12th week of 2014 patent applcation highlights part 71 |
Patent application number | Title | Published |
20140082650 | TOPOGRAPHIC FRAUD DETECTION - Methods and systems to detect topographic fraud are provided herein. The system includes a Cable Modem Termination System (CMTS) to periodically poll active cable modems and generate polling data. The system also includes a processor and a memory coupled to the CMTS. The processor is configured to, based on instructions in the memory, periodically determine a current geographic location for each polled cable modem based on the polling data from the CMTS, determine a geographic radius within which each polled cable modem is to be operated in and determine cable modems whose current geographic location is outside of their geographic radius. | 2014-03-20 |
20140082651 | Systems and Methods for Live Media Content Matching - Systems and methods for matching live media content are disclosed. At a server, obtaining first media content from a client device, herein the first media content corresponds to a portion of media content being played on the client device, and the first media content is associated with a predefined expiration time; obtaining second media content from one or more content feeds, wherein the second media content also corresponds to a portion of the media content being played on the client device; in accordance with a determination that the second media content corresponds to a portion of the media content that has been played on the client device: before the predefined expiration time, obtaining third media content corresponding to the media content being played on the client device, from the one or more content feeds; and comparing the first media content with the third media content. | 2014-03-20 |
20140082652 | DYNAMIC REBROADCAST SCHEDULING OF VIDEOS - Some embodiments include a method for managing rebroadcast of a previously broadcast video. The method includes a computer determining popularity of the previously broadcast video based, at least in part, on a number of requests to rebroadcast the previously broadcast video. The method includes the computer determining a popularity threshold based in part on demographics of viewers sending the number of requests to rebroadcast the previously broadcast video. The method includes the computer determining that the popularity of the previously broadcast video exceeds the popularity threshold, and in response, the computer determining a day of week and time of day to rebroadcast the previously broadcast video based in part on days of the week and times of day in which the requests were sent. | 2014-03-20 |
20140082653 | METHOD AND SYSTEM FOR COLLABORATIVE BROADCAST AND TIMESHIFTED VIEWING - A collaborative system for more efficiently viewing streamed content in a time shifted matter utilizes collaborative home set-top box (STB) home component (the home STB) and a cloud component (the cloud STB) and a receiving device, such as an antenna or cable component, all cooperatively shared among a community of users. The cloud STB may further comprise a network accessible distributed part and/or a cross licensed portion of other home STBs. The home STB may be connected to the cloud STB and other home STBs over any local or wide area network topology infrastructure, such as the Internet. A group of home STBs may be cross licensed to each other within a community of users sharing the same viewing rights to a collaboratively old copy of content retained either in the consort system or among a plurality of shared user systems. Various network infrastructure configurations and streaming techniques, including unicast, multicast, and upstream and downstream collaborative streaming, are proposed to optimize network bandwidth efficiency and increase viewing options. | 2014-03-20 |
20140082654 | METHOD AND SYSTEM FOR COLLABORATIVE BROADCAST AND TIMESHIFTED VIEWING - A collaborative system for more efficiently viewing streamed content in a time shifted matter utilizes collaborative home set-top box (STB) home component (the home STB) and a cloud component (the cloud STB) and a receiving device, such as an antenna or cable component, all cooperatively shared among a community of users. The cloud STB may further comprise a network accessible distributed part and/or a cross licensed portion of other home STBs. The home STB may be connected to the cloud STB and other home STBs over any local or wide area network topology infrastructure, such as the Internet. A group of home STBs may be cross licensed to each other within a community of users sharing the same viewing rights to a collaboratively old copy of content retained either in the consort system or among a plurality of shared user systems. Various network infrastructure configurations and streaming techniques, including unicast, multicast, and upstream and downstream collaborative streaming, are proposed to optimize network bandwidth efficiency and increase viewing options. | 2014-03-20 |
20140082655 | VIDEO DISPLAY APPARATUS AND OPERATING METHOD THEREOF - Provided are a video display device and a method of operating the same. The video display device request content recognition configuration information to a third party server that is not dependent on any single channel, and receives the content recognition configuration information from the third party server. The video display device extracts a plurality of content recognition configuration information items from the content recognition configuration information and configures the plurality of content recognition configuration information item in the video display device. The video display device obtains contents information of uncompressed content on the basis of the plurality of content recognition configuration information item, obtains an application on the basis of the content information, and executes the application. | 2014-03-20 |
20140082656 | DESCRAMBLING APPARATUS AND TELEVISION SYSTEM UTILIZING THE SAME - A descrambling apparatus includes a descrambling module and a one-time programmable module. The descrambling module descrambles an input data stream. When the one-time programmable module is in a first status, the descrambling module descrambles the input data stream by a first mode. When the one-time programmable module is in a second status, the descrambling module descrambles the input data stream by a second mode. | 2014-03-20 |
20140082657 | ON-DEMAND PROTECTION AND AUTHORIZATION OF PLAYBACK OF MEDIA ASSETS - On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a client for the digital media. The method also includes generating a protected copy of the digital media from the digital media and the intermediary data. The method also includes storing a description of the protected copy in a database and sending the protected copy to the client. The method also includes receiving a request from the client to access the digital media and reading the description from the database based on information in the request. The method also includes sending a response to the client, the response indicating whether the client is authorized to access the digital media, and the response including cryptographic data to decrypt the protected digital media if the client is authorized to access the digital media. | 2014-03-20 |
20140082658 | TERMINAL BASED ON CONDITIONAL ACCESS TECHNOLOGY - The terminal comprises a tuner, a security chip and a digital television terminal main chip. The tuner is used to receive cable television broadcast data through a cable for cable televisions, and transmit the received cable television broadcast data to the security chip. A key message required by CA is stored in the security chip. The security chip is used to extract stream media of a program needing to be played from the received cable television broadcast data, descramble the stream media according to the stored key message required by the CA, encrypt the descrambled stream media, and transmit the encrypted stream media to the digital television terminal main chip. The digital television terminal main chip is used to decrypt the received encrypted stream media, decode the decrypted stream media to obtain audio and video data, and output the audio and video data. | 2014-03-20 |
20140082659 | SYSTEMS AND METHODS FOR GENERATING PROGRESSIVE ADVERTISEMENT SCHEDULES IN MEDIA ASSETS - Methods and systems for generating progressive advertisement schedules in media assets. Advertisement schedules are generated for currently displayed media assets based at least in part on the advertisement schedules associated with media assets previously viewed by the user and the number of advertisements presented to a user while the user viewed the previous media asset. | 2014-03-20 |
20140082660 | AD INVENTORY MANAGEMENT SYSTEM - Estimating ad inventory in an online video streaming system accurately handles interdependencies among targeted attributes. The estimating includes determining a probability distribution of samples taken from electronic data records of ad impressions in an interactive online video streaming service, among a population comprising each different combination of targeted attributes recorded for each of the samples. In addition, the estimating may include populating an electronic data structure with data relating the each different combination of the targeted attributes to corresponding forecasted number of available impressions in a defined time period, based on the probability distribution and a forecasted total number of available impressions in the time period. Then, estimating the ad inventory is based on the electronic data structure and targeting attributes for an ad campaign, optionally including summing forecasted impressions for combinations of the targeted attributes that include all of the defined set of targeted attributes. | 2014-03-20 |
20140082661 | LOW LATENCY VIDEO STORYBOARD DELIVERY WITH SELECTABLE RESOLUTION LEVELS - A video storyboard delivery system is disclosed. The system receives, from a playback client executed on a user device, a request for a video including one or more user device parameters. The system obtains a storyboard manifest including information defining a storyboard associated with the video, wherein the information includes a plurality of storyboard resolution levels. Using the one or more user device parameters, a selection is made of one of the plurality of storyboard resolution levels from the storyboard manifest. The storyboard at the selected resolution level is delivered to the playback client. | 2014-03-20 |
20140082662 | DATA INSERTION APPARATUS AND METHODS FOR USE WITH COMPRESSED AUDIO/VIDEO DATA - Methods, apparatus, and articles of manufacture for performing data insertion in compressed audio/video data streams are disclosed. Example methods disclosed herein include receiving an input multi-program data stream including a first compressed media data stream associated with a media program and a second data stream containing descriptive information describing the media program, rearranging data in frames of the first compressed media data stream to form contiguous sequences of skip bytes at respective locations in the frames of the first compressed media data stream, extracting the descriptive information from the second data stream, inserting payload data prepared from the descriptive information at the locations of the contiguous sequences of skip bytes in the frames of the compressed media data stream, and recombining the second data stream with the compressed media stream after inserting the payload data to form an output multi-program data stream. | 2014-03-20 |
20140082663 | Methods for Identifying Video Segments and Displaying Contextually Targeted Content on a Connected Television - Systems and methods for identifying which video segment is being displayed on a screen of a television system. The video segment is identified by deriving data from the television signals, the derived data being indicative of the video segment being displayed on the screen. This feature can be used to extract a viewer's reaction (such as changing the channel) to a specific video segment (such as an advertisement) and reporting the extracted information as metrics. The systems and methods may further provide contextually targeted content to the television system. The contextual targeting is based on not only identification of the video segment being displayed, but also a determination concerning the playing time or offset time of the particular portion of the video segment being currently displayed. | 2014-03-20 |
20140082664 | Systems and methods for dealing with online activity based on delivery of a television advertisement - In a computer-implemented method, a selected online advertisement is automatically directed to, or online activity is automatically tracked and recorded from, an online user interface device which corresponds, at the time the advertisement is directed or the activity is tracked, to a first online access identifier. The advertisement is directed or the activity is tracked based on information from a user profile that references or includes a first set-top box identifier. That information is derived at least in part from automatically collected data related to user behavior with respect to at least one television advertisement delivered to a set-top box, which set-top box corresponds, at the time of that user behavior, to the first set-top box identifier. The first online access identifier is associated with the first set-top box identifier, by being referenced or included in the user profile, by being associated in a database, or otherwise. | 2014-03-20 |
20140082665 | HOME MEDIA SERVER CONTROL - New forms of entertainment can result from this method of selecting, identifying, and storing by a media producer of multi-media content as files to a storage medium within an editing platform. Generating, using an editing software program, a set of instructions and data for assembly of an edited program, the edited program including specified segments from the files of the multi-media content. Assembling the specified segments using the set of instructions and data to form the edited program. Storing the edited program on the editing platform. Analyzing, using a software program, endpoint frames of each segment in the edited program, the analysis resulting in analysis data stored on the editing platform. Distributing the information to a home media server. Emulating assembly of the edited program by the home media server using the information and a home media server editing program, the assembled edited program being stored in the home media server. | 2014-03-20 |
20140082666 | PROGRESS BAR FOR BRANCHED VIDEOS - A system for navigating and visualizing the progression of selectably presentable video content includes a progress indicator module for dynamically displaying the progression status of video content paths made up of selectably presentable video content segments. The system further includes an interactive control module for facilitating navigation along the video content paths. The progression status may be graphically represented in the form of a tree structure having linked video content segments forming the content paths. The control module may be used to navigation the video within this tree structure. | 2014-03-20 |
20140082667 | TELEVISION PROGRAM PLAYING CONTROL METHOD AND THE SYSTEM THEREOF - A television program playing control method and the system thereof are disclosed. The method includes the following steps: creating a television control interface which comprises a television program playing window and a message push window. The television program playing window is configured to play television program, and the message push window is configured to display push message acquired from a background server; while receiving a triggering command for the push message, acquire network link corresponding to the push message, and connect to internet according to the network link, and visit network object corresponding to the push message. It can expediently visit network while displaying television image, and through network push related network message to television users. | 2014-03-20 |
20140082668 | TELEVISION MESSAGE SYSTEM - A television message system is provided that allows users at user television equipment devices that are connected to a television distribution facility to transmit messages to each other relating to a television program or other suitable subject. The television message system permits users to participate in evaluations, contests, promotions, and surveys related to a television program while watching that television program. The television message system also permits users to compose and send a message to a television program entity. The television message system also allows a user to purchase a gift related to television programming for a recipient. The gift may be an electronic gift certificate for pay-per-view programming. The television message system may be based on an interactive television program guide or a set-top box application implemented on a set-top box. | 2014-03-20 |
20140082669 | System and Method of Providing an Interactive Menu Through Streaming Video - A method of providing a menu for video content is disclosed and may include delivering a looping video clip over a first video channel. The looping video clip may be configured to be displayed on a video plane. The method may also include delivering side channel data over a second video channel. The side channel data may include two or more navigable menu elements that may be configured to be displayed on a graphics overlay plane. | 2014-03-20 |
20140082670 | METHODS AND SYSTEMS FOR SELECTING OPTIMIZED VIEWING PORTIONS - Methods and systems for a media guidance application that can identify and display a portion of a media asset that is of interest to a user. In some embodiments, the media guidance application may extract a portion of the media asset that encompasses a particular main action sequence. The extracted portion may also include an amount of additional content (e.g., content immediately before or after the main action sequence) that the media guidance application determines is necessary for the user to understand the main action sequence. In some embodiments, the media guidance application may extract several media assets, so that a user may graze through the extracted portions in series. | 2014-03-20 |
20140082671 | METHOD AND DEVICE FOR SMART SELECTION OF TV CHANNELS - A method for smart selection of TV channels is disclosed. The method includes the following steps: receiving a first user command, obtaining the current time, and determining a preset time period based on the current time, and prompting a first list of recommended channels corresponding to the preset time period; the first list of recommended channels is determined by the following steps: obtaining the accumulated broadcasting duration of each channel by accumulating the historical broadcasting duration of each channel during the preset time period; ranking the channels according to their accumulated broadcasting duration, the channel with longer broadcasting duration being ranked in front of the channel with shorter broadcasting duration, based on which the first list of recommended channels is determined. A corresponding device is further provided. The device includes an acquisition module and a prompting module. | 2014-03-20 |
20140082672 | Metadata System for Real-Time Updates to Electronic Program Guides - Novel tools and techniques to enable more robust electronic program guides in television distribution systems. Some solutions can obtain data (e.g., from the Internet) about a program listed on an electronic program guide and integrate that data with electronic program guide. In some cases, this information can be obtained and/or updated dynamically, in real-time or near real-time, for example to provide, up-to-date information can be provided in the electronic program guide, rather than requiring the viewer to tune to an information channel. In some cases, the system can provide a generalized electronic program guide that can be rendered by the system to be displayed on a plurality of different devices. | 2014-03-20 |
20140082673 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing device | 2014-03-20 |
20140082674 | APPARATUS, SYSTEM, AND METHOD FOR PROCESSING DATA - Provided is a data processing apparatus and method that may initialize baseband frame data that is newly input, and may randomize the baseband frame data based on a byte unit. Also, provided is a data processing system and method that may configure baseband frame data by randomizing the baseband frame data based on the byte unit in performing mode adaptation and stream adaptation with respect to a received transport stream (TS) packet, and may perform channel encoding of the baseband frame data. | 2014-03-20 |
20140082675 | DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) BASED TRANSMISSION AND RECEPTION APPARATUS AND METHOD OPERABLE IN CIRCUMSTANCES OF LOW SIGNAL TO NOISE RATIO (SNR) - Provided is a digital video broadcasting-satellite-second generation (DVB-S2) based transmission and reception apparatus and method operable in circumstances of a low signal to noise ratio (SNR), the DVB-S2 based transmission and reception apparatus including a DVB-S2 based transmitter, a mapping unit to determine bit mapping based on at least one of a state of a transmission channel and an area to be applied, and a physical layer frame (PLframe) replica processing unit to repeat a PLframe in which a physical layer header (PLheader) corresponding to a spreading factor (SF) is inserted. | 2014-03-20 |
20140082676 | Interface For Wireless Data Transmission In A Motor Vehicle, And Computer Program Product - An interface for data transmission in a motor vehicle between a mobile data device ( | 2014-03-20 |
20140082677 | APPARATUS, SYSTEMS AND METHODS FOR REMOTE STORAGE OF MEDIA CONTENT EVENTS - Techniques for facilitating recording of media content events by media devices on remote storage devices are described. Some embodiments provide a remote storage manager as part of a media device, such as a set-top box. In one embodiment, the remote storage manager causes a media content event to be recorded on a remote persistent storage device by receiving the media content event from a program distributor, and then transmitting the media content event to the remote persistent storage device. In another embodiment, the remote storage manager instructs the remote persistent storage device to obtain the media content event from the program distributor, so that the remote persistent storage device can record the media content event without the media content event first being received by the remote storage manager. | 2014-03-20 |
20140082678 | VIDEO SERVER AND METHOD FOR RESTARTING REBUILDING - According to one embodiment, a video server includes an ingesting device, a storage controller, storage devices and a control processor. The control processor controls the ingesting device and the storage controller to store the video signal. When one of the storage devices is replaced, the storage controller restores redundant or divisional data and reconstructs data stored in the original storage devices. When the control processor receives a request for ingesting a video signal and sufficient resources for ingesting do not remain while the control processor causes the storage controller to reconstruct the data, the control processor causes the storage controller to suspend reconstruction, and controls the ingesting device and the storage controller to perform the ingesting. | 2014-03-20 |
20140082679 | LINEAR PROGRAMMING BASED DISTRIBUTED MULTIMEDIA STORAGE AND RETRIEVAL - Video on demand is orchestrated between systems by linear program (LP) based multimedia storage and retrieval. An LP based storage and retrieval system can partition multimedia data into an integral number of segments. Further, the LP based storage and retrieval system can store a first amount of the integral number of segments in a storage device of storage devices of a storage network in response to a determination that a storage size of the storage device satisfies a first condition with respect to the first amount of the integral number of segments. Furthermore, such system can store a segment of a second amount of the integral number of segments in a remote storage device of the remote storage devices in response to a determination that the segment satisfies a second condition with respect to a defined number of remote storage devices of the storage devices that have stored the segment. | 2014-03-20 |
20140082680 | CONTENT DISTRIBUTION SERVER SYSTEM AND METHOD FOR CONTROLLING THE SAME - According to an embodiment, a content delivery server system is provided with a timer, a buffer, a next transmission time generation part, an abnormality judgment part, and a transmission control part. The buffer holds contents for every session temporarily. The next transmission time generation part generates a next transmission time based on a time stamp added to the contents to be put on an IP packet of next transmission. The abnormality judgment part judges whether a difference between the next transmission time and the present time is greater than a first threshold value which is a positive value, and judges whether the difference is smaller than a second threshold value which is a negative value. The transmission control part performs a control not to transmit the IP packet when the difference between is greater than a first threshold value or is smaller than a second threshold value. | 2014-03-20 |
20140082681 | OPTIMIZED DELIVERY TECHNIQUES - Systems and methods are described that relate to on-demand compression for electronic data, such as media content, through a communication pathway. The communication pathway may be a configured to multicast media content to a plurality of end-users in a service group. In certain embodiments, the service group may comprise a service group node having a quadrature amplitude modulation device. In one exemplary method, it may be determined whether the amount of media content being transmitted meets a first utilization threshold. The determination may be based on, at least in part, by measurements taken at one or more electronic devices located throughout a network or system. If the first bandwidth utilization threshold is not met, media content may be transmitted in a first format. If the first bandwidth utilization threshold is met, at least a portion of the media content may be transmitted in a first optimized delivery technique. | 2014-03-20 |
20140082682 | SMART SET-TOP BOX AND OPERATING METHOD FOR PROVIDING SMART SERVICE AND DIGITAL TELEVISION SERVICE USING DEFAULT MEDIA PLAYER INCLUDED IN SINGLE OPERATING SYSTEM - A method of playing back media data in a single operating system that supports a smart service and digital television (DTV) service is provided. The method includes loading the single operating system that supports the smart service and the DTV service, receiving, by a default media player included in the single operating system from an application, a request for playback of a target media data, determining a type of an identifier (ID) of the target media data, selecting, based on the type of the ID of the target media data, one player from among a video-on-demand (VOD) player and a DTV player different from the default media player, and playing back the target media data by the selected player. | 2014-03-20 |
20140082683 | CHANNEL SWITCHING PROCESSING METHOD, SYSTEM, AND RELATED DEVICES - A channel switching processing method includes receiving, by a switching server, a channel switching request from a receiving end. When the switching server determines that current switching resource information does not meet a switching condition according to the channel switching request, the switching server performs an exception handling procedure and sends channel switching instruction information to the receiving end. The channel switching instruction information is configured to instruct the receiving end to perform a channel switching operation corresponding to the channel switching instruction information. | 2014-03-20 |
20140082684 | MEDIA PACKAGING - Described are methods, systems, and apparatus, including computer program products for packaging media. In some embodiments, the technology relates to a computer-implemented method of packaging media files. A list of one or more media asset IDs is received by a media packaging server. A packaging template is received by the media packaging server. One or more media files based on a media asset ID in the list of the one or more media asset IDs and the packaging template are retrieved, by the media packaging server. Metadata associated with the media asset ID based on the packaging template is retrieved by the media packaging server. The one or more media files and the metadata are packaged by the media packaging server into a delivery package in a packaging format indicated by the packaging template. | 2014-03-20 |
20140082685 | METHOD AND APPARATUS FOR ADJUSTING DATA TRANSMISSION RATE IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus for transmitting image data via a wireless channel, the method and apparatus involving dropping at least one pixel from every pixel block of the image data, so as to decrease a data rate of the image data, and transmitting the image data in which the at least one pixel is dropped. A method and apparatus for restoring image data via a wireless channel, the method and apparatus involving receiving the image data from which data values of at least one pixel is dropped, and restoring the dropped at least one pixel by referring to the data values of the at least one pixel. | 2014-03-20 |
20140082686 | CHARACTERIZING INGRESS NOISE - Methods and devices for characterization of repetitious noise in cable networks are disclosed. A frequency band of interest is identified, a time trace of a signal parameter within the frequency band is obtained, and an autocorrelation of the time trace is computed to detect repetitious noise. The repetition frequency can serve as an indicator of the noise source type, and thus it can assist in noise segmentation. | 2014-03-20 |
20140082687 | Method for Presenting Custom Content in Set Top Box and Set Top Box - A method for presenting a custom content in a set top box and a set top box are disclosed. The method includes checking a display cache and a flash memory of a set top box after the set top box is powered on, writing a custom content in the flash memory into the display cache if the display cache and the flash memory of the set top box are checked correct, controlling the custom content written into the display cache to be presented to a user on a video terminal, and, after the custom content written into the display cache is controlled to be presented to the user on the video terminal, checking a hardware device other than the display cache and the flash memory in the set top box, starting an operating system of the set top box, and performing network authentication. | 2014-03-20 |
20140082688 | RULE-BASED DERIVED-GROUP SECURITY DATA MANAGEMENT - Methods for rule-based group security data management and corresponding systems and computer-readable mediums. A method includes receiving a complex rule set corresponding to at least one electronic document, the complex rule set including a combination of granting rules, denying rules, and rule precedence. The method includes generating derived user groups according to the complex rule set. The method includes deriving grant rules for each electronic document according to the complex rule set to produce a derived grant rule set. The method includes storing the derived grant rules as associated with the electronic document. | 2014-03-20 |
20140082689 | CREATION OF SECURITY ROLES THROUGH USER WALKTHROUGH OF BUSINESS PROCESS WORKFLOW - A user interface is displayed to an administrator (or other user) and allows the administrator to walk through a workflow performed by a user in a given role. Data access steps performed in walking through the workflow are recorded and a set of permissions is identified, based upon the recorded workflow. The set of permissions corresponds to the role. | 2014-03-20 |
20140082690 | MOBILE COMPUTING SYSTEM FOR PROVIDING HIGH-SECURITY EXECUTION ENVIRONMENT - A mobile computing system for providing a high-security execution environment is provided. The mobile computing system separates execution environments in the same mobile device on the basis of virtualization technology and manages user-specific execution environments using the same hardware security module, thereby facilitating protection of personal privacy. | 2014-03-20 |
20140082691 | Anomalous Activity Detection - The disclosure addresses the detection of anomalous activity. Some embodiments are directed towards a system for receiving an indication relating to a plurality of controls, identification information associated with a responsible account, and instructions from a responsible account associated with the monitoring of thresholds of controls being monitored. The plurality of user account may be organized into groups based upon information relating to the user accounts, and instructions may be applied to the groups to create a dynamic security policy. | 2014-03-20 |
20140082692 | Stateful Reference Monitor - A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request. | 2014-03-20 |
20140082693 | UPDATING SECURITY BINDINGS IN A NETWORK DEVICE - A network device includes a security binding table. The network device is configured to couple to a network and configured to receive security information from a source device. A processor is included to compare the lookup portion of the received security information from the source device to the lookup portion of each entry of the security binding table and to compare the match portion of the received security information from the source device to the match portion of each entry of the security binding table to determine if there is a match, and to update the security binding table by adding an entry comprising the lookup portion and the match portion of the received security information from the source device when neither the lookup portion nor the match portion of the received security information from the source device matches any entry of the security binding table. | 2014-03-20 |
20140082694 | ANTIBOT MECHANISMS OPTIMIZED FOR MOBILE COMPUTING - A method of determining whether a response received from an electronic device is generated by a person or by an automated software. The method receives a set of capabilities of the electronic device for detecting a group of actions that include at least a gesture or a device movement. The method selects a set of actions based on the device capabilities. The method sends a request to the electronic device for performing the set of actions in the plurality of actions. The method, based on a result of the set of actions performed on the electronic device, determining whether the set of actions are performed by a human. | 2014-03-20 |
20140082695 | SECURE ACCOUNT CREATION - In one embodiment, non-transitory computer-readable medium stores instructions for establishing a trusted two-way communications session for account creation for an online store, which include instructions for causing a processor to perform operations comprising retrieving and verifying a signed configuration file from a server, requesting a communication session using the configuration file, receiving a payload of account creation forms from a network client, signing the payload according to the server configuration file, and sending the signed payload containing account creation information to the server. In one embodiment, a computer-implemented method comprises analyzing timestamps for requests for data forms for supplying account creation information for evidence of automated account creation activity and rejecting the request for the locator of the second account creation form if evidence of automated account creation activity is detected. Methods for secure account authentication and asset purchase are also disclosed. | 2014-03-20 |
20140082696 | DISTANCE BOUNDING PROTOCOL WITH MINIMAL VARIANCE PROCESSING - The method for communicating between a first device and a second device, the first and second devices being structured and configured for communicating via a communication channel by exchanging messages, comprises the steps of
| 2014-03-20 |
20140082697 | SYSTEM ENHANCEMENTS FOR ENABLING NON-3GPP OFFLOAD IN 3GPP - Methods and apparatuses for offloading traffic from a third generation partnership project (3GPP) access network to a non-3GPP access point (AP) are disclosed. A 3GPP access network entity may receive subscription information associated with a wireless transmit receive unit (WTRU). The 3GPP access network entity may further receive traffic associated with the WTRU. The 3GPP access network entity may further determine whether to offload the traffic to the non-3GPP AP based on the subscription information. The 3GPP access network entity may also forward the traffic to the non-3GPP AP based on its determination. | 2014-03-20 |
20140082698 | METHOD AND SYSTEM FOR CONNECTING MOBILE COMMUNICATION TERMINAL WITH ACCESS POINT - Disclosed is a method for connecting a mobile communication terminal with an access point located in a local area providing a Wireless Local Area Network (WLAN) service in which a server managing the access point compares Media Access Control (MAC) information of the mobile communication terminal or MAC information of the access point transferred from the mobile communication terminal through a mobile communication network with MAC information previously stored in the server and transfers network setting information required for connection to the access point to the mobile communication terminal if the MAC information of the mobile communication terminal or access point is identical to the MAC information previously stored in the server. | 2014-03-20 |
20140082699 | SYSTEMS AND METHODS FOR ASSOCIATING A VIRTUAL MACHINE WITH AN ACCESS CONTROL RIGHT - The present invention is related to associating a machine or virtual machine instance with an access control right in a cloud-based computing environment. In one aspect, the present invention relates to an apparatus for or a method of associating a machine or virtual machine instance with an access control right in a cloud-based computing environment. In various embodiments, the apparatus is capable of, and the method includes, the following: receiving, in a cloud-based computing environment, a request to perform an action; using an identifier for the machine or virtual machine instance to determine that the received request was sent by, or on behalf of, the machine or virtual machine instance; and identifying an access control right associated with the machine or virtual machine instance making the request, to determine whether to perform the action on behalf of, or grant access by, the machine or virtual machine instance. | 2014-03-20 |
20140082700 | INFORMATION PROCESSING APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND PROGRAM - An information processing apparatus for executing authentication processing, characterized by comprises: storage means for storing, in association with each other, an image, region information indicating a region included in the image, and word information indicating an object linked with the region; determination means for determining an image to be used for the authentication processing among the images stored in the storage means; display means for displaying the image determined by the determination means; specification means for specifying, in a case where a user designates a position within the image displayed by the display means, word information associated with region information of a region including the position; and authentication means for executing authentication processing using the word information specified by the specification means. | 2014-03-20 |
20140082701 | DYNAMICALLY CONFIGURABLE ONLINE DATA UPDATE SYSTEM - A data object update system provides a flexible framework that can be used to upgrade, renew, replace or supplement data objects that are provisioned in a large base of network-enabled devices that been deployed in the field to end users. The system has the flexibility to configure, for example, the following items, based on different requirements received from network operators: which device key and/or certificate is to be used to authenticate request messages from network-enabled devices before a specific data object update request is accepted into the system; which device identifier is to be used to authorize data object update requests; which device identifier is to be used for generating device specific data objects; and which protection mechanism is to be used to secure the delivery of data objects to network-enabled devices. | 2014-03-20 |
20140082702 | SYSTEMS AND METHODS FOR CONTROLLING AND COMMUNICATING WITH CONNECTED DEVICES - Systems and methods for controlling and communicating with electronic devices (connected devices) remotely through an Internet connection or other networks are disclosed. In some embodiments, a system of connected devices includes appliances, consumer electronics products, sensors, or modules intended to control devices attached to the connected devices, such as, for example, light bulbs or other appliances, through power outlets or other electrical or mechanical connections. A remote server may be able to receive signals directly from a user via input from a user device, or from a third party, and communication from the user or from third parties may be secured such that only the user and the third parties given explicit permission can control and communicate with the connected devices belonging to the user. | 2014-03-20 |
20140082703 | AUTHORIZATION METHOD, APPARATUS, AND SYSTEM - The present invention discloses an authorization method, apparatus, and system, and belongs to the field of communication technologies. The method includes: receiving information for accessing a third-party network application platform; generating a two-dimensional code corresponding to the third-party network application platform, and presenting the two-dimensional code in the third-party network application platform; and receiving information of the scanned two-dimensional code, and authorizing, according to the information of the scanned two-dimensional code, the third-party network application platform. After the information for accessing the third-party network application platform is received, authorization is performed on a third-party web site by generating a two-dimensional code corresponding to the third-party web site and according to information of the scanned two-dimensional code. The third-party web site can be authorized by only scanning the corresponding two-dimensional code, which is easy to operate and reduces operation time. | 2014-03-20 |
20140082704 | ACCESS MANAGEMENT FOR CONTROLLING ACCESS TO COMPUTER RESOURCES - A computer system to control access to computer resources of a computer data center. The computer system includes processors and program instructions stored on one or more computer-readable storage devices of the computer system. The stored program instructions include: (i) program instructions to determine that a request to access one of the computer resources is in response to a service request pertaining to the one computer resource targeted by the service request; and (ii) program instructions, responsive to the determination, to map the service request to one or more standard operating procedures to enable information embedded in the one or more standard operating procedures to be used to process the service request, assign a user to execute the service request, and grant the user the requested access of the one computer resource to enable the user to execute the service request. | 2014-03-20 |
20140082705 | SERVER, A SYSTEM, A METHOD, A COMPUTER PROGRAM AND A COMPUTER PROGRAM PRODUCT FOR ACCESSING A SERVER IN A COMPUTER NETWORK - The invention concerns a first server ( | 2014-03-20 |
20140082706 | FINE-GRAINED USER AUTHENTICATION AND ACTIVITY TRACKING - In one embodiment, the finer grained control may be in the form of controlling the validity period after which credentials need to be provided anew or access is denied. In another embodiment, the control may be provided by enabling the period of inactivity after which access is denied to be controlled. In yet another embodiment, techniques may be provided for enabling isolation of applications for a session. | 2014-03-20 |
20140082707 | SYSTEMS AND METHODS FOR NETWORK CONNECTED AUTHENTICATION - The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of a user using a connected device in the possession of the user. In an embodiment, the system includes a network connected authentication server system communicatively coupled to a network for access by a plurality of user devices to authenticate a plurality of users of one or more third party applications, and a user account database coupled to the network connected authentication server system to store account information including a username for each of the plurality of users. The network connected authentication server system is configured to pair a username to one or more user devices, receive an authentication request from one of the third party applications, notify at least one of the plurality of user devices that has been paired to the username for which the authentication request is received, receive an authentication response from at least one of the plurality of user devices that has been notified, and send the authentication response to the third party application from which the authentication request is received. | 2014-03-20 |
20140082708 | COMMUNICATION APPARATUS, ELECTRONIC MAIL TRANSMITTING METHOD, AND ELECTRONIC MAIL TRANSMITTING PROGRAM - A communication apparatus enhances security in transmitting electronic mail to a destination mail address without degrading operability. An MFP is connected to an authentication server and a mail server via a network. A user name and password are entered in a user name entry screen. The MFP requests the authentication server to authenticate the entered user name and password. When the user name and password are authenticated, the MFP is operable to acquire an e-mail address, a SMTP authentication user name, and a SMTP authentication password according to SMTP associated with the authenticated user name and password from the authentication server. The MFP requests the mail server to authenticate the acquired SMTP authentication user name and SMTP authentication password according to SMTP. When the SMTP authentication user name and the SMTP authentication password are authenticated, the MFP is operable to transmit e-mail to the mail server. | 2014-03-20 |
20140082709 | DYNAMIC PASSWORD AUTHENTICATION METHOD AND SYSTEM THEREOF - The present invention discloses a dynamic password authentication method and a system thereof. The method comprises: a server receives first information sent from the client, generates second information according to the first information, sets every transmission bit in the second information to be in corresponding brightness status or color status to obtain a third information and sends it to a client; the client transforms the third information into impulse optical signal and outputs it; a dynamic password device transforms the impulse optical signal into intermediate information, extracts part or all of it and transforms it into display information; the dynamic password device receives trigger information, generates a first dynamic password; the server generates a second dynamic password or a set of second dynamic passwords and verifies whether the first dynamic password is legitimate by it. Security of authentication is improved by the present invention. | 2014-03-20 |
20140082710 | METHOD FOR AUTHENTICATING AN OTP AND AN INSTRUMENT THEREFOR - A method for authenticating an OTP (one time password) and an instrument therefor, in which the method includes determining whether the OTP token is authenticated successfully, if the OTP token is not authenticated successfully, setting size of an authentication window to be a first predetermined time length and authenticating the obtained OTP according to the authentication window; if the OTP token is authenticated successfully, determining whether the interval between the authentication success time and the current system time is longer than a second predetermined time length, if yes, setting size of the authentication window to be a third predetermined time length and authenticating the obtained OTP according to the authentication window and the authentication success time, in which the third predetermined time length is shorter than the first predetermined time length; otherwise, setting size of the authentication window to be a fourth predetermined time length and authenticating the obtained OTP according to the authentication window and the authentication success time, in which the fourth time length is shorter than the third predetermined time length. The invention can ensure both the authentication success rate and the authentication security. | 2014-03-20 |
20140082711 | CREDENTIAL PROVIDER THAT ENCAPSULATES OTHER CREDENTIAL PROVIDERS - Systems, methods, and computer readable media for encapsulating multiple Windows® based credential providers (CPs) within a single wrapping CP are described. In general, CP credentials and fields from two or more encapsulated or wrapped CPs may be enumerated and aggregated in such a way that the order of fields from each CP is preserved, fields that may be used only once are identified and appear only once, and fields are given a new unique field identifier. The union of all such fields (minus duplicates of any one-use-only fields) may be used to generate a mapping so that the wrapping CP and CP credential may “pass-through” calls from the operating system's logon interface to the correct wrapped CP and CP credential. The disclosed techniques may be used, for example, to provide single sign-on functionality where a plurality of sign-on credentials may be used (e.g., user name/password and smart card PIN). | 2014-03-20 |
20140082712 | Systems and Methods for Authorization of Information Access - Systems and methods according to the present invention provide a proactive approach to controlling access to information that may be correlated with a governmentally issued personal identifier. Included are systems and methods for proactive control of information access and liability incursion. Further included are systems and methods for emulating information access to an authorized person. Generally, a method according to the present invention includes the steps of requesting verification from a subscriber at any time that information is requested from registered information holders and any time that liability may be incurred through registered information holders. In this way, the subscriber, rather than reacting to invasive information or identity theft, may proactively control access to such information, thereby preventing the theft in the first place. | 2014-03-20 |
20140082713 | System and Method for Location-Based Authentication - Systems and methods are provided for enhancing security by providing additional authentication factors. Prior to authentication, a user may enroll a device from which access to a service or application is authorized. During authentication, the authentication system may retrieve the location of the enrolled device and generate one or more questions that only a user in that location can answer. The user may additionally or alternatively enroll a movement signature with an authentication server as an authentication factor. The user may set a pattern for device movement. During authentication, the user moves the device in the pattern. The device then transmits the movement signature for authentication. | 2014-03-20 |
20140082714 | METHOD AND SYSTEM OF PROVIDING ACCESS POINT DATA ASSOCIATED WITH A NETWORK ACCESS POINT - A method includes sending a faked authentication request from a client device wherein the faked authentication request includes identification credentials. A faked authentication request indicates that a reply message in response to the faked authentication request is to include data for updating a directory on the client device. A reply message is received at the client device in response to the faked authentication request. The reply message includes data for updating the directory. The directory is updated based, at least in part, on the data for updating the directory. | 2014-03-20 |
20140082715 | MOBILE MULTIFACTOR SINGLE-SIGN-ON AUTHENTICATION - Features are disclosed for authentication of mobile device applications using a native, independent browser using a single-sign-on system. An authentication module within the mobile application can direct the mobile device's native browser to a URL to initiate authentication with an authentication appliance. The mobile browser can receive and store a browser-accessible token to indicate previous authentication performed by the user. The mobile application can receive from the application appliance and store a client application ID token that may be presented to network services for access. A second mobile device application may direct the same browser to the authentication appliance. The authentication appliance may inspect the persistent browser-accessible token and issue a second client application ID identity to the second application without collecting additional authentication information, or collecting additional authentication information that is different from the first authentication information. | 2014-03-20 |
20140082716 | ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, COMMUNICATION TERMINAL, AND SERVER - An access control method including: receiving a log information item indicating use history of electrical equipment that is used together with an intended product; receiving product information including information for identifying the intended product; storing the log information item received in the receiving of a log information item and the product information received in the receiving of product information, in association with each other; and controlling whether or not to allow access to the log information item based on the product information associated with the log information item when access to the log information item is attempted. | 2014-03-20 |
20140082717 | System and Method for Providing Secure Access to a Remote File - A method and system for providing secure access to a remote file is disclosed. According to one embodiment, a portable memory device containing a secure desktop is provided to a user. The user has a user device that removably accepts the portable memory device. The user is allowed to securely access a dedicated storage of the cloud storage system that is created at a request from an administrator. The secure desktop runs independently from a user desktop of the user device. The user's access to a local storage of the user device is blocked while the secure desktop is running. | 2014-03-20 |
20140082718 | METHOD AND APPARATUS FOR GENERATING A SECURITY TOKEN CARRIER - A method and an apparatus for generating a security token carrier, which belong to the field of data security, are disclosed. The method may include: generating multiple pieces of token information, establishing a relation which associates the token information with location information of a pre-set interactive security token carrier; obtaining security data which is set by a user for protecting the interactive security token carrier; and generating the interactive security token carrier by using the token information, the relation, the security data and public information of the interactive security token carrier. The apparatus may include: a token information processing module, a security data obtaining module and an interactive security token carrier generating module. | 2014-03-20 |
20140082719 | METHOD AND DEVICE FOR NETWORK COMMUNICATION MANAGEMENT - Method and device for managing one or more secure gateway virtual private network, VPN, devices ( | 2014-03-20 |
20140082720 | Method and System for Authentication of Device Using Hardware DNA - Methods and systems for authentication of a device are disclosed. An exemplary method includes transmitting an energy towards the device including a material, monitoring a response of the device to the transmitted energy, generating a signature of the device based on the response of the device to the transmitted energy, comparing the device signature to an enrolled signature for the device, and indicating that authentication of the device is successful when the generated signature matches the enrolled signature. An exemplary system includes a transmitter configured to transmit an energy towards the device, a receiver configured to monitor a response of the device, and a processor configured to generate a signature of the device based on the response of the device, compare the device signature to an enrolled signature for the device, and indicate that authentication of the device is successful when the generated signature matches the enrolled signature. | 2014-03-20 |
20140082721 | SECURED COMPUTING SYSTEM WITH ASYNCHRONOUS AUTHENTICATION - A computing device includes an input bridge, an output bridge, a processing core, and authentication logic. The input bridge is coupled to receive a sequence of data items for use by the device in execution of a program. The processing core is coupled to receive the data items from the input bridge and execute the program so as to cause the output bridge to output a signal in response to a given data item in the sequence, and the authentication logic is coupled to receive and authenticate the data items while the processing core executes the program, and to inhibit output of the signal by the output bridge until the given data item has been authenticated. | 2014-03-20 |
20140082722 | Computer Recovery or Return - A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner. | 2014-03-20 |
20140082723 | ACCESS CONTROL TO OPERATING MODULES OF AN OPERATING UNIT - The invention relates to an operating unit ( | 2014-03-20 |
20140082724 | METHODS AND APPARATUS TO PROTECT MEMORY REGIONS DURING LOW-POWER STATES - A disclosed example method involves when transitioning a processor system to a low-power mode, generating at least a first signature based on a data structure storing memory addresses of memory regions to be protected during the low-power mode. During a resume process of the processor system from the low-power mode, at least a second signature is generated based on the data structure storing the memory addresses of the memory regions to be protected during the low-power mode. When the first signature matches the second signature, the processor system resumes from the low-power mode. When the first signature does not match the second signature, an error is generated. | 2014-03-20 |
20140082725 | Systems, Methods, and Media for Outputting a Dataset Based Upon Anomaly Detection - Systems, methods, and media for outputting a dataset based upon anomaly detection are provided. In some embodiments, methods for outputting a dataset based upon anomaly detection: receive a training dataset having a plurality of n-grams, which plurality includes a first plurality of distinct training n-grams each being a first size; compute a first plurality of appearance frequencies, each for a corresponding one of the first plurality of distinct training n-grams; receive an input dataset including first input n-grams each being the first size; define a first window in the input dataset; identify as being first matching n-grams the first input n-grams in the first window that correspond to the first plurality of distinct training n-grams; compute a first anomaly detection score for the input dataset using the first matching n-grams and the first plurality of appearance frequencies; and output the input dataset based on the first anomaly detection score. | 2014-03-20 |
20140082726 | REAL-TIME CLASSIFICATION OF EMAIL MESSAGE TRAFFIC - A classification system has a classification server that receives data for an email and determines if the email message is suspicious, legitimate but failing authentication, forwarded or fully authenticated and legitimate when the domains are owned, or not owned, by the domain owner, Email messages are categorized and presented in a report that enables the email sender to identify and fix a network, malicious traffic, and legitimate messages that have failed authentication beyond control. It also highlights where everything is going well. | 2014-03-20 |
20140082727 | ELECTRONIC DEVCIE AND METHOD FOR MONITORING APPLICATION - An electronic device includes an operating system to determine hardware modules being used when an application of the electronic device is run. The electronic device stores a table recording hardware modules used by the running of each application obtained from a creditable service provider. The electronic device obtains the hardware modules being used by the operating system when an application is running, determines whether all the hardware modules being used are the hardware modules corresponding to the running application in the table if the running application is recorded in the table, and determines that the running application is a malicious application if not all of the hardware modules being used are the hardware modules corresponding to the running application in the table. The electronic device executes a safeguard operation to protect the electronic device when the running application is a malicious application. A related method is also provided. | 2014-03-20 |
20140082728 | DONGLE DEVICE FOR WIRELESS INTRUSION PREVENTION - Disclosed is a dongle device for wireless intrusion prevention, which can provide a wireless intrusion prevention service to a wireless access point in a wireless local area communication network. A dongle device for wireless intrusion prevention including an interface unit connected to an access point and configured to receive a data frame from the access point, a control unit configured to determine a security threat on the basis of the received data frame and generate prevention information if there is the security threat according to the determination result, and a storage unit configured to store information for security threat determination can make an existing wireless access point a wireless access point that can provide wireless intrusion prevention. | 2014-03-20 |
20140082729 | SYSTEM AND METHOD FOR ANALYZING REPACKAGED APPLICATION THROUGH RISK CALCULATION - The present invention relates to a system and method for analyzing a repackaged application through risk calculation, and more specifically, to a system and method for analyzing a repackaged application through risk calculation, which confirms existence of a malicious code by scoring whether or not an application installed in an Android smart phone is repackaged. | 2014-03-20 |
20140082730 | SYSTEM AND METHOD FOR CORRELATING HISTORICAL ATTACKS WITH DIVERSE INDICATORS TO GENERATE INDICATOR PROFILES FOR DETECTING AND PREDICTING FUTURE NETWORK ATTACKS - An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic characteristics using these indicators of potential attacks or anomalous behavior. The set of indicators is analyzed by supervised learning to automatically learn a decision rule which examines the temporal patterns in the coded values of the set of indicators to accurately detect and predict network attacks. The rules automatically evolve in response to new attacks as the system updates its rules periodically by analyzing new data and feedback signals about attacks associated with that data. To assist human operators, the system also provides human interpretable explanations of detection and prediction rules by pointing to indicators whose values contribute to a decision that there is an existing network attack or an imminent network attack. When such indictors are detected, an operator can take remediation actions. | 2014-03-20 |
20140082731 | Contextual Alert of an Invasion of a Computer System - Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion of the computer system is detected and a contextually appropriate alert is selected from a set of alerts. The alert is played immediately upon detection of the invasion so that the user is alerted to the invasion within close temporal proximity to the user's action that resulted in the invasion of the computer system. In addition, details of the invasion are logged to a diagnostic log file for later use by support personnel in repairing the computer system. | 2014-03-20 |
20140082732 | System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner - A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device. | 2014-03-20 |
20140082733 | METHODS AND SYSTEMS FOR EVALUATING SOFTWARE FOR KNOWN VULNERABILITIES - A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer device includes a memory device for storing data including data representing computing assets installed in the computer system and a processor in communication with the memory device. The VIR computer device is programmed to receive an asset identifier identifying a computing asset selected for evaluation and execute a query on at least one database storing security vulnerabilities, the query searching for security vulnerability data associated with the selected computing asset. The VIR computer device is further programmed to receive the security vulnerability data at the VIR computer device in response to the query. | 2014-03-20 |
20140082734 | CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES - Methods for server security verification include acquiring a public key associated with a received report that includes an indication regarding the presence of a vulnerability for each vulnerability, the report having been generated at a server; decrypting the received report using the public key; determining a level of server-side security based on the decrypted report using a processor; and reconfiguring a browser at the client responsive to the determined level of server-side security. | 2014-03-20 |
20140082735 | MINING ATTACK VECTORS FOR BLACK-BOX SECURITY TESTING - Black-box security testing for a Web application includes identifying infrastructure supporting the Web application, obtaining vulnerability data for the Web application from an external data source according to the infrastructure, deriving a test payload from the vulnerability data using a processor, and determining a type of vulnerability exploited by the test payload. An existing validation operation of a testing system is selected for validating a response from the Web application to the test payload according to the type of vulnerability. | 2014-03-20 |
20140082736 | CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES - Systems for server security verification include a report validation module configured to acquire a public key associated with a received report, where the received report was generated at a server, to decrypt the received report using the public key, and to determine a level of server-side security based on the decrypted report; and a processor configured to reconfigure a browser responsive to the determined level of server-side security. | 2014-03-20 |
20140082737 | MINING ATTACK VECTORS FOR BLACK-BOX SECURITY TESTING - Black-box security testing for a Web application includes identifying infrastructure supporting the Web application, obtaining vulnerability data for the Web application from an external data source according to the infrastructure, deriving a test payload from the vulnerability data using a processor, and determining a type of vulnerability exploited by the test payload. An existing validation operation of a testing system is selected for validating a response from the Web application to the test payload according to the type of vulnerability. | 2014-03-20 |
20140082738 | DYNAMIC RISK MANAGEMENT - A dynamic risk management system for operating systems that provides monitoring, detection, assessment, and follow-up action to reduce the risk whenever it rises. The system enables an operating system to protect itself automatically in dynamic environments. The risk management system monitors a diverse set of attributes of the system which determines the security state of the system and is indicative of the risk the system is under. Based on a specification of risk levels for the various attributes and for their combinations, the risk management system determines whether one or more actions are required to alleviate the overall risk to the system. | 2014-03-20 |
20140082739 | APPLICATION SECURITY TESTING - The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT. | 2014-03-20 |
20140082740 | COMPUTING SYSTEM WITH PRIVACY MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: an initialization module configured to generate initial sharing options; a rating analysis module, coupled to the initialization module, configured to generate a privacy score and a benefit score with a control unit for one or more of the initial sharing options; a mapping module, coupled to the rating analysis module, configured to generate a map based on the initial sharing options, the privacy score, and the benefit score; and a tuning module, coupled to the mapping module, configured to: analyze an initial distribution of the map, and generate the tuned sharing options based on the initial distribution for displaying on a device. | 2014-03-20 |
20140082741 | DATA PROTECTION SYSTEMS AND METHODS - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 2014-03-20 |
20140082742 | Message Filtering System - A message filtering system is provided including a message management unit and a message monitoring unit in communication with the message management unit. The message management unit is configured to send and receive message over a network and to route messages to the message monitoring unit based on a message source, and the message monitoring unit is configured to parse the message and locate identifiers in the message and to re-route the message based on the identifier located in the message. | 2014-03-20 |
20140082743 | PRIVACY OF LOCATION INFORMATION - An arrangement for providing privacy settings for determining whether location information for a subscriber can be provided to a requesting party is described. The privacy settings are at least partially based on presence information for the subscriber. A gateway mobile location centre (GMLC) selectively provides the location information regarding subscribers on request, in accordance with the privacy settings. | 2014-03-20 |
20140082744 | AUTOMATIC SHARING OF USER INTERACTIONS - The subject disclosure relates to a method comprising steps for receiving reference object information, wherein the reference object information is based on a first user's interaction with a content item, determining that a second user is interacting with the content item, receiving item object information, wherein the item object information is based on the second user's interaction with the content item and determining that the second user has access rights to the reference object information based on the second user and the second user's interaction with the content item. In certain aspects, the method can further comprise steps for providing at least a portion of the reference object information for an electronic device associated with the second user. Systems and computer-readable media are also provided. | 2014-03-20 |
20140082745 | CONTENT-DRIVEN SCREEN POLARIZATION WITH APPLICATION SESSIONS - The disclosure relates to rendering content on a display. An embodiment creates a plurality of sessions between the display and a content delineating device, determines, by the content delineating device, a sensitivity level of content, and renders content having a first sensitivity level in a first session and content having a second sensitivity level in a second session. | 2014-03-20 |
20140082746 | EXTENSIBLE PROTOCOL FOR LOW MEMORY AGENT - A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software) comprises multiple functional modules, including a loader module (CLM) that loads and gains control during POST, independent of the OS, an Adaptive Installer Module (AIM), and a Communications Driver Agent (CDA). Once control is handed to the CLM, it loads the AIM, which in turn locates, validates, decompresses and adapts the CDA for the detected OS environment. The CDA exists in two forms, a mini CDA that determines whether a full or current CDA is located somewhere on the device, and if not, to load the full-function CDA from a network; and a full-function CDA that is responsible for all communications between the device and the monitoring server. The servicing functions can be controlled by a remote server. | 2014-03-20 |
20140082747 | INFORMATION PROCESSING SYSTEM, OPERATING DEVICE, AND PROGRAM - An information processing system including an operating device and an information processing main body device, the operating device comprising: an application control unit configured to acquire function information of at least one of application program installed in the operation device; and a use-authority determination unit configured to receive the operation from the user and notice to the application control unit, the information processing main body device comprising a authentication unit configured to submit to the use-authority determination unit a user authentication result including a use-authority information, wherein the use-authority determination unit determines whether or not the user is allowed to use the at least one of the application program on the basis of the function information and the use-authority information. | 2014-03-20 |
20140082748 | USER INFORMATION MANAGEMENT APPARATUS AND USER INFORMATION MANAGEMENT METHOD - A user information management apparatus stores various types of user information on a user in a storage unit, causes a providing unit to provide a user with an access code used to access the user information on the user stored in the storage unit, and when receiving the access code from the facility device installed in a facility that provides a service, causes the transmitting unit to transmit the user information corresponding to the service provided by the facility having the facility device among the various types of the user information stored in the storage unit. | 2014-03-20 |
20140082749 | SYSTEMS AND METHODS FOR SECURE AND PERSISTENT RETENTION OF SENSITIVE INFORMATION - An information processing system provisions a client account for a user to enable a client computer associated with the user to store information in an elastic storage system and to prohibit the client computer, the information processing system, and the elastic storage system from altering and from deleting the stored information during an authorized retention period. Data messages are received from one or more client computers and include information that is required to be stored for the authorized retention period. That information is transmitted via one or more data communications networks to the elastic storage system for storage so that the stored information is non-rewriteable and non-erasable during the authorized retention period. The secure data center receives the retrieved copy and provides it to the user device. The elastic storage system permits deletion, modification, or destruction of the stored information only when a trusted independent third party having predetermined authentication information associated with the client account provides the predetermined authentication information to the elastic storage system. | 2014-03-20 |