Patents Issued in April 13, 2017
-
Publication number: 20170104766Abstract: Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. A first framelet is sent to a first client device. A second framelet is sent to a second client device. When the first and second client devices are oriented such that the first and second framelets are aligned in a particular manner, the content is made viewable to a user.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventor: Ketan Bhardwaj
-
Publication number: 20170104767Abstract: An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines. The method may further include identifying, in view of the monitoring, a virus-infected application running on a virtual machine of the plurality of virtual machines. The method may further include terminating the virus-infected application. The method may further include receiving, in view of the monitoring, resource usage data reflecting types and duration of usage of the computing resources. The method may further include generating, in view of the usage data, a report reflecting usage of the computing resources.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Inventors: James Michael Ferris, Gerry Edward Riveros
-
Publication number: 20170104768Abstract: A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Alex M. Semenko, Preston Derek Adam, Innokentiy Basmov, Narendra S. Acharya, Peter J. Novotney, Salil Arun Bhagurkar, Yogesh A. Mehta
-
Publication number: 20170104769Abstract: A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems within a security intelligence platform which accumulate events within the IT environment associate an event ingest time with the event. When the events are provided for analysis, the device time accumulation operation analyzes the ingest times as well as the emit time to take into account historical time data associated with the accumulated events.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Gregory A. Davis, Irakle Dzneladze, Jason D. Keirstead, Helene Saint-Amour
-
Publication number: 20170104770Abstract: A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller (BMC) to transmit a plurality of memory addresses identifying where a plurality of network packets received by the IHS are stored. A field programmable gate array (FPGA) within a processor receives the memory addresses of the network packets and retrieves the network packets. The network packets are analyzed by comparing at least one threat signature that is associated with undesired network behavior with the contents of the network packets. In response to the at least one threat signature matching the contents of at least one of the network packets, an intrusion alert is transmitted to the BMC.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Applicant: DELL PRODUCTS, L.P.Inventors: ELIE ANTOUN JREIJ, CHITRAK GUPTA, WADE ANDREW BUTCHER, SUSHMA BASAVARAJAIAH, RAMA RAO BISA
-
Publication number: 20170104771Abstract: There is provided a network monitoring device including: a memory; and a processor coupled to the memory and the processor configured to: detect, based on history record information on attempts to log into a plurality of information processing devices from a plurality of terminals via a network, occurrences of attempts that were made to log into the plurality of information processing devices with common account information a predetermined number of times or less; and reject an attempt to log into an information processing device among the plurality of information processing devices from a terminal among the plurality of terminals and notify the terminal of a re-attempt to log into the information processing device after the occurrences of attempts are detected.Type: ApplicationFiled: September 28, 2016Publication date: April 13, 2017Applicant: FUJITSU LIMITEDInventors: Satomi Saito, Satoru Torii, Hiroshi Tsuda
-
Publication number: 20170104772Abstract: Methods and systems for detecting an electronic intrusion are described. A user activity may be identified for a user account. A location of a user corresponding to the user account may be determined. It may be identified, based in part on the location of the user, whether to communicate a request to the user for instructions to respond to the user activity. A response may be received from the user in response to determining to communicate the request to the user for instructions. The response may include instructions to block access to the user account at a server. Command information may be communicated to the server. The command information may include a command to block access to the user account.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Inventor: Srinivasan Raman
-
Publication number: 20170104773Abstract: In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines whether the supervised anomaly detection model detected an anomaly in the network from the analyzed data. The device trains an unsupervised anomaly detection model, based on a determination that no anomalies were detected by the supervised anomaly detection model.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Fabien Flacher, Grégory Mermoud, Jean-Philippe Vasseur, Sukrit Dasgupta
-
Publication number: 20170104774Abstract: In one embodiment, a device in a network receives an output of an anomaly detection model. The device receives state information surrounding the output of the anomaly detection model. The device determines whether the state information supports the output of the anomaly detection model. The device causes the anomaly detection model to be adjusted based on a determination that the state information does not support the output of the anomaly detection model.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Jean-Philippe Vasseur, Fabien Flacher, Grégory Mermoud
-
Publication number: 20170104775Abstract: In one embodiment, a device in a network maintains information regarding anomaly detection models used in the network and applications associated with traffic analyzed by the anomaly detection models. The device receives an indication of a planned application deployment in the network. The device adjusts an anomaly detection strategy of a particular anomaly detector in the network based on the planned application deployment and on the information regarding anomaly detection models used in the network and the applications associated with the traffic analyzed by the anomaly detection models.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Jean-Philippe Vasseur, Sukrit Dasgupta, Grégory Mermoud
-
Publication number: 20170104776Abstract: A computer-implemented method and system for analyzing and maintaining data security in backup data, comprising of: accessing backup data of file systems on-site or remotely from a backup server; determining which data is present in a backup system; defining an abnormality data selection criteria to identify security components within the scope of said backup system; performing a data security analysis on backup data; if data abnormality in data are detected in backup data, determining compromised target files, identifying all other files created or modified associated with said compromised target files, including files having a parent-child relationship in both up and down directions of the parent-child tree, including files that are other children of the compromised files in the parent-child tree, including files created or modified by of the compromised files, and including data launched from those files.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Guy HALFON, Boaz APT
-
Publication number: 20170104777Abstract: A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems within a security intelligence platform which accumulate events within the IT environment associate an event ingest time with the event. When the events are provided for analysis, the device time accumulation operation analyzes the ingest times as well as the emit time to take into account historical time data associated with the accumulated events.Type: ApplicationFiled: December 16, 2015Publication date: April 13, 2017Inventors: Gregory A. Davis, Irakle Dzneladze, Jason D. Keirstead, Helene Saint-Amour
-
Publication number: 20170104778Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.Type: ApplicationFiled: October 12, 2016Publication date: April 13, 2017Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
-
Publication number: 20170104779Abstract: Embodiments of the invention are directed to a system, method, or computer program product for an engine for exposing vulnerability within applications based on application characteristic identification. In this way, the engine identifies existing data sets that aid in understanding the possible privacy vulnerabilities associated with technologies such as applications, operated by an entity. The engine comprises dials and levers that allow for prioritization visualization of vulnerabilities critical to a particular portion of the entity. In this way, a user can drive the application engine allowing them to narrow the focus on any number of variations of application characteristics including, but not limited to types of vulnerabilities, status of the vulnerabilities, critical applications, regulated applications, vulnerabilities, business continuity and/or accessibility to the applications.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Daniel Edward Middleman, John Henry Denning, Keith Allen Topel
-
Publication number: 20170104780Abstract: A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element. For each one of the twice-tested component stages, comparing results from the first test and the second test, wherein the comparison yields or leads to information helpful in assessing effectiveness of the first cybersecurity technology on each respective one of the twice-tested component stages at the computer network element.Type: ApplicationFiled: October 6, 2016Publication date: April 13, 2017Inventors: Kara Zaffarano, Joshua Taylor, Samuel Hamilton
-
Publication number: 20170104781Abstract: A system is described for securing data saved on servers against external security threats. The system includes a computing device connected to a data vault via a communications network and a server. The data vault stores personal information of a user. An alias is assigned to the personal information so that it is not disclosed during processing of a transaction by a server. When the user desires to complete a purchase, the user logs into a website having access to the server. To complete a purchase, the server queries the data vault for the user's sensitive personal information. The data vault responds with the aliases corresponding to the user's personal information so that the user may select payment and shipping information from among the aliases. Payment and shipping information are confirmed by selecting the desired aliases, which the server then transmits to the data vault for completion of the transaction.Type: ApplicationFiled: October 10, 2016Publication date: April 13, 2017Inventor: Michael C. Wood
-
Publication number: 20170104782Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.Type: ApplicationFiled: October 22, 2015Publication date: April 13, 2017Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
-
Publication number: 20170104783Abstract: Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: ODED VANUNU, Liad Mizrachi
-
Publication number: 20170104784Abstract: A method includes receiving a set of strings and applying one or more filters to generate a subset of strings that are determined to correspond to strings of interest. The method also includes retrieving domain name system (DNS) information associated with a first string of the subset. The method includes executing a rule-based engine to determine, based on application of one or more rules to the DNS information, whether to add the first string to a set of suspicious hostnames.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventors: Mark Richard Stemm, Arlyn Robert Johns
-
Publication number: 20170104785Abstract: A system that generates decoy emails and documents by automatically detecting concepts such as dates, times, people, and locations in e-mails and documents, and shifting those concepts. The system may also generate an email or document reciting a URL associated with a fake website and purported login credentials for the fake website. The system may send an alert to a user of the system when someone seeks to access the fake website.Type: ApplicationFiled: August 10, 2016Publication date: April 13, 2017Inventors: Salvatore J. Stolfo, Carl Sable
-
Publication number: 20170104786Abstract: An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active TLS session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point. The technique enables an origin to authorize the edge server to inject cached data at certain points in a TLS session, as well as to mathematically and cryptographically revoke any further access to the stream until the origin deems appropriate.Type: ApplicationFiled: December 26, 2016Publication date: April 13, 2017Inventors: Charles E. Gero, Michael R. Stone
-
Publication number: 20170104787Abstract: A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such communications for purposes of identifying communication issues that may affect user QoE (quality of experience). In certain embodiments, an application may be modified to log communication data before encryption and after decryption. For example, the application program may be decompiled and logging instructions may be inserted before portion that result in data encryption and after portions where received data is decrypted. The modified application program may then be recompiled and executed on a device to produce an unencrypted log of data. In other embodiments, elements of the device operating system may be modified to log data before encryption and after decryption.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventor: Peter P. Myron
-
Publication number: 20170104788Abstract: Systems, methods, and computer program products to perform an operation comprising determining that a first component of a first compute node violates a compliance rule, wherein the first compute node executes a plurality of workloads and is of a plurality of compute nodes in a computing cluster, performing a predefined operation to defer need to apply a software update configured to correct the violation of the compliance rule by the first component of the first compute node, and executing, by the first compute node, at least one of the plurality of workloads without applying the software update.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Gary D. CUDAK, Christopher J. HARDEE, Adam ROBERTS, Adrian X. RODRIGUEZ
-
Publication number: 20170104789Abstract: Methods to perform an operation comprising determining that a first component of a first compute node violates a compliance rule, wherein the first compute node executes a plurality of workloads and is of a plurality of compute nodes in a computing cluster, performing a predefined operation to defer need to apply a software update configured to correct the violation of the compliance rule by the first component of the first compute node, and executing, by the first compute node, at least one of the plurality of workloads without applying the software update.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Gary D. CUDAK, Christopher J. HARDEE, Adam ROBERTS, Adrian X. RODRIGUEZ
-
Publication number: 20170104790Abstract: In one implementation, a risk assessment of an asset is compared to a risk level of a security policy and network traffic associated with the asset is assigned to a group associated with the security policy when the risk assessment achieves the risk level of the security policy.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Applicant: Trend Micro IncorporatedInventors: Russell MEYERS, Scott RIVERS, Matthew LASWELL
-
Publication number: 20170104791Abstract: Embodiments disclosed herein provide feature-level access control functionality useful for enforcing access controls to features and subfeatures on uncontrolled, third party Web Applications such as those associated with social networking sites. Specifically, pages of uncontrolled Web applications are programmatically inspected as they are accessed by users of an enterprise computing environment. Specific features on the pages are located and access to these features is enabled or disabled on a per user basis. A modified page is generated if feature(s) on a Web page is/are to be disabled. To block certain feature(s), content may be rewritten on-the-fly. Because embodiments disclosed herein can programmatically inspect a Web page and understand what is on the page at a much finer granularity, it is possible for enterprises to gain benefits that may come from embracing social networking sites without risking the downsides of allowing enterprise users access to uncontrolled Web applications.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventor: Cameron Blair Cooper
-
Publication number: 20170104792Abstract: A method of establishing a media session between a first mobile station and a second mobile station, the method including receiving, at an MQTT messaging service and from the first mobile station, a first MQTT subscription request for a first topic name used to indicate the second mobile station agrees to establish a media session with a mobile station; receiving, at the MQTT messaging service and from the first mobile station, a first MQTT application message having a second topic name used to indicate a mobile station requests establishing a media session with the second mobile station; issuing, in response to receiving the first MQTT application message, an indication to the second mobile station that a mobile station requests establishing a media session with the second mobile station; receiving, at the MQTT messaging service and from the second mobile station, a second MQTT application message having the first topic name; forwarding the second MQTT application message to the first mobile station; receiviType: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Kumar Sanjeev, Dongliang Hu
-
Publication number: 20170104793Abstract: Systems and methods are provided for enabling real-time synchronous communication with persons appearing in image or video files. For example, an image or video file is displayed on a display screen of a computing device. The computing device detects a user selection of a person present in the displayed image or video. A request is sent from the computing device to a service provider for profile information associated with the user-selected person. The computing device receives from the service provider profile information associated with the user-selected person, wherein the profile information includes a communications address of the user-selected person. The communications address is utilized to initiate a communications session on the computing device with the user-selected person present in the displayed image or video.Type: ApplicationFiled: December 13, 2016Publication date: April 13, 2017Inventor: Robert G. Farrell
-
Publication number: 20170104794Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: ApplicationFiled: December 16, 2016Publication date: April 13, 2017Inventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
-
Publication number: 20170104795Abstract: In one embodiment a router connects to a cellular network using at least one authentication credential stored on a smart card of the router. The router receives, from a client device coupled to the router, a Session Initiation Protocol (SIP) request to register with an Internet Protocol Multimedia Subsystem (IMS) network coupled to the cellular network. The router sends a SIP registration request for the client device to the IMS network, the SIP registration request comprising authorization information associated with the router, wherein the authorization information associated with the router is used by the IMS network to register the client device with the IMS network.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Srinath Gundavelli, Vimal Srivastava, Vojislav Vucetic
-
Publication number: 20170104796Abstract: A method, system, and apparatus for simultaneous media collaboration between remotely located users is disclosed. Unlike the existing collaboration methods currently used, which often include emailing files and comments back and forth between different users, the disclosed system and method enables real-time communication and collaboration between remotely located users without requiring the use of email or editing software.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Applicant: ARMORED INFO, LLCInventor: Michael J. Fahey
-
Publication number: 20170104797Abstract: In certain information handling system environments, remote conferencing may require the transmission of multi-media content. The server may query a client that has joined the remote conference to determine if the client supports the encoding format of the multi-media content. A source filter may load the requested multi-media content whereupon the multi-media content is split into audio content and video content by a demultiplexor and then transmitted via a multi-media redirection multiplier filter to a proxy client of each client joined to the remote conference or only selected clients. The multi-media content is processed and decoded at the client system using local hardware at the client thereby offloading demand on the server to the client.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventor: Ramanujam Kaniyar Venkatesh
-
Publication number: 20170104798Abstract: Systems and methods for broadcasting events are provided. The system, for example, may include, but is not limited to, a communication system, a memory, and a processor. The processor may be configured to receive, from the communication system, a session identifier identifying a broadcast session and at least one application event corresponding to the broadcast session from a presenting electronic device, update a playback queue corresponding to the broadcast session stored in the memory based upon the received at least one application event, receive, from the communication system, a subscription request to the broadcast session from at least one subscribing electronic device, and transmit, via the communication system, a corresponding playback queue to each electronic device subscribed to the broadcast session, the playback queue including instructions to regenerate the application event within an application operating on the at least one subscribing electronic device.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Applicant: SALESFORCE.COM, INC.Inventor: Santhosh Kumar Kuchoor
-
Publication number: 20170104799Abstract: A method and system for providing information to an application related to an occurrence at a data node. A data node may include an application running on a mobile device. The data node generates an event when it observes a predefined occurrence. The predefined occurrence may be functionality of an application, data being copied, a message being received, or the like. The event generated by the data node includes information taken from a semantic space defined by a domain but selected based at least in part on the occurrence. A request is received from an application for events meeting interest criteria specified by the application. The system determines whether to establish a subscription for the application. If it does, the system delivers events meeting interest criteria for the subscription to the subscriber application.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Inventors: Leslie Prock, Steve Kondik, Ravi Subramanian
-
Publication number: 20170104800Abstract: Disclosed are various embodiments for a streaming video application. The application downloads, decodes, and renders video frame data at different frame rates. Based on the differences between these frame rates, the downloading frame rate is adjusted to minimize performance degradation.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Inventor: KEITH E. BELOVAY
-
Publication number: 20170104801Abstract: In one embodiment, a client device includes a processor to send a first GET request to a server for a first data chunk of a data item, a communication interface to receive packets of the first data chunk, a buffer to buffer the packets, wherein the processor is operative to obtain a first measure of round trip time (RTT), the processor is operative to estimate a time t1 when receipt of the last packet of the packets of the first data chunk in the buffer will be completed, the processor is operative to determine a next fetch time, t2, to send a second GET request to the server for a second data chunk of the data item, based on the time t1 adjusted by a portion of the first measure of RTT, the processor is operative to send the second GET request to the server at about time t2.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Bill VER STEEG, Ali C. Begen
-
Publication number: 20170104802Abstract: Aspects of the subject technology relate to mixing an aggregated content data structure into a content stream. A first plurality of aggregated content data structures is be received, each comprising a group of content items for display in a content stream of a user and being associated with a respective score. A first aggregated content data structure may be selected from among the first plurality of aggregated content data structures based on the scores and predetermined type target percentages associated with the user. The first aggregated content data structure may be mixed into a content stream associated with a user, and the content stream provided for display.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Inventors: Harish CHANDRAN, Lucian Florin CIONCA, Amogh Sanjay ASGEKAR, Panchapagesan KRISHNAMURTHY
-
Publication number: 20170104803Abstract: An apparatus comprises a receiver configured to receive a request for an adaptive streaming media presentation description (MPD), a processor coupled to the receiver and configured to generate the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information, and a transmitter coupled to the processor and configured to transmit the MPD. A method comprises receiving a request for an adaptive streaming media presentation description (MPD), generating the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information, and transmitting the MPD. An apparatus comprises a processor configured to generate a request for an adaptive streaming media presentation description (MPD), a transmitter coupled to the processor and configured to transmit the request, and a receiver coupled to the processor and configured to receive the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information.Type: ApplicationFiled: December 16, 2016Publication date: April 13, 2017Inventors: Alexander Giladi, Xin Wang
-
Publication number: 20170104804Abstract: Methods and devices for image data encoding are provided. Image data is created using at least one image captured by a camera of the electronic device. First encoded image data is created by encoding at least a portion of the image data in a first manner. Second encoded image data is created by encoding the at least a portion of the image data in a second manner. The second manner is different from the first manner. The first encoded data is stored in a memory of the electronic device. The second encoded data is transmitted from the electronic device to an external device.Type: ApplicationFiled: September 27, 2016Publication date: April 13, 2017Inventors: Taewon DO, Kichoon Gong, Jinkyu Kim
-
Publication number: 20170104805Abstract: Embodiments relate to providing a method for an authenticated user of an item of streaming media content to create a shareable clip of a portion of the item. The method comprises using an interface on a first device to accept, from the authenticated user, a first input to define the clip and a second input to create a comment; creating an identifier, uniquely corresponding to the authenticated user and the clip; and sending the identifier and the comment to a second user in a form that includes a clickable link. If the second user clicks on the clickable link, the clip is streamed to the second user to play on a second device, independent of whether the second user is authorized to access the whole of the content. The clickable link expires either after a predetermined time or after a predetermined number of plays by the second user.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Applicant: SONY INTERACTIVE ENTERTAINMENT NETWORK AMERICA LLCInventor: Margaret Plumley
-
Publication number: 20170104806Abstract: Methods and systems are provided for encoding content using a first encoding algorithm to produce first encoded content. Content can also be encoded using a second encoding alaorithm to produce second encoded content, where the second encoded content can comprise data that can be used to reconstruct the first encoded content. At any time relative to the encoding, a request for the content can be received from a user device. In response to receipt of the request, the first encoded content is transmitted to the user device and the second encoded content is transmitted to the user device.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Zhen Zhao, Sadasivan Ponnuswamy
-
Publication number: 20170104807Abstract: Systems and methods for remote control of computers and computing devices, such as tablets and mobile phones, including control software run on a control device, and a client application running on one or more controlled devices in network communication with the control device. The control device can be used to selectably lock or otherwise control the controlled device from further usage. In some examples, the systems and methods include multiple controlled devices. In some further examples, the systems and methods include a third-party provider that stores user credential information and generates corresponding external IDs, and both the control software and client application query the third-party provider upon startup to validate that the controlling user is authorized to lock the controlled devices.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Inventors: Matthew Braun, Maria Braun
-
Publication number: 20170104808Abstract: A control method of a network appliance, a network appliance, a mobile terminal and system, are provided. The control method includes: acquiring, by a feature phone, a control webpage address of the network appliance; opening, by the feature phone, a control webpage corresponding to the control webpage address through a browser, wherein the control webpage includes a control element and an address of the network appliance; and sending, by the feature phone, control request information corresponding to the control element to the network appliance through an internet by using the address of the network appliance as a destination address, when detecting that the control element is triggered.Type: ApplicationFiled: September 2, 2016Publication date: April 13, 2017Inventor: ZHEN LI
-
Publication number: 20170104809Abstract: The present invention, generally speaking, provides a broad-based solution for acquisition, processing and distribution of media objects including pictures (images), movies, videos, graphics, sound clips, etc via the Internet or the like. And specifically, it is a solution to such systems for use in applications wherein there are multiple originators of media objects that will be viewed in multiple web sites having different viewing requirements. A browser-based prepare and post tool prepares and submits media objects from inside a standard browser to a remote server. A Media Acquisition, Processing and Distribution (MAPD) system receives these media objects, processes them to meet specific requirements, and delivers them for integration into remote databases. MAPD system services include media object submission, processing, hosting and mirroring. The hosting service delivers a media object URL to a remote database, allowing the media object to be requested and served by the media object server.Type: ApplicationFiled: August 19, 2016Publication date: April 13, 2017Inventors: Lisa T. Wood, Scott M. Lewis, Robin T. Fried
-
Publication number: 20170104810Abstract: The present disclosure discloses a device and method for processing slice data. The method comprises: sending a download request for slice data adjacent to the newest continuous data to a server, determining whether or not a adjacent slice interval is filled with the slice data returned by the server; if yes, inserting the returned slice data into a database, setting the displaying mark thereof as valid, setting the displaying mark of downloaded data between the adjacent slice interval and the next slice interval to the adjacent slice interval as valid, and deleting the adjacent slice interval from the database; if not, inserting the returned slice data into the database, setting the displaying mark thereof as valid, and amending the border of the adjacent slice interval.Type: ApplicationFiled: December 16, 2016Publication date: April 13, 2017Inventors: Jiongxuan ZHANG, Guofeng FAN
-
Publication number: 20170104811Abstract: The invention provides, in one aspect, an improved system for data access comprising a file server that is coupled to a client device or application executing thereon via one or more networks. The server comprises static storage that is organized in one or more directories, each containing, zero, one or more files. The server also comprises a file system operable, in cooperation with a file system on the client device, to provide authorized applications executing on the client device access to those directories and/or files. Fast file server (FFS) software or other functionality executing on or in connection with the server responds to requests received from the client by transferring requested data to the client device over multiple network pathways. That data can comprise, for example, directory trees, files (or portions thereof), and so forth.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Applicant: PME IP PTY LTDInventors: MALTE WESTERHOFF, DETLEV STALLING
-
Publication number: 20170104812Abstract: A system, apparatus, and method for managing applications as Internet of Things (IoT) objects includes an IoT server, a computing device, and an IoT application. The IoT server and the computing device communicate via a network. The computing device has an IoT interface and an IoT-enabled application with an RPC interface. The IoT interface uses the RPC interface to communicate with the IoT-enabled application. The IoT interface communicates with the IoT server or the IoT application using an IoT protocol. The IoT interface operates the IoT-enabled application as an IoT device in the system.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Applicant: Samsung Electronics Co., Ltd.Inventors: Minseok CHOI, Sung Hwan LEE, Pei ZHENG
-
Publication number: 20170104813Abstract: In an embodiment of the present disclosure, there is provided a computer-implemented method, wherein the computer is operable between a management server and at least one cloud server providing a cloud service, the method comprising: collecting management data related to the cloud service through a standard protocol for network management, wherein the standard protocol allows communication of the management data via a designated port; and sending at least part of the management data to the management server.Type: ApplicationFiled: October 28, 2015Publication date: April 13, 2017Inventors: Guang Ya Liu, Yi Li Wang, Qing Yin, Ming Zhao
-
Publication number: 20170104814Abstract: Computing systems, devices, and associated processes for distributed execution of extensions are disclosed herein. In one embodiment, a method includes receiving a user input at a client device for initiating an extension in a web page associated with a web site. In response to the received user input, a communication link between the client device and a remote computing facility can be established. The method can also include transmitting a request for initiating the extension, from the client device, to the remote computing facility via the established communication link and receiving, at the client device, data representing execution results of the requested extension from the remote computing facility.Type: ApplicationFiled: February 10, 2016Publication date: April 13, 2017Inventors: Alvaro Dias, Brad Olenick, Julio Casal Terreros, Marck Robinson, Madhur Joshi, Yu Zhao, Vinela Pothineni, Wissam Zeidan
-
Publication number: 20170104815Abstract: Systems and methods are provided for managing server loads that accounts for various measures of risk associated with different workloads assigned to servers. The systems and methods may include a memory storing instructions for server load management operations, and a processor configured to execute the stored instructions. The processor may receive a workload, determine a value associated with the workload indicating a predetermined importance of the workload, receive information for a plurality of active servers in a server cluster associated with the processor, determine risk levels associated with the active servers based on the received information, and assign the received workload to one of the active servers based on the determined value and the determined risk levels.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Inventors: Tao TAO, Santosh BARDWAJ, Il Sun YOO, Yihui TANG, Jeremy GERSTLE