52nd week of 2015 patent applcation highlights part 70 |
Patent application number | Title | Published |
20150373036 | Methods and Systems for Side Channel Analysis Detection and Protection - A computing device may use machine learning techniques to determine whether a side channel attack is underway and perform obfuscation operations (e.g., operations to raise the noise floor) or other similar operations to stop or prevent a detected side channel attack. The computing device may determine that a side channel attack is underway in response to determining that the computing device is in airplane mode, that the battery of the computing device the battery has been replaced with a stable DC power supply, that the touch-screen display of the computing device has been disconnected, that there are continuous calls to a cipher application programming interface (API) using the same cipher key, that there has been tampering with a behavioral analysis engine of the computing device, or any combination thereof. | 2015-12-24 |
20150373037 | METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH RETRIEVED CONTENT - Techniques are described for detecting restricted content associated with retrieved content. A method and system includes receiving a client request for content, where the request includes an outbound network request from the client with a Uniform Resource Identifier (URI) containing a domain name, saving contextual information from the request, examining the request for compliance with a management policy, retrieving a content item responsive to the request, and analyzing the contextual information from the request and the content item to detect whether the content item includes restricted content from a list of restrictions in the management policy. A scanning facility may thus utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content. | 2015-12-24 |
20150373038 | CYBER SECURITY MONITORING SYSTEM AND METHOD FOR DATA CENTER COMPONENTS - A security monitoring system is disclosed which is adapted for use with a component having a service processor. The system may use a device configured to communicate with the component. A network may be used which is dedicated to communicating with the service processor for routing only data concerning performance or health of the component. The device may also use at least one sub-system for analyzing the data concerning health or performance of the component to determine if a security threat has affected operation of the component. | 2015-12-24 |
20150373039 | Entity Group Behavior Profiling - Entity group behavior profiling. An entity group is created that includes multiple entities, where each entity represents one of a user, a machine, and a service. A behavior profile is created for each one of the entities of the entity group. The behavior of each of one of the entities of the entity group is monitored to detect behavior change. An indicator of compromise is detected based on multiple ones of the entities experiencing substantially a same behavior change. | 2015-12-24 |
20150373040 | SHARING INFORMATION - Sharing information can include identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community. Sharing information can also include determining what participant-related information to share with the threat exchange server in response to the identified security occurrence, and receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community. | 2015-12-24 |
20150373041 | SYSTEMS, METHODS, AND MEDIA PROTECTING A DIGITAL DATA PROCESSING DEVICE FROM ATTACK - In accordance with some embodiments of the disclosed subject matter, systems, methods, and media for protecting a digital data processing device from attack are provided. For example, in some embodiments, a method for protecting a digital data processing device from attach is provided, that includes, within a virtual environment; receiving at least one attachment to an electronic mail; and executing the al least one attachment; and based on the execution of the at least one attachment, determining whether anomalous behavior occurs | 2015-12-24 |
20150373042 | RUNTIME PROTECTION OF WEB SERVICES - Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace point vulnerabilities are identified using one or more data payloads. Candidate trace point operations associated with the trace point vulnerabilities are identified. Supplementary candidate operations are computed based on the existing trace point operations and the one or more data payloads. The Web service application is further instrumented with the one or more supplementary candidate operations. | 2015-12-24 |
20150373043 | Collaborative and Adaptive Threat Intelligence for Computer Security - Collaborative and adaptive threat intelligence. Data collected on a first customer network is received. One or more local models are trained with at least the received data, where the one or more local models are related to security. An amount of data to transmit to a centralized controller is determined based at least on a result of the training one or more local models and the determined amount of data is transmitted to the centralized controller. Result data is received from the centralized controller that is a result of one or more global models trained on the centralized controller using data collected on multiple customer networks including the first customer network. The one or more local models are adjusted using the received result data and the one or more adjusted local models are trained. | 2015-12-24 |
20150373044 | SYSTEMS AND METHODS FOR DYNAMIC PROTECTION FROM ELECTRONIC ATTACKS - Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats. | 2015-12-24 |
20150373045 | METHODS AND APPARATUS FOR VARYING SOFT INFORMATION RELATED TO THE DISPLAY OF HARD INFORMATION - Methods, systems, and apparatuses for varying soft information are disclosed. In an example embodiment, a security processor receives, from a transaction server, hard information to transmit to a client device related to a transaction with the client device, and soft information related to the display of the hard information on the client device. The security processor determines a variation of the soft information configured to prevent a malicious application from interacting with the hard information and determines the variation of the soft information does not change how the hard information is displayed at the client device compared to how the hard information was to be displayed using the soft information. Responsive to determining the variation of the soft information does not change how the hard information is displayed, the security processor transmits the hard information and the variation of the soft information to the client device. | 2015-12-24 |
20150373046 | SYSTEM AND METHOD FOR MITIGATING TOC/TOU ATTACKS IN A CLOUD COMPUTING ENVIRONMENT - A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is a result of a second process executing checksum code to verify at least one last branch record on the host. A processor also determined, based on the measurements, whether the first process was compromised. | 2015-12-24 |
20150373047 | IDENTIFYING URL TARGET HOSTNAMES - Techniques are provided for displaying a uniform resource locator (URL) to assist a user in determining whether a URL destination is what the user expects. A link is presented for selection to a user, and a URL corresponding to the link is accessed. A portion of the URL that corresponds to a hostname component of the URL may be identified, and the URL may be displayed. The hostname component of the URL is visually distinguished from other components of the URL. In addition to or as an alternative to displaying the URL and visually distinguishing the hostname component, a warning message relating to the hostname portion of the URL may be displayed. The techniques may be implemented as a software plug-in or in any type of software application that is capable of recognizing URLs. | 2015-12-24 |
20150373048 | Enterprise Mobile Notification Solution - The present invention provides mobile clients that can be easily distributed using any third party MDM (Mobile Device Management) solutions, or mobile app stores. Two operational modes provide only messaging functions, or give more functions to manage and control various processes in the system server. This gives an easy way for Enterprises to manage their license cost by providing advance functions to targeted technical users. The solution works on all the above mentioned platforms and enables an Enterprise to work with heterogeneous mobile devices and platforms. An admin panel on the server software through which an admin can control each and every mobile device, and its access to the information. The present invention provides an easy to define general policy through which rules can be defined for all devices. Similarly, specific rules for individual devices can also be defined, and applied instantaneously. | 2015-12-24 |
20150373049 | METHODS AND APPARATUSES FOR TRUST COMPUTATION - Embodiments of a method are disclosed for computing trust index among multiple entities associated with a resource marketplace. The method includes receiving multiple inputs including interaction attributes, attribute importance factors, references to databases, and multiple entities associated with the resource marketplace. The method also includes creating a weighted-interaction graph based on the received inputs. The weighted-interaction graph includes multiple vertices representing the entities. The method further includes performing a topology-specific analysis of the weighted-interaction graph. The method furthermore includes computing Euclidean distances for each pair of vertices in the weighted-interaction graph based on the performed analysis. The method also includes determining a trust index for a first entity in the received multiple entities based on the computed Euclidean distances. The trust index includes ranking of at least one of the multiple entities with respect to the first entity. The ranking is inversely proportional to the computed Euclidean distances. | 2015-12-24 |
20150373050 | Aggregation of asynchronous trust outcomes in a mobile device - Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome. | 2015-12-24 |
20150373051 | Dynamic authentication using distributed mobile sensors - Systems and techniques are provided for dynamic authentication using distributed mobile sensors. According to an embodiment of the disclosed subject matter, signals may be received from sensors. Some of the sensors may be located on a remote computing device. Heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems may be applied to the signals from sensors to determine a trust outcome. The trust outcome may be sent to be implemented by the enabling, disabling, or relaxing of a security measure based on the trust outcome. | 2015-12-24 |
20150373052 | Management of Privacy Policies - Master privacy policies for different users are stored to a cloud-based central server. When a user interacts with a third-party service (such as FACEBOOK® or AMAZON®), the third party service may require acceptance of privacy policies before services are rendered. Here the cloud-based central server may automatically configure a privacy policy of the third-party service to the user's master privacy policy. The cloud-based central server thus relives the user of managing many different privacy policies required by many different third party service providers. | 2015-12-24 |
20150373053 | METHOD AND APPARATUS FOR PROVIDING PRIVACY MANAGEMENT IN MACHINE-TO-MACHINE COMMUNICATIONS - A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy. | 2015-12-24 |
20150373054 | AUTOMATED FEEDBACK FOR PROPOSED SECURITY RULES - A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged event data. The computer determines a predicted performance of the proposed security rule as part of a network security system based on the number of matches. The computer sends a message during a creation session of the proposed security-rule. The message includes a recommended change for a portion of the proposed security based on the predicted performance of the proposed security rule. | 2015-12-24 |
20150373055 | Systems and Methods for Network Interoperability - Systems and methods for interoperating between networks. A first network may be configured to operate according to a first real time network protocol and each of one or more second networks may be configured to operate according to respective second real time traffic protocols. A mapping may specify data routing between a plurality of ports and the routing may maintain real time behavior between the first network and the one or more second networks. Additionally, routing information may be inserted in packets routed from the one or more second networks to the first network and removed from packets routed from the first network to the one or more second networks. The packets may be routed, based on the mapping, to distinct queues for the first network and the one or more second networks for processing by an application executing on at least one device. | 2015-12-24 |
20150373056 | Seamless Web Real-Time Communication Support On Mobile Appliances - Techniques pertaining to seamless WebRTC support on mobile appliances are described. In one aspect, a method includes one or more processors of one or more gateway servers receiving from a browser-based application executed by a mobile device a request for access to multimedia provided by a multimedia access platform. The method also includes the one or more processors retrieving information related to a profile associated with a user of the mobile device from an identity and access management server. The method further includes the one or more processors enabling the browser-based application to receive from the multimedia access platform one or more types of multimedia based at least in part on the profile associated with the user of the mobile device. | 2015-12-24 |
20150373057 | ENHANCING MEDIA CHARACTERISTICS DURING WEB REAL-TIME COMMUNICATIONS (WebRTC) INTERACTIVE SESSIONS BY USING SESSION INITIATION PROTOCOL (SIP) ENDPOINTS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Enhancing media characteristics during Web Real-Time Communications (WebRTC) interactive sessions by using Session Initiation Protocol (SIP) endpoints, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method comprises intercepting, by a media redirection agent of a WebRTC client executing on a computing device, a WebRTC initiation token. The method further comprises generating a SIP endpoint WebRTC token based on the WebRTC initiation token, and sending the SIP endpoint WebRTC token to a remote endpoint. The method also comprises establishing a WebRTC interactive session between the remote endpoint and a SIP endpoint based on the SIP endpoint WebRTC token. By leveraging the audio and/or video functionality of the SIP endpoint, the media characteristics of the WebRTC interactive session may be enhanced, resulting in an enhanced user experience. | 2015-12-24 |
20150373058 | SERVICE CONTROL AWARENESS FOR CALL ROUTING BETWEEN PACKET SWITCHED TELEPHONY DOMAIN AND CIRCUIT SWITCHED TELEPHONY DOMAIN - A telecommunications network has a packet switched domain for handling packet based calls and a circuit switched telephony domain for handling circuit switched calls. A node of the packet switched telephony domain decides whether to terminate a call to a user equipment using a packet based connection to the user equipment or using a circuit switched connection to the user equipment. In response to deciding to terminate the call using the circuit switched connection, the node sends, to a further node controlling routing of calls between the packet switched telephony domain and the circuit switched telephony domain, an indication that services related to the call are controlled in the packet switched telephony domain. In accordance with the indication, the further node may then adapt its control signalling with respect to a node of the circuit switched telephony domain. | 2015-12-24 |
20150373059 | Communication System Using Heterogeneous Networks - Disclosed is a communication system and, more particularly, a communication system using heterogeneous networks to support voice calls by combining private mobile networks, Mobile Network Operators (MNOs), and Public Switched Telephone Networks (PSTNs) even when an application for voice talk has not been installed on the mobile terminal. | 2015-12-24 |
20150373060 | Using Smart TV Capabilities to Enhance Audio/Video Call - A method of using capabilities of a smart TV to enhance an audio and/or video call, including discovering by a first smartphone a near smart TV; establishing communication between the first smartphone and the smart TV; checking by the first smartphone the smart TV's capabilities; and using the smart TV capabilities to enhance a call between the first smartphone and a second smartphone or to enhance an application running on the first smartphone. | 2015-12-24 |
20150373061 | Managing Voice over Internet Protocol (VoIP) Communications - The disclosed embodiments include a computer implemented method for managing network communications. In one embodiment, the method includes gathering, using performance information packet (PIP) data packets, network performance information from a communications network that includes network performance information from a set of egress points between the communications network and an outside network. The method selects a network connection including an egress point and an egress packet path within the communications network to the egress point offering the best quality of service between the communications network and an outside network based on the network performance information. The method then establishes the network connection between the communications network and the outside network for routing communications. | 2015-12-24 |
20150373062 | APPARATUS, SYSTEM, AND METHOD OF MANAGING COMMUNICATION, AND RECORDING MEDIUM STORING COMMUNICATION MANAGEMENT PROGRAM - A communication management system that manages a plurality of communication terminals transmits, to a request communication terminal, one of operation state information indicating that an operation state of a candidate counterpart communication terminal is unknown or information indicating that a communications protocol of the candidate counterpart communication terminal is different from a communications protocol of the request communication terminal, when the communications protocol is different between the candidate counterpart communication terminal and the request communication terminal. The request communication terminal displays information to a user, which is generated based on the information received from the communication management system. | 2015-12-24 |
20150373063 | METHOD AND APPARATUS FOR TIMELINE-SYNCHRONIZED NOTE TAKING DURING A WEB CONFERENCE - A computer implemented method and apparatus for timeline-synchronized note taking during a web conference. The method comprises receiving a note from a user in a web conference; generating metadata that identifies a timestamp in the web conference when the note was created and a user identifier of the user who authored the note; and storing the note and the metadata with a recording of the web conference. | 2015-12-24 |
20150373064 | ENABLING DIGITAL ASSET REUSE THROUGH DYNAMICALLY CURATED SHARED PERSONAL COLLECTIONS WITH EMINENCE PROPAGATION - A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user. | 2015-12-24 |
20150373065 | Gestures for Sharing Content Between Multiple Devices - Methods and systems for sharing content includes detecting selection of multimedia content at a first device. The selection causes automatic rendition of the selected multimedia content on a display portion of the first device. Selection of a second device is detected at a user interface of the first device. The user interface identifies a plurality of devices that have an established communication pairing with the first device. A gesture made with the first device while the second device continues to be selected, is identified. The gesture acts as a trigger for sharing the selected multimedia content with the second device. The gesture causes the multimedia content to be automatically transmitted to the second device for rendering at a display portion of the second device. | 2015-12-24 |
20150373066 | METHODS FOR SCREEN-SHARING AND APPARATUSES USING THE SAME - The invention introduces a screen-sharing method, executed by a processing unit of a screen-sharing source, which contains at least the following steps. Application windows being opened on a display unit are obtained. For each application window, screen-sharing receivers, which are connected to the screen-sharing source, are detected and items are appended to a system menu instance of the application window, where each item corresponds to one screen-sharing receiver. | 2015-12-24 |
20150373067 | PROMPTING SOCIAL NETWORKING SYSTEM USERS TO PROVIDE ADDITIONAL USER PROFILE INFORMATION - A social networking system presents questions to a user on an interface associated with the social networking system to elicit information about the user that is missing from the user's profile or is otherwise outdated. The questions are selected based on a number of factors, such as the need for or value of the information item, probability of a response, or cost of collecting the information item. In presenting the selected question, the social networking system prompts a user for information about the user in a an interface associated with a page from the social networking system, an application external to the social networking system, or using a push notification or prompt. The questions may be formatted in various ways, such as an explicit question, confirmation, a selection of responses, or social context to encourage the user to respond to the question. | 2015-12-24 |
20150373068 | COLLABORATION PLATFORM - One or more embodiments of the invention provide a collaboration platform that permits multiple users to collaborate on multiple copies of a model simultaneously. The collaboration application provides a full set of two-dimensional (2D) and three-dimensional (3D) tools for a client to manipulate a model and transmit the results of such manipulations to a server. Both the clients and the server maintain a history of the manipulations results. Once object changes are received by the server from one or more clients, the server distributes the object changes to the remaining clients. Thereafter, the clients modify their local version of the model in accordance with the object changes received from the server. The history maintained by the clients or the server may then be used to undo or redo any of the object changes, or to rebuild a model space in the event of a network failure. | 2015-12-24 |
20150373069 | MANAGING A COMMON SHARED PLAY QUEUE ON MULTIPLE DEVICES - A system for managing a shared play queue, comprising a queue manager that stores and modifies a media playback queue comprising media file identifiers, and configured to communicate via a network to broadcast a media playback queue and listen for media playback queue broadcasts received via the network, and to modify a media playback queue based on a received broadcast, and a method for managing a shared play queue. | 2015-12-24 |
20150373070 | IP MULTICAST OVER MULTI-CHASSIS TRUNK - In embodiments of the present invention, multicast traffic is simultaneously routed via all switches participating in the trunk (can be referred to as partner switches). A respective partner switch synchronizes the local multicast state information with all other partner switches. For a respective multicast group, a plurality of partner switches can be the part of the corresponding multicast distribution tree and obtain multicast traffic from uplink sources. For the multicast group, only one partner switch is elected as the primary forwarder which forwards the multicast traffic via the trunk. Another partner switch can become the primary forwarder for the multicast traffic of another multicast group and provide load sharing of multicast traffic between partner switches. Furthermore, because the partner switches have the multicast traffic and state readily available, in the event of a switch or link failure to the primary forwarder, another partner switch can readily become the primary forwarder. | 2015-12-24 |
20150373071 | ON-DEMAND HELPER OPERATOR FOR A STREAMING APPLICATION - A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. When a bottleneck is detected, the streams manager automatically adjusts a helper operator to help the operator experiencing the bottleneck, thereby dynamically improving performance of the streaming application. Helper operators can be dynamically created and destroyed by the streams manager as needed, and can be deployed to virtual machines in a cloud. | 2015-12-24 |
20150373072 | Remote Streaming of Media Content - An example system for streaming media content includes: a data communication network; a source venue for generating audio and/or video data stream, the source venue in communication with the data communication network; and at least one recipient venue, the at least one recipient venue in communication with the data communication network; the source venue is configured to send the audio and/or video data stream to the at least one recipient venue through the data communication network. | 2015-12-24 |
20150373073 | IMAGE PICKUP APPARATUS, CONTROL METHOD AND RECORDING MEDIUM - An image pickup apparatus control method for performing live streaming with a terminal device includes setting an image pickup mode, determining, based on the set image pickup mode, a parameter related to the live streaming, and transmitting the acquired image to the terminal device based on the determined parameter. | 2015-12-24 |
20150373074 | TECHNIQUE FOR DETECTING AN ENCODER FUNCTIONALITY ISSUE - A technique for detecting an encoder functionality issue in a media distribution system is presented. In the media distribution system consecutive media segments generated by an encoder are transmitted to a media client, and media descriptions describe expected availability times of media segments for the media client. A method implementation of the technique comprises the step of monitoring an availability time of a media segment compared to an expected availability time of the media segment, wherein the expected availability time is described by, or derived from, a media description. The method further comprises determining whether a deviation of the monitored availability time of the media segment from the expected availability time of the media segment is present, and detecting the encoder functionality issue based on a result of the determination. The encoder functionality issue may comprise one or more of an encoder restart, an encoder malfunction and an encoder time drift. | 2015-12-24 |
20150373075 | MULTIPLE NETWORK TRANSPORT SESSIONS TO PROVIDE CONTEXT ADAPTIVE VIDEO STREAMING - Methods, apparatus, systems, and software for implementing context adaptive video streaming using multiple streaming connections. Original video content is split into multiple bitstreams at a video streaming server and streamed to a video streaming client. Higher-importance video content, such as I-frames and the base layer for scalable video coder (SVC) content are streamed over a high-priority streaming connection, while lower-importance video content is streamed over a low-priority streaming connection. The high-priority streaming connection may employ a reliable connection protocol such as TCP protocol, while the lower-priority connection may employ UDP or a modified TCP protocol under which some portions of the bitstream may be dropped. Cross-layer context adaptive streaming may be implemented under which context data such as network context and video application context information may be considered to adjust parameters associated with implement one or more streaming connections. | 2015-12-24 |
20150373076 | METHOD FOR TRANSMITTING/RECEIVING INTERNET-BASED CONTENT AND TRANSMITTER/RECEIVER USING SAME - The present invention relates to a method for transmitting/receiving contents through a network such as the Internet, and to a transmitter/receiver using same, the transmission method comprising: converting content stored in a file format into a delivery format; and transmitting the content converted into the delivery format using an IP packet, wherein the file format and/or the delivery format includes priority information for expressing whether data that makes up the content is played back in default. | 2015-12-24 |
20150373077 | LINK-AWARE STREAMING ADAPTATION - Technology to provide link aware streaming adaptation is disclosed. In an example, a mobile device can include computer circuitry configured to: receive a manifest file for an HTTP adaptive stream from a node; determine a physical layer goodput of the mobile device with the node; and select a representation in the manifest file for a selected period based, at least in part, on the physical layer goodput. | 2015-12-24 |
20150373078 | ON-DEMAND HELPER OPERATOR FOR A STREAMING APPLICATION - A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. When a bottleneck is detected, the streams manager automatically adjusts a helper operator to help the operator experiencing the bottleneck, thereby dynamically improving performance of the streaming application. Helper operators can be dynamically created and destroyed by the streams manager as needed, and can be deployed to virtual machines in a cloud. | 2015-12-24 |
20150373079 | METHOD AND SYSTEM FOR PROVIDING CONTENT IN CONTENT DELIVERY NETWORKS - A method delivers content in content delivery networks that include an upstream content delivery network and a downstream content delivery network comprising at least two content delivery entities. The upstream and downstream content delivery networks are connected to each other. A user equipment is connected to the downstream content delivery network. The method includes requesting a content stream by the user equipment, providing the content stream by the upstream content delivery network, redirecting the content stream to a content delivery entity, and providing the content stream to the user equipment. Network information of the downstream content delivery network and/or user equipment information are determined. Probabilities for the content delivery entities are determined for optimized content stream performance. The user equipment is connected to the content delivery entity having the highest probability. The content stream is redirected to the content delivery entity and delivered to the user equipment. | 2015-12-24 |
20150373080 | DEVICES AND METHODS FOR OPENING ONLINE DOCUMENTS - A mobile terminal may include a processor-readable storage medium comprising a set of instructions implementing a method for opening an online document and a processor in communication with the storage medium. The processor may execute the set of instructions to receive a first request to display a first portion of an online document including a first plurality of elements, and start to download the first plurality of elements. When the processor receives a second request to display a second portion of the online document before complete downloading the first plurality of elements including a second plurality of elements, the processor may stop downloading remainder of the first plurality of elements that has not been downloaded and start to download the second plurality of elements. | 2015-12-24 |
20150373081 | METHOD OF SHARING BROWSING ON A WEB PAGE DISPLAYED BY A WEB BROWSER - A method of sharing browsing on a web page displayed in a window of a first web browser executed in a first terminal, with at least one second web browser executed in a second terminal. The method comprising:
| 2015-12-24 |
20150373082 | METHOD AND APPARATUS FOR OBTAINING WEBPAGES - The present invention discloses a method and apparatus for obtain webpages. The method comprises: receiving a webpage identifier through a browser; determining whether the webpage identifier comprises an error; if the webpage identifier comprises an error, matching the error with a corresponding correction method in a pre-stored matching table for webpage identifier errors; correcting the webpage identifier in accordance with the matched correction method; and sending the corrected webpage identifier to a server to obtain a corresponding webpage. Errors in the webpage identifier can be automatically corrected, which saves time and enhances the browsing experiences. | 2015-12-24 |
20150373083 | ELECTRONIC DEVICES FOR, A SYSTEM AND A METHOD OF CONTROLLING ONE OF THE ELECTRONIC DEVICES - A first electronic device | 2015-12-24 |
20150373084 | FORWARDING ACTIVITY-RELATED INFORMATION FROM SOURCE ELECTRONIC DEVICES TO COMPANION ELECTRONIC DEVICES - The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device and broadcasts an activity advertisement comprising an activity identifier for the activity. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device acquires extended activity data from the source electronic device and uses the extended activity data to configure the second application and commence performing the activity with the second application at the companion electronic device. The source electronic device may also forward activity-related information (e.g., information from a copy and paste clipboard in the source electronic device) to the companion electronic device. | 2015-12-24 |
20150373085 | METHOD OF PROVIDING LOCATION INFORMATION FOR MOBILE ELECTRONIC DEVICE AND MOBILE ELECTRODE DEVICES USING THE SAME - The disclosure is directed to a method of providing location information for a mobile electronic device and a mobile electronic device using the same method. In one of the exemplary embodiments, the mobile electronic device would receive a first signal that indicates capturing a multimedia file. In response to receiving the first signal, the mobile electronic device would transmit to an external device a second signal in response to receiving the first signal. In response to transmitting the second signal, the mobile electronic device may receive from the external device a first location information or an ephemeris. The mobile electronic device may then determine the first location information either based on the first location information as received or based on the ephemeris. Also, the mobile electronic device may associate the multimedia file with the first location information. | 2015-12-24 |
20150373086 | Courier Network Service - Example apparatus facilitate controlling how targeted electronic data is selected and couriered (e.g., physically carried) between a provider in a first physical location and a recipient in a second physical location. An apparatus, method, or service may control the flow of targeted electronic data or metadata concerning the targeted electronic data in a courier network. The service may consider requests for targeted electronic data or information from which targeted electronic data can be identified. The service may also consider predictions about content that a recipient may want. The targeted electronic data may be identified based on a current state of an operating system, an application, or content at the recipient and information about a desired state of the operating system, application, or content. The number and identity of courier devices selected to courier data may be based on a familiarity index between couriers and recipients in the courier network. | 2015-12-24 |
20150373087 | COMMUNICATION OF APPLICATION MICROARCHITECTURE ATTRIBUTES BETWEEN DATACENTERS - Technologies are directed to a communication of application microarchitecture attributes between datacenters. According to some examples, components of a distributed broker are executed at an origin datacenter and a destination datacenter to communicate the microarchitecture attributes of an application executed or being executed at the origin datacenter. The distributed broker may read an event counter register to capture an instruction counter of the application at the origin datacenter. The instruction counter may be added to a microarchitecture instruction census (MIC) at the origin datacenter. The MIC may be combined with an identification information of the application to produce a portable affinity record at the origin datacenter. In addition, the portable affinity record may be transmitted to the destination datacenter from the origin datacenter. | 2015-12-24 |
20150373088 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a registration unit and a notification unit. The registration unit registers a document onto a designated registration destination if a condition for registration is satisfied when the registration of the document onto the registration destination is requested. The notification unit provides a notification of identification information for identifying the document to multiple destinations if the registration of the document is not performed. When the registration of the document identified based on the identification information notified by the notification unit is requested, the registration unit registers the document onto the registration destination if the condition for the registration is satisfied. | 2015-12-24 |
20150373089 | CROSS-DEVICE NOTIFICATIONS - Techniques for cross-device notifications are provided. An example method includes receiving a first indication of an event detected at a first device associated with a user account, determining one or more characteristics of the event based on the first indication of the event, detecting whether the determined characteristics match at least one selection criterion, automatically identifying a second device from one or more devices associated with the user account, and providing, if the determined characteristics match the at least one selection criterion, the first indication of the event to the second device associated with the user account, where the provided first indication of the event is displayed at the second device to allow management of the event at the first device from the second device. | 2015-12-24 |
20150373090 | Techniques and Systems for Supporting Podcasting - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application, can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates am be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 2015-12-24 |
20150373091 | Creation and Consumption of Transient User Profiles - Transient user profiles are generated and broadcast to nearby recipient devices. In some implementations, a transient user profile is generated from a master user profile that includes user information. The master user profile can be stored in encrypted form on the user's mobile device or on a network-based computer system where it can be accessed upon authentication. The master user profile can include information provided by the user or retrieved from other network-based computer systems. The master user profile can include information that is labeled with security tags that indicate the class of users that may receive the user information. From the master user profile, a transient user profile can be generated in response to a sharing event and broadcast to other nearby recipient devices. | 2015-12-24 |
20150373092 | APPARATUS, SYSTEM AND METHOD OF AGGREGATING MULTIPLE ADDRESS BOOK SOURCES - Embodiments of the present invention are directed to an apparatus, system and method of aggregating address book sources. Contact entries from these sources are retrieved by a server. There can be multiple contact entries for the same contact. Without modifying the original contact entries, the server links together similar contact entries such that these similar contact entries are virtually aggregated but not physically merged. An aggregated address book at the server includes a distinct contact entry for each contact and can be viewed from one or more end-user devices either in a browser or in a client application. One or more address book sources are automatically updated based on changes made to the aggregated address book at the server from an end-user device. The aggregated address book is also automatically updated based on changes made at one or more of the address book sources. | 2015-12-24 |
20150373093 | SELECTING OPTIMAL HYPERVISOR PLATFORMS THAT SATISFY APPLICATION WORKLOAD REQUIREMENTS - A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high CPU capacity, high power and low cost, are received. A ranking algorithm is then applied to a list of pools of compute nodes to identify an ordered list of pools of compute nodes that are best suited for satisfying the attribute requirements of the application workload by comparing hypervisor characteristics of the pools of compute nodes with the attribute requirements of the application workload. Each pool of compute nodes runs on a particular hypervisor platform which has a unique combination of characteristics that correspond to a combination of a set of attribute requirements (e.g., medium CPU/memory/disk capacity; high CPU and memory performance). In this manner, the hypervisor platforms that are best suited for satisfying the application workload requirements are identified. | 2015-12-24 |
20150373094 | Load sharing method and apparatus - Provided is a load sharing method, including that public network addresses are configured in a form of address pools; after traffic transmitted by user devices is received, the user devices are grouped according to traffic models transmitted by the user devices; CPU allocate the public network addresses to the user devices and translate private network addresses of the user devices into the public network addresses, wherein each of the address pools includes a plurality of address blocks, each of the plurality of address blocks corresponds to one CPU, each user group includes a plurality of user blocks, and each of the plurality of user blocks corresponds to one CPU. A load sharing apparatus is also provided. Thus, uneven sharing of public network address resources among a plurality of CPUs and loads of user devices can be avoided, thereby not only improving the processing speed of the CPUs for address translation, but also obtaining an excellent load sharing effect. | 2015-12-24 |
20150373095 | METHOD AND APPARATUS FOR DETERMINING SERVICE QUALITY PROFILE ON DATA DISTRIBUTION SERVICE - Provided herein a method and apparatus for determining a QoS (quality of service) profile in the data distribution service, the method including determining network environment information; and determining the QoSProfile based on the network environment information, wherein the QoSProfile includes a QoSFunction, QoSMatching, QoSStatement, QoSConstraint, and QoSCharacteristic. | 2015-12-24 |
20150373096 | Reducing Restoration Time for Virtual Machines - Systems and techniques are described for restoring virtual machines. A described technique includes receiving location data specifying a location of a mobile device of a user. A first distance between the mobile device and a first data center that stores a virtual machine template and a snapshot associated with the user is determined. The snapshot represents a state of a virtual machine. A second distance between the mobile device and a second data center that is different from the first data center is determined. A determination is made that the mobile device of the user is closer to the second data center than the first data center. In response to determining that the mobile device is closer to the second data center than the first data center, the snapshot is transferred from the first data center to the second data center. | 2015-12-24 |
20150373097 | SYSTEM AND METHOD FOR SUPPORTING RESTFUL MANAGEMENT IN A MULTITENANT APPLICATION SERVER ENVIRONMENT - In accordance with an embodiment, a system and method for supporting RESTful management in an application server environment for operating application software includes an interface configured to receive input for interacting with the application server environment. When a request to manage the application server environment is received, REST resources are dynamically generated using bean trees and other bean information within the application server environment. The REST resources are then usable as input to the interface to manage the application server environment. | 2015-12-24 |
20150373098 | SYSTEM AND METHOD FOR SUPPORTING PARTITIONS IN A MULTITENANT APPLICATION SERVER ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for supporting partitions in a multitenant application server environment. In accordance with an embodiment, an application server administrator (e.g., a WLS administrator) can create or delete partitions; while a partition administrator can administer various aspects of a partition, for example create resource groups, deploy applications to a specific partition, and reference specific realms for a partition. Resource groups can be globally defined at the domain, or can be specific to a partition. Applications can be deployed to a resource group template at the domain level, or to a resource group scoped to a partition or scoped to the domain. The system can optionally associate one or more partitions with a tenant, for use by the tenant. | 2015-12-24 |
20150373099 | SYSTEM AND METHOD FOR CONFIGURATION TAGGING IN A MULTITENANT APPLICATION SERVER ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for supporting the use of configuration tagging in a multitenant application server environment. In accordance with an embodiment, a user interface is provided which displays a domain structure, including partitions and target systems, and enables components of the domain to be associated with user-specified tags that are received from an administrator, including for example, a first component associated with a first set of one or more tag(s), and a second component associated with a second set of one or more tag(s), which are then associated with the corresponding domain component. For example, a virtual target or target system can be associated with a tag such as “Gold”, “Silver” or “Bronze”. The tagged components can then be associated with the creation or definition of a partition. | 2015-12-24 |
20150373100 | CONTEXT SHARING BETWEEN DIFFERENT CLIENTS - The present disclosure describes methods, systems, and computer program products for providing context sharing between different clients. One computer-implemented method includes receiving a data state change from a client application associated with a client, the state change indicating a change in data contextually relevant to other client applications, generating, by operation of a hardware processor, client state data reflecting the data state change, transmitting the client state data to a server to be persisted as state data, and receiving the state data at another client, the another client aligning the state of associated application to reflect the state data. | 2015-12-24 |
20150373101 | METHODS AND SYSTEMS FOR SYNCHRONIZING DATA BETWEEN TWO GEOGRAPHICALLY DISPARATE LOCATIONS - Methods and systems for synchronizing data between two geographically disparate locations are disclosed. The method includes identifying a first file on a first device in communication with a first docking station; and obtaining a second file at a second docking station in communication with the first docking station. The method also includes calculating a difference between the first file and the second file and updating the first file using the difference. | 2015-12-24 |
20150373102 | DEPLOYMENT OF VIRTUAL MACHINE DISKS FROM A SHARED NETWORK FILE SYSTEM - Techniques for deployment of virtual machine disks (VMDKs) in a virtualized computing environment are disclosed. In one embodiment, a request to deploy a VMDK to a virtual machine (VM) is received. The VMDK includes a master virtual disk file and at least one data virtual disk file. Further, the master virtual disk file is copied from a shared network file system to a storage device associated with a host computing system. Furthermore, a redo virtual disk file is created in the storage device upon copying the master virtual disk file. Also, changes made to content associated with the VMDK are stored in the redo virtual disk file until the at least one data virtual disk file is copied to the storage device. | 2015-12-24 |
20150373103 | DETERMINING TRANSFERABILITY OF A COMPUTING RESOURCE TO A CLOUD COMPUTING ENVIRONMENT - An embodiment of the present technique may in a method for generating a report related to the transferability of an application to a cloud computing environment. The method may include receiving data related to characteristics of the application. The method may include comparing, via a processor, the data received to predetermined dimensions related to the transferability of an application to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension. The method may include generating, via the processor, a report based on the comparison. | 2015-12-24 |
20150373104 | WEB-BASED PUBLISHING OF ENTERPRISE INFORMATION - A system and method is described for providing enterprise information to a mobile communications device. The system receives enterprise information from server based application software products at a publisher, and determines particular enterprise data from the enterprise information and integrates the particular enterprise data into a normalised data structure. The normalised data structure is stored on a local server in a Sync database and platform, wherein at least part of the normalised data structure may be accessed through an application user interface on mobile or web based communication devices. | 2015-12-24 |
20150373105 | TRANSFER FORMAT FOR STORAGE SYSTEM, AND TRANSFER METHOD - If resources allocated to a host computer exist in different physical storage nodes within a virtual storage system after performing migration to a storage system, mapping of resources among the physical storage nodes becomes necessary, and if the amount of communication between physical storage nodes that occurs during access to resources exceeds a bandwidth of the connection path, the host I/O performance may be deteriorated compared to the performance before migration. Therefore, when migration is performed from a first physical storage node to a virtual storage system composed of a plurality of second physical storage nodes, a management computer allocates resources of the second physical storage nodes within a range of bandwidth of the transfer path between the second physical storage nodes based on configuration information of the plurality of second physical storage nodes, performance information, and load information of the volume provided by the first physical storage node. | 2015-12-24 |
20150373106 | MIGRATION PROJECT AUTOMATION, E.G., AUTOMATED SELLING, PLANNING, MIGRATION AND CONFIGURATION OF EMAIL SYSTEMS - Technology is generally described for automating the project management and execution of data migration from a source email system to a destination email system. In some examples, the technology can include receiving a domain name of a second computing system; obtaining domain name system (DNS) records for the received domain name; determining an email hosting provider for the second computing system; determining, by the processor, based on the obtained DNS records, an email system service type of the source email system on the second computing system; discovering mailboxes and message delivery rules of the source email system; displaying customization options for migrating discovered source email system mailboxes; migrating data items from the source email system to the destination email system; and managing migration of data from source email system client computing devices to the destination email system. | 2015-12-24 |
20150373107 | MANAGING APPLICATIONS ON AN ELECTRONIC DEVICE - An electronic device may offload an application to a network storage to free up storage on the electronic device. For instance, an application file and, in some cases, associated application data and/or saved application state information may be stored at the network storage and deleted from the electronic device. Subsequently, a data management module may receive an instruction to onload the application back onto the electronic device, such as in response to a user input that selects the offloaded application, a determination that an upcoming activity may include use of the offloaded application, or a determination that a user usage pattern indicates that the offloaded application is likely to be used. In response, the data management module may download the corresponding application file from the network storage. In some cases, the electronic device may also receive associated application data and/or saved application state information from the network storage. | 2015-12-24 |
20150373108 | DYNAMIC PROXIMITY BASED NETWORKED STORAGE - A computer implemented method of storing data in at least one mobile node according to mobile node location may include identifying a first qualified mobile node and determining a first geographic position of the first qualified mobile node. The method may include determining a user geographic position of a user device, determining whether the first geographic position is within a first proximity relative to the user device, and causing storage of a first data portion in the first qualified mobile node in response to determining that the first geographic position is within the first proximity. | 2015-12-24 |
20150373109 | METHODS AND SYSTEMS FOR VIRTUALIZING AND MANAGING CLOUD STORAGE SOURCES - Methods and systems for virtualizing and managing cloud storage sources are disclosed. The method includes detecting devices in communication with a docking station and identifying a file on one of the devices. The method also includes identifying a plurality of cloud storage sources and calculating a weighted value for each storage source among the plurality of storage sources. The method further includes selecting a storage location within the plurality of cloud storage sources based on the calculated weighted values and storing the file at the selected storage location. | 2015-12-24 |
20150373110 | DATA COMMUNICATIONS SYSTEM FOR AN AIRCRAFT - A data communications system for an aircraft comprising a plurality of line-replaceable units and a data network configured according to an ARINC standard defining ports, and interconnecting the plurality of line-replaceable units, wherein the line-replaceable units communicate via the ports of the data network. | 2015-12-24 |
20150373111 | CONFIGURATION INFORMATION ACQUISITION METHOD AND MANAGEMENT COMPUTER - A management computer configured to manage one or more storage apparatuses managing a plurality of resources transmits requests to the one or more storage apparatuses to, based on one or more basic information pieces for identifying the one or more storage apparatuses, acquire as a priority configuration information on, out of the plurality of resources, resources logically closer to a host computer of the one or more storage apparatuses. The management computer receives the configuration information corresponding to the requests from the one or more storage apparatuses, and incorporates the received configuration information into configuration management information for managing the configuration information on the resources managed by the one or more storage apparatuses. | 2015-12-24 |
20150373112 | HISTORY INFORMATION MANAGEMENT METHOD, AND HISTORY INFORMATION MANAGEMENT APPARATUS - A history information management method includes detecting competing access requests from among a plurality of access requests, utilizing history information that are generated by the plurality of access requests, each of the plurality of access requests being related to a plurality of data that are respectively mapped to a plurality of accounts; specifying an executed access request from among the detected competing access requests based on information relating to an executed access request; and specifying, for each of the plurality of accounts, part of the history information relating to an executed access to the data based on the specified access request and the history information. | 2015-12-24 |
20150373113 | OPERATING TECHNIQUES FOR A STORAGE NETWORK SYSTEM - A technique for operating a storage network system includes storing, at one or more of a plurality of data collection storages arranged along a traveling path of a mobile body, data records received from the mobile body. An acknowledge (ACK) record including a storage identifier (ID) is transmitted, from the one or more of the plurality of data collection storages to the mobile body, in response to receiving the data records. Communication between a user storage and the one or more of the plurality of data collection storages is established via a communication network that is configured to receive the ACK record and receive and store at least one of the data records from the one or more of the data collection storages that is identified by the storage ID in the received ACK record. | 2015-12-24 |
20150373114 | STORAGE ABSTRACTION LAYER AND A SYSTEM AND A METHOD THEREOF - Embodiments of the present invention are directed to a storage abstraction layer that is a concatenation of a plurality of storage devices that is accessible by a computing device. The plurality of storage devices includes at least one attached storage of the computing device, at least one cloud storage, or a combination thereof. The storage abstraction layer is presented as an application programming interface (API) to applications running on the computing device to allow each application to store and retrieve data as if it was using a single storage, regardless of where each of the plurality of storage devices is located and the type of each of the plurality of storage devices. Access to individual objects or files on this layer is done transparently such that underlying implementation details are hidden from the calling application. | 2015-12-24 |
20150373115 | MODULAR SWITCHED FABRIC FOR DATA STORAGE SYSTEMS - Systems, methods, apparatuses, and software for data storage systems are provided herein. In one example, a data storage system is provided that includes a plurality of storage drives each comprising a Peripheral Component Interconnect Express (PCIe) interface, and configured to store data and retrieve the data stored on associated storage media responsive to storage operations. The data storage system includes one or more processing modules comprising one or more processors communicatively coupled to the plurality of storage drives over a PCIe fabric comprised of one or more PCIe switches. The processors are configured to share a PCIe address space associated with the PCIe fabric for transfer of the storage operations to appropriate ones of the processors that manage ones of the plurality of storage drives. | 2015-12-24 |
20150373116 | STORING CONTENT ITEMS - Implementations generally relate to storing content items. In some implementations, a method includes receiving content items on a mobile device. The method includes storing the content items on local storage on the mobile device. The method includes determining available local storage capacity of the mobile device. The method includes uploading content items to secondary storage, and selecting content items to remove from the local storage or add to the local storage based on predetermined criteria, for example, when the available local storage capacity meets a threshold available local storage capacity. | 2015-12-24 |
20150373117 | SYSTEM AND METHOD FOR SUPPORTING USE OF AN IN-MEMORY DATA GRID WITH A MULTITENANT APPLICATION SERVER ENVIRONMENT - In accordance with an embodiment, the system supports use of an in-memory data grid or other distributed memory environment, for example Oracle Coherence. A partition provides a runtime and administrative subdivision or slice of an application server domain. An application can be deployed to a particular partition, or otherwise associated with a particular domain partition name. The domain partition name can be used by the data grid to enable a separation of data between different partitions or between tenants associated with those partitions. In some embodiments, one or more data grid services, for example caches and clustered services, can be shared across multiple partitions. Alternatively, the data grid can provide read-shared/write-specific access to data grid services, in which multiple partitions can share an initial set of data, but their subsequent modifications to that data are then isolated from each other. | 2015-12-24 |
20150373118 | CLOUD OFF-RAMP MANAGEMENT - According to an example, cloud off-ramp management may include generating folders on a cloud storage system and retrieving content from the folders based on folder settings. Retrieved content may be sent over the Internet to a device associated with the content. | 2015-12-24 |
20150373119 | STORAGE MANAGEMENT CALCULATOR, AND STORAGE MANAGEMENT METHOD - In one mode, a management calculator is connected to a host calculator and a storage device, and stores, in a memory, composition information and function setting information. The composition information shows multiple logic storage regions provided by the storage device, and objects that are stored in one logic storage region from among the multiple logic storage regions and that are executed by the host calculator, the logic storage regions and the objects being shown in association with one another. Meanwhile, the function setting information shows storage functions set for the logic storage regions. | 2015-12-24 |
20150373120 | ADJUSTING A DISPERSAL PARAMETER OF DISPERSEDLY STORED DATA - A method includes storing a first subset of encoded data slices of a set of encoded data slices in one local memory, LAN memory, and/or WAN memory. The method further includes storing a second subset of encoded data slices in a different one of the local memory, the LAN memory, and the WAN memory. The method further includes determining to make a change in storage of the set of encoded data slices. The method further includes determining to make an adjustment to the pillar width number based on the determined storage change. The method further includes generating adjusted encoded data slices for the set of encoded data slices based on the adjustment to the pillar width number. The method further includes storing the updated set of encoded data slices in accordance with the determined change in the storage of the set of encoded data slices. | 2015-12-24 |
20150373121 | WIRELESS PASSENGER SERVICE SYSTEM - A wireless passenger service system for an aircraft having a power system and a cabin management system that includes a wireless receiver and a wireless passenger control unit. The wireless receiver is able to receive a wireless signal and is operationally connected to the power and cabin management systems of the aircraft. The wireless passenger control unit is able to send a wireless signal. In response to receiving a wireless signal from the wireless passenger control unit, the wireless receiver is configured to activate at least one passenger service function of the cabin management system of the aircraft. | 2015-12-24 |
20150373122 | DATA PROCESSING METHOD AND APPARATUS - Data-processing apparatus ( | 2015-12-24 |
20150373123 | CODELESS DEVICE PAIRING BETWEEN MOBILE DEVICE AND PARTICULAR ONE OF A PLURALITY OF MEDIA DEVICES - A media server receives a request from an unpaired mobile device, queries a login database to determine whether the mobile device is logged in for high speed Internet access, and, when yes, identifies a particular guest area of the hospitality establishment according to details in its login record. One of the media devices accessible from within the particular guest area is selected and paired with the mobile device without requiring a user of the mobile device to input into the mobile device a connect code of the selected media device. In another example, a user initiates a codeless pairing mode on a particular one of the media devices and begins interacting with the media server utilizing an unpaired mobile device. Since, only one media device can be in that mode at a time, the media server pairs the newly detected unpaired mobile device with the particular media device. | 2015-12-24 |
20150373124 | COMMUNICATION BETWEEN MACHINE-TO-MACHINE SERVICE LAYERS AND TRANSPORT NETWORK - Techniques for facilitating Machine-to-Machine (M2M) communications include providing an M2M system that implements one or more pre-defined M2M Application Programming Interface (API) profiles, providing a network interface for the M2M system, receiving a profile query over the network interface, and responding with information about the implemented one or more-pre-defined M2M API profiles. | 2015-12-24 |
20150373125 | Methods and Apparatus for Providing Session Policy During a Registration of a Device - A method for a user agent to access a session policy in a network is provided. The method comprises the user agent sending a registration message to a first network node. The method further comprises the user agent receiving policy-related information from the first network node in a response to the registration message. The policy-related information is one of the session policy, a Uniform Resource Locator that points to the session policy, and a Policy-Contact header containing a policyContactURI for a policy document. | 2015-12-24 |
20150373126 | METHOD, APPARATUS AND SYSTEM FOR INTERACTIVE DATA EXCHANGE - A method, apparatus and system for exchanging data, the method including: receiving an identifier of a data server to exchange data with a mobile terminal; determining the data server in accordance with the identifier of the data server; and relaying data to be exchanged between the mobile terminal and the data server. The mobile terminal exchanges data with the data server originally configured to support landline terminals through the access server, which enhances data exchange between the mobile terminal and the data server. | 2015-12-24 |
20150373127 | METHODS AND APPARATUSES FOR RESTFUL BATCH SERVICES - Apparatuses, computer readable media, and methods are disclosed for supporting services at an application service layer (ASL). The method may include responding to receiving batched requests from an entity by processing the batched requests, and sending a response to the batched requests to the entity. The method may include sending a separate response to each request indicated in the batched request to the entity, or sending a batched response. Two or more batched requests may have the same operation and the operation may be only specified once. The operation may be determined based on a name of the batched requests or an attribute of the batched request. The request may be determined to be a batch request based on a name of the batched request, attributes associated with the batched request, or an address to which the batched request is addressed. The ASL may be a service capability layer. | 2015-12-24 |
20150373128 | AUTOMATIC DISCOVERY AND DOWNLOAD OF APPLICATION BASED ON LOCATION - In accordance with a first method embodiment of the present invention, a computer implemented method includes determining a location of a hand held computer system and responsive to the determining, downloading an application program specific for the location to the hand held computer system. The method may also include sending first information of the location to a second computer system and receiving, from the second computer system, the application program specific for the location. The method may further include sending second information identifying the hand held computer system to the second computer system and receiving, from the second computer system, the application program specific for the location, wherein the application program reflects a preference history of the hand held computer system. | 2015-12-24 |
20150373129 | AUTOMATIC DISCOVERY AND DOWNLOAD OF MEDIA CONTENT BASED ON LOCATION - In accordance with a first method embodiment of the present invention, a computer implemented method includes determining a location of a hand held computer system and responsive to the determining, downloading a media content specific for the location to the hand held computer system. The method may also include sending first information of the location to a second computer system and receiving, from the second computer system, the media content specific for the location. The method may further include sending second information identifying the hand held computer system to the second computer system and receiving, from the second computer system, the media content specific for the location, wherein the media content reflects a preference history of the hand held computer system. | 2015-12-24 |
20150373130 | DEVICE AND METHOD FOR CONNECTING CELEBRITIES AND FANS - Various aspects described herein relate to connecting fans and celebrities in a social networking environment. A fan profile can be associated with a celebrity profile in the social networking environment. Attendance of a device registered for the fan profile at an event defined for the celebrity profile can be determined. An opportunity for the fan profile to obtain an autograph related to the celebrity profile can be provided based at least in part on the determined attendance of the device. Distributions of locations or times related to the autograph and/or other autographs can be provided. | 2015-12-24 |
20150373131 | METHOD AND APPARATUS FOR OBTAINING AN IMAGE ASSOCIATED WITH A LOCATION OF A MOBILE TERMINAL - A method, apparatus and computer program product are provided in order to obtain an image from a remote computer with the image being associated with the current location of a mobile terminal via which a user provides input soliciting the image. In the context of a method, the user input representative of a request to obtain an image from a remote computer may be received. The method may then determine a current context including a location of a mobile terminal and may cause the current context to be transmitted to the remote computer. The method may also receive an image from the remote computer based upon the current context of the mobile terminal. In this regard, the image is associated with the location of the mobile terminal upon receiving the user input. The method may also cause the image received from the remote computer to be stored. | 2015-12-24 |
20150373132 | SEQUENTIAL BEHAVIOR-BASED CONTENT DELIVERY - Providing sequential behavior-based content may include detecting, using a processor, an event sequence involving at least one device of a user, wherein the event sequence includes a current event and a prior event, correlating, using the processor, the event sequence with a frequent sequential pattern selected from a plurality of frequent sequential patterns associated with the user, and predicting, using the processor, a next event for the user according to a plurality of ordered events specified by the selected frequent sequential pattern. Responsive to predicting the next event, content relating to the next event may be provided to the device using the processor. | 2015-12-24 |
20150373133 | DEVICE AND METHOD FOR PROCESSING SLICE DATA - The present disclosure discloses a device and method for processing slice data. The method comprises: sending a download request for slice data adjacent to the newest continuous data to a server, determining whether or not a adjacent slice interval is filled with the slice data returned by the server; if yes, inserting the returned slice data into a database, setting the displaying mark thereof as valid, setting the displaying mark of downloaded data between the adjacent slice interval and the next slice interval to the adjacent slice interval as valid, and deleting the adjacent slice interval from the database; if not, inserting the returned slice data into the database, setting the displaying mark thereof as valid, and amending the border of the adjacent slice interval. The technical scheme of the present disclosure can obtain slice data from the server and fill the slice data in a corresponding slice interval according to a recorded slice interval set, and the data displayed to users is always the newest continuous data. | 2015-12-24 |
20150373134 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - [Object] To reduce a communication load resulting from communication process to maintain connection with an information processing apparatus. | 2015-12-24 |
20150373135 | WIDE AREA NETWORK OPTIMIZATION - Wide Area Network optimization is described. In an embodiment, a first proxy server computer intercepts a first message from a client computer to a server computer along a routing path. The first proxy server computer modifying the first message to include an indication that the first proxy server computer is along the routing path. The first proxy server computer forwarding the first message to a next hop of the routing path. The first proxy server computer receiving a message from a second proxy server computer indicating that the second proxy server computer is along the routing path. The first proxy server computer, in response to receiving the second message, enabling a set of optimizations for traffic traveling between the client computer and the server computer. | 2015-12-24 |