52nd week of 2014 patent applcation highlights part 72 |
Patent application number | Title | Published |
20140380359 | Multi-Person Recommendations in a Media Recommender - A method of providing multi-person media item recommendations comprises receiving media preference information for a plurality of users, and generating a composite media recommendation score for a plurality of media items for a specified group of at least two of the plurality of users using the media preference information for the two or more users for the plurality of media items. A media recommendation is provided for the specified group of at least two of the plurality of users based on the generated composite media recommendation scores for the plurality of media items for the specified at least two of the plurality of users. | 2014-12-25 |
20140380360 | INTERACTIVE TELEVISION TARGETED MESSAGE SYSTEM - An interactive television system is provided in which targeted messages may be sent to users. The interactive television system may use an interactive television program guide or other interactive applications to provide interactive television services to users. An e-mail or other messaging application may be used to receive the messages. The messaging application may be separate from the program guide or other interactive television application or may be part of the program guide or other interactive television application. Messages may be targeted based on the television channels to which the user subscribes or based on which settings the user has established in the program guide or other application or based on any other suitable criteria. | 2014-12-25 |
20140380361 | PROCESS AND USER INTERFACE FOR DOWNLOADING MUSICAL CONTENT - A method for offering at least one piece of content available for downloading to a viewer of a viewed program commences by first extracting from the viewed program information indicative of at least one piece of content associated with the viewed program available for downloading. Thereafter, a link established to a source of the content available for downloading. Lastly, both a portion of viewed program and the established link undergo display to the viewer so the viewer can actuate the link and download the at least one piece of content. | 2014-12-25 |
20140380362 | Paired Devices - Disclosed herein is a media device. The media device comprises an output component configured to deliver an experience to a user. In addition, the media device comprises a pairing communication link for exchanging information about the experience with a paired user device, and a detection component configured to directly detect an indication received from the user device. The indication is received over an air interface other than the communication link. Further, the media device comprises a processing component for decoding the indication. It is configured to exchange information via the pairing communication link with the paired user device in response to decoding the indication, the information including information about an option. The processing component is further configured to detect selection of the option and modify operation of the media device to implement the selected option. | 2014-12-25 |
20140380363 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380364 | METHODS AND SYSTEMS OF GENERATING A DISPLAY OF MEDIA LISTINGS IN DYNAMIC CELLS - Methods and system are described for a media guidance application that generates a plurality of media cells, each corresponding to a particular media criterion, selects a plurality of media listings corresponding to the media criterion of each media cell, and automatically transitions between the media listings within the cell. For example, within each media cell, the media listings selected for that cell may crawl, one at a time, from one side of the media cell to the other. In another example, the media listings selected for each cell may automatically transition by displaying one media listing, removing the media listing, and displaying a different media listing in a continuous and/or repeating cycle. | 2014-12-25 |
20140380365 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380366 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380367 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380368 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380369 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380370 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380371 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380372 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-12-25 |
20140380373 | SYSTEM FOR CONFIGURING SOFT KEYS IN A MEDIA COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, set top box (STB) having a controller to record one or more soft key preferences associated with a user of the STB for each of a plurality of media presentation states of a media communication system, receive a request for presentation of a graphical user interface (GUI) associated with one of the media presentation states, select one or more soft keys according to the one or more soft key preferences assigned to the requested media presentation state, and present the selected one or more soft keys in the GUI. Other embodiments are disclosed. | 2014-12-25 |
20140380374 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2014-12-25 |
20140380375 | PAGE TURNING METHOD, PAGE TURNING APPARATUS AND TERMINAL AS WELL AS COMPUTER READABLE MEDIUM - The invention discloses a page turning method, a page turning apparatus and a terminal as well as a computer readable medium, and belongs to the field of computer technology. The method includes: receiving a continuing page turning signal; performing page turning on the pages according to a predefined single page turning mode; if the page turning mode change condition is met, performing page turning on the pages according to a predefined fast page turning mode, page turning speed of the fast page turning mode being larger than page turning speed of the single page turning mode. The technology realizes effects of fast page turning and reduced page turning time. | 2014-12-25 |
20140380376 | METHOD AND APPARATUS FOR STREAMING VIDEO - A method, apparatus, article of manufacture, and a memory structure for a CPT stream to a client device via an HTTP live streaming (HLS) protocol having a plurality of HLS media files is disclosed. In one embodiment, the method comprises generating an HLS playlist specifying a plurality HLS media files before generating any of the HLS media files, wherein each of the plurality of HLS media files has a unique name, transmitting the HLS playlist to the client device, after generating the HLS playlist, transcoding the CPT stream into at least a subset of the plurality of HLS media files, and providing at least one of the subset of plurality of HLS media files to the client device, wherein the at least one of the plurality of HLS media files is a client-requested media file selected from the HLS playlist. | 2014-12-25 |
20140380377 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2014-12-25 |
20140380378 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2014-12-25 |
20140380379 | SYSTEMS AND METHODS FOR PERFORMING MEDIA ASSET RECORDINGS BASED ON POWER CONSUMPTION - Systems and methods for performing cost efficient media asset recording on a user equipment device are provided. A first instance of a media asset is identified for recording. A media asset schedule database is searched to identify a second instance of the media asset. A determination, based on cost of power consumption information, is made as to whether recording the first instance of the media asset will cost less than recording the second instance of the media asset. Either the first instance of the media asset or the second instance of the media asset is selected for recording based on the determination. | 2014-12-25 |
20140380380 | SYSTEM AND METHOD FOR ENCODING MEDIA WITH MOTION TOUCH OBJECTS AND DISPLAY THEREOF - A method and system for providing video embedded with a plurality of motion touch enabled objects, each of the motion touch enabled objects corresponding to a given item featured in the video at one or more specific frames of the video. The method comprises providing playback of a motion touch enabled video to a viewer and presenting a plurality of touch objects encoded within the video to the viewer, where each of the plurality of touch objects configured to accept a touch from the viewer. The method further comprises receiving a touch for a given one of the plurality of touch objects from the viewer, presenting a touch feedback to the viewer upon receiving the touch for the given one of the plurality of touch objects, and recording the given touch object. | 2014-12-25 |
20140380381 | System And Method In A Television System For Responding To User-Selection Of An Object In A Television Program Based On User Location - A system and method in a system for responding to user-selection of an object in video based on geographical location, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims. | 2014-12-25 |
20140380382 | SYSTEM AND METHOD FOR STREAMING AUDIO OF A VISUAL FEED - An approach for streaming audio feeds independently from visual feeds is provided. The approach includes processing programming information associated with one or more first devices proximate a user to determine one or more programs presented by the one or more first devices. The approach also includes presenting a user interface to the user for selecting from among the one or more programs. In addition, the approach includes determining an input from the user for selecting at least one of the one or more programs. The approach further includes streaming an audio feed of the at least one of the one or more programs to a second device associated with the user. | 2014-12-25 |
20140380383 | APPARATUS AND METHOD FOR MANAGING MEDIA CONTENT DELIVERY FOR MULTIPLE COMMUNICATION DEVICES - A system incorporating teachings of the present disclosure may include, for example, a server having a controller to monitor for a first adjustment made by a first communication device associated with a user where the first communication device is capable of presenting media content and where the first adjustment is associated with the presentation of the media content, determine a second adjustment to be made to a second communication device associated with the user where the determination is based at least in part on the monitored first adjustment where the second adjustment is associated with the presentation of the media content and where the second communication device is a battery-operated mobile device, and wirelessly communicate adjustment information to the second communication device that is representative of the second adjustment, where the adjustment information is adapted for allowing the second communication device to perform the second adjustment. Other embodiments are disclosed. | 2014-12-25 |
20140380384 | Non-DSG Mechanisms for Aligning Client Devices with Their Multicast Data Flows in a DOCSIS Network Environment - Video messaging may be provided. First, a bootstrap message including a system address may be transmitted by a high level device. A user device may receive the bootstrap message from the high level device and obtain system data from the system address contained in the received bootstrap message. The user device may then determine a service group in which the user device is deployed. Next, the user device may determine, from the obtained system data, a sub-system address corresponding to the determined service group. The user device may then obtain sub-system data from the sub-system address. | 2014-12-25 |
20140380385 | Digital Broadcast Receiver - One embodiment provides a digital broadcast receiver that features a video telephone module, a program table generator, an input receive module and a display control module. The video telephone module establishes a video telephone communication with an external apparatus and receives a video telephone image from the external apparatus during the video telephone communication. The video telephone image is displayed on a screen during the video telephone communication. The program table generator generates a program table of broadcast programs while the display control module controls a display, where the program table is superimposed on the video telephone image during video telephone communications and transitions into a channel menu. The channel menu presents information of the selected one of the broadcast program and allows the user to perform at least one of a recording operation and a program display operation on the selected one of the broadcast program. | 2014-12-25 |
20140380386 | METHOD AND APPARATUS FOR SEARCHING AND GENERATING A CHANNEL - A method and apparatus for generating a channel playlist for streaming audio/video content to a user. Specifically, the system is operative to generate a playlist and stream content in response to user provided search terms and statistically relevant information. The system is further operative to store information related to consumed content and provided updated playlists in response to further user requests. | 2014-12-25 |
20140380387 | SYSTEM, APPARATUS AND METHOD FOR UTILIZING A MULTIMEDIA SERVICE - In one or more embodiments a system and an apparatus for utilizing a multimedia service are provided. In one embodiment, the system includes a first client device, a media managing server and a media provider system to implement the multimedia service. The first client device is associated with a user desiring to utilize the multimedia service. The first client device includes, primarily, a processor, and a memory configured with one or more programs and is connected to the processor. The memory includes a media handling module configured for managing sensory inputs and customized outputs that are characteristic to the immersive multimedia service and a social communicator assisting in providing immersive multimedia service, the social communicator being configured for enabling social communication of the first client device with a second client device through the media managing server based on a set of user preferences provided by the user. | 2014-12-25 |
20140380388 | METHOD FOR TRANSMITTING A BROADCASTING SERVICE, METHOD FOR RECEIVING A BROADCAST SERVICE, AND APPARATUS FOR RECEIVING A BROADCAST SERVICE - A method for receiving a broadcasting service according to the present invention comprises the steps of: receiving service signaling data for receiving a object; receiving network property information related to the object if the object that is to be received exists; determining whether the object is received according to network connection status of an apparatus for receiving a broadcast and the received network property information; receiving the object based on the service signaling data; receiving a first packetized stream; extracting a trigger including a trigger action and trigger time from a payload of the first packetized stream; and performing the trigger action in response to the object at the predetermined time using the trigger time based on the network property information. | 2014-12-25 |
20140380389 | ACOUSTIC SIGNALLING TO SWITCH FROM INFRASTRUCTURE COMMUNICATION MODE TO AD HOC COMMUNICATION MODE - A system includes a first computerized device configured for communicating in an infrastructure mode and an ad hoc mode and a second computerized device configured for communicating at least in the ad hoc mode. A first computerized device operating in infrastructure mode prompts the user of the first computerized device to switch to ad hoc mode in order to communicate with the second computerized device. | 2014-12-25 |
20140380390 | METHOD OF RECEIVING A BROADCASTING SIGNAL AND RECEIVING SYSTEM FOR RECEIVING A BROADCASTING SIGNAL - A broadcast signal reception method and a reception system are provided. The reception system includes a first processor, a second processor, and a storage medium. The first processor receives and processes a signaling table, the signaling table comprising first signaling information including access information of Non-Real-Time (NRT) service data and second signaling information including media object association information of the NRT service data. The second processor receives the NRT service data and processes a file including the received NRT service data based on the access information and the media object association information processed by the first processor. The storage medium stores the processed file of the NRT service data. | 2014-12-25 |
20140380391 | METHOD OF RECEIVING A BROADCASTING SIGNAL AND RECEIVING SYSTEM FOR RECEIVING A BROADCASTING SIGNAL - A broadcast signal reception method and a reception system are provided. The reception system includes a first processor, a second processor, and a storage medium. The first processor receives and processes a signaling table, the signaling table comprising first signaling information including access information of Non-Real-Time (NRT) service data and second signaling information including media object association information of the NRT service data. The second processor receives the NRT service data and processes a file including the received NRT service data based on the access information and the media object association information processed by the first processor. The storage medium stores the processed file of the NRT service data. | 2014-12-25 |
20140380392 | METHOD AND APPARATUS FOR MANAGING VIDEO TRANSPORT - A method and apparatus for managing video transport is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to predict visibility to a viewer of packet loss impairment for communicated video content based at least in part on scene information for one or more packets of the video content. Other embodiments are disclosed. | 2014-12-25 |
20140380393 | SYSTEMS, METHODS, AND DEVICES FOR SCANNING BROADCASTS - The various embodiments disclosed herein provide methods, systems, and devices for capturing broadcast streams, analyzing the broadcast streams to obtain information about the media content transmitted in the broadcast streams, obtaining additional information about the media content if available, and assigning a unique event identifier specific to the instance of broadcast of the broadcast stream and/or media segment transmitted in the broadcast stream. In other embodiments, the unique event identifier is broadcasted to broadcast receiving devices. With the unique event identifier, broadcast receiving devices can access the obtained information associated with the media content. | 2014-12-25 |
20140380394 | DEVICE AND METHOD FOR COMPOSING PROGRAMMES FROM DIFFERENT SOURCES IN BASEBAND - The invention concerns a device for inserting additional video content (inlays, secondary programmes) into a main video programme. Said device works in baseband within a single encoding box under the control of a common supervisor. The supervisor is configured to pass metadata associated with the images to the coder, said metadata comprising temporal, spatial and dynamic data relating to the planning of the insertion, and analysis data for the image files, which analysis data have been produced prior to the insertion. The coder receives said metadata and is configured to deduce therefrom optimization strategies for the coding that are implemented by line coding and file coding processes that are capable of being carried out simultaneously or sequentially. | 2014-12-25 |
20140380395 | GATEWAY, AND METHOD, COMPUTER PROGRAM AND STORAGE MEANS CORRESPONDING THERETO - A gateway connects a first communication network comprising at least one terminal intended to consume multimedia contents and a second communication network via which the gateway is intended to receive the multimedia contents in a stream form. The gateway detects ( | 2014-12-25 |
20140380396 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2014-12-25 |
20140380397 | SERVER SYSTEM FOR REAL-TIME MOVING IMAGE COLLECTION, RECOGNITION, CLASSIFICATION, PROCESSING, AND DELIVERY - Provided is a server system in which real-time communication based on a moving image group is performed between a number of users. The moving image collection/delivery server system accumulates moving images sequentially uploaded in real time via a network in a database, generates moving image thumbnails used to simultaneously display a plurality of moving images on a single display screen in real time, allocates the moving image thumbnails to a channel group adaptively generated from sequentially uploaded moving images, and delivers the moving image thumbnails to a terminal having a display and operating unit in real time via a network, and the sequentially generated moving image thumbnails are stored in an allocated channel in ascending order of shooting times and delivered to a plurality of terminals. | 2014-12-25 |
20140380398 | System and Method for Selectively Transcoding Signal From One Format to One of Plurality of Formats - A device is provided for use with an input signal and a selecting signal. The input signal has a first format, and the selecting signal has a first state and a second state. The device comprises a receiving portion and a transcoder portion. The receiving portion can receive the input signal and output a received signal. The transcoder portion is arranged to receive the selecting signal and can output a first transcoded signal when the selecting signal is in the first state and can output a second transcoded signal when the selecting signal is in the second state. The first transcoded signal is based on the received signal and is in a second format. The second transcoded signal is based on the received signal and is in a third format, wherein the first format is different from the second format, the first format is different from the third format and the second format is different from the third format. | 2014-12-25 |
20140380399 | SYSTEM FOR REDUCING RETURN SIGNAL NOISE WITHOUT RADIO FREQUENCY SWITCHING DEVICES - A bi-directional return signal noise reducing unit includes first and second ports, an amplifier, and a noise checking circuit. The first port connects to a cable television network. The second port connects to one or more devices of a subscriber to the cable television network. The amplifier includes an input that is connected to the second port and includes an output that is connected to the first port. The noise checking circuit samples the signals flowing from the second port to the first port. The noise checking circuit also: when a level of the signals flowing from the second port toward the first port are less than a predetermined threshold, blocks the signals from the input of the amplifier; and when the level of the signals flowing from the second port toward the first port are greater than the predetermined threshold, supplies the signals to the input of the amplifier. | 2014-12-25 |
20140380400 | SYSTEM AND METHOD FOR PROVIDING DATA COMMUNICATION SERVICES THROUGH A CATV TAP-OFF DEVICE - A system for providing data communication services includes a cable television (CATV) tap-off device and a CATV gateway device. The tap-off device includes a signal splitter communicably coupled to a tap-off access point and a first signal transceiver and communicates a CATV signal with a CATV network through the splitter. The gateway device is communicably coupled to the signal splitter through a first coaxial cable to communicate the CATV signal with the tap-off device. The gateway device includes a second signal transceiver and is configured to split the CATV signal into a television signal and a baseband data signal. The second signal transceiver communicates the baseband data signal as a transceiver signal over the first coaxial cable to the first signal transceiver. The tap-off access point is configured to transmit a first wireless signal based on the transceiver signal. | 2014-12-25 |
20140380401 | System And Method In A Local Television System For Responding To User-Selection Of An Object In A Television Program - A system and method in a local display system for responding to user-selection of an object in video, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims. | 2014-12-25 |
20140380402 | POLICY ENFORCEMENT DELAYS - Policies are used to control access to resources. Requests to change a set of policies may be fulfillable, at least in some circumstances, only if the requests are submitted such that the requested changes would become effective at a time in the future that is in compliance with a requirement for delayed enforcement. The requirement for delayed enforcement may be encoded in a policy in the set of policies. | 2014-12-25 |
20140380403 | SECURE ACCESS ENFORCEMENT PROXY - Efficient architecture for a secure access enforcement proxy is described. The proxy interfaces with multiple subsystems and multiple shared resources. The proxy identifies an original transaction command being sent from one of the subsystems to one of the shared resources, identifies a policy corresponding to the subsystem, performs an action pertaining to the original transaction command based on the policy, and sends a response to the subsystem based on the action. | 2014-12-25 |
20140380404 | AUTOMATIC DATA PROTECTION IN A COMPUTER SYSTEM - Techniques are provided for a data security system that includes two mappings: a first mapping that maps a security policy to sensitive type and a second mapping that maps the sensitive type to one or more data sets. The sensitive type indicates a class of sensitive data. Example data sets include columns, tables, tablespaces, files, and directories in a file system. Because a security policy is not tightly coupled to a target data set, the security policy becomes data-agnostic, portable, and reusable. Also, a security policy may be objectless in that, at some point in time, the security policy is not associated with any data set. A security policy may also be multifunctional in that the security policy may include multiple security features or requirements. A security policy may also be exhaustive in that all necessary security requirements prescribed for a data set can be included in the security policy. | 2014-12-25 |
20140380405 | FLEXIBLE POLICY ARBITRATION CONTROL SUITE - A policy arbitration system manages the fundamental communications and isolation between executable components and shared system resources of a computing device, and controls the use of the shared resources by the executable components. Some versions of the policy arbitration system operate on a virtualized mobile computing device to dynamically compile and implement policy rules that are issued periodically by multiple different independent execution environments that are running on the computing device. Semi-dynamic policy changes allow for context enabled policy changes that enforce the desired system and component “purpose” while simultaneously denying the “anti-purpose”. | 2014-12-25 |
20140380406 | POLYMORPHIC VIRTUAL APPLIANCE RULE SET - A domain manager system as disclosed herein can control the selective activation of multiple independently-operable execution environments or domains on a computing device in accordance with one or more policies. In some embodiments, activation of a domain may at least temporarily transform a general purpose computing device into a specific purpose computing device or “appliance” by disabling use of one or more shared system resources by other domains. | 2014-12-25 |
20140380407 | ROLE BASED SEARCH - The disclosure relates to accessing information, and more specifically to accessing information wherein the information is protected by access rules. In particular, the invention relates to a search system comprising integrated access request routines. The disclosure also relates to a search system and to a corresponding computer program. | 2014-12-25 |
20140380408 | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions and rights management - An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities over electronic networks, and can also be adapted to the specific needs of electronic commerce value chains. In one embodiment a Distributed Commerce Utility having a secure, programmable, distributed architecture provides these administrative and support services. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many of its participants. Different support functions can be collected together in hierarchical and/or networked relationships to suit various business models or other objectives. Modular support functions can be combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes. | 2014-12-25 |
20140380409 | NETWORK DEVICE MANAGEMENT APPARATUS, NETWORK DEVICE MANAGEMENT METHOD, AND PROGRAM FOR EXECUTING NETWORK DEVICE MANAGEMENT METHOD - This network device management apparatus includes an acquisition unit that acquires management information that shows a management condition of network device; a decision-making unit that decides a security policy based on management information; and a delivery unit that delivers a security policy to network device that is compatible with security policy settings. | 2014-12-25 |
20140380410 | SYSTEMS AND METHODS FOR HTTP CALLOUTS FOR POLICIES - A method of identifying an action of a policy in association with communications between a client and one or more servers includes determining, by an intermediary, a policy action based on using a callout based policy. In one aspect, an intermediary receives communications between a client and one or more servers. The intermediary identifies a policy for the communications, the policy specifying a request and a server to communicate the request. Responsive to the policy, the intermediary transmits the request to the server. Based on the server response to the request, the intermediary determines an action of the policy. In another aspect, a system for the present method includes a an intermediary and a policy engine for identifying a policy to specify a request and a destination server. Responsive to a server response to the request, the intermediary determines an action of the policy. | 2014-12-25 |
20140380411 | TECHNIQUES FOR WORKLOAD SPAWNING - Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments. | 2014-12-25 |
20140380412 | COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 2014-12-25 |
20140380413 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 2014-12-25 |
20140380414 | METHOD AND SYSTEM FOR APPLICATION-BASED POLICY MONITORING AND ENFORCEMENT ON A MOBILE DEVICE - A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy enforcement code into a previously un-monitored software application package that is installable on a mobile device, and executing the monitoring and policy enforcement code during normal use of the software application by a user of the mobile device. | 2014-12-25 |
20140380415 | Method and Device for Synchronizing Network Data Flow Detection Status - A method and a device for synchronizing network data flow detection status are provided. The method includes: a status synchronizing server receives a first request sent by a first security device node, where the first request carries a first flow entry of a first data flow that is currently detected by the first security device node; determines first network data flow detection status corresponding to the first flow entry; sends a first response to the first security device node, where the first response carries the first network data flow detection status. A security device node requests previous network data flow detection status of a data flow from a status synchronizing server so as to synchronize network data flow detection status, thereby allowing the security device node to detect a network attack in a more accurate way and improving network system security. | 2014-12-25 |
20140380416 | CONNECTION DETECTION APPARATUS AND IN-VEHICLE RELAY APPARATUS - A connection detection apparatus in includes a gateway to which communication lines are connected, and which detects whether an unauthorized communication device has been connected to the communication lines. The gateway samples a signal several times from each of the communication lines, and generates waveform information, such as an eye pattern in which the waveforms are superimposed on one another. Furthermore, the gateway has stored therein normal waveform information, such as a mask generated based on the eye pattern at normal times. The gateway compares the generated waveform information with the stored waveform information, and recognizes that the waveform information is abnormal if it does not sufficiently match the normal waveform information. If the waveform information is abnormal, it is determined that an unauthorized communication device has been connected to one or more of the communication lines. | 2014-12-25 |
20140380417 | Methods And Devices For Controlling Access To Distributed Resources - Access to distributed resources of a network may be controlled by access control data structures that may be customized for a given user or application by taking into consideration a plurality of factors, such as the users and applications seeking access, and the status of a given user or application session. A combination of such parameters may dictate a strict or lenient authentication process. | 2014-12-25 |
20140380418 | System and method for verifying the legitimacy of requests sent from clients to server - Disclosed herein are method and system that can be used for: preventing brute force attacks against passwords; preventing denial of service attacks by flooding; restricting bots from spamming emails, registering resources, and collecting sensitive information; and possibly in other challenge-response tests. It also can be used to replace CAPTCHA in some situations, with advantages of better reliability and spares human participation during the process. This present invention considers a request as legitimate when the requesting client has paid certain amount of computation resource required by the server, in exchange for the server to admit the request. It performs a challenge-response test. The subject challenged is the sincerity of the client to make that request, which is measured by computation resources the client willing to spend in exchange for the service provided by the server. The invention also gives a method to control and guarantee the computation complexity of the challenge problem of the test. | 2014-12-25 |
20140380419 | METHODS FOR AUTHENTICATING DEVICE-TO-DEVICE COMMUNICATION - Devices and methods are described to enable devices to be paired in a convenient and secure way based on proximity with the use of a single radio transmission protocol. Using devices configurable to perform the processes described, users are able to pair Bluetooth enabled devices or other radio communication protocols simply by putting the devices briefly in contact, or within close proximity, usually few centimeters. When the two devices touch or are in close proximity, the encryption key is shared across the two devices without further interaction required by the user. The encryption key is not made visible, so one potential source of security breach is eliminated. After first setup, proximity is not required and the device can communicate securely based on the previously exchanged security tokens (and encryption keys) without the requirement of proximity. This method is hence superior to all other authentication methods in use as it combines the benefit of an easy setup/configuration with the use of secure communications and cheaper design and manufacturing. | 2014-12-25 |
20140380420 | METHOD AND APPARATUS FOR EXPANDED CONTENT TAG SHARING - Techniques for expanded content tag sharing include determining that a first user is associated with content provided by a different second user. Data is recorded that indicates the first user is authorized to associate a different third user with the content provided by the second user, without further input by the second user. In some embodiments, the data that indicates the content provided by the second user includes data that indicates a plurality of contents. Some techniques include determining a message received from a first user indicates a portion of content associated with the first user, and a second user. The portion of the content is rendered on an apparatus of the second user. The second user is prompted for associating, with the portion of the content, an item identifier, such as text or another user, for the portion of the content. | 2014-12-25 |
20140380421 | Insecure Connection Prohibition - A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis. | 2014-12-25 |
20140380422 | RISK PREDICTIVE ENGINE - A method, a device, and a storage medium provide a risk engine that calculates a level of risk stemming from a communication to access a service or an asset. The risk engine operates as a fuzzy logic neural network. The risk engine obtains parameters from the communication and applies rules to calculate the level of risk. | 2014-12-25 |
20140380423 | SYSTEM AND METHOD FOR DYNAMICALLY AWARDING PERMISSIONS - An authorization system for dynamically awarding permissions to a requestor for performing an action, based on real-time monitored statistics of the requestor. The authorization system comprises a processor and a memory. The memory further comprises a status database for storing real-time information corresponding to the requestor, and a rules database for storing rules to enable the authorization system in determining permissions for various requestors' requests to perform the action. Additionally, the memory includes a status determining module for determining status-data related to the requestor, and a permission awarding module to evaluate the status-data with a dynamically selected set of rules for awarding permission to a requestor's request. The memory further includes a risk estimation module for calculating risk associated in awarding the permission, and an action triggering module for triggering an associated action based on the calculated risk. | 2014-12-25 |
20140380424 | LOCATION DETERMINATION FOR USER AUTHENTICATION - User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two or more host machines and a client device. Upon a request received from the client device by one of these host machines, round trip times of test messages may be measured between the client device and each of the host machines. The round trip times can be utilized to determine the current geographical location of the client device. If the location is within a tolerance geographical area, the client device may be authenticated. Otherwise, the authentication may fail or additional security procedures may be implemented. In some examples, a travel time from a historical geographical location to current geographical location can be determined. This data may be also utilized in the user authentication process. | 2014-12-25 |
20140380425 | POLYMORPHIC COMPUTING ARCHITECTURES - Polymorphic computing architectures can support and control separate, independently executable domains and other components on a computing platform. In some embodiments, the architectures may control the different domains and/or components according to different purposes. In some embodiments, the architectures can control domains and/or components to enforce a desired “purpose” of a domain/component while simultaneously denying a corresponding “anti-purpose.” | 2014-12-25 |
20140380426 | METHOD, DEVICE AND SYSTEM FOR LOGGING IN THROUGH A BROWSER APPLICATION AT A CLIENT TERMINAL - The current invention discloses methods, devices and systems for logging in a third party server through a browser application at a client terminal. After receiving a validation request from a third party server, the main server for the browser application may choose to grant or deny the request. The validation request, which may include a third party identifier, a user identifier, and a session key, can be triggered by a data access request from the browser application. If there is an active communication session between the client terminal and the server, the server may send an authorization request to the third party so that the third party server allows the client terminal to access non-sensitive data associated with the user identifier through the browser application without further validation of the data access request. The current invention provides additional convenience and security for third party login operations. | 2014-12-25 |
20140380427 | METHODS FOR DETERMINING AUTHENTICATION REQUIREMENTS OF INFORMATION CENTRIC NETWORK BASED SERVICES AND DEVICES THEREOF - A method, device, and non-transitory computer readable medium for determining and representing one or more authentication requirements for at least one valid service flow of one or more information centric network (ICN) based services. This technique involves capturing service specification and storing it in a repository. Then, one or more possible service flows are generated and represented based on the nature of contents, delivery options and preferred architecture. This representation is again modified based on the trust level among functional entities and authentication scope which are inferred from the service specification. The final representation of the service flow shows only the valid inter-connections and operations among functional entities and the service flow is constrained by authentication requirement. | 2014-12-25 |
20140380428 | AUTHORIZATION SERVER SYSTEM, CONTROL METHOD THEREOF, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An authorization server system that manages authorization information configured to enable providing of a service without requiring input of authentication information, comprises: a management unit which manages the authorization information; a providing unit which provides a deletion screen that includes the authorization information generated when an authorization operation of a user is performed but not the authorization information generated without performing the authorization operation of the user in accordance with reception of a request of the deletion screen configured to delete the authorization information managed by the management unit; and a deletion unit which deletes the authorization information managed by the management unit, in accordance with reception of a deletion instruction via the deletion screen. | 2014-12-25 |
20140380429 | AUTHORITY DELEGATE SYSTEM, AUTHORIZATION SERVER SYSTEM, CONTROL METHOD, AND PROGRAM - An authority delegate system, including a server system which provides a service to a device having an application, and an authorization server system which performs authorization processing to delegate user authority in the service to a usage source of the service, includes a management unit, and a providing unit. The management unit identifies authority of the application, in accordance with having received a request to register the application as the usage source, and manages the identified authority, and an identifier of the application, in an associated manner. The providing unit provides the service, in a case where an authorization operation has been performed to permit delegating of the user authority to the application transmitting a request to use the service, and an authority which the application uses is included in authorities associated with the identifier of the application. | 2014-12-25 |
20140380430 | IMAGE FORMING APPARATUS HAVING TRANSMISSION FUNCTION, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - An image forming apparatus capable of maintaining user's convenience in performing transmission while utilizing a transmission setting even when destinations usable for the transmission according to the transmission setting are restricted to a predetermined destination such as an authenticated user's address in order to enhance security. In a case where destinations usable for the transmission according to the transmission setting are restricted to an authenticated user's address and where at least one transmission destination registered in the transmission setting differs from the user's address, the at least one transmission destination registered in the transmission setting is rewritten to the authenticated user's address. | 2014-12-25 |
20140380431 | COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST AUTHORIZATION SYSTEMS AND COMPUTER PROGRAMS PRODUCTS THEREOF - A computer implemented method and computer program products to prevent attacks against authorization systems | 2014-12-25 |
20140380432 | METHOD, DEVICE AND SYSTEM FOR DATA DOWNLOADING - A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request; receiving network data returned according to the download request, and receiving a check result returned according to the security check request; and determining whether the check result indicates that the network data is secure; if yes, then continue receiving the returned network data, and if no, interrupt receiving the returned network data. In addition, a device and a system for data downloading are provided, which improve the security of data download. | 2014-12-25 |
20140380433 | Transport Communication Management - Methods and systems for communicating information are disclosed. An example method can comprise receiving information at a first device based on a first protocol. The information can be translated, at the first device, for communication to a second device based on a second protocol. A determination can be made as to whether the information matches a criterion associated with a transportation device. The information can be provided to the second device based on the second protocol and a determination that the information matches the criterion. | 2014-12-25 |
20140380434 | METHOD AND TRUSTED GATEWAY FOR WIFI TERMINAL ACCESSING TO PACKET DATA PS SERVICE DOMAIN - The embodiments of the present invention provide a method and a trusted gateway for a WiFi terminal to access a PS service domain. The method comprises: receiving an accounting request message sent by an authentication, authorization and accounting AAA server or a dynamic host configuration protocol DHCP request message sent by the WiFi terminal; establishing, by a trusted gateway, a first packet data protocol PDP context connection or a first packet data network PDN connection with the PS service domain according to attribute information of the WiFi terminal after receiving the accounting request message or the DHCP request message, so that the WiFi terminal accesses the PS service domain via the wireless local area network, the trusted gateway, and the established first PDP context connection or the first PDN connection. | 2014-12-25 |
20140380435 | DEVICE-SPECIFIC AUTHORIZATION AT DISTRIBUTED LOCATIONS - A method includes receiving authentication information for a client device at a server. The authentication information includes a geographic location of the client device and a first result of a one-way hash function based on a combination including an authentication seed and a first secret. The method includes computing, at the server, a second result of the one-way hash function based on a combination including the authentication seed and a second secret. The method also includes enabling the client device to access a second network in response to a determination by the server that the first result matches the second result and a determination by the server that the client device is authorized to access the second network based on the geographic location. | 2014-12-25 |
20140380436 | DIGITAL RIGHTS MANAGEMENT OF CONTENT WHEN CONTENT IS A FUTURE LIVE EVENT - A method and system for managing use of items having usage rights associated therewith including a point of capture system adapted to generate content of a future event when the event occurs, a content distributor adapted to generate a rights label having usage rights associated with content of the future event before the content is created, the rights label having a distribution key for encrypting the content as the content is generated, the distribution key being encrypted with a public key. The system also includes a license server adapted to generate a license associate with the content from the rights label before the content is generated, the license including the distribution key encrypted with the public key, and a content distributor adapted to distribute the license before the content is generated. | 2014-12-25 |
20140380437 | SYSTEM AND METHOD OF A RELAY SERVER FOR MANAGING COMMUNICATIONS AND NOTIFICATION BETWEEN A MOBILE DEVICE AND APPLICATION SERVER - Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device. | 2014-12-25 |
20140380438 | METHOD FOR INTEGRATING MANAGEMENT OF POSTED ARTICLES AND TERMINAL FOR THE SAME - There is provided a method for integrated management of posted articles and a terminal for the method. The method for integrated management of posted articles that is executed in a user terminal includes performing a login using an integrated ID when an integrated ID client module starts, having access to a posted article server where an article is written and requesting writing to the posted article server, transmitting a written and posted article to an integrated ID server and requesting storage of the posted article to the integrated ID server, and receiving a storage location where the posted article is stored from the integrated ID server and notifying the posted article server of the received storage location of the posted article. | 2014-12-25 |
20140380439 | Methods of Resetting Passwords in Network Service Systems Including User Redirection and Related Systems and Computer Program Products - Resetting a password for a network service account may include redirecting the user to a password reset tool, wherein the user is blocked from network access other than the password reset tool while being redirected. After redirecting the user to the password reset tool, user entry of verification information may be accepted, and the verification information from the user may be compared with known verification information for the user. User entry of a new password may be accepted if the verification information accepted from the user matches the known verification information for the user; and the new password may be stored as the known password for the user. Related systems and computer-program products are also discussed. | 2014-12-25 |
20140380440 | AUTHENTICATION INFORMATION MANAGEMENT OF ASSOCIATED FIRST AND SECOND AUTHENTICATION INFORMATION FOR USER AUTHENTICATION - An authentication information management program of an authentication information management apparatus allowing the authentication information management apparatus to execute: changing the first authentication information in correspondence information which is information including the first authentication information and second authentication information in association with each other and stored in a storage section of the authentication information management apparatus; transmitting the authentication apparatus of the changed first authentication information; determining, in response to a request from the apparatus to be authenticated, whether the second authentication information in the authentication request coincides with the second authentication information in the correspondence information; and returning, in the case where it is determined that the second authentication information in the authentication request coincides with the second authentication information in the correspondence information, the first authentication information associated with the second authentication information read from the storage section. | 2014-12-25 |
20140380441 | SECURE AND AUTOMATED CREDENTIAL INFORMATION TRANSFER MECHANISM - A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the central server sends it a secret text string. The virtual machine requests the credentials from the central server by transmitting the secret string and its instance ID. The central server validates the secret string and source IP to determine whether they are authentic. Once verified, the central server transmits the credentials to the virtual machine in a secure channel and invalidates the secret string. The credentials can now be used to authenticate API calls. | 2014-12-25 |
20140380442 | SYSTEM AND METHOD FOR ENABLING SECURE TRANSACTIONS USING FLEXIBLE IDENTITY MANAGEMENT IN A VEHICULAR ENVIRONMENT - A method in one embodiment includes authenticating a first agent to an on board unit (OBU) of a vehicle if the first agent validates a first set of one or more authentication requirements and identifying a first identity profile corresponding to the first agent. The method also includes determining a role of the first agent in the vehicle and configuring the vehicle with the first identity profile, where the vehicle is configured based, at least in part, on the role of the first agent. In this embodiment, the first identity profile is one of a plurality of identity profiles provisioned on the OBU. In specific embodiments, each one of a plurality of agents corresponds to a respective one of the plurality of identity profiles, and includes one or more of a human agent, a machine device, a software agent, an authorized entity, and a mobile device. | 2014-12-25 |
20140380443 | NETWORK CONNECTION IN A WIRELESS COMMUNICATION DEVICE - The secure sharing of network security credentials allows a wireless communication device to connect to a network. By sharing the security credentials out of band, using a different communications protocol (such as Bluetooth or Bluetooth Low Energy), devices can be easily and securely connected to the network. | 2014-12-25 |
20140380444 | OUT-OF-BAND CHALLENGE QUESTION AUTHENTICATION - A system and method for challenge question authentication comprises determining whether a log-in attempt requires additional authentication. A user attempts to log-in using a first application and a first delivery channel. When additional authentication is required, a challenge question is communicated to the user using a second application and a second delivery channel. The challenge question is specific to the user. An answer to the challenge question is received, and the user provides the answer using the first application and the first delivery channel. The log-in attempt is completed when the answer to the challenge question is correct. | 2014-12-25 |
20140380445 | Universal Authentication and Data Exchange Method, System and Service - A method for securely communicating information between an authenticator at a local endpoint and a remote device at a remote endpoint and for authenticating to the remote device. The method comprises activating the authenticator; determining at least one communication scheme useable at the local or remote endpoints or any midpoints between the local and the remote endpoints on a communication channel; determining authentication schemes and authentication credentials usable at the local or remote endpoints or any midpoints on the communication channel; determining data encryption schemes useable at the local or remote endpoints or any midpoints on the communication channel; a user supplying authentication credentials to the authenticator; the authenticator supplying determined authentication credentials to the remote device; and responsive to a successful authentication, the authenticator and remote device exchanging information according to a determined communication scheme and a determined encryption scheme. | 2014-12-25 |
20140380446 | METHOD AND APPARATUS FOR PROTECTING BROWSER PRIVATE INFORMATION - A method and apparatus for protecting browser private information have been disclosed. The method including: detecting a viewing request to view private information of a current browser page; obtaining a current user's face image upon detecting the viewing request; determining based on a pre-set face recognition method, whether the current user's facial image and a registered user's face image bear same face print features, wherein the face print features are utilized to uniquely identify facial features of a person; and displaying the private information of the browser page, in response to a positive determination of bearing the common face print features. | 2014-12-25 |
20140380447 | Method, Apparatus, and System for Sending Credentials Securely - A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed. | 2014-12-25 |
20140380448 | SYSTEMS AND METHODS FOR IMPLEMENTING AND TRACKING IDENTIFICATION TESTS - Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated challenge graphic comprising a challenge character set whose appearance may change over time. In some embodiments, marketing content may be incorporated into a challenge message for use in an identification test. The marketing content may be accompanied by randomly selected content to increase a level of security of the identification test, in some embodiments, a challenge message for use in an identification test may be provided based on information regarding a transaction for which the identification test is administered. For example, the transaction information may include a user identifier such as an IP address. In some embodiments, identification test results may be tracked and analyzed to identify a pattern of behavior associated with a user identifier. A score indicative of a level of trustworthiness may be computed for the user identifier. | 2014-12-25 |
20140380449 | INFORMATION PROCESSING DEVICE AND METHOD, PROGRAM, AND RECORDING MEDIUM - To improve the convenience of a user and further provide service comfortable and safe for the user. A PK storing PMD as personal related information of a user communicates with a service system. When first using the service system, the PK stores the service ID of the service system and a spoofing preventing method. When the PK communicates with the service system for a second time and thereafter, a spoofing preventing process is mutually performed, and then the PMD is provided to the service system. The service system reads or changes the PMD on the basis of access permission information set in advance by the user. The present disclosure is applicable to PDAs. | 2014-12-25 |
20140380450 | SYSTEM AND METHOD TO PROVIDE BUILT-IN AND MOBILE VPN CONNECTIVITY - A system and method for facilitating the establishment of a virtual private network between a network and a remote computer, the system having: a mobile device connectable to the remote computer and storing a user profile, virtual private network information, and password information; virtual private network software being located on one of the mobile device and the remote computer; an access point communicating with the network; and communication means for communications between the access point and one of the mobile device and the remote computer, wherein the user profile, virtual private network information, and password information is passed to the virtual private network software upon connection of the mobile device to the remote computer, the virtual private network software using the user profile, virtual private network information, and password information to establish a virtual private network through the communications means and the access point to the network. | 2014-12-25 |
20140380451 | APPARATUS AND METHOD FOR PROVIDING A SECURITY ENVIRONMENT - A method for providing a security environment. The method includes detecting user information from an accessory in response to detection of the accessory, performing security authentication with input security information if the user information is detected; and providing the security environment when the security authentication is successful. | 2014-12-25 |
20140380452 | SECURITY TOKEN AND TRANSACTION AUTHORIZATION SYSTEM - A security token is conceived, in particular a smart card, being adapted to support multi-factor user authentication, said security token comprising: a tactile sensing user interface being adapted to capture a stream of input data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a user-specific credential for authorizing a transaction; a conversion unit being adapted to convert said stream of input data into a machine-readable credential; a computation unit being adapted to compute a machine-readable authentication code based on the machine-readable credential; a contact-bound interface being adapted to transmit said machine-readable authentication code to a first transaction device; a contactless interface being adapted to transmit said machine-readable authentication code to a second transaction device. | 2014-12-25 |
20140380453 | COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST USER AUTHENTICATION AND COMPUTER PROGRAMS PRODUCTS THEREOF - The computer implemented method comprising: receiving a first server a request in the name of a user to be logged into a service of said first server and authenticating said request by verifying user identification information of said user, wherein a second server in connection with a user computing device with a dedicated program is used for: receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication; verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status to said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid. | 2014-12-25 |
20140380454 | WHITE-LIST FIREWALL BASED ON THE DOCUMENT OBJECT MODEL - Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to produce a white-list rendering of the data which presents the non-executable elements of the data and, potentially, outputs of the executable elements of the data without the executable elements that could be used to carry a security threat. Some embodiments provide control over which nodes of the DOM tree are included in producing the white-list rendering. Specifically, a configuration file is specified to white-list various nodes from the DOM tree and the white-list rendering is produced by including the DOM tree nodes that are specified in the white-list of the configuration file while excluding those nodes that are not in the white-list. Some embodiments provide a hybrid firewall that executes a set of black-list rules over white-listed nodes of the DOM tree. | 2014-12-25 |
20140380455 | System and Method for Making Application Requests into Private Firewalled Networks - A first agent process is provided in a first computing environment. The first agent process is in communication with a first application. A second agent process is provided in a second computing environment, and the second agent process is in communication with a second application. Both the second agent process and first application run behind a firewall. The first agent process and second agent process communicate with each other across the firewall to have tasks performed by the second application on behalf of the first application. | 2014-12-25 |
20140380456 | INTEGRATED DATA TRAFFIC MONITORING SYSTEM - The present invention includes an integrated data traffic monitoring system monitoring data traffic received from a communication network and destined for a protected network. The monitoring system includes a security appliance and one or more security and monitoring technologies such as hardware and open source and proprietary software products. The security appliance and the security and monitoring technologies may be implemented as separate and distinct modules or combined into a single security appliance. The security and monitoring technologies monitor network data traffic on, or directed to, the protected network. The monitoring system collects data from each of the technologies into an event database and, based on the data, automatically generates rules directing one or more of the technologies to prevent subsequent communications traffic from specific sources from entering the protected network. | 2014-12-25 |
20140380457 | ADJUSTING DDOS PROTECTION - A system, method and computer readable storage medium that blocks network traffic exceeding a user selected value. Received data packets are analyzed to determine volumetric traffic flow so as to graphical represent the determined volumetric traffic flow for the received data packets on a display device. A countermeasure filter is provided having at least one traffic setting operational to block data packet traffic flow from the one or more external devices when the volumetric data packet flow exceeds a prescribed threshold value. The prescribed threshold value is determined by a user positioned indicator on a display device graphically representing the determined volumetric traffic flow. | 2014-12-25 |
20140380458 | APPARATUS FOR PREVENTING ILLEGAL ACCESS OF INDUSTRIAL CONTROL SYSTEM AND METHOD THEREOF - Disclosed is an apparatus for preventing illegal access of industrial control system and a method thereof in accordance with the present invention. The apparatus for preventing illegal access of industrial control system includes: a first interface communicating a packet by interoperating with a management network group that requests a control command; a second interface communicating a packet by interoperating with a control network group that receives a control command from the management network group and processes it; and a control device, which, when a packet flows therein from the management network group or the control network group, checks whether or not at least one filter rule is set and controls the packet flow between the management network group and the control network group using the filter where the rule is set. | 2014-12-25 |