35th week of 2014 patent applcation highlights part 77 |
Patent application number | Title | Published |
20140245308 | SYSTEM AND METHOD FOR SCHEDULING JOBS IN A MULTI-CORE PROCESSOR - A multi-core processor, comprising a plurality of processor cores to process jobs, a multicore navigator coupled to the plurality of processor cores to evaluate a job for atomicity and, based on determining the job to have atomicity, to determine whether there is an atomic wait queue associated with the job's atomicity. Based on there being an atomic wait queue associated with the job's atomicity, the multicore navigator is to push the job to the atomic wait queue. | 2014-08-28 |
20140245309 | SYSTEM AND METHOD FOR TRANSFORMING A QUEUE FROM NON-BLOCKING TO BLOCKING - A system and method can use continuation-passing to transform a queue from non-blocking to blocking. The non-blocking queue can maintain one or more idle workers in a thread pool that is not accessible from outside of the non-blocking queue. The continuation-passing can eliminate one or more serialization points in the non-blocking queue, and allows a caller to manage the one or more idle workers in the thread pool from outside of the non-blocking queue. | 2014-08-28 |
20140245310 | METHOD OF PERFORMING TASKS ON A PRODUCTION COMPUTER SYSTEM AND DATA PROCESSING SYSTEM - A method of performing tasks on a production computer includes retrieving a one task description file stored on a task computer and containing a description of a task on a production computer, transferring the task description file from the task computer to a production computer, causing the production computer to check that the file is associated with at least one task stored on the production computer, performing the task associated with the file in the production computer using the file, if the association check was successful, wherein the task computer has open ports and the production computer keeps the ports closed so that access by a user of a first user group to the task computer is arranged, but access by a user of the group to the production computer is prevented while steps above are performed in a predetermined operating state of the production computer. | 2014-08-28 |
20140245311 | ADAPTIVE PARTITIONING FOR OPERATING SYSTEM - An adaptive partition scheduler is a priority-based scheduler that also provides execution time guarantees (fair-share). Execution time guarantees apply to threads or groups of threads when the system is overloaded. When the system is not overloaded, threads are scheduled based strictly on priority, maintaining strict real-time behavior. When the system is overloaded, threads are scheduled based priority of threads that are in a ready state and based on the available guaranteed processor time budget of the adaptive partition associated with each thread. | 2014-08-28 |
20140245312 | SYSTEM AND METHOD FOR SUPPORTING COOPERATIVE CONCURRENCY IN A MIDDLEWARE MACHINE ENVIRONMENT - A system and method can support cooperative concurrency in a priority queue. The priority queue, which includes a calendar ring and a fast lane, can detect one or more threads that contend to claim one or more requests in the priority queue. Then, a victim thread can place a request in the fast lane in the priority queue, and release a contending thread, which proceeds to consume the request in the fast lane. | 2014-08-28 |
20140245313 | SYSTEM AND METHOD FOR USING A SEQUENCER IN A CONCURRENT PRIORITY QUEUE - A system and method can support a concurrent priority queue. The concurrent priority queue allows a plurality of threads to interact with the priority queue. The priority queue can use a sequencer to detect and order a plurality of threads that contend for one or more requests in the priority queue. Furthermore, the priority queue operates to reduce the contention among the plurality of threads. | 2014-08-28 |
20140245314 | METHODS AND APPARATUS FOR ACHIEVING THERMAL MANAGEMENT USING PROCESSING TASK SCHEDULING - The present invention provides apparatus and methods to perform thermal management in a computing environment. In one embodiment, thermal attributes are associated with operations and/or processing components, and the operations are scheduled for processing by the components so that a thermal threshold is not exceeded. In another embodiment, hot and cool queues are provided for selected operations, and the processing components can select operations from the appropriate queue so that the thermal threshold is not exceeded. | 2014-08-28 |
20140245315 | Logic For Synchronizing Multiple Tasks - Logic (also called “synchronizing logic”) in a co-processor (that provides an interface to memory) receives a signal (called a “declaration”) from each of a number of tasks, based on an initial determination of one or more paths (also called “code paths”) in an instruction stream (e.g. originating from a high-level software program or from low-level microcode) that a task is likely to follow. Once a task (also called “disabled” task) declares its lack of a future need to access a shared data, the synchronizing logic allows that shared data to be accessed by other tasks (also called “needy” tasks) that have indicated their need to access the same. Moreover, the synchronizing logic also allows the shared data to be accessed by the other needy tasks on completion of access of the shared data by a current task (assuming the current task was also a needy task). | 2014-08-28 |
20140245316 | Background Collective Operation Management In A Parallel Computer - Background collective operation management in a parallel computer, the parallel computer including one or more compute nodes operatively coupled for data communications over one or more data communications networks, including: determining, by a management availability module, whether a compute node in the parallel computer is available to perform a background collective operation management task; responsive to determining that the compute node is available to perform the background collective operation management task, determining, by the management availability module, whether the compute node has access to sufficient resources to perform the background collective operation management task; and responsive to determining that the compute node has access to sufficient resources to perform the background collective operation management task, initiating, by the management availability module, execution of the background collective operation management task. | 2014-08-28 |
20140245317 | Resource Sharing Using Process Delay - Methods and systems that reduce the number of instance of a shared resource needed for a processor to perform an operation and/or execute a process without impacting function are provided. a method of processing in a processor is provided. Aspects include determining that an operation to be performed by the processor will require the use of a shared resource. A command can be issued to cause a second operation to not use the shared resources N cycles later. The shared resource can then be used for a first aspect of the operation at cycle X and then used for a second aspect of the operation at cycle X+N. The second operation may be rescheduled according to embodiments. | 2014-08-28 |
20140245318 | DATA PROCESSING WORK ALLOCATION - A processor-implemented method, system, and/or computer program product allocates computer processing work. Input data, which has been deemed to be in need of processing, is stored in a first computer. A virtual machine that is capable of processing the input data is stored on a second computer. A first set of constraint rules contains constraint rules against moving the input data from the first computer, and a second set of constraint rules contains constraint rules against moving the virtual machine from the second computer. Based on the first and second constraint rules, either the virtual machine is moved to the first computer or the input data is moved to the second computer. | 2014-08-28 |
20140245319 | METHOD FOR ENABLING AN APPLICATION TO RUN ON A CLOUD COMPUTING SYSTEM - A method for enabling an application to run on a cloud computing system so that jobs that may be computed without having to modify the application. The method includes the step of programming a task processor that relates the parameters of each task of the job to the arguments that need to be passed to an application executable on a compute node in the cloud computing system that is used to process the task. The task processor runs on any compute node in the cloud computing system. | 2014-08-28 |
20140245320 | Self-Perpetuation of a Stochastically Varying Resource Pool - A computer-readable medium has encoded thereon software for maintaining a steady-state worth of an inhomogenous renewable resource pool. The software includes instructions for causing a data-processing system to evaluate an indicator of a historical worth of the resource pool, to determine a draw amount at least in part on the basis of this indicator, and to output data representative of that draw amount. | 2014-08-28 |
20140245321 | GENERATING TIMING SEQUENCE FOR ACTIVATING RESOURCES LINKED THROUGH TIME DEPENDENCY RELATIONSHIPS - A method, computer program product, and computer system for generating a timing sequence for activating resources linked through time dependency relationships. A Direct Acyclic Graph (DAG) includes nodes and directed edges. Each node represents a unique resource and is a predefined Recovery Time Objective (RTO) node or an undefined RTO node. Each directed edge directly connects two nodes and represents a time delay between the two nodes. The nodes are topologically sorted to order the nodes in a dependency sequence of ordered nodes. A corrected RTO is computed for each ordered node after which an estimated RTO is calculated as a calculated RTO for each remaining undefined RTO node. The ordered nodes in the dependency sequence are reordered according to an ascending order of the corrected RTO of the ordered nodes to form a timing sequence for activating the unique resources represented by the multiple nodes. | 2014-08-28 |
20140245322 | MESSAGING BUS RESIDING ON A MOBILE DEVICE - Systems and methods are disclosed for handling messages using a messaging bus residing on a mobile device. An example system includes a register module that registers first and second applications. The second application is executing on the mobile device. The system also includes a routing module that receives from the first application a communication in a first format for the second application, determines a second format associated with the second application, and determines whether the first format is different from the second format. When the first format is determined to be different from the second format, the routing module transmits to the second application the communication in the second format. The system further includes a translation module that when the first format is determined to be different from the second format, translates the communication in the first format to the second format. | 2014-08-28 |
20140245323 | MOBILE APPARATUS EXECUTING EFFICIENT DATAFLOW EXECUTION FOR MOBILE CONTEXT MONITORING, METHOD OF EXECUTING DATAFLOW USING THE SAME, METHOD OF CONTEXT MONITORING USING THE SAME AND CONTEXT MONITORING SYSTEM INCLUDING THE SAME - A mobile apparatus includes a processing planner and a plan processor. The processing planner generates a plurality of resource use plans in response to a context monitoring query (CMQ) of an application, and selects a final plan satisfying a request of the CMQ among the resource use plans. The plan processor executes the final plan. Accordingly, the mobile apparatus may support resource-efficient context monitoring. | 2014-08-28 |
20140245324 | ALL-TO-ALL MESSAGE EXCHANGE IN PARALLEL COMPUTING SYSTEMS - A method for all-to-all message exchange between program tasks including N>1 hierarchy levels l | 2014-08-28 |
20140245325 | LINK OPTIMIZATION FOR CALLOUT REQUEST MESSAGES - According to one aspect of the present disclosure, a method and technique for link optimization for callout request messages is disclosed. The method includes: monitoring a plurality of different time-based parameters for each of a plurality of links between a communication pipe of a host system and one or more service systems, the links used to send and receive callout request messages between one or more applications running on the host system and the services systems that process the callout request messages, the time-based parameters associated with different stages of callout request message processing by the communication pipe and the service systems; assessing a performance level of each of the plurality of links based on the time-based parameters; and dynamically distributing the callout request messages to select links of the plurality of links based on the performance assessment. | 2014-08-28 |
20140245326 | LOCAL MESSAGE QUEUE PROCESSING FOR CO-LOCATED WORKERS - Technologies are provided for locally processing queue requests from co-located workers. In some examples, information about the usage of remote datacenter queues by co-located workers may be used to determine one or more matched queues. Messages from local workers to a remote datacenter queue classified as a matched queue may be stored locally. Subsequently, local workers that request messages from matched queues may be provided with the locally-stored messages. | 2014-08-28 |
20140245327 | Method and System for Recovering Stranded Outbound Messages - A method for recovering and requeueing lost messages is disclosed. The lost messages are intended for delivery from a first computer program to a second computer program but are instead stranded in locations internal to the first program. The method extracts one or more of these stranded messages from the location internal to the first program, determines the original destination of each stranded message and delivers that message to the second program. Delivery of each message to the second program is facilitated by using message queues provided by middleware type software programs. The desired middleware program can be selected by the user of the method, and the method provides for the necessary formatting of each recovered message according to the selected middleware. Absent use of the present method, these stranded messages would not be routed to their original destinations. | 2014-08-28 |
20140245328 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE AND ITS CONTROL METHOD AND CONTROL PROGRAM - The information processing device, in which a plurality of applications are executable on different platforms respectively, includes a first operation processing means for processing, on a first platform, an operation instruction with respect to an application for the first platform operable on the first platform; a second operation processing means for processing, on a second platform different from the first platform, an operation instruction with respect to an application for the second platform operable on the second platform; and an operation control means, operable on a given platform, for activating the first operation processing means or the second operation processing means and establishing communications, based on whether an activated application is for the first platform or the second platform. The first operation processing means or the second operation processing means processes an operation instruction with respect to the application on the platform on which the activated application is operable. | 2014-08-28 |
20140245329 | INFORMATION PROCESSING DEVICE AND PROGRAM - An information-processing device includes: a storage unit that stores parameter types used in executing application proms, each parameter type associated with an identifier of an application program; a setting unit that sets a value for a parameter used in executing a first application; a determination unit that determines, based on an association between the identifiers and parameter types, which association is stored in the storage unit, at least one second application program that uses a parameter of a parameter type the same as a parameter type for which a value is set by the setting unit; and an incorporating unit that incorporates the value for the parameter set by the setting unit into a value for a parameter used in executing the at least one second application program determined by the determination unit. | 2014-08-28 |
20140245330 | TILT ADJUSTING APPARATUS AND OPTICAL DISC DRIVE USING THE SAME - Provided is a tilt adjusting apparatus of an optical disc drive for adjusting a tilt of an optical pickup unit. The tilt adjusting apparatus includes an optical pickup unit moving in a radial direction of the disc, along first and second guide shafts. The tilt adjusting unit also includes a fixing support unit that fixes the first guide shaft and an adjustment supporting unit that supports the second guide shaft and enables the height of both ends of the second guide shaft to be adjusted. | 2014-08-28 |
20140245331 | BEAM CONTROLLING METHOD AND OPTICAL PICKUP DEVICE FOR PERFORMING THE METHOD - Provided is an optical pickup device that compensates for an aberration caused by a beam splitter. When a beam of light is reflected from a disc and proceeds towards a beam splitter, the beam splitter is designed to allow the reflected beam to pass therethrough. However, the beam splitter can cause an astigmatism in the reflected beam due to diffraction. According to various aspects herein, an optical pickup device may include a compensation device that generates an inverse astigmatism to compensate for the astigmatism generated by the beam splitter. | 2014-08-28 |
20140245332 | COOLING APPARATUS COMBINED WITH OPTICAL DISK DRIVE MODULE - Provided is a cooling apparatus of a portable computer. The cooling apparatus includes one or more ventilation holes formed on the body thereof, and a cooling fan module mounted in the body. An optical disk drive (ODD) module mounted in the body drives the cooling fan module thereby reducing power consumption of the cooling module. | 2014-08-28 |
20140245333 | APPARATUS AND METHOD FOR FOCUSING A LASER BEAM ON AN OPTICAL DISC - Provided are a method and apparatus for focusing a laser beam on an optical disc. According to various aspects, the apparatus may include an objective lens which has a numerical aperture below what is standardized for the optical disc. In addition, a collimating lens which is used to focus a laser beam on the objective lens may be positioned at a fixed location. Despite the fixed location, the apparatus may support data recording/reproducing on multiple layers of the optical disc. | 2014-08-28 |
20140245334 | PERSONAL VIDEOS AGGREGATION - Media content programming and portions of the media content programming are aggregated and communicated via a single communication channel based on a user profile. Various channels of video content are selected for viewing content. A channel is configured to communicate various programming according to video content and/or a media source. The channel can be configured with video content from media sources such as from various broadcast channels, news feeds, web page feeds, social network feeds, online subscription services, and the like. User profile data provides access to one or more of the media sources for video content. The user profile can include user preferences for content, times and/or media sources from which the content is viewed from. Multiple personalized channels can therefore be configured and personalized according to the user profile. | 2014-08-28 |
20140245335 | Environment Object Recognition - Methods, systems, and devices for displaying additional or targeted content to a user are disclosed. An image or data capture device associated with a display device may capture an image of a space associated with the user or capture data related to what is being viewed by the viewer's eyes. Objects in the captured image or objects being viewed may be recognized, including any identifiable image, item, detail, or article and the like. A recognized object may then be compared to a target list to determine a match. If matched, and if there is additional content associated with the target object, the additional content may be presented to the user. | 2014-08-28 |
20140245336 | FAVORITE MEDIA PROGRAM SCENES SYSTEMS AND METHODS - An exemplary method includes a media program distribution service system 1) receiving data representative of a plurality of scene tags specifying one or more media program scenes tagged by a plurality of end users of a media program distribution service, 2) aggregating the plurality of scene tags, 3) determining, based on a favorite scenes determination heuristic and the aggregate scene tags, a set of one or more favorite scenes that are most popular among the plurality of end users of the media program distribution service, and 4) providing, based on the determined set of one or more favorite scenes, a favorite scene based feature of the media program distribution service. Corresponding systems and methods are also disclosed. | 2014-08-28 |
20140245337 | Proxy Analytics - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for analyzing behavioral data. In one aspect, a method includes receiving a request for television reporting sample data from a client device. The request includes filtering criteria. The television reporting data comprises channel tune event data and viewership data. In response to receiving the request, processing the television reporting data to identify filtered data from the television reporting data satisfying the filtering criteria; processing the filtered data to generate filtered sample data; and associating the filtered sample data with channel tune event data and viewership data to generate the television reporting sample data. The method also includes providing the television reporting sample data to the client device and receiving processing parameters from the client device, and, in response to receiving the processing parameters, processing the filtered data based on the processing parameters to generate reporting data metric results. | 2014-08-28 |
20140245338 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROVISION DEVICE, AND INFORMATION PROVISION SYSTEM - An ACR service is realized by an information provision server which has not prepared feature point information of a sub sound because only the feature point information is extracted from a main sound and an inquiry is made to the information provision server even when the sub sound is listened to in a client device. In addition, even when content that has a main sound and a plurality of pieces of audio information is distributed, it is not necessary for the information provision server to prepare feature point information of sub sounds, and the capacity of the database may not increase. | 2014-08-28 |
20140245339 | SYSTEM AND METHOD FOR AUTOMATIC CONTENT PROGRAM DISCOVERY - A system for program information discovery is described. A method and a device for generating and inserting a watermark for such program information discovery into a program signal to be rendered are disclosed, along with the corresponding method and device for watermark detection and decoding from the rendered program signals. Watermark, which carries channel/program information, is encoded and embedded at the set top box where the program streams are received and decoded for rendering. Second screen devices are employed for watermark detection and decoding by capturing the render program signals which has the watermark embedded. The extracted watermark information may be sent to information servers for more detailed channel/program information. | 2014-08-28 |
20140245340 | SYSTEMS AND METHODS FOR THIRD-PARTY AGGREGATED VIDEO RATINGS - A computer implemented method for providing a third-party video content rating unit to a client device, is disclosed. A web browser running on the client device requests video content from a affiliate video content server. The media player running on the client device receives a data stream of the video content from the affiliate video content server, renders the video content and sends a request for the third-party video content rating unit to a third-party ad content server once the video content has been completely rendered. The third-party ad content server receives the request for the third-party video content rating unit, sends the third-party video content rating unit to the client device and streams advertising content to the third-party video content rating unit. The third party video content rating unit is configured to be rendered on top of the media player. | 2014-08-28 |
20140245341 | Extending Blackout Control - Systems and methods for blackout management in media distribution systems may include a central data center in a service provider's domain. The central data server may coordinate with a blackout manager that implements control features for blackout. In contrast to (or to supplement) blackout control solutions that require integrated receiver decoders (IRD)s to be physically installed at each of the regional headends in the service provider network, the blackout manager may provide three functions: 1) a Virtual IRD (VIRD) function 2) access control functions via access control component, and 3) VIRD-to-EndPoint mapping function in the linkage manager. | 2014-08-28 |
20140245342 | System and/or Method for Distributing Media Content and Providing an Option to Maintain an Advertising Experience - The subject matter disclosed herein relates to distribution of media content and a system and method for presenting a user-selectable option to permit a user to change a setting for an advertising experience during presentation of such an advertising experience. | 2014-08-28 |
20140245343 | SYSTEMS AND METHODS FOR DETERMINING SUBSCRIPTION DATA - A media guidance application is provided by which users can view program listings associated with programming that the user may access using other user equipment devices. The media guidance application, implemented on, for example, a remote system, may determine through communications with television equipment whether or not the television equipment is authorized to provide a particular package of television programming to be viewed by the user. For example, an online program guide application may determine whether or not television equipment allows a user to view particular channels and, based on that determination, proceed to determine what packages of programming the user subscribes to. A customized program guide may then be displayed based on what programming the user subscribes to on various systems. | 2014-08-28 |
20140245344 | COPY PROTECTION SYSTEM - A method of modifying the output of an output device is provided. A first code, associated with a first recipient party, is received and used to generate, within the output device, a second code, the second code containing encoded data identifying the first recipient party and instructions for activating an additional functionality of the output device. The additional functionality is activated in accordance with the instructions contained in the second code. The output of the output device is modified according to data encoded in the second code, to encode a third code in the output of the output device, the third code including an ID code associated with the first recipient party. | 2014-08-28 |
20140245345 | MEDIATING DIGITAL PROGRAM INSERTION FOR LINEAR STREAMING MEDIA - Exemplary embodiments involve a mediation application executed on a processor determining one or more digital programming insertion breaks in a linear media stream. The linear media stream can include electronic content delivered over a network at a time determined by the content provider. The mediation application can determine that a plurality of clients identified by a common group identifier and in communication with the mediation application are receiving the linear media stream. The mediation application can mediate a plurality of requests for digital programming insertion content provided by a digital programming insertion content provider by identifying digital programming insertion content targeted to the common group identifier. The mediation application can provide the digital programming insertion content during the one or more digital programming insertion breaks to the plurality of clients. | 2014-08-28 |
20140245346 | OVERWRITING EXISTING MEDIA CONTENT WITH VIEWER-SPECIFIC ADVERTISEMENTS - Embodiments are directed to pacing on-demand linear advertisement entries to appear as being live entries, to generating a sequential segment map from a parallel playlist and to consolidating linear ad and main content portions into a single linear chunklist. In one embodiment, a computer system receives video content updates for a portion of live video programming, and generates a parallel playlist with parallel playlist entries that identify a presentation that is to be played. The computer system then generates a sequential segment map from the parallel playlist that identifies which parallel playlist entry is to be played, monitors a live position for new media, determines that an on-demand linear advertisement is to be played at the live position, and appends on-demand linear advertisement chunks to a chunklist to replace the main content chunks and play the on-demand linear advertisement entries in a pseudo-live format as if they were live. | 2014-08-28 |
20140245347 | CONTROL LAYER INDEXED PLAYBACK - A method and system for controlling a playback experience for one or more videos is disclosed. Actions are specified in control documents for the one or more videos. The actions specify start time and duration for each action, optional introductory or confirmation messages or interface controls, optional gestures, and/or intents that are triggered by the actions. The various control documents are compiled into a single control document that includes a link to the one or more videos and the actions various. Multiple parties can control the playback experience with multiple control documents to provide a multi-layered control experience. | 2014-08-28 |
20140245348 | MOVIE COMPILATION SYSTEM WITH INTEGRATED ADVERTISING - An automated movie compilation system is described. An application on a mobile device has a capture component that samples media assets and a data asset synchronizer that synchronizes the media assets over a network with a backend server. The backend server has an asset data synchronizer that stores the media assets in a data store, a movie compiler combining the media assets and further assets into a movie compilation, and a movie server serving the movie compilation for viewing. The mobile application has a compiled movie receiver that receives a movie compilation from the backend server and a movie playback system that plays the compiled movie on the mobile device. Advertisers can upload establishing shot clips for viewing in the movie compilation. | 2014-08-28 |
20140245349 | METHOD FOR PROVIDING A CONTENT-SHARING SERVICE, AND A DEVICE THEREFOR - A method and apparatus for providing contents-sharing services are provided. The method for providing contents-sharing services includes: receiving a contents-sharing request message for a contents sharer from a first contents reproducing apparatus of a contents sharing requester; transmitting a contents-sharing notify message generated using the received contents-sharing request message to a second contents reproducing apparatus of the contents sharer; and transmitting the received contents-sharing request message to a streaming server, wherein the transmitted contents-sharing request message requests the streaming server to transmit contents to the second contents reproducing apparatus of the contents sharer. | 2014-08-28 |
20140245350 | SYSTEM FOR AND METHOD OF PROCESSING A VIDEO CLIP TO IDENTIFY AN OCCLUDING OBJECT - A system for and a method of processing a video clip to identify an occluding object. In an embodiment, a video clip comprising a sequence of frames is obtained. The video clip has an identified target area and an occluding object that at least partially occludes the target area. A location of the occluding object in a frame of the video clip is estimated based on its location in a previous frame of the video clip. Pixels of the occluding object in the frame are identified by generating a characteristic signature of the occluding object based on its estimated location and the characteristic signature is used to separate pixels of the occluding object from pixels of the frame of the video clip. The occluding object can be identified for multiple frames of the video clip. Image data can be inserted into the target area and a resulting video clip displayed such that the occluding object appears to pass in front of the inserted image data. | 2014-08-28 |
20140245351 | System For Booking Television Programs - A computer system in which a touch-screen display displays an electronic program guide to a user. A first user can book to watch a television program at a future time by selecting a “book to watch” button | 2014-08-28 |
20140245352 | Time-Sensitive Content Update - In one embodiment, a method includes determining available media content from one or more content sources and providing at least a portion of the available media content for display in a programming guide on a display device of a user. The programming guide includes a plurality of entries each associated with one of the available media content. The method further includes determining that an update action button should be displayed on the display device, providing the update action button for display on the display device when it is determined that the update action button should be displayed, and updating the programming guide in response to a user selection of the update action button. The update action button is operable to cause the social-networking system to update the programming guide. | 2014-08-28 |
20140245353 | METHODS AND SYSTEMS FOR DISPLAYING MEDIA LISTINGS - Methods and system are described herein for a media guidance application, which allows a user to more quickly and easily navigate available media listings. Specifically, the media guidance application generates a plurality of media cells each corresponding to a particular media listing. In addition, the media guidance application generates a plurality of presentation criterion cells. Upon selection of a particular presentation criterion cell, the media guidance application reveals media cells that are associated with the particular criterion and conceals media listings that are not associated with the particular criterion. | 2014-08-28 |
20140245354 | SYSTEMS AND METHODS FOR VIDEO-RICH NAVIGATION - Methods and systems are disclosed that provide a user with efficient video-rich navigation (VRN) of media assets in an interactive media guidance application, such as an interactive program guide. A user can select a displayed video asset and perform an action on the selectable video asset, for example, using a remote control. The manner in which the video assets are displayed and the actions enabled for the particular video assets are defined by screen data transmitted to the user equipment in a VRN data feed. | 2014-08-28 |
20140245355 | System For Interacting With An Electronic Program Guide - A computer system includes a display that displays an electronic program guide to a user. A data storage unit includes keywords related to television shows currently being broadcast. A server device is configured to retrieve real-time data related to a person of interest from the internet by monitoring messages that they generate. The server device can then identify one or more matches between the retrieved data and the stored keywords, and can output a modified electronic program guide including an indication of matching keywords. This can allow an electronic program guide to include an inference of the television show that a person of interest is likely to be watching or talking about online. | 2014-08-28 |
20140245356 | PERSONAL TELEVISION CHANNEL AND SYSTEM AND METHOD THEREOF - A system for presenting media programming guides is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a media processor having a controller to transmit to a media source a request to access media content of a personal television (TV) channel composed by a subscriber of a media communication system, transmit to the media source a communication identifier, and receive from the media source media content in the personal TV channel adapted according to the communication identifier. Other embodiments are disclosed. | 2014-08-28 |
20140245357 | METHOD AND SYSTEM TO NAVIGATE VIEWABLE CONTENT - A method and system to navigate viewable content in the context of television entertainment is provided. In one example embodiment, the system comprises a presentation module to present main content on a display screen, a communications module to receive a first request associated with a first directional key on a remote control device, a navigation mode detector to determine a navigation mode associated with the first request; a margin menu module to activate a margin menu associated with the determined navigation mode. The margin menu may be presented along one of the margins of a display screen, while permitting viewing of the main content. | 2014-08-28 |
20140245358 | Enhanced Content Interface - Systems and methods for presenting content are disclosed. One method can comprise presenting an interface such as a content guide comprising a field relating to content. A selection of one or more of a plurality of filters can be received. A first indicator representing first information can be presented if a first one of the filters is selected, wherein the first information relates to the field. A second indicator representing second information can be presented if a second one of the filters selected, wherein the second information relates to the field. | 2014-08-28 |
20140245359 | Content Delivery Network Interconnection (CDNI) Mechanism - Embodiments contemplate the movement of mobile node (MN) from a first access network to a second access network, while in communication with a CDN server (e.g. a surrogate providing a multimedia streaming session). The server selection may become sub-optimal as a result of this movement. A first CDN may learn about MN mobility event via the MN, an access network node, the server, or another node. The first CDN may trigger reselection by upstream CDN by sending a CDNI reselection request message, including information for the upstream CDN to perform request routing for the MN with the specified content, at a different location. The upstream CDN may perform the request routing procedure. The upstream CDN may return the request routing result to first CDN. The initial server may send a redirection message back to the application, which may interpret the message and continue streaming from a different server. | 2014-08-28 |
20140245360 | Mobile Telecommunications Apparatus for Receiving and Displaying More Than One Service - Mobile telecommunications apparatus has a receiver for receiving concurrently a plurality of broadcast services containing image data content, and a display device with a display area operable to display an image corresponding to the content of at least one of the services in a first mode in which the content one of the channels is displayed for normal viewing, and a second mode in which the content of more than one of the services is displayed. A mosaic of images may be displayed from which one may be selected for full screen viewing in the first mode. Also a picture-in-picture (PIP) display may be provided with a facility to swap between displayed images. | 2014-08-28 |
20140245361 | MULTILEVEL SATELLITE BROADCASTING SYSTEM FOR PROVIDING HIERARCHICAL SATELLITE BROADCASTING AND OPERATION METHOD OF THE SAME - Provided is a multilevel satellite broadcasting system for providing a hierarchical satellite broadcasting, including a demodulator to demodulate a transmitted multilevel compression stream based on a modulation parameter, a hierarchical video decoder to receive the demodulated multilevel compression stream, and a channel predicting and controlling unit to process at least one of channel prediction and channel control with respect to the demodulated multilevel compression stream based on channel information of the demodulator. | 2014-08-28 |
20140245362 | SYSTEMS AND METHODS FOR ACCESSING RECOVERABLE PROGRAM CONTENT - Content delivery systems and methods are operable to provide recoverable program content to a media device. An exemplary embodiment detects an occurrence of a qualifying event, wherein the qualifying event is associated with an unavailable portion of a program of interest; communicates a request to establish a backchannel between the media device and a program content device in response to detecting the occurrence of the qualifying event; communicates a request for a recoverable portion of the program of interest from the media device to the program content device over the backchannel, wherein the requested recoverable portion of the program of interest corresponds to the unavailable portion of the program of interest; and receives at the media device the recoverable portion of the program of interest from the program content device. | 2014-08-28 |
20140245363 | METHOD FOR AUDIO-VIDEO RE-MATCHING OF TV PROGRAMS ON MOBILE TERMINAL, AND MOBILE TERMINAL - The disclosure discloses a method for audio-video re-matching of TV programs on a mobile terminal, including that: when a mobile terminal receives from a user a request to perform re-matching on a current program, the mobile terminal determines whether the user requires to re-match the current program with a new audio; when the mobile terminal determines that the user requires to re-match the current program with a new audio, the mobile terminal stops playing an audio of the current program, acquires target information called for by the user, and outputs a target audio included in the target information and a video of the current program respectively to a corresponding local playing module so as to be played. The disclosure further discloses a corresponding mobile terminal. With the present disclosure, a user can flexibly re-match a program currently being played with a video or an audio, and form a custom program by mixing an audio of a program with a video of another program, thereby obtaining maximal amount of information. | 2014-08-28 |
20140245364 | Systems and Methods for Distributing Video on Demand - A method of receiving content includes joining an in-progress multicast stream to receive a first portion of a content. The method further includes sending a request to a peer for a catch-up portion of the content, the request including a deadline for delivery of the content, and receiving the catch-up portion of the content from the peer prior to the deadline. | 2014-08-28 |
20140245365 | SYSTEMS AND METHODS FOR ENABLING AND MANAGING SOCIAL TELEVISION - The field of the invention relates to social television, and more particularly to systems and methods that enable and manage social television. In a preferred embodiment, a central server system operably coupled to a public computer network is included. The central server system is configured to enable and manage social television and includes a receiving subsystem coupled to the public network for receiving from a host commentator a first commentary data associated with a first video program available to a plurality of television viewers. The server system further includes a commentary source subsystem having a database configured to store said first commentary data associated with the first video program. The server system also provides a user interface operably coupled to said commentary source subsystem over said public network to enable a plurality of television viewers to retrieve and watch said first commentary data in sync with said first video program. | 2014-08-28 |
20140245366 | Method and Apparatus For Establishing a Time Base - The present invention relates to a method of and apparatus for establishing a time base for variable data rate traffic data received from an asynchronous network. In some embodiments, the invention relates to a method of and apparatus for establishing a time base for a compression coded video signal transmitted over an Internet Protocol (IP) network. A method of establishing a traffic data time base for variable data rate traffic data received over an asynchronous network is provided in which a time base for the traffic data is established using a first method of time base recovery and a reliability metric for first method is determined. If the reliability metric shows that the first method is unreliable, a second method of establishing a time-base for the traffic data is used. In some embodiments the arrival timing of asynchronous network data is used in the step of establishing a time base for the traffic data using a first method of time-base recovery. In some embodiments the arrival timing of asynchronous network data is used in the step of determining the reliability metric. In some embodiments an internal traffic data time base is used in the step of establishing a time-base for the traffic data using a second method of time-base recovery. In some embodiments the traffic data is a compression coded signal. In some embodiments the asynchronous network is an Internet Protocol (IP) network. | 2014-08-28 |
20140245367 | METHOD FOR PROVIDING A VIDEO, TRANSMITTING DEVICE, AND RECEIVING DEVICE - A method for providing a video includes: (a) acquiring a first main video captured of a first capture space, and a second main video captured of a second capture space including a space other than the first capture space; (b) generating a wide-angle video by combining the plurality of main videos acquired in step (a); (c) acquiring user preference information via a network; (d) calculating a region to be cropped which is a region of the wide-angle video and smaller than the area captured in the wide-angle video, based on the user preference information acquired in step (c); (e) cropping the wide-angle video into the cropping region; and (f) providing, to a user, a cropped video generated by cropping the wide-angle video. | 2014-08-28 |
20140245368 | SMART RECEIVER FOR MASHUP SERVICE BASED ON CONVERGENCE AND RECEIVING METHOD THEREOF - A smart receiver for a mashup services based on convergence includes a hardware platform which receives a digital broadcast and supports an added service, a smart receiver hardware module which supports a multimedia function of the hardware platform and a mashup service, and a smart receiver software module which supports the multimedia function and the mashup service so that a digital broadcast is received in real time via a broadcast tuner. A software module and a UX (user experience design), both of which enable access to a CDN (contents delivery network) server for a massive data mashup service, are provided in order to overcome a problem with the related art, i.e. an existing system including a smart TV and an IP STB (Internet protocol set-top box) cannot directly support a mashup service, so that a user can use the mashup service at any time. | 2014-08-28 |
20140245369 | AUTOMATED MOVIE COMPILATION SYSTEM - An automated movie compilation system is described. An application on a mobile device has a capture component that samples media assets and a data asset synchronizer that synchronizes the media assets over a network with a backend server. The backend server has an asset data synchronizer that stores the media assets in a data store, a movie compiler combining the media assets and further assets into a movie compilation, and a movie server serving the movie compilation for viewing. The mobile application has a compiled movie receiver that receives a movie compilation from the backend server and a movie playback system that plays the compiled movie on the mobile device. Advertisers can upload establishing shot clips for viewing in the movie compilation. | 2014-08-28 |
20140245370 | SYSTEM AND METHOD FOR THE BROADCAST DISSEMINATION OF TIME-ORDERED DATA - A stream of time-ordered data, such as a movie, is divided into multiple fragments of equal length, which are repetitively transmitted at different respective repetition rates. The fragments are reordered for transmission so that those which occur near the beginning of the original data stream are transmitted more frequently than those which occur later in the data stream. When a user enters a request to utilize the data, the individual fragments are stored upon receipt at the user's premises, and reassembled into a contiguous stream. The ordering of the fragments is such that the wait time required before utilization of the data can begin is limited to a predetermined maximum, and at least one copy of every fragment becomes available by the time it is needed. | 2014-08-28 |
20140245371 | DEVICE AND METHOD FOR PROVIDING CONTENT BY ACCESSING CONTENT STREAM IN HYBRID 3D TV, AND DEVICE AND METHOD FOR REPRODUCING CONTENT - A content providing apparatus and method, and a content reproduction apparatus and method for accessing a content stream in a hybrid three-dimensional television (3DTV) are disclosed. The content providing apparatus may include a content stream generation unit to generate a first content stream corresponding to a reference image and a second content stream corresponding to a supplementary image, a descriptor generation unit to generate a descriptor associated with the first content stream and the second content stream, and a data transmission unit to transmit the first content stream, the second content stream, and the descriptor to a content reproduction apparatus. | 2014-08-28 |
20140245372 | HTTP PASSWORD MEDIATOR - A method and system for password mediation including identifying an HTTP request issued by a client application executing on a client device, the HTTP request indicating an operation to be performed for a user of the client application at a destination system, obtaining user credentials using the HTTP request, requesting security information for the user with respect to the destination system, determining whether the user is allowed to perform the operation based on the security information, and upon determining that the user is allowed to perform the operation, modifying the HTTP request based on the security information and sending the modified HTTP request to the destination system. | 2014-08-28 |
20140245373 | DISCRETIONARY POLICY MANAGEMENT IN CLOUD-BASED ENVIRONMENT - Embodiments are disclosed for managing and providing access to a collection of digital resources. One embodiment provides a method comprising receiving a request to access a resource for a principal and determining one or more principal groups to which the principal belongs. The method further comprises obtaining resource set membership information indicating a resource set to which the resource belongs, and obtaining resource set access policy information for the resource set to which the resource belongs. The method yet further comprises determining whether the principal is allowed to access the resource based on the principal group membership information and the resource set access policy information, and, if the principal is allowed to access the resource, then permitting access to the resource by the principal. | 2014-08-28 |
20140245374 | Device and Method for Detection of Anomalous Behavior in a Computer Network - A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates within an enterprise network in cooperation with a centralized analytics and correlation engine that correlates detected events across the sensors to detect malicious activity on a monitored network which may include using a multi-tiered or Rete net rule set or engine. When malicious activity is detected upon the satisfaction of a predetermined set of conditions, the invention traces the activity to a host responsible for the activity for further action. | 2014-08-28 |
20140245375 | DOCUMENT AUTHORITY MANAGEMENT SYSTEM, TERMINAL DEVICE, DOCUMENT AUTHORITY MANAGEMENT METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A document authority management system | 2014-08-28 |
20140245376 | SYSTEMS AND METHODS OF RISK BASED RULES FOR APPLICATION CONTROL - In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules database, and a rule module. The monitor module may be configured to monitor a device for an instruction to execute a legitimate application. The application identification module may be configured to identify one or more attributes of the legitimate application. The vulnerability module may be configured to retrieve risk information based on the one or more attributes of the legitimate application. The risk information may be determined from known vulnerabilities of the legitimate application. The rules database may be for storing a rule associated with the risk information. The rule module may be configured to retrieve the rule from the rule database based on the risk information and to control the legitimate application based on the rule. | 2014-08-28 |
20140245377 | SECURE MOBILE FRAMEWORK - Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided. Various embodiments provide mechanisms of securitizing data and communication between mobile devices and end point services accessed from a gateway of responsible authorization, authentication, anomaly detection, fraud detection, and policy management. Some embodiments provide for the integration of server and client side security mechanisms, binding of a user/application/device to an endpoint service along with multiple encryption mechanisms. For example, the secure mobile framework provides a secure container on the mobile device, secure files, a virtual file system partition, a multiple level authentication approach (e.g., to access a secure container on the mobile device and to access enterprise services), and a server side fraud detection system. | 2014-08-28 |
20140245378 | SECURE MOBILE FRAMEWORK - Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided. Various embodiments provide mechanisms of securitizing data and communication between mobile devices and end point services accessed from a gateway of responsible authorization, authentication, anomaly detection, fraud detection, and policy management. Some embodiments provide for the integration of server and client side security mechanisms, binding of a user/application/device to an endpoint service along with multiple encryption mechanisms. For example, the secure mobile framework provides a secure container on the mobile device, secure files, a virtual file system partition, a multiple level authentication approach (e.g., to access a secure container on the mobile device and to access enterprise services), and a server side fraud detection system. | 2014-08-28 |
20140245379 | SYSTEM AND METHOD FOR ENFORCING A POLICY FOR AN AUTHENTICATOR DEVICE - A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance. | 2014-08-28 |
20140245380 | AUTOMATIC PIN CREATION USING PASSWORD - A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password. | 2014-08-28 |
20140245381 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules. | 2014-08-28 |
20140245382 | SYSTEM AND METHOD FOR DEVELOPING AND USING TRUSTED POLICY BASED ON A SOCIAL MODEL - A trust policy is constructed based upon a social relationship between real-world entities. The trust policy may determined based upon a social network and social network maps. The social network map provides a framework to determine social distances. The trust policy provides quick and secure access to desired or trusted nodes while providing security from entities outside the trusted sphere of nodes. The trust policy determined by the social distance may be used for various types of applications including filtering unwanted e-mail, providing secure access to resources, and accessing protected services. File sharing, referral querying, advertisement targeting, announcement targeting, access control, and various applications may be limited using the constructed trust policy. | 2014-08-28 |
20140245383 | METHOD AND APPARATUS FOR PACKET SOURCE VALIDATION ARCHITECTURE SYSTEM FOR ENHANCED INTERNET SECURITY - A system of enhanced global computer network security provides for a globally unique human signature code that is provided in the header of a data packet and that is used to uniquely identify a sender of a data packet in a global computer network. The signature code is of the form that identifies the source as an owner of the server that has control over the server that originated the data packet. The signature code includes, (i) a caller id of a mobile telephone provided by a cellular telephone network, (ii) time and date of a call to a key server, (iii) cellular network identification of the geographic location of the caller, and (iv) a random code. | 2014-08-28 |
20140245384 | Nonvolatile Memory Device Having Authentication, and Methods of Operation and Manufacture Thereof - A memory device package encloses two separate die, one being a standard nonvolatile memory integrated circuit (“IC”) die, and the other being any suitable authentication IC die. Either die may be stacked upon the other, or the die may be placed side-by-side. The external contacts may correspond to the power and signal requirements of the standard nonvolatile memory IC die so that the pin-out of the memory device package may present a standard pinout. The power and signal requirements of the authentication IC die may be satisfied with some or all of the pins for the nonvolatile memory integrated circuit die, or with other unused pins of the device package. One or more additional external contacts may be added exclusively for the authentication integrated circuit die. One or more signals may be dedicated as between the standard nonvolatile memory IC die and the authentication IC die. | 2014-08-28 |
20140245385 | METHOD AND APPARATUS FOR PACKET SOURCE VALIDATION ARCHITECTURE SYSTEM FOR ENHANCED INTERNET SECURITY - A router in a global computer network for enhanced Internet security provides for an adaptation of major routers of the global computer network with a packet source validation function. The validation function checks the presence of a source validation code in the header of a packet and routs only those packets that have the source validation code. The validation function after checking the presence of the source validation code, verifies the source validation code with reference to a key server. | 2014-08-28 |
20140245386 | SYSTEM AND METHOD FOR ACCESS CONTROL MANAGEMENT - A system or method of monitoring data accessed in operations or systems calls or functions to find in such data words, phrases or data strings that are to be transferred or subject to the system call. The data strings may be added to files as an indication that the file data is protected, or may be searched for as an indication of a suspicious data string. Data strings that are detected in the system call may serve as a trigger or indication that the data is to be subject to some review or screening process. | 2014-08-28 |
20140245387 | DATA PROCESSING LOCK SIGNAL TRANSMISSION - In accordance with one aspect of the present description, a node of the distributed computing system has multiple communication paths to a data processing resource lock which controls access to shared resources, for example. In this manner, at least one redundant communication path is provided between a node and a data processing resource lock to facilitate reliable transmission of data processing resource lock signals between the node and the data processing resource lock. Other features and aspects may be realized, depending upon the particular application. | 2014-08-28 |
20140245388 | AUTHENTICATION APPARATUS, METHOD FOR CONTROLLING AUTHENTICATION APPARATUS, COMMUNICATION APPARATUS, AUTHENTICATION SYSTEM, AND STORAGE MEDIUM IN WHICH CONTROL PROGRAM IS STORED - A family message board server includes a device authentication section which authenticates a television in a case where an access to a family message board is made via the television, identification information of the television, user identification information, and identification information of a smart phone are received via the smart phone, and it is determined that the user identification information and the identification information of the smart phone which have been received respectively match user identification information and identification information of the smart phone which have been associated with each other by a device registration section. | 2014-08-28 |
20140245389 | SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS - A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider. | 2014-08-28 |
20140245390 | SYSTEMS AND METHODS FOR PROVIDING SECURE MULTICAST INTRA-CLUSTER COMMUNICATION - Systems and methods which facilitate secure multicast communications between any valid node of a cluster using authentication between a node joining the cluster and any single node which is validly part of the cluster are disclosed. In accordance with embodiments, a cluster key is utilized to provide security with respect to intra-cluster communications. The cluster key of embodiments is shared by a node which is already part of the cluster with a node joining the cluster only after these two nodes mutually authenticate one another. The mutual authentication handshake of embodiments implements a protocol in which a session key is calculated by both nodes, thereby providing a secure means by which a cluster key may be shared. Having the cluster key, each node of the cluster is enabled to securely communicate with any other node of the cluster, whether individually (e.g., unicast) or collectively (e.g., multicast), according to embodiments. | 2014-08-28 |
20140245391 | Authentication Method - A method of authenticating a user to a transaction at a terminal ( | 2014-08-28 |
20140245392 | Systems, Methods, and Computer Program Products for Authenticating Human Users of a Computer System - A computer program product having a computer readable medium tangibly recording computer program logic for use in a secure computer system with a first human user and a second human user being authorized users of the secure computer system, the computer program product including code to receive input from the first human user to select the second human user for authentication, code to electronically generate a secure code in response to the input from the first human user, code to display the secure code to the first human user, code to allow the second human user access to the secure computer system after the second human user has been verified by the secure computer system, and code to display the secure code to the second human user as the second human user accesses the secure computer system. | 2014-08-28 |
20140245393 | METHODS AND SYSTEMS FOR CONTENT AVAILABILITY BASED ON LOCATION - Access to protected content is based on a client device being within a region. The region may be a mobile or movable region, and/or a region that is in motion. In some embodiments, the region may be determined based on a distance from a position within the region, or based on a boundary about the position that need not be symmetrical. In some embodiments, the region is a three dimensional region. In some embodiments, being within the region is further based on the region being above a defined altitude. In further embodiments, a determination for access is based on whether the client device is detected to be in motion relative to the region. | 2014-08-28 |
20140245394 | TRUST-BASED COMPUTING RESOURCE AUTHORIZATION IN A NETWORKED COMPUTING ENVIRONMENT - A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources). | 2014-08-28 |
20140245395 | OFF-SITE USER ACCESS CONTROL - Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices. | 2014-08-28 |
20140245396 | SYSTEM AND METHOD FOR INTEGRATING TWO-FACTOR AUTHENTICATION IN A DEVICE - A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider. | 2014-08-28 |
20140245397 | TERMINAL AND SERVER FOR APPLYING SECURITY POLICY, AND METHOD OF CONTROLLING THE SAME - A method of operating a terminal using Mobile Device Management (MDM) solution includes: installing an application, requesting for registration by a license key received from an Enterprise License Management (ELM) server, receiving a Right Object (R/O) that corresponds to the license key and comprises a permission list, setting at least one permission based on the permission list comprised in the received R/O, and performing the set permission. A terminal using MDM comprises an MDM application configured to control an installed application to acquire a required permission, a ELM agent configured to request for registration by a license key from an ELM server, and receive a R/O that corresponds to the license key and comprises a permission list, and an ELM permission enforcer configured to set at least one permission based on the permission list comprised in the received R/O. | 2014-08-28 |
20140245398 | M2M DATA MANAGEMENT - Described embodiments provide managing data collected from machine 2 machine (M2M) devices. A plurality of M2M devices may be grouped based on a common interest and the same group authorization key may be assigned to M2M devices in the same device group. A data collecting terminal having a group authorization key may be allowed to collect data in M2M devices when the M2M devices have the same group authorization key. | 2014-08-28 |
20140245399 | INFORMATION MANAGEMENT SYSTEM AND INFORMATION MANAGEMENT METHOD - In the present invention, a control section of a CRM server performs editing processing for TPO (the time, the place, and the occasion) requirements. Next, a control section of a TPO server registers the TPO requirements in order to convert the same to TPO definitions. Then, the control section performs setting processing for the TPO definitions. A portable terminal identifies the current location and the current time. Then, a control section verifies TPO definition state transitioning. If transitioning of the TPO definition state is detected, the control section performs TPO definition state transition notification processing. The control section of the portable terminal performs individual control processing on the basis of the TPO definitions. | 2014-08-28 |
20140245400 | PROGRESSIVE DOWNLOAD OR STREAMING OF DIGITAL MEDIA SECURELY THROUGH A LOCALIZED CONTAINER AND COMMUNICATION PROTOCOL PROXY - Various embodiments are directed towards employing a container and communication protocol proxy component within a client device to receive securely real-time streamed, progressively downloaded, or adaptively streamed container over a network using one container and communication protocol, and to securely decrypt the container and provide it to a media player using a different container and communications protocol. In one embodiment, the container is in Flash Video (FLV) file format. A browser or the media player on the client device may be used to request the container. The requested container is sent over one communication protocol and intercepted by the container and communication protocol proxy component. The container may be received as selectively encrypted container. The container and communication protocol proxy component then may enable decryption of the container and providing of it to the media player using another container and communication protocol combination. | 2014-08-28 |
20140245401 | SECURE AND EFFICIENT LOGIN AND TRANSACTION AUTHENTICATION USING IPHONES.TM. AND OTHER SMART MOBILE COMMUNICATION DEVICES - To authenticate a user of a mobile communication device for login or transaction authorization, a first application on the device directs transmission of a request for authentication of the user to a security server. A second application on the device receives the request for authentication from the security server and directs presentation of the received request for authentication to the user by the device. The second application receives a user input to the device indicating that the requested authentication should proceed and in response directs transmission of an indication that the requested authorization should proceed, to the security server. In response to this latter transmission, the second application receives a PIN from the authentication server. The first application directs transmission of the PIN received by the second application to the network site, which validates the transmitted PIN, in order to authenticate the user or the transaction to the network site. | 2014-08-28 |
20140245402 | AUTHORITY TRANSFER SYSTEM, AUTHORITY TRANSFER METHOD, INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM - To prevent a transfer of an authority from being useless as much as possible, an authority transfer unit includes a decision unit for making a decision that an authority of a user with respect to a management unit is transferred to a processing request unit. | 2014-08-28 |
20140245403 | METHOD AND DEVICE FOR PROCESSING DATA SECURITY CHANNEL - Embodiments of the present invention provide a method and a device for processing a data security channel of a tunnel, where the method includes: receiving an authentication and authorization request of an access side, and determining a trust relationship of access of a user equipment; and when an S6b interface session of the user equipment exists, sending a message including information about the trust relationship of the access of the user equipment to a packet data gateway, so that the packet data gateway establishes or updates a data security channel of an S2c tunnel according to the information about the trust relationship. | 2014-08-28 |
20140245404 | METHOD AND APPARATUS FOR TRANSFERRING USAGE RIGHTS AND DIGITAL WORK HAVING TRANSFERABLE USAGE RIGHTS - A method, system and computer program product for transferring a digital work, including receiving by a first device a first digital work including digital content which is associated with usage rights and transfer permission information; sending to a server a request to transfer the digital content to a second device, the request indicating an identification of the second device; receiving from the server permission to transfer the digital content, the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and transferring the digital content associated with the new usage rights to the second device. | 2014-08-28 |
20140245405 | METHOD FOR TRANSFERRING AUTHORIZATION INFORMATION, RELAY DEVICE, AND SERVER - Embodiments of the present application provide a method for transferring authorization information, a relay device, and a server. The method includes: receiving, by a DHCPv6 relay device, authorization information delivered by an AAA server; and inserting an option into a DHCPv6 Relay-Forward message, encapsulating the authorization information in the option, and sending the option to a DHCPv6 server. By using the technical solutions of the present application, a DHCPv6 relay device sends authorization information delivered by an AAA server to a DHCPv6 server, so that the DHCPv6 server can provide a correct configuration for a DHCPv6 client according to the authorization information delivered by the AAA server. | 2014-08-28 |
20140245406 | Method for Personalizing a Secure Element, Method for Enabling a Service, Secure Element and Computer Program Product - According to an aspect of the invention, a method for personalizing a secure element for a mobile device is conceived, wherein an application is stored in the secure element and wherein the application is pre-provisioned by loading secure credentials into the application without tying said secure credentials to a specific user of the secure element. | 2014-08-28 |
20140245407 | Single Login Procedure For Accessing Social Network Information Across Multiple External Systems - A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system. | 2014-08-28 |