Patent application number | Description | Published |
20090158443 | PIRACY PREVENTION, DETECTION, AND CONTENT MANAGEMENT - A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message. | 06-18-2009 |
20090293126 | MALWARE DETECTION DEVICE - An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware. | 11-26-2009 |
20100043047 | UNAUTHORIZED DATA TRANSFER DETECTION AND PREVENTION - A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class. | 02-18-2010 |
20100061662 | System and Methods for Recording Emergency Data - A system and method for recording emergency data during a 911 call. The emergency data recorded may be in the form of a digital image. The digital image may be of the event prompting the 911 call. The digital image may be a single image, a series of images, or streaming video. The emergency data may be received on a portable electronic device, such as a cell phone, through a digital imaging device, such as a digital camera. The emergency data may then be transmitted to a server, wherein the emergency data is stored. The emergency data may be accessed by a 911 dispatcher during a 911 call to review the image data to aid in assessing the emergency recorded in the emergency data. | 03-11-2010 |
20100094619 | AUDIO FREQUENCY REMAPPING - An exemplary system and method are directed at receiving an audio signal and process the audio signal into a remapped audio signal based on a plot profile. The plot profile may include at least one of an identified range of audio frequencies. The processing may comprise retrieving an identified range of audio frequencies from the plot profile; determining a range of impaired audio frequencies in the audio signal based on the identified range of audio frequencies; shifting the frequency of at least a portion of the impaired audio frequencies to outside of the identified range; and continuing to retrieve identified ranges of audio frequencies from the plot profile. The shifting of the impaired audio frequencies of the audio signal may be performed until no further identified ranges of audio frequencies are available for consideration. | 04-15-2010 |
20100154012 | TELEVISION BOOKMARKING WITH MULTIPLATFORM DISTRIBUTION - A system includes a content processing device in communication with a control device, the content processing device is configured to receive multi-media content from a network, and create a bookmark representing at least a portion of the multi-media content upon receiving a signal from the control device. | 06-17-2010 |
20100325140 | SYSTEM FOR AND METHOD OF PARALLEL SEARCHING - A system for and method of parallel searching is presented. According to an embodiment, the techniques may be realized as a method, comprising receiving, at a network device, an indication of an electronic media selection from a user, identifying a search input in metadata associated with the electronic media selection, searching one or more electronic data sources based at least in part on the identified search input, and providing one or more search results via a network to one or more devices accessible to the user, wherein the one or more search results are capable of being delivered during delivery of the electronic media selection to the user. | 12-23-2010 |
20110016485 | DOUBLE-CLICK CHANNEL BUTTON ACCESS OF USER-DEFINED CONTENT LIST - A set-top box receives a channel input from a remote control associated with a user, and determines whether the channel input is a double-click channel input. The set-top box retrieves a user-defined content list, associated with the user, when the channel input is determined to be a double-click channel input, and tunes to a channel associated with the retrieved user-defined content list. The set-top box also receives content associated with the tuned to channel, and provides the received content to a television, where the television displays the received content to the user. | 01-20-2011 |
20110107084 | SYSTEM FOR AND METHOD FOR RELAYING MESSAGES - A system for and method of relaying messages is presented. In an exemplary embodiment, the system and method may include receiving a request from a user to transmit a message to an intended recipient, processing the message for transmission, wherein processing the message comprises assigning metadata to the message, and transmitting the message with the metadata to the intended recipient, where transmitting the message with metadata comprises searching for at least one proximate ad hoc relay device in the event that a communication link cannot be established with a communication network. | 05-05-2011 |
20110135075 | METHOD AND SYSTEM FOR PROVIDING CALLER IDENTIFICATION BASED MESSAGING SERVICES - An approach provides caller identification-based messaging services. A user-defined message associated with a directory address of a communication device is received. The user-defined message is inserted into a caller identification field of a caller identification message. Establishment of a communication session is initiated with the communication device. The caller identification message is transmitted to the communication device for presentation of the user-defined message during establishment of the communication session. | 06-09-2011 |
20110136502 | NETWORK PROVIDING GEO-TAGGED DATA - A method includes receiving geo-tagged data by a user device, wherein the geo-tagged data includes information tagged with geographic data; determining a geographic location of the user device; comparing the geographic data with the geographic location; determining whether the information is to be provided to a user associated with the user device based on the comparing; and providing the information to the user when the geographic location is within a geographic region indicated by the geographic data. | 06-09-2011 |
20110145927 | METHOD AND SYSTEM FOR PROVIDING REMOTE CONFIGURATION OF MISSING MOBILE DEVICES - An approach is provided for remotely configuring a mobile device designated as missing. A request to remotely configure the mobile device is received. In response to the request, at least one setting parameter specifying at least one action to be performed by the mobile device is retrieved. A control message specifying the at least one setting parameter is generated. It is determined whether the mobile device is network inaccessible. The control message is queued for transmission over a data channel to the mobile device when the mobile device is determined to be network inaccessible. | 06-16-2011 |
20110153437 | METHOD AND SYSTEM FOR PROVIDING VIRTUAL CREDIT CARD SERVICES - An approach is provided for virtual credit card services. A request for a limited use transactional account number representing a virtual credit card is generated at a mobile device. The limited use transactional account number is received in response to the request. A point of sale interface is configured with the limited use transactional account number for presentation at a point of sale terminal. | 06-23-2011 |
20120036344 | CONTEXT-SENSITIVE USER DEVICE CONTROL PROFILE - A method including receiving control profile information that controls one or more operations of a user device during an event associated with a user; generating a control profile based on the control profile information; controlling the one or more operations of the user device based on the control profile for a duration of the event; and automatically setting the user device to a previous state or a new state after the event transpires. | 02-09-2012 |
20120082424 | METHOD AND APPARATUS FOR SYNCHRONIZING CONTENT PLAYBACK - An approach for facilitating the playback of content concurrently on multiple devices is described. A time reference associated with a first device is provided to a synchronization platform for corresponding to playback of content on the first device. The synchronization platform also receives a request from a second device to synchronize concurrent playback of a version of the content on the second device. Timing information is generated for transmission to the second device in response to the request for enabling the second device to playback its version of the content in synchronization with that of the first device. | 04-05-2012 |
20120084286 | METHOD AND APPARATUS FOR GROUP COORDINATION OF CALENDAR EVENTS - An approach for managing calendar information received from a plurality of data sources is described. Calendar information associated respectively with a plurality of data sources is retrieved by a calendar management platform. For each of the data sources, metadata specifying a contributor of the corresponding calendar information and for relating distribution of the calendar information is determined. Based on the first and second metadata, a data view for the calendar information is generated. | 04-05-2012 |
20120149309 | METHOD AND SYSTEM FOR PROVIDING PROXIMITY-RELATIONSHIP GROUP CREATION - An approach for enabling computing devices to establish and recognize a relationship group based on physical proximity is described. A proximity management platform monitors a plurality of activities of a mobile device. The monitored activities include communications with one or more devices within a predetermined proximity of the mobile device. The proximity management platform stores the monitored activities and associated timing information. | 06-14-2012 |
20120150808 | METHOD AND SYSTEM FOR PERFORMING DATA BACKUP AND RESTORATION - An approach for enabling execution of data backup and restoration among a group of user devices is described. A data management platform detects at a source device, one or more peer devices capable of wireless communication with the source device. It then determines one or more of the peer devices as belonging to a backup device group according to a predetermined criterion. The data management platform | 06-14-2012 |
20120167234 | PERSONA-BASED IDENTITY MANAGEMENT SYSTEM - A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data. | 06-28-2012 |
20120314077 | NETWORK SYNCHRONIZED CAMERA SETTINGS - A network device receives, from a first video camera system, position information for a first video camera at a first site and sends, to a second video camera system, position instructions for a second video camera at a second site. The position instructions are configured to locate the second video camera within the second site to correspond to a relative position of the first camera in the first site. The network device receives, from the first video camera system, a first video feed including images of the first site and receives, from the second video camera system, a second video feed including images of a subject of the second site. The network device combines the first video feed and the second video feed to generate a synchronized combined video feed that overlays the images of the subject of the second video feed in images of the first site. | 12-13-2012 |
20130061285 | METHOD AND SYSTEM FOR PROVIDING BEHAVIORAL BI-DIRECTIONAL AUTHENTICATION - An approach for authenticating parties engaged in a web-based transaction without compromising the integrity or anonymity of the parties is described. An authentication platform receives, from a first application associated with a first party, an authentication request that has been redirected in response to a transaction initiated with a second application associated with a second party. The authentication platform forwards knowledge based assessment information to the first application that is based on determined behavioral information for authenticating the second party to the first party. A valid response to the knowledge based assessment information by the first application provides authentication of the first party to the second party. | 03-07-2013 |
20130063538 | METHOD AND APPARATUS FOR PROVIDING DEVICE ANGLE IMAGE CORRECTION - An approach for providing device angle image correction. An image (e.g., still or moving) of a subject is captured via a camera of a mobile device. One or more geometrics parameters associated with the subject are determined in relation to the mobile device. One or more camera parameters for the mobile device are also determined. An image correction scheme is applied to the image based on the camera parameters and the geometrics parameters to output a modified image. | 03-14-2013 |
20130083149 | METHOD AND APPARATUS FOR DEVICE PEER RESOURCE POOLING - An approach is provided for generating a composite signal. A plurality of media signals are received over a wireless communication network from a plurality of mobile devices. One or more of the received media signals are selected according to a criterion. A composite signal is generated from the selected media signals. | 04-04-2013 |
20130162781 | INTER POLATED MULTICAMERA SYSTEMS - An approach for enabling users to generate an interpolated view of content based on footage captured by multiple cameras is described. An interpolation platform receives a plurality of images from a plurality of video cameras providing overlapping fields of view. A camera angle that is different from angles provided by the plurality of cameras is selected. The interpolation platform then generates an interpolated image corresponding to the selected camera angle using a portion or all of the plurality of images from the plurality of cameras. | 06-27-2013 |
20130191885 | SECURE MOBILE INTERFACE ACCESS SYSTEM - A method performed by one or more server devices connected to a mobile device via a network, the mobile device being connected to an electronic device is provided that can include sending, by the one or more server devices and to the mobile device, data initiating a session between the one or more server devices and the mobile device; sending a request for information about the electronic device; receiving the requested information about the electronic device; identifying device credentials for the electronic device and communication protocols for communicating with the electronic device; providing the device credentials for the electronic device and the communication protocols for communicating with the electronic device; automatically gathering information about the electronic device from data stored on the electronic device using the communication protocols and the mobile device; and providing support to the electronic device via the mobile device. | 07-25-2013 |
20130318613 | MOBILE APPLICATION SECURITY SCORE CALCULATION - The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score. | 11-28-2013 |
20130318614 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 11-28-2013 |
20140310764 | METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION AND IDENTIFICATION BASED ON GESTURES - An approach is provided for authenticating and/or identifying a user through gestures. A plurality of media data sets of a user performing a sequence of gestures are captured. The media data sets are analyzed to determine the sequence of gestures. Authentication of the user is performed based on the sequence of gestures. | 10-16-2014 |
20140380413 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 12-25-2014 |
20150037011 | Methods and Systems for Recovering Media Content Lost Due to a Channel Change Event - An exemplary method includes a media content recovery system 1) detecting that a DVR device is tuned to a first channel used by a media content provider to distribute a first media content program, 2) dynamically storing, in response to the detecting, first program data representative of the first media content program in a local buffer residing on the DVR device and in a recovery buffer as the first media content program is distributed by the media content provider, and 3) directing the DVR device to use the first program data stored in the local buffer to present the first media content program by way of a display while the DVR device is tuned to the first channel. Corresponding methods and systems are also disclosed. | 02-05-2015 |
20150067798 | SELECTIVE COMPLEX DATA ENTRY FROM ONE TIME PASSWORDS FOR AUTHENTICATION - A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that include the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion. | 03-05-2015 |
20150089607 | METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION AND IDENTIFICATION BASED ON A ONE-TIME PASSWORD - An approach is provided for authenticating and/or identifying a user through machine-transferrable one-time password codes. A user device sends to an authentication platform a request for a one-time password for authenticating a user at a relying party device. A machine readable form of the one-time password deliverable to the relying party device over an air gap between the user device and the relying party device is determined and transmitted. The relying party device reverts the machine readable form back to the one-time password, and transmits the one-time password to the authentication platform to authenticate the user device. | 03-26-2015 |
20150089613 | METHOD AND SYSTEM FOR PROVIDING ZERO SIGN ON USER AUTHENTICATION - An approach for receiving a request for an authentication code for presentation in an authentication user interface, wherein the request is from a relying party and wherein the authentication user interface is presented by the relying party at a first device. The approach further involves transmitting the authentication code to the relying party. The approach also involves authenticating a user with respect to the relying party by determining that a second device associated with the user has read the authentication code from the authentication user interface of the first device, wherein the second device is a previously authenticated device. | 03-26-2015 |