24th week of 2013 patent applcation highlights part 67 |
Patent application number | Title | Published |
20130152123 | INTERACTIVE PRODUCT PLACEMENT SYSTEM AND METHOD THEREFOR - A method for presenting advertisements for commercial products in video productions, whereby the commercial product is placed in the video production as an element of the video production. A viewer is enabled to interact with the video production to select the product. Information is then displayed about the selected product; and the viewer is enabled to purchase the selected product. | 2013-06-13 |
20130152124 | CONTROLLING AD DELIVERY FOR VIDEO ON-DEMAND - Various embodiments related to delivery of advertising content for video on-demand are disclosed. One example embodiment comprises receiving a set of VOD metadata including a first configuration of ad avails to be included in a VOD content item. The first configuration specifies a first set of locations of ad avails and a size of each ad avail in the first configuration. The method further includes comparing the VOD metadata to a set of one or more policy rules specifying a second configuration of ad avails to be included in the VOD content item, the second configuration of ad avails specifying a second set of locations of ad avails and a size of each ad avail in the second configuration. The method further includes determining a number of advertisements to be included in the VOD content item based upon a result of the comparing and obtaining an ad decision. | 2013-06-13 |
20130152125 | METHOD AND SYSTEM FOR ADVERTISEMENT CHOICES USING A SECOND DISPLAY DURING CONTENT PLAYBACK - Systems and methods are disclosed that allow users to choose ads to be delivered while viewing content. In addition, the user can choose ads using a second display, thus not interrupting content viewing on a primary device. In this way, users may receive ads or ads within specific categories of their choosing. Ad choice may also take into account ads previously viewed, user preferences and interests, any purchasing history if available (including where items are merely browsed and not purchased, or where item barcodes are scanned, e.g., by a mobile phone camera), the content item playing during ad choice, previous content items played, interests or preferences determined from a social networking profile, and the like. User data as may be compiled is useful to advertisers and provides significant benefits to users because the ads displayed are highly likely to attract user interest upon playback. User choice provides similar benefits. | 2013-06-13 |
20130152126 | User control of replacement television advertisements inserted by a smart television - A method is performed using a smart TV, which receives from a television signal source device a television signal feed encoding primary television content and then presents that content. The smart TV receives data via the computer network, including first data representing a to-be-replaced portion of the primary television content and second data representing secondary television content. Using the second data, the smart TV automatically presents the secondary television content in place of the to-be-replaced television content. The method includes the smart TV: (a) automatically monitoring, during presentation of the secondary television content, the television signal feed and comparing it with the first data; and (b) automatically altering presentation of the secondary television content in accordance with a user-control action with respect to the television signal source device, in response to detecting any difference between the television signal feed and the first data indicative of that user-control action. | 2013-06-13 |
20130152127 | RECEIVING APPARATUS, DISPLAY CONTROL METHOD, BROADCASTING SYSTEM, AND COMPUTER PROGRAM - Disclosed herein is a receiving apparatus including: a broadcast reception block; a network connection block; an operation input block; a display block; a broadcast content display block; a network content processing block; a pseudo-data broadcast content processing block configured to process pseudo-data broadcast content having a first designation part and a second designation part, and a data broadcast content processing block. | 2013-06-13 |
20130152128 | CONTROLLING A VIEWING SESSION FOR A VIDEO PROGRAM - A method includes requesting, by a user device, video program related content. The video program related content includes content related to one or more video programs provided by a service provider. The method also includes receiving the video program related content. A selection of a video program from the one or more video programs is received. The video program is selected at a set top box. The method also includes controlling a viewing session for the video program using the user device. | 2013-06-13 |
20130152129 | POPULATING A USER INTERFACE DISPLAY WITH INFORMATION - A method of populating a series of tiles of an interactive user interface with information is disclosed. The interactive user interface is in a form of a visual display of a representation of an object having a surface contour, and the method includes the step of populating the tiles such that information of greater priority is initially populated in tiles that are most prominently displayed on the object and information of lesser priority is initially populated in tiles that are less prominently displayed on the object. Apparatus and a computer readable storage medium for performing the method are also disclosed. | 2013-06-13 |
20130152130 | PROGRAM GUIDE IMAGE OBJECTS FOR MEDIA CONTENT ACCESS SYSTEMS AND METHODS - An exemplary system includes a media content processing subsystem configured to provide a program guide including a matrix of cells associated with a plurality of media content instances, and a selector object within the program guide. The selector object is configured to select one of the cells such that the cells in the matrix include a selected cell and at least one unselected cell. The subsystem is further configured to provide at least one image object within the at least one unselected cell. The image object represents the media content instance associated with the unselected cell. In certain embodiments, the image object includes a video content stream. The subsystem is further configured to provide a graphical user interface to a display for presentation to a user, the graphical user interface including at least a portion of the program guide and the image object. | 2013-06-13 |
20130152131 | Method and user interface for accessing groups of media assets - Improved systems and methods to navigate, browse, search and/or playback digital media assets (e.g., media items) hosted on a media server are disclosed. One embodiment of the invention pertains to a user interface arrangement, such as a hierarchical menu system, that facilitates navigation, browsing and playing of media items remotely stored on a media server. The user interface arrangement enables user scrolling or browsing with respect to a list or set of information pertaining to media items, where the list or set can be expanded to include information for additional media items that are subsequently acquired. The user interface arrangement can also present and permit navigation of categorized media items. The user interface arrangement can be presented on a display device associated with a client device. In one embodiment, the display device can be a television and the client device can be an electronic apparatus that can couple to the media server via a network. | 2013-06-13 |
20130152132 | INTERACTIVE PROGRAM GUIDE NAVIGATOR MENU SYSTEM - An interactive program guide system is provided. The program guide system has a logically flat navigator menu structure made up of program guide categories and selectable program guide options. Program guide categories correspond to fairly broad groups of program guide features. Selectable program guide options correspond to more specific program guide features. Each program guide category has associated selectable program guide options. Program guide categories may be displayed in a row across the top of the display screen. Selectable program guide options may be displayed in the same column as the program guide category with which they are associated. A highlight region may be positioned on one of the selectable program guide options. The selectable program guide options may be scrolled using a pair of vertical cursors. Pressing a horizontal cursor while the highlight region is on one of the selectable program guide options causes a new program guide category and associated column of selectable program guide options to be displayed in place of the originally displayed program guide category and associated selectable program guide options. | 2013-06-13 |
20130152133 | PROGRAM GUIDE APPARATUS - A method acquires program guide information in an image signal receiver, and program guide method and apparatus using the same. In the program guide apparatus, information immediately required by a user is obtained first, and information of less preferential channels is obtained next, thus presenting a smooth interface to the user. The method of acquiring program guide information for channels includes acquiring the program guide information for each channel by scanning accessible channels while a received program is not displayed. The program guide apparatus includes a tuner tuning a channel, a program guide information detector, a memory, a key input, a microprocessor, and a character signal generator. | 2013-06-13 |
20130152134 | PROGRAM GUIDE APPARATUS - A method acquires program guide information in an image signal receiver, and program guide method and apparatus using the same. In the program guide apparatus, information immediately required by a user is obtained first, and information of less preferential channels is obtained next, thus presenting a smooth interface to the user. The method of acquiring program guide information for channels includes acquiring the program guide information for each channel by scanning accessible channels while a received program is not displayed. The program guide apparatus includes a tuner tuning a channel, a program guide information detector, a memory, a key input, a microprocessor, and a character signal generator. | 2013-06-13 |
20130152135 | NETWORK TV AND METHOD FOR OPERATING NETWORK TV - Provided is a method of operating a network TV. The method includes: displaying a TV-only page of an application selected by a user input; transmitting to a mobile terminal a mobile-only page mutually linked with the TV-only page; and controlling an operation of the application according to a user input transmitted from the mobile terminal. | 2013-06-13 |
20130152136 | PROGRAM GUIDE APPARATUS - A method acquires program guide information in an image signal receiver, and program guide method and apparatus using the same. In the program guide apparatus, information immediately required by a user is obtained first, and information of less preferential channels is obtained next, thus presenting a smooth interface to the user. The method of acquiring program guide information for channels includes acquiring the program guide information for each channel by scanning accessible channels while a received program is not displayed. The program guide apparatus includes a tuner tuning a channel, a program guide information detector, a memory, a key input, a microprocessor, and a character signal generator. | 2013-06-13 |
20130152137 | PROGRAM GUIDE APPARATUS - A method acquires program guide information in an image signal receiver, and program guide method and apparatus using the same. In the program guide apparatus, information immediately required by a user is obtained first, and information of less preferential channels is obtained next, thus presenting a smooth interface to the user. The method of acquiring program guide information for channels includes acquiring the program guide information for each channel by scanning accessible channels while a received program is not displayed. The program guide apparatus includes a tuner tuning a channel, a program guide information detector, a memory, a key input, a microprocessor, and a character signal generator. | 2013-06-13 |
20130152138 | IMAGE DISPLAY DEVICE AND METHOD FOR OPERATING SAME - The present invention relates to an image display device and to a method for operating same. The method for operating the image display device according to one embodiment of the present invention includes: replaying content; when a command for storing the replayed content exists, storing at least one portion of the replayed content; displaying a content object indicating the stored content; displaying objects indicating another user or electric device for an accessed network or another network linked to the accessed network; and, when a content object is dragged and dropped in a selected object among the objects indicating the other user or electronic device, transmitting content corresponding to a selected object and having been selected by a user or stored in a selected electronic device. Therefore, the present invention can enhance use convenience for users. | 2013-06-13 |
20130152139 | SECOND SCREEN METHODS AND ARRANGEMENTS - The present technology concerns cell phones and similar devices, and their use in conjunction with media content (electronic and physical) and other systems (e.g., televisions, digital video recorders, and electronic program directories). Some aspects of the technology particularly concern “second screen” applications that sense a television program being watched by a user, and present menus of complementary content on the phone touchscreen from which the user can select. This complementary content can include other video content, associated web pages, opportunities to buy merchandise related to the program, etc. This complementary content can be identified by a provider of the television program, or can be identified otherwise (e.g., by crowd-sourcing). In some embodiments, the phone instructs a remote DVR to record content of interest for later viewing. The technology also provides features for making TV watching a social experience—involving remote friends. A great number of other arrangements and details are also disclosed. | 2013-06-13 |
20130152140 | System and Method for Using a Set-Top Box Application to Diagnose Customer Premises Equipment - A device having a test module configured to connect with a server through a cellular telephone network and a wireless area network. The test module is also configured to initiate, in the server, a diagnostic test of an Internet Protocol television network and a set-top box device. The test module is further configured to receive information indicating problems with the Internet Protocol television network and the set-top box device, and to display the information on a display. | 2013-06-13 |
20130152141 | BILATERAL CONTROL SYSTEM AND METHOD OF A VEHICLE-USE FRONT SEAT AUDIO DEVICE AND A BACK SEAT ENTERTAINMENT DEVICE - The present invention is related to a bilateral control system and method of a vehicle-use front seat audio device and a back seat entertainment device according to the present invention, the system includes a vehicle-use front seat audio device, a back seat entertainment device and a connection cable, the control method is provided to copy the signals and pictures of the vehicle-use front seat audio device or the back seat entertainment device and transmit mutually by utilizing the connection cable as the bilateral transmission passageway, the signals and pictures may be mutually bilateral controlled and transmitted via the connection cable by controlling the physical keys or operating on the touch panel. | 2013-06-13 |
20130152142 | Playback of Audio/Video Content with Control Codes - A system and method for time-shifted viewing of broadcast television programs is disclosed. Simultaneous recording and playback are provided by using buffer storage as the source and destination of compressed or uncompressed digital video/audio programs, Full VCR-like control is provided for all playback within the buffer storage. Playback and control of recorded programs may be initiated by the user at any time after initiation of the broadcast program with simultaneous continuous recording of the ongoing live broadcast, Larger archival storage and removable is also provided for storing and building a library of programs. Viewer playback control data may be stored as part of the program or used as edit points prior to archival. Numerous options are provided for features such as continuous automatic recording in a circular buffer fashion, program archival, editing, Internet interfaces, multiple-channel recording and more. | 2013-06-13 |
20130152143 | SHARED LOCAL GOVERNMENT CHANNEL - A method, performed by a computer device, may include receiving content from a first local government entity; associating a virtual channel identifier with the received content; and transmitting the received content and the virtual channel identifier on a shared local government channel, wherein the shared local government channel includes content received from a second local government entity. | 2013-06-13 |
20130152144 | SYSTEM AND METHOD FOR SUPPLYING SUPPLEMENTAL AUDIO INFORMATION FOR BROADCAST TELEVISION PROGRAMS - A method, computer readable medium and an apparatus for providing supplemental information related to a character featured on a broadcast television program, wherein the supplemental information is not broadcast along with the broadcast television program. A viewer can request specific supplemental information associated with the broadcast television program through a telephone or electronic network interface. In some embodiments, a service controller transmits the requested supplemental information such that an audio component of the supplemental information does not conflict with the audio component of the broadcast television program. | 2013-06-13 |
20130152145 | SYSTEM AND METHOD FOR MULTI-STANDARD BROWSER FOR DIGITAL DEVICES - The present invention provides a method of rendering a thin client application in a network device, for parsing the internet data so as convert the internet data into a common data format which can be rendered in set-top box using any type of middleware. The invention would be equipped to handle any type of application and also would be cost-efficient to be developed in a middleware layer of a network device like set-top box. | 2013-06-13 |
20130152146 | METHODS, DEVICES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING INSTANT MESSAGING IN CONJUNCTION WITH AN AUDIOVISUAL, VIDEO, OR AUDIO PROGRAM - Methods, devices, and computer program products for providing instant messaging in conjunction with an audiovisual, video, or audio program are provided. The methods include providing an audiovisual, video, or audio program to a user. Viewer/listener input is received requesting activation of a program-based instant messaging function. A viewer/listener identifier corresponding to the viewer/listener is associated with a program identifier that uniquely identifies the audiovisual, video, or audio program being provided to the user to thereby generate a program viewer/listener record. The program viewer/listener record is transmitted to an electronic database. A list of other users who are viewing or listening to the program in addition to the viewer/listener is acquired from the electronic database. The list of other users is transmitted to the viewer/listener. | 2013-06-13 |
20130152147 | SYSTEMS AND METHODS FOR ASSOCIATING ADDITIONAL CONTENT WITH BROADBAND CONTENT - Systems and methods for associating additional content with broadband content are provided. A pairing between a customer premise device configured to output broadband content and a customer device may be identified by a service provider system. Information associated with content output by the customer premise device may be received by the service provider system from the customer premise device. Based at least in part upon an evaluation of the received information, the service provider system may identify additional content to be communicated to the customer device. The service provider system may then facilitate communication of the additional content to the customer device. | 2013-06-13 |
20130152148 | PEER TO PEER STREAMING OF DVR BUFFERED PROGRAM DATA - Various embodiments are directed to streaming DVR devices that can communicate over an Internet Protocol (IP) network with other streaming enabled DVR devices. Implementing a peer-to-peer type connection, one streaming enabled DVR device may be able to stream buffered video data to another streaming enable DVR device. Other embodiments are described and claimed. | 2013-06-13 |
20130152149 | APPARATUS AND METHOD OF PORTABLE TERMINAL FOR DUAL DISPLAY OF BROADCASTING RECEIVER BY HDMI SIGNAL - An apparatus and a method of a portable terminal for dual display of a broadcasting receiver by a High Definition Multimedia Interface (HDMI) signal are provided. The method includes receiving at least one input signal from a broadcasting receiver, generating an output signal based on the received input signal, and transmitting the output signal to the broadcasting receiver so that the output signal can be output from the broadcasting receiver. | 2013-06-13 |
20130152150 | METHOD, TRANSMISSION CENTER, BASE STATION AND SYSTEM FOR SENDING BROADCAST TELEVISION SIGNALS - A method, a transmission centre, a base station and a system for sending broadcast television signals can implement automatic operation and management for broadcast television emission. The method includes: the broadcast television transmission centre determines control information for controlling the work of each station, sends the corresponding control information to each station through a broadcast television networks, and instructs each base station to control its work according to the received control information. | 2013-06-13 |
20130152151 | HOUSE AMPLIFIER WITH RETURN PATH GATING - A house amplifier provides automatic gating to selectively block the return path signal in a cable network. The house amplifier includes ports connected to the cable network and to at least one home coaxial outlet. A forward signal path is coupled to pass a forward signal from the cable network. A reverse signal path is coupled to selectively pass a reverse signal from the home to the cable network. The reverse signal path includes a gate configured to block the reverse signal in response to a control signal. A detector circuit detects when the reverse signal is received and activates or deactivates the gate based on the detection. The detector circuit may include a timing circuit configured to provide a delay before deactivating the gate when the reverse signal is no longer detected. | 2013-06-13 |
20130152152 | METHOD AND APPARATUS FOR GENERATING THREE-DIMENSIONAL CONTENT BASED ON USER PREFERENCES - An approach is provided for enabling viewers to control the depth of three-dimensional content rendered via a set-top box. A 3D content platform receives a user input for specifying a user identifier and a mode of operation of a set-top box. A depth setting parameter is determined based on user profile information related to the user identifier. Content is then presented for display via the set-top box at the dept setting corresponding to the parameter. | 2013-06-13 |
20130152153 | SYSTEMS AND METHODS FOR PROVIDING SECURITY FOR SIP AND PBX COMMUNICATIONS - The present application is directed to systems and methods for providing security for session initiation protocol (SIP) services via a single device providing an SIP proxy and video conference bridge. A device deployed as a proxy between a first client and a second client receives an SIP request of the first client to establish a real-time communication with the second client. The device determines, based on application of a policy to the first SIP request, to deny the SIP request. The device receives a real-time communication protocol request, originated by the first client, to establish a real-time communication channel with the second client. The device identifies that the first client originating the real-time communication protocol request corresponds to the first client of the denied SIP request, and discards the real-time communication protocol request, at a transport layer of a network stack of the device, responsive to the identification. | 2013-06-13 |
20130152154 | Controlling the Release of Private Information Using Static Flow Analysis - A privacy control system is described herein for controlling dissemination of private information by a program. The privacy control system operates by performing static analysis to determine at least one flow within the program of private information, from a source to a sink The static analysis is particularly configured to identify two types of flow, including: (a) an unvetted flow of untampered private information from the source to the sink; and (b) a flow of tampered private information from the source to the sink, whether vetted or unvetted. The privacy control system then prompts the user to provide a privacy control decision regarding the flow. The privacy control decision governs whether actual data or anonymized data is provided to the sink, or whether the program is terminated. A runtime system then runs the program in accordance with the privacy control decision. | 2013-06-13 |
20130152155 | PROVIDING USER ATTRIBUTES TO COMPLETE AN ONLINE TRANSACTION - A first server device receives a request for attributes, of a user, from a second server device associated with a receiving entity. The first server device determines whether the receiving entity is entitled to receive the attributes, and authenticates an identity of the user. The first server device also identifies the attributes based on the identity when the receiving entity is entitled to receive the attributes, and transmits the identified attributes to the second server device. | 2013-06-13 |
20130152156 | VPN SUPPORT IN A LARGE FIREWALL CLUSTER - A firewall cluster comprises three or more firewall processing nodes, at least one of which is operable to establish a Virtual Private Network (VPN) network connection. A node is further operable to share VPN state information with two or more receiving nodes by sending broadcast message to the two or more nodes. | 2013-06-13 |
20130152157 | AUTOMATIC FILTERING IN SOCIAL NETWORKS - Embodiments of the present invention provide a method, system and computer program product for automated filtering of content viewing rights in a social network. In an embodiment of the invention, a method for automated filtering of content viewing rights in a social network includes selecting content directed for publication to different members of a social network executing in memory of a host server and computing a context for the content. The method additionally includes applying a rule to the context and to at least one member profile corresponding to one of the members of the social network in order to determine whether or not the content is to be blocked from viewing by the one of the members based upon a relationship between the member profile and the computed context. Thereafter, access to the content by the one of the members is permitted when permitted by the rule. | 2013-06-13 |
20130152158 | CONFIDENTIAL INFORMATION IDENTIFYING METHOD, INFORMATION PROCESSING APPARATUS, AND PROGRAM - An information processing apparatus includes a clustering unit configured to read messages from a log and to classify the read messages into clusters according to similarities of the messages; a variable portion finding unit configured to find a portion variable between messages; an attribute determination unit configured to estimate and determine a confidential attribute of the variable portion by using predefined rule; and an attribute estimation unit configured to, in a case where there is a portion whose confidential attribute is undeterminable by using the rules, estimate the confidential attribute of the portion having the undeterminable confidential attribute with use of either a correspondence between appearance locations in the messages, or a co-appearance relation of a portion having a determined confidential attribute and the portion having the undeterminable confidential attribute. | 2013-06-13 |
20130152159 | ENHANCED LIFECYCLE MANAGEMENT OF SECURITY MODULE - A method, computer program, apparatus and a secure module are described. By example, in the method there are steps of receiving a request from a first entity for a secure module to enter an unlock lifecycle state; requesting confirmation to enter the unlock lifecycle state; and if the request is confirmed, transitioning the secure module from a current lifecycle state to the unlock lifecycle state. | 2013-06-13 |
20130152160 | SYSTEMS AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA - Systems, methods, and devices configured to provide an intelligent cipher transfer object are provided. The intelligent cipher transfer object includes a set of participants protected by cloaking patterns. A portable dynamic rule set, which includes executable code for managing access to the protected set of participants, is included within the intelligent cipher transfer object. For a given user, the intelligent cipher transfer object may provide access to some of the participants while preventing access to other participants, based on the portable dynamic rule set. | 2013-06-13 |
20130152161 | METHOD AND DEVICE FOR CONTROLLING ACCESS TO OUT-OF-BAND CONTENTS FOR COMBINATION WITH TRUSTED CONTENTS, AND ASSOCIATED EQUIPMENTS - A method is intended for controlling access to out-of-band contents, provided by an out-of-band source, by at least one communication equipment connected to a managed source, providing trusted contents, and coupled to this out-of-band source. This method includes the steps of:
| 2013-06-13 |
20130152162 | METHOD AND SYSTEM FOR AUTHORIZING A LEVEL OF ACCESS OF A CLIENT TO A VIRTUAL PRIVATE NETWORK CONNECTION, BASED ON A CLIENT-SIDE ATTRIBUTE - An appliance and method for authorizing a level of access of a client to a virtual private network connection, based on a client-side attribute includes the step of establishing, by an appliance, a control connection with a client upon receiving a client request to establish a virtual private network connection with a network. The appliance transmits, via the control connection, a request to the client to evaluate at least one clause of a security string, the at least one clause including an expression associated with a client-side attribute. The client transmits, via the control connection, a response to the appliance comprising a result of evaluating the at least one clause by the client. The appliance assigns the client to an authorization group based on the result of evaluation of the at least one clause. | 2013-06-13 |
20130152163 | SECURITY SYSTEM FOR PROTECTING NETWORKS FROM VULNERABILITY EXPLOITS - A system for protecting networks from vulnerability exploits comprises a security engine operable to receive a packet destined for a user's network and forward the packet to at least one host virtual machine for processing. The security engine is further operable to forward the stored packet to the user's internal network based upon a result of the processed packet. A method of securing a network from vulnerability exploits is described. The method comprises receiving a packet destined for a user's internal network; forwarding the packet to at least one virtual machine based upon a virtual machine configuration table; processing the forwarded packet on the at least one virtual machine; and releasing the packet to the user's internal network based upon results of the processing. | 2013-06-13 |
20130152164 | Taking Configuration Management Data and Change Business Process Data Into Account With Regard to Authorization and Authentication Rules - An approach receives a request from a user, typically a change implementer, on a computer system. The request includes a user identifier and a requested action. A current timestamp corresponding to a computer system clock is retrieved. Scheduled changes are retrieved from a data store accessible by the processor. The current timestamp is compared to the scheduled change periods. The requested action is allowed if the comparison reveals that the current timestamp is within one of the retrieved scheduled changes, and the requested action is denied if the comparison reveals that the current timestamp is outside of the retrieved scheduled change periods. | 2013-06-13 |
20130152165 | END USER LICENSE AGREEMENTS ASSOCIATED WITH MESSAGES - A server computing device generates a first message that, when executed by a client computing device, will initiate a transaction between the server computing device and the client computing device. The server computing device attaches an end user license agreement to the first message, wherein the end user license agreement dictates terms to be accepted by the client computing device before the transaction is initiated. The server computing device transmits the first message to the client. Responsive to the client computing device accepting the end user license agreement, the server computing device receives an accept response message from the client computing device and transmits a second message to the client computing device. | 2013-06-13 |
20130152166 | System And Method For Trusted Pair Security - A system for and method of protecting a resource is presented. The system and method include a trusted pair consisting of an initiator and a receiver. The receiver faces outward and is connected to a network, such as the Internet. The initiator is connected to the protected resource. In establishing a connection between the initiator and the receiver, the initiator initiates all communications. This configuration simplifies environment management, improves security including access controls, and facilitates deployment of internet-facing resources by changing the traditional model of component-to-component connection. | 2013-06-13 |
20130152167 | APPARATUS AND METHOD FOR IDENTIFYING WIRELESS NETWORK PROVIDER IN WIRELESS COMMUNICATION SYSTEM - To check security of an Access Point (AP) in a wireless communication system, an operating method of a terminal includes, before completing connection to the AP, receiving a frame that informs the terminal of existence of the AP; extracting security test information from the frame; and testing the security of the AP using the security test information. | 2013-06-13 |
20130152168 | WIRELESS CONNECTION METHOD AND DEVICE - A method, a device, and an access point are provided for obtaining network access. A method, comprising: receiving, by an access point device and from wireless device, a request for authorization to access a network through the access point; determining, by the access point, a distance between the access point and the wireless device; determining, by the access point, that the distance is less than a first threshold distance; using, by the access point, a first process to grant access to the network through the access point when the distance is less than the first threshold distance; and using, by the access point, a second process to grant access to the network through the access point when the distance is not less than the first threshold distance, where the first process is a different and less complex for granting access to the network than the second process. | 2013-06-13 |
20130152169 | CONTROLLING ACCESS TO RESOURCES ON A NETWORK - Disclosed are various embodiments for controlling access to data on a network. In one embodiment, a proxy service receives a request from a user on a client device to access a quantity of enterprise resources served up by an enterprise device. In response, the proxy service determines whether the user on the client device has been authenticated to access the enterprise resources. The proxy service also determines whether the client device from which the user requested the access is authorized to access the enterprise resources. Responsive to the determination that the user is authentic and that the client device is authorized, the proxy service associates a set of approved enterprise access credentials with the request and facilitates the transmission of the requested enterprise resources to the client device. | 2013-06-13 |
20130152170 | Region Access Platform, Mobile Positioning Method and System - A region access platform is disclosed in the present invention. The region access platform is set to: receive a positioning request from a positioning client; authenticate the positioning client; and after the authentication is passed, obtain a positioning result locally or from a Mobile Positioning Center (MPC) and return the positioning result to the positioning client. A mobile positioning method is also disclosed in the present invention and includes: a region access platform receiving a positioning request from a positioning client, authenticating the positioning client, and after the authentication is passed, acquiring positioning result locally or from a MPC and returning the positioning result to the positioning client. A mobile positioning system is also disclosed in the present invention. The present invention can facilitate the management and maintenance and also facilitates the operator to carry out a service. | 2013-06-13 |
20130152171 | SYSTEM AND METHOD TO FACILITATE COMPLIANCE WITH COPPA FOR WEBSITE REGISTRATION - Embodiments of the present invention provide a third-party system that allows parents or authorized guardians to continually grant permissions to several websites and online services and provides a one-time-authentication process of the parent-child relationship. Through this system, the need to re-authenticate the parent-child relationship or for each online company to build their own authentication system and COPPA record keeping mechanisms can be reduced or eliminated. In addition, the embodiments provided herein may afford a service for managing COPPA compliance that is relatively easy for online companies to integrate into their online services and websites. | 2013-06-13 |
20130152172 | Entitled Data Cache Management - Systems and methods are disclosed for managing an entitled data cache. A data server may generate and send entitled data to a data cache server. The data cache server, a server that may be located nearer to the user within a data provider's computer network, may receive and cache the entitled data. A permission server may store user's permissions and transmit the user's permissions to the data server and the data cache server. Upon receiving a request for data, the data cache server may retrieve the requested data from the cache and send a subset of the cached data which matches the user's permissions to the user, without the need to request the data from the data server. | 2013-06-13 |
20130152173 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR CONTENT ACCESS AUTHORIZATION - An apparatus, computer-readable medium, and computer-implemented method for granting access to content are disclosed. An exemplary method includes receiving user credentials associated with a user from a device which has authorization to access content in a first content domain, determining whether the user associated with the user credentials has a license to access content in a second content domain, and granting temporary authorization to the device which allows it to access content in the second content domain based at least in part on the determination that the user associated with the user credentials has a license to access content in the second content domain. | 2013-06-13 |
20130152174 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR CONTENT ACCESS AUTHORIZATION - An apparatus, computer-readable medium, and computer-implemented method for obtaining access to content are disclosed. The method includes transmitting user credentials associated with a user of a device, the device having authorization to access content in a first content domain, and receiving temporary authorization for the device to access content in a second content domain based at least in part on a determination that the user associated with the user credentials has a license to access content in the second content domain. | 2013-06-13 |
20130152175 | MULTI-INTERFACE MOBILITY - Techniques for providing access to cloud services via a plurality of different network interfaces of a client device. In accordance with one example, during establishment of a communication session between the cloud computing system and the client device, an interface-independent identifier is provided to the client device via a first of the plurality of different network interfaces. Following determination to establish the communication session via the second network interface, the cloud computing system is configured to maintain a virtual environment associated with the communication session for a period of time. A message is received, via a second of the plurality of different network interfaces, from the client device that includes the interface-independent identifier. In response to the received interface-independent identifier, the communication session is re-established with the client device via the second network interface, thereby enabling access to the virtual environment maintained by the cloud computing system. | 2013-06-13 |
20130152176 | SECURE AUTHENTICATION - Apparatus, systems, and methods provide a mechanism to enhance the security of operating client devices with systems controlling secure data. Various embodiments include apparatus and methods to authenticate a communication session between a server and a client device without providing authentication tokens to the client device. Additional apparatus, systems, and methods are disclosed. | 2013-06-13 |
20130152177 | Method and Apparatus for Providing Personal Mobility Features in a Telecommunications Environment - Personal mobility, multiparty control, and device augmentation features are provided within a voice-over-Internet protocol environment, such as a distributed feature composition (DFC) telecommunications architecture. The personal mobility features allow a caller to be identified to a callee using a desired identifier in place of an identifier of the device from which a call is made. Such personal mobility features are made available in multiparty calling environments and after mid-call moves. Device augmentation features provide enhanced calling options to a device that may otherwise be unequipped to provide such options, thus enabling personal mobility and multiparty control features across a wide variety of telecommunications devices. | 2013-06-13 |
20130152178 | SECURE ENTERPRISE SERVICE DELIVERY - A device receives enterprise information associated with enterprises supported by a network, and determines enterprise identifiers for one or more enterprises identified in the enterprise information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the enterprise identifiers. | 2013-06-13 |
20130152179 | SYSTEM AND METHOD FOR USER AUTHENTICATION USING ONE-TIME IDENTIFICATION - A system for user authentication using OTIDs (one-time identifications), includes a client terminal configured to generate n number of OTIDs which is used in the user authentication, and sequentially select one of the generated n number of OTIDs to use the selected OTID as a user identification in each authentification session. Further, the system includes an authentication server configured to receive the generated n number of OTIDs from the client terminal to store same, when the one OTID selected from the n number of OTID and a secret key are transmitted, inquire the OTID in a DB (database), and determine whether a secret key which is associated with the inquired OTID and stored in the DB and the received secret key is matched to performing the user authentication. | 2013-06-13 |
20130152180 | DEVICE USING SECURE PROCESSING ZONE TO ESTABLISH TRUST FOR DIGITAL RIGHTS MANAGEMENT - A DRM client on a device establishes trust with a DRM server for playback of digital content. The client executes in a secure execution environment, and the process includes (1) securely loading loader code from secure programmable memory and verifying it using a digital signature scheme and first key securely stored in the device; (2) by the verified loader code, loading DRM client code from the memory and verifying it using a digital signature scheme and second key included in the loader code; (3) by the verified DRM client code (a) obtaining a domain key from the memory; (b) encrypting the domain key with a device identifier using a DRM system key included in the DRM client code; and (c) sending the encrypted domain key and device identifier to the DRM server, whereby the device becomes registered to receive content licenses via secure communications encrypted using the domain key. | 2013-06-13 |
20130152181 | PORTAL BASED CASE STATUS MANAGEMENT - Illustrative embodiments include a method, system, and computer program product for providing a current status of an update to a data record. A computer receives, from a portal in a backend application, a request for status of a previous request to perform the update to the data record. The computer determines a previously reported status from a previously completed processing operation on the data record in a workflow used for processing the previous request. The computer further determines a status of a presently incomplete processing operation on the data record in the workflow used for processing the previous request. The computer adding the previously reported status and the status of the presently incomplete processing operation to a status report, forming the current status. The computer transmits a response including the current status. | 2013-06-13 |
20130152182 | SYSTEM AND METHOD FOR ENABLING, VERIFICATION OF ONE OR MORE CREDENTIALS OF ENTITIES AND SHARING RESULT OF VERIFICATION - A system and method for enabling, verification of one or more credentials of entities and sharing result of verification is provided. The system is configured to receive request from an entity to verify a credential, verify the credential of the entity according to a predefined methodology and allow the entity to share at least a part of result of verification. | 2013-06-13 |
20130152183 | User Identity Management and Authentication in Network Environments - Systems, devices, and methods for sending, by a first computing device to a second computing device, a set of authentication information; determining, by the second computing device, a globally unique identifier associated with the set of authentication information; determining, by the first computing device, a set of properties associated with the received request based on the determined globally unique identifier; and establishing, by the first computing device, a communication channel to the second computing device, wherein the communication channel is established based on the determined set of properties. | 2013-06-13 |
20130152184 | METHOD OF PROVIDING SNS-GROUP INVITING SERVICE AND SNS SERVER THEREFOR - A method of providing a Social Networking Service (SNS) group inviting service via an SNS server, the method including receiving an SNS group invitation request containing second-user identification information, from a first device of a first user, generating first authentication information corresponding to the second-user identification information in response to the SNS group invitation request, receiving an SNS group joining request containing second authentication information, from a second device of a second user, and comparing the first authentication information and the second authentication information with each other and permitting the second device to join the SNS group. | 2013-06-13 |
20130152185 | TRANSACTION PROVISIONING FOR MOBILE WIRELESS COMMUNICATIONS DEVICES AND RELATED METHODS - A mobile communications device may include a memory, a transceiver, and a controller coupled with the memory and the transceiver. The controller may be capable of receiving first authentication data from a security token via communication with the security token, where the first authentication data is associated with an account. The controller may also be capable of transmitting the first authentication data via the transceiver, and receiving second authentication data via the transceiver, where the second authentication data is also associated with the account. The controller may be further capable of storing the second authentication data in the memory, and transmitting a transaction request using the second authentication data. | 2013-06-13 |
20130152186 | FILTERING KERNEL-MODE NETWORK COMMUNICATIONS - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system. | 2013-06-13 |
20130152187 | METHODS AND APPARATUS FOR MANAGING NETWORK TRAFFIC - Methods, apparatus, and computer readable storage media reduce or eliminate network traffic meeting criteria. In some aspects, network traffic transmitted by one or more source nodes to one or more destination nodes may comprise a denial of service attack against the destination node(s). At least a portion of the denial of service attack traffic may be reduced or eliminated with the disclosed methods and apparatus. In one aspect, a method of managing undesirable network traffic transmitted from a source node to a destination node over a communications network includes receiving a notification of a routing rule change, authenticating the notification, determining a network routing rule based on the notification, applying the network routing rule, determining a network path toward the source node, determining an entity based on the network path, and transmitting a notification of the routing rule change to the entity. | 2013-06-13 |
20130152188 | PORT ALLOCATION IN A FIREWALL CLUSTER - A firewall cluster having three or more firewall processing nodes sharing the same shared IP address. Port numbers are assigned to the firewall processing nodes within the cluster and are used to distinguish between traffic sent to the cluster. Each network connection is assigned a destination port number. Each node receives the network connection and its assigned port number and determines if the assigned destination port number matches one of its assigned port numbers. If so, the node processes the network connection. If the assigned destination port number does not match one of its assigned port numbers, the network connection is discarded. | 2013-06-13 |
20130152189 | AUTHENTICATION METHOD AND APPARATUS FOR DETECTING AND PREVENTING SOURCE ADDRESS SPOOFING PACKETS - An authentication apparatus for detecting and preventing a source address spoofing packet, includes a packet reception unit configured to receive a packet from a previous node or a user host; a self-assurance type ID generation unit configured to generate a self-assurance type ID of a source node of the received packet; and a self-assurance type ID verification unit configured to determine whether the source address of the received packet has been spoofed. Further, the authentication apparatus includes a white list storage unit configured to store a reliable source node; a black list storage unit configured to store an unreliable source node; and a packet transmission unit configured to transmit the packet whose source has been verified through the self-assurance type ID verification unit to a next network node. | 2013-06-13 |
20130152190 | Software Firewall Control - A software firewall that may be configured using rules specified for types of network interfaces rather than individual network interfaces. The network types may be specified with type identifiers that have a readily understandable meaning to a user, facilitating ease of configuring the firewall. The network types could include, for example, wired, wireless and remote access. A rule specified based on a network type can be implemented for network interfaces of that network type. The implementation may be performed automatically and may be updated based on network location awareness information. | 2013-06-13 |
20130152191 | TIMING MANAGEMENT IN A LARGE FIREWALL CLUSTER - A firewall cluster comprises three or more firewall processing nodes, which report primary node status based on the reporting node's membership in a preexisting cluster. A controller uses the reported status to assign a primary node in the distributed firewall cluster. Reported primary node status includes reported primary node eligibility if the node is a member of a preexisting cluster, reported primary node status comprising reporting primary node ineligibility if the node is not a member of a preexisting cluster, reported primary node status if the node is a primary node in a preexisting cluster, and reported primary node eligibility in a node that has timed out | 2013-06-13 |
20130152192 | RESTRICTING ACCESS TO THE RESOURCES OF A TERMINAL - A portable computer terminal having an operating system configured to switch from a first state to a second state in response to a first command from a user and to switch from the second state to the first state in response to a second command from the user, the second command including inputting an identification code of the user, the operating system being capable, in the first state, of causing execution in interactive manner of an application selected from a set of applications, the operating system being capable, in a second state, of causing execution in interactive manner of an application of said set of applications in compliance with an access condition, wherein the access condition is determined as a function of said first command. | 2013-06-13 |
20130152193 | METHOD FOR AUTHENTICATION WITH DYNAMIC AND RANDOM PASSWORDS - An approach is provided for a method for authentication with dynamic and random passwords, which comprises acts of obtaining a code equation initially from a person through an register page of a system, generating a starting code set and a result value, obtaining a password from the person through an authentication page of the system, determining the identity of the result value and the password, and granting the person for the authentication when the password and the result value are the same. The code equation is formed by at least one mathematical equation. The result value is the calculation result of the starting code set and the code equation. The starting code set is a set of number randomly generated by the system. Therefore, the present invention is able to prevent password cracking or recovering from data that has been stored in or transmitted by an apparatus. | 2013-06-13 |
20130152194 | SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES - A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit of consoles and capture the defined limit of consoles. An image console control is configured to receive a request to check-out one or more of the captured consoles in one of an exclusive mode and a shared mode and determine whether the check-out request was made by the owner. The console access controller is further configured to open the one or more captured consoles in the exclusive mode to the owner if the check-out request is made by the owner and recapturing the one ore more consoles in response to a check-in request from the owner. | 2013-06-13 |
20130152195 | Replay Attack Protection With Small State For Use In Secure Group Communication - A replay detection technique with “small state” (e.g., with relatively few bits of state information). A sending node generates a random number r | 2013-06-13 |
20130152196 | THROTTLING OF ROGUE ENTITIES TO PUSH NOTIFICATION SERVERS - Techniques for throttling of rogue entities to push notification servers are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store an application, the application maintaining a monitored domain table, the application maintaining an offending domain table, the application operative to receive an incoming request from a client in a domain, to detect harmful activity based on the request, and to respond to the harmful activity based on one or both of the monitored domain table and the offending domain table. Other embodiments are described and claimed. | 2013-06-13 |
20130152197 | EVENT DETECTION METHOD AND APPARATUS IN A DISTRIBUTED ENVIRONMENT - An event detection method in a distributed environment includes, when a non-parsable event occurred during grammar parsing, executing the following process until the first grammar parser module obtains a detection result, including the event that the current grammar parser module can not parse in a scheduling request as a next event to be detected and sending it to the grammar control module, scheduling, by the grammar control module, other grammar parser module as the target grammar parser module for further parsing based on the scheduling strategy table, performing grammar parsing based on the local parsing table in the scheduled target grammar parser module, returning parsing results to the grammar control module for further parsing when no non-parsable event is found; or repeating the above process with the target grammar parser module as a new current grammar parser module when an non-parsable event is found. | 2013-06-13 |
20130152198 | Anomaly Detection To Implement Security Protection of a Control System - An anomaly detection mechanism is provided that detects an anomaly in a control network, and includes an identifying unit to receive event information on an event that occurs, and to identify a group including a resource related to the event information by referring to a configuration management database for retaining dependence relationships between processes and resources including a control system; a policy storing unit to store one or more policies each of which associates one or more actions with a condition defining a situation suspected to have an anomaly; an adding unit to acquire group-related information needed for application to the one or more policies, and to add the acquired information to the event information; and a determining unit to apply the event information to the one or more policies and to determine the one or more actions associated with the matched condition as one or more actions to be taken. | 2013-06-13 |
20130152199 | Decoy Network Technology With Automatic Signature Generation for Intrusion Detection and Intrusion Prevention Systems - Improved methods and systems for decoy networks with automatic signature generation for intrusion detection and intrusion prevention systems. A modular decoy network with front-end monitor/intercept module(s) with a processing back-end that is separate from the protected network. The front-end presents a standard fully functional operating system that is a decoy so that the instigator of an attack is lead to believe a connection has been made to the protected network. The front-end includes a hidden sentinel kernal driver that monitors connections to the system and captures attack-identifying information. The captured information is sent to the processing module for report generation, data analysis and generation of an attack signature. The generated attack signature can then be applied to the library of signatures of the intrusion detection system or intrusion prevention system of the protected network to defend against network based attacks including zero-day attacks. | 2013-06-13 |
20130152200 | Predictive Heap Overflow Protection - A method for preventing malware attacks includes identifying a set of data whose malware status is not known to be safe, launching an application using the data, determining that one or more prior memory allocations have been created by the application, determining that a new memory allocation has been created by the application, comparing the new memory allocation to the prior memory allocations, and based on the comparison, determining whether the data includes malware. | 2013-06-13 |
20130152201 | Adjunct Computing Machine for Remediating Malware on Compromised Computing Machine - Described is a technology by which a malware-compromised machine, such as a personal computer is cleaned through the use of a functional adjunct machine, such as a mobile device (or vice-versa). The functional adjunct machine performs actions on behalf of the malware-compromised machine and/or to assist the remediation. This may include downloading antimalware-related data (e.g., an application, antimalware code, signature updates and/or the like) via a marketplace/application store, and transferring at least some of the data and/or programs to the compromised machine. Other actions may include using the functional adjunct machine to boot the malware-compromised machine into a non-compromised state and providing the data or programs to allow remediation of the malware while in this state. | 2013-06-13 |
20130152202 | APPARATUS AND METHOD FOR ANALYZING MALWARE IN DATA ANALYSIS SYSTEM - An apparatus and method for analyzing malware in a data analysis system are provided. The apparatus includes a data analysis unit and a controller. The data analysis unit sorts data into primary harmful data and primary harmless data using screening data information of malicious code information and virus information. The controller screens or deletes the primary harmful data, and sends a request for precision analysis of the primary harmless data to a server. The data analysis unit sorts secondary harmful data from the primary harmless data using the precision analysis result received from the server. | 2013-06-13 |
20130152203 | OPERATION OF A DUAL INSTRUCTION PIPE VIRUS CO-PROCESSOR - Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus processing content objects is provided. A content object is stored within a system memory by a general purpose processor using a virtual address. Most recently used entries of a page directory and a page table of the system memory are cached within a translation lookaside buffer (TLB) of a virus co-processor. Instructions are read from a virus signature memory of the co-processor. Those of a first type are assigned to a first of multiple instruction pipes of the co-processor. The first instruction pipe executes an instruction including accessing a portion of the content object by performing direct virtual memory addressing of the system memory using a physical address derived based on the virtual address and the TLB and comparing it to a string associated with the instruction. | 2013-06-13 |
20130152204 | INTERACTIVE ANALYSIS OF A SECURITY SPECIFICATION - Analyzing a security specification. An embodiment can include identifying a downgrader in a computer program under test. Testing on the downgrader can be performed in a first level of analysis. Responsive to the downgrader not passing the testing performed in the first level of analysis, a counter example for the downgrader can be automatically synthesized. Further, a test unit can be created for the downgrader using the counter example as an input parameter to the downgrader. The test unit can be executed to perform testing on the downgrader in a second level of analysis. Responsive to the downgrader passing the testing performed in the second level of analysis, a user can be prompted to simplify a model of the downgrader. | 2013-06-13 |
20130152205 | INTERACTIVE ANALYSIS OF A SECURITY SPECIFICATION - Analyzing a security specification. An embodiment can include identifying a downgrader in a computer program under test. Via a processor, testing on the downgrader can be performed in a first level of analysis. Responsive to the downgrader not passing the testing performed in the first level of analysis, a counter example for the downgrader can be automatically synthesized. Further, a test unit can be created for the downgrader using the counter example as an input parameter to the downgrader. The test unit can be executed to perform testing on the downgrader in a second level of analysis. Responsive to the downgrader passing the testing performed in the second level of analysis, a user can be prompted to simplify a model of the downgrader. | 2013-06-13 |
20130152206 | METHOD AND APPARATUS FOR PREVENTING UNAUTHORIZED ACCESS TO INFORMATION STORED IN A NON-VOLATILE MEMORY - A communications device for ensuring secure data transfer provided having an interface device for controlling data transfer, an integrated circuit coupled to the interface device and having a processor, a non-volatile memory for storing at least program code for the processor, a volatile memory, an input pin and an output pin; and an electrical conductor which electrically connects the input pin and the output pin. The electrical conductor passes through an external portion of the enclosure, e.g., a slot, which allows a user to easily sever the electrical conductor. In operation, a portion of the program code detects when the electrical conductor is severed and causes the program code in the non-volatile memory to be erased, data transfer via the interface device to be disabled, and power to the integrated circuit cut off to ensure that all information in volatile memory is erased. | 2013-06-13 |
20130152207 | DATA ACCESS REPORTING PLATFORM FOR SECURE ACTIVE MONITORING - Technologies pertaining to detecting accesses to monitored regions of memory and transmitting data to a protection system responsive to the detecting are described herein. A region of memory that includes objects in an object graph utilized by an operating system to determine which processes to execute and an order to execute such processes is monitored. If a process executing on a processor attempts to write to an object in the object graph, a field that is being written to is identified, and a determination is made regarding whether the field includes a pointer. Based upon whether the field includes a pointer, a type of write desirably undertaken by the object is ascertained, and an object event is transmitted to the protection system that informs the protection system of the type of write. | 2013-06-13 |
20130152208 | SECURITY KEY MANAGEMENT BASED ON SERVICE PACKAGING - A device receives application information associated with applications provided by a network, and determines service package identifiers for one or more applications identified in the application information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the service package identifiers. | 2013-06-13 |
20130152209 | Facilitating System Service Request Interactions for Hardware-Protected Applications - Described herein are implementations for providing a platform adaptation layer that enables applications to execute inside a user-mode hardware-protected isolation container while utilizing host platform resources that reside outside of the isolation container. The platform adaptation layer facilitates a system service request interaction between the application and the host platform. As part of the facilitating, a secure services component of the platform adaptation layer performs a security-relevant action. | 2013-06-13 |
20130152210 | COORDINATED WATERMARKING - Methods, devices and computer program products enable embedding and extraction of multiple watermark messages in a coordinated fashion to improve watermark transparency, robustness against impairments, security, and computational complexity of embedding and extraction of watermarks. Coordinated watermark embedding and extraction operations take advantage of a pre-defined relationship between the symbols of two watermark messages. The improved aspects of the watermarking system provide significant value to content owners, content distributors, and consumers at a small incremental cost. | 2013-06-13 |
20130152211 | USING SOCIAL SIGNALS TO IDENTIFY UNAUTHORIZED CONTENT ON A SOCIAL NETWORKING SYSTEM - A prediction is calculated to determine whether a content item posted on a social networking system infringes on copyrights or otherwise violates the system's terms of use. The predictions are generated using social signals that are based on social information surrounding the content item, such as the density of connections between the posting user and the viewing users, the profile information of the users, and the geographical separation between the users. The content item is disabled if the prediction indicates a violation and the violation can be verified. | 2013-06-13 |
20130152212 | DEPERSONALIZED SEARCH - Methods and systems for managing a search process are provided. One method includes receiving user information from a user application, the user information associated with a search provider maintaining search services and non-search services. The method further includes transmitting the user information to the search provider, and receiving one or more cookies from the search provider. The method also includes receiving a user request from a user application, the user request addressed to the search provider, comparing the user request to a list of non-search services maintained by the search provider, and, upon determining that the user request is associated with a search service, transmitting the user request to the search service without transmitting the one or more cookies. | 2013-06-13 |
20130152213 | APPARATUS, SYSTEM AND METHOD FOR PREVENTING DATA LOSS - A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface. | 2013-06-13 |
20130152214 | METHODS AND APPARATUS TO MITIGATE A DENIAL-OF-SERVICE ATTACK IN A VOICE OVER INTERNET PROTOCOL NETWORK - Methods and apparatus to mitigate a Denial-of-Service (DoS) attack in a voice over Internet protocol (VoIP) network are disclosed. An example method comprises receiving a communication session initiation message from a communication session endpoint, determining whether the communication session endpoint is associated with a probable DoS attack, and sending to the communication session endpoint a communication session initiation response message comprising a DoS header when the communication session endpoint is associated with the probable DoS attack. | 2013-06-13 |
20130152215 | SECURE LOCATION COLLECTION AND ANALYSIS SERVICE - A location collection system is described herein that provides a uniform facility for reporting location data to a cloud-based service from a variety of devices, and that provides a uniform facility for accessing aggregated location data collected by the cloud-based service. The system collects location information related to a user and reports the location information to a central service to provide a variety of useful services to the user. By providing a big, secure location vault in the cloud, the system enables big data analytics to be used to allow current and future questions to be asked of this data and to correlate this with other data to enable new scenarios not yet enabled. Thus, the location collection system provides a model to report, gather, and analyze location data across devices and users. | 2013-06-13 |
20130152216 | SYSTEMS AND METHODS FOR STORAGE OF USER INFORMATION AND FOR VERIFYING USER IDENTITY - Systems and methods are provided for maintaining user profile information and allowing for biometric verification of the user's identity. The user stores or links to personal, financial, etc. information in a web page. The user can limit the types of information that is available to others. The information can be downloaded to a portable device. The information can be used for financial transactions, where the financial information is transmitted to a web site, an ATM, credit card machine, etc. for financial approval. The information can also be used to find other users with similar interest. The user stores selected characteristics that they would like to find in other users, which are compared with other user's profiles. Matching users are aided in locating one another, where they may then prove their identity to each other by biometrically verifying that they are the owner of the user profile. | 2013-06-13 |
20130152217 | MACHINE-TO-MACHINE APPARATUS CAPABLE OF FACILITATING ADDITION OF EXTENSION FUNCTIONALITIES - Disclosed is a Machine-To-Machine (M2M) apparatus capable of facilitating addition of extension functionalities. The apparatus includes an input/output unit configured to connect with an external peripheral, a wireless communication unit configured to connect with the external peripheral or a control center (server), a storage unit configured to store details about the exchange of data between the input/output unit and the wireless communication unit, programs of one or more inherent functionalities and scripts of one or more extension functionalities, Application Programming Interfaces (APIs) and libraries configured to be provided to obtain a command code of each of the extension functionalities from the script of the extension functionality, control means configured to verify a right to use to determine whether to execute the command code, and an interpreter configured to provide an environment in which command codes of the APIs and libraries are sequentially executed, and to add the extension functionality. | 2013-06-13 |
20130152218 | COMPUTER-READABLE MEDIUM RECORDED WITH INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - An example information processing program that causes a computer of an information processing apparatus | 2013-06-13 |
20130152219 | ELECTRONIC DEVICE WITH FILE LOCKING FUNCTION AND METHOD THEREOF - An electronic device includes a data storage, a display unit, and a processing unit. The data storage stores a plurality of files. The display unit is operable to display drawing interfaces. The electronic device selects a file requiring locking, activates a drawing tool to generate the drawing interface in response to an file locking operation, records an image file drawn by the drawing tool as a locking password following a drawing operation on the drawing interface, and associates the file with the locking password to lock the file. | 2013-06-13 |
20130152220 | Method, Apparatus and System for Software Management - A method, apparatus and system are disclosed for software management, relating to the technical field of communications, and allowing software installed on a UPnP device by a service provider to be managed only by that service provider. The method comprises: receiving a software installation command sent by a first control device, installing software according to the software installation command and storing a first authentication information required during management of the software; receiving a software management command sent by a second control device, and acquiring a second authentication information corresponding to the software management command, which command is used in managing the software; when the second authentication information is consistent with the first authentication information, executing the software management command. | 2013-06-13 |
20130152221 | LIMITING CONCURRENT VIEWING SESSIONS ON MULTIPLE USER DEVICES - System devices include network interfaces to communicate with user devices associated with a user, memories for storing instructions to be executed by processors, and the processors. The processors are configured to execute the instructions to receive, from a first user device, among the user devices, a request for content; initiate an upload of the requested content to the first user device in response to the request; receive a request for a license key from the first user device in response to the initiation of the upload; determine whether a number of concurrent sessions with the user devices exceeds a maximum number; and send the license key to the first user device when the processors determine that the number of concurrent sessions does not exceed the maximum number. | 2013-06-13 |
20130152222 | TRANSGENIC FISH AND USES THEREOF - The present invention relates to a transgenic fish having at least one genomically integrated expression cassette containing a 5′-regulatory nucleotide sequence responsive to hormones, particularly estrogenic hormones, connected in a functional manner upstream of a nucleotide sequence encoding a reporter protein. The present invention further relates to methods of using the transgenic fish for various purposes, including, for example: (1) identifying estrogenic endocrine disruptors; (2) monitoring estrogen-like activity of test samples; (3) identifying anti-estrogenic endocrine disruptors; and (4) investigating the effects of endocrine disruptors on liver regeneration. Expression cassettes, host cells, and transgenic cells of aquatic animals are also disclosed. | 2013-06-13 |