection with each of the network access devices over the Internet. The management server is to generate a bytecode based on a filtering expression for packet captures (PCAPs) representing one or more PCAPs filtering rules, transmit the bytecode to the network access devices without requiring the network access devices to compile the PCAPs filtering rules, receive PCAPs from the network access devices captured by the network access devices based on the PCAPs filtering rules, and merge the PCAPs received from the network access devices into merged PCAPs. | 2015-10-29 |
20150312308 | VIDEO PROCESSING METHOD, MOBILE TERMINAL, AND SERVER - Embodiments of the present invention provide a video processing method, a mobile terminal, and a server. The method may include: sending, by a mobile terminal, a request to a server for pulling status update data of a social network, so that the server acquires original status update data that is requested to be pulled, the original status update data including a source video address; performing, by the server, adaptation processing on the source video address, to generate an adaptive video address; updating, by the server, the original status update data by using the adaptive video address, to obtain optimized status update data, and returning the optimized status update data to the mobile terminal; and obtaining, by the mobile terminal, adaptive video data according to the adaptive video address in the optimized status update data, and playing the adaptive video data. | 2015-10-29 |
20150312309 | SYSTEM TO COMMUNICATE MEDIA - A system for communicating media is disclosed. Such a system may include, for example, a media broken into a plurality of independent segment files that may represent sequential portions of the media. One of the segment files can be encoded to have a format that is different than the encoded format of another one of the segment files. The formats may be chosen to allow outputting of information in the segments at different rates. A list may include network addresses for the segment files, and a content delivery system may be deployed to distribute media content to remotely located requesting devices by sending the segment files in response to requests for the segment files. | 2015-10-29 |
20150312310 | ASSOCIATING UNIQUE IDENTIFIERS OF PRIMARY AND ENRICHING CONTENT - A unified system of unique identifiers is used to match enrichment content with primary content being delivered by subscribers, e.g. broadcasters, in different markets, market segments, etc. Songs, video, advertisements, or other content from multiple different content publishers or databases, each of which may be assigned identifiers using different identification systems, are assigned a unified, unique identifier. The unique identifiers are also mapped to content identifiers used by subscribers. When subscribers provide primary content, for example by broadcasting the content to end users, enrichment content is matched to the unified, unique identifier associated with the content, and appropriate enrichment data and content are sent to the subscriber for distribution along with the primary content. | 2015-10-29 |
20150312311 | Policy-Based Payload Delivery for Transport Protocols - Information describing a rule to be applied to a traffic stream is received at an edge network device. The traffic stream is received at the edge network device. A schema is applied to the traffic stream at the edge network device. It is determined that a rule triggering condition has been met. The rule is applied to the traffic stream, at the edge network device, in response to the rule triggering condition having been met. At least one of determining that the rule triggering event has taken place or applying the rule is performed based on the applied schema. | 2015-10-29 |
20150312312 | DATA STREAM CLASSIFICATION - Systems, methods, and other embodiments associated with data stream classification are described. One example method includes identifying packets associated with the data stream. The example method may also include updating a set of characterization data associated with the data stream based on information associated with a packet. The example method may also include assigning a data stream classifier to the data stream by comparing characterization data to identification data upon determining that the set of characterization data indicates that the data stream is able to be classified. The example method may also include providing a signal associated with the data stream classifier. | 2015-10-29 |
20150312313 | PROXY FOR MODIFYING HTTP MESSAGES TO COMPLY WITH BROWSER - A proxy server includes various components to modify HTTP communications between a client and a server. Generally, an HTTP request or response is received. The request or response is modified in-stream by a proxy-process module that is running within a web-server-process space. | 2015-10-29 |
20150312314 | METHOD AND SYSTEM FOR APPLICATION LOADING - The present invention discloses a method and system for application loading, the method comprising: receiving from the client a method tag request triggered on the basis of the tagging method of the application; retrieving the method tag in a method tag index store; obtaining, in response to the method tag being retrieved, a method content body corresponding to the method tag; and sending the method content body to the client. The present invention reduces the number of redundant codes to be loaded, thereby accelerating the application loading time. | 2015-10-29 |
20150312315 | METHOD AND SYSTEM FOR CAUSING PORTABLE TERMINAL TO OBTAIN SITE PAGE OF WEB SERVER ASSOCIATED WITH CURRENT LOCATION - Provided is a method for a portable terminal to acquire Web site pages related to the current position, without a user selecting a site page. A proxy server includes an address correspondence table in which the addresses of the site pages and access points are associated. The portable terminal searches for the access points in the vicinity, receives annunciation signals including access points' addresses, and measures the reception levels. The portable terminal transmits a page acquisition request to the proxy server. The proxy server searches for the address of the site page corresponding to the address of each access point, using address correspondence table, and transmits list information, where the addresses are arranged in descending order of reception levels, to the portable terminal. The portable terminal presents the list information to the user and transmits page acquisition requests having one or more addresses as destinations to the corresponding site servers. | 2015-10-29 |
20150312316 | Method of establishing a connection transmitting messages and controlling users behavior in an information system including the Internet using the web interface - Method, apparatus and computer software product are intended for the field of computer technology, specifically interaction between individual users and businesses. | 2015-10-29 |
20150312317 | VEHICLE PROXY LIFECYCLE MANAGEMENT - A device may register a mobile application with a vehicle-based computing system (VCS) using an application proxy configured to manage nomadic device connection to the VCS, and utilize the application proxy, by the mobile application, to present a mobile application user interface via a human-machine interface (HMI) of the VCS in accordance with an HMI status received from the VCS and indicative of a level of mobile application HMI access. | 2015-10-29 |
20150312318 | METHOD AND APPARATUS OF PROVIDING MESSAGING SERVICE AND CALLBACK FEATURE TO MOBILE STATIONS - Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a hosted server that an action needs to be performed by a mobile device under management. The method may further include generating a message via the hosted server, the message includes the action, and transmitting the message to the mobile device under management, and receiving a result message from the mobile device under management responsive to the transmitted message, the result message indicating that the action has been satisfied. | 2015-10-29 |
20150312319 | ACCESS POINT WITH LIMITED RANGE - Methods, systems, and devices are described for limiting the range of an access point. An access point (AP) may transmit a beacon advertising supported for a set of low bit rates to achieve backwards compatibility for devices that expect support for those rates. If a station (STA) sends a data packet using one of the low bit rates, the AP may refrain from transmitting an acknowledgement (ACK) of the transmission to the STA. The AP may also transmit a disassociation or deauthentication frame. This may cause devices outside of a limited range to disassociate from the AP. In some examples, the AP may indicate that it will not communicate using the set of low bit rates. The AP may transmit beacons or probe responses at higher bit rates. | 2015-10-29 |
20150312320 | PROCESSING DATA RECEIVED VIA A NETWORK FROM MULTIPLE CLIENT DEVICES - A system may comprise one or more processors. The one or more processors may store data, associated with a plurality of documents, as stored data and may receive documents from a plurality of client devices. The documents may include a plurality of different types of data. The one or more processors may assign the documents to one or more groups based on the plurality of different types of data and may identify a group of documents of the one or more groups. The one or more processors may compare data, within documents in the group of documents, to the stored data and may transmit, to one or more devices, a result of comparing the data to the stored data. | 2015-10-29 |
20150312321 | SYSTEM FOR GENERATING A RESPONSE TO A CLIENT REQUEST - Embodiments of the invention are directed to a system, method, and computer program product for generating a response to a client request. The system typically including a memory, a processor and a module configured to receive a request associated with a service from a client; initiate the presentation of a first user interface, wherein the first user interface enables a user selection of one or more template types; initiate the presentation of a second user interface based on at least a user selection of one or more template types, wherein the second user interface enables a user selection of one or more templates associated with the selected template type; receive a client progress from the user based on at least the selection of the one or more templates to generate a response, wherein the response reflects the status of the request; and transmit the response to the client. | 2015-10-29 |
20150312322 | DISTRIBUTED HIGH AVAILABILITY PROCESSING METHODS FOR SERVICE SESSIONS - Provided are methods and systems for processing a data packet associated with a service session. The data packet directed to a first servicing node can be received by a forwarding node. The forwarding node can determine that the first servicing node is unavailable. Based on the determination, the forwarding node can select a second servicing node from a plurality of servicing nodes. The selection can be based on a high availability policy. The forwarding node can then send the data packet to the second servicing node. | 2015-10-29 |
20150312323 | SYSTEM AND METHOD FOR PROVIDING INDIVIDUALIZED PORTABLE ASSET APPLICATIONS - In one aspect, a computer-implemented method for providing individualized portable asset applications may generally include providing access to a master geospatial asset and receiving a user input associated with generating a portable geospatial asset based on the master geospatial asset, wherein the portable geospatial asset corresponds to a data subset of the master geospatial asset. The method may also include generating the portable geospatial asset based on the user input and embedding the portable geospatial asset within an asset application, wherein the asset application includes computer-readable instructions for rendering the portable geospatial asset. In addition, the method may include transmitting the asset application containing the portable geospatial asset to a separate computing device. | 2015-10-29 |
20150312324 | APPLICATION INTEGRATION SYSTEM AND METHOD - Systems and methods are disclosed for integrating with a first remote application with a second application that may also be remote. A module of the browser may generate a task with respect to an interface rendered in the browser. A task may be stored with a reference to the interface, which may be represented by a URL. Upon subsequent accessing of the interface, the module may then determine that one or more tasks have been associated with that URL and present them with the interface, such as superimposed on the interface in the form of a link to the one or more tasks or some other visual indicator that tasks are associated with that interface. A configuration file may define where the visual indicator is superimposed on the interface. Tasks generated may be integrated with a second remote application implementing project management or other functions. | 2015-10-29 |
20150312325 | ENHANCED RELIABILITY FOR CLIENT-BASED WEB SERVICES - Disclosed herein are systems, methods, and software for providing enhanced reliability for web services. In an implementation, a proxy service supports web services provided by a client application to at least an online service. While the client application is temporarily disconnected from the proxy service, the proxy service monitors for web services activity to occur in association with the web services provided by the client application to at least the online service. In response to the client application reconnecting to the proxy service after having been temporarily disconnected from the proxy service, the proxy service communicates activity information to the client application indicative at least of whether or not to query the online service with respect to the web services activity. | 2015-10-29 |
20150312326 | ADMINISTERING VIRTUAL MACHINES IN A DISTRIBUTED COMPUTING ENVIRONMENT - In a distributed computing environment that includes which each execute a VMM, where each VMM supports execution of one or more VMs, administering the VMs may include: assigning, by a VMM manager, the VMMs of the distributed computing environment to a logical tree topology, including assigning one of the VMMs as a root VMM of the tree topology; and executing, amongst the VMMs of the tree topology, a gather operation, including: sending, by the root VMM, to other VMMs in the tree topology, a request to retrieve one or more VMs supported by the other VMMs; pausing, by the other VMMs, each VM requested to be retrieved; and providing, by the other VMMs to the root VMM, the VMs requested to be retrieved. | 2015-10-29 |
20150312327 | Lane Level Road Views - Methods for providing a lane-level road view include: (a) accessing lane-specific data comprising information characterizing a first segment of a first lane of a road in a direction of travel; and (b) communicating at least a portion of the lane-specific data to a client. Apparatuses for providing lane-level road views are described. | 2015-10-29 |
20150312328 | SOCIAL SHARING OF CONTACTS INFORMATION - Sharing contact information among one or more communities or individuals in a social media environment, in one aspect, may comprise creating contact information associated with contact as social media content based on input from a first user. At least a portion of the contact information may be shared with a plurality of second users via a social media like application. | 2015-10-29 |
20150312329 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR PROVIDING APPLICATIONS STYLE FUNCTIONALITY TO A USER - Systems, methods, and computer readable media of providing applications style functionality to a user of a mobile radio terminal are disclosed. In certain embodiments, the systems, methods, and computer readable media include the steps of receiving a data stream transmission having a plurality of states, wherein each state is associated with output instructions and storage instructions, and wherein the plurality of states is configured such that moving through the states creates the appearance of executing an application on the mobile radio terminal; decoding the data stream transmission and caching each of the plurality of states with the associated output instructions according to the associated storage instructions; rendering a first state; responsive to an event on the mobile radio terminal, moving from the first state to a second state by applying the output instructions associated with the second state; and communicating a change of state to a server. | 2015-10-29 |
20150312330 | ADMINISTERING VIRTUAL MACHINES IN A DISTRIBUTED COMPUTING ENVIRONMENT - In a distributed computing environment that includes hosts that execute a VMM, where each VMM supports execution of one or more VMs, administering VMs may include: assigning, by a VMM manager, the VMMs of the distributed computing environment to a logical tree topology, including assigning one of the VMMs as a root VMM of the tree topology; and executing, amongst the VMMs of the tree topology, a broadcast operation, including: pausing, by the root VMM, execution of one or more VMs supported by the root VMM; sending, by the root VMM, to other VMMs in the tree topology, a message indicating a pending transfer of the paused VMs; and transferring the paused VMs from the root VMM to the other VMMs. | 2015-10-29 |