Patents Issued in April 13, 2017
  • Publication number: 20170104766
    Abstract: Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. A first framelet is sent to a first client device. A second framelet is sent to a second client device. When the first and second client devices are oriented such that the first and second framelets are aligned in a particular manner, the content is made viewable to a user.
    Type: Application
    Filed: October 12, 2015
    Publication date: April 13, 2017
    Inventor: Ketan Bhardwaj
  • Publication number: 20170104767
    Abstract: An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines. The method may further include identifying, in view of the monitoring, a virus-infected application running on a virtual machine of the plurality of virtual machines. The method may further include terminating the virus-infected application. The method may further include receiving, in view of the monitoring, resource usage data reflecting types and duration of usage of the computing resources. The method may further include generating, in view of the usage data, a report reflecting usage of the computing resources.
    Type: Application
    Filed: December 21, 2016
    Publication date: April 13, 2017
    Inventors: James Michael Ferris, Gerry Edward Riveros
  • Publication number: 20170104768
    Abstract: A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.
    Type: Application
    Filed: October 9, 2015
    Publication date: April 13, 2017
    Inventors: Alex M. Semenko, Preston Derek Adam, Innokentiy Basmov, Narendra S. Acharya, Peter J. Novotney, Salil Arun Bhagurkar, Yogesh A. Mehta
  • Publication number: 20170104769
    Abstract: A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems within a security intelligence platform which accumulate events within the IT environment associate an event ingest time with the event. When the events are provided for analysis, the device time accumulation operation analyzes the ingest times as well as the emit time to take into account historical time data associated with the accumulated events.
    Type: Application
    Filed: October 13, 2015
    Publication date: April 13, 2017
    Inventors: Gregory A. Davis, Irakle Dzneladze, Jason D. Keirstead, Helene Saint-Amour
  • Publication number: 20170104770
    Abstract: A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller (BMC) to transmit a plurality of memory addresses identifying where a plurality of network packets received by the IHS are stored. A field programmable gate array (FPGA) within a processor receives the memory addresses of the network packets and retrieves the network packets. The network packets are analyzed by comparing at least one threat signature that is associated with undesired network behavior with the contents of the network packets. In response to the at least one threat signature matching the contents of at least one of the network packets, an intrusion alert is transmitted to the BMC.
    Type: Application
    Filed: October 12, 2015
    Publication date: April 13, 2017
    Applicant: DELL PRODUCTS, L.P.
    Inventors: ELIE ANTOUN JREIJ, CHITRAK GUPTA, WADE ANDREW BUTCHER, SUSHMA BASAVARAJAIAH, RAMA RAO BISA
  • Publication number: 20170104771
    Abstract: There is provided a network monitoring device including: a memory; and a processor coupled to the memory and the processor configured to: detect, based on history record information on attempts to log into a plurality of information processing devices from a plurality of terminals via a network, occurrences of attempts that were made to log into the plurality of information processing devices with common account information a predetermined number of times or less; and reject an attempt to log into an information processing device among the plurality of information processing devices from a terminal among the plurality of terminals and notify the terminal of a re-attempt to log into the information processing device after the occurrences of attempts are detected.
    Type: Application
    Filed: September 28, 2016
    Publication date: April 13, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Satomi Saito, Satoru Torii, Hiroshi Tsuda
  • Publication number: 20170104772
    Abstract: Methods and systems for detecting an electronic intrusion are described. A user activity may be identified for a user account. A location of a user corresponding to the user account may be determined. It may be identified, based in part on the location of the user, whether to communicate a request to the user for instructions to respond to the user activity. A response may be received from the user in response to determining to communicate the request to the user for instructions. The response may include instructions to block access to the user account at a server. Command information may be communicated to the server. The command information may include a command to block access to the user account.
    Type: Application
    Filed: December 21, 2016
    Publication date: April 13, 2017
    Inventor: Srinivasan Raman
  • Publication number: 20170104773
    Abstract: In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines whether the supervised anomaly detection model detected an anomaly in the network from the analyzed data. The device trains an unsupervised anomaly detection model, based on a determination that no anomalies were detected by the supervised anomaly detection model.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Inventors: Fabien Flacher, Grégory Mermoud, Jean-Philippe Vasseur, Sukrit Dasgupta
  • Publication number: 20170104774
    Abstract: In one embodiment, a device in a network receives an output of an anomaly detection model. The device receives state information surrounding the output of the anomaly detection model. The device determines whether the state information supports the output of the anomaly detection model. The device causes the anomaly detection model to be adjusted based on a determination that the state information does not support the output of the anomaly detection model.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Inventors: Jean-Philippe Vasseur, Fabien Flacher, Grégory Mermoud
  • Publication number: 20170104775
    Abstract: In one embodiment, a device in a network maintains information regarding anomaly detection models used in the network and applications associated with traffic analyzed by the anomaly detection models. The device receives an indication of a planned application deployment in the network. The device adjusts an anomaly detection strategy of a particular anomaly detector in the network based on the planned application deployment and on the information regarding anomaly detection models used in the network and the applications associated with the traffic analyzed by the anomaly detection models.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Inventors: Jean-Philippe Vasseur, Sukrit Dasgupta, Grégory Mermoud
  • Publication number: 20170104776
    Abstract: A computer-implemented method and system for analyzing and maintaining data security in backup data, comprising of: accessing backup data of file systems on-site or remotely from a backup server; determining which data is present in a backup system; defining an abnormality data selection criteria to identify security components within the scope of said backup system; performing a data security analysis on backup data; if data abnormality in data are detected in backup data, determining compromised target files, identifying all other files created or modified associated with said compromised target files, including files having a parent-child relationship in both up and down directions of the parent-child tree, including files that are other children of the compromised files in the parent-child tree, including files created or modified by of the compromised files, and including data launched from those files.
    Type: Application
    Filed: October 12, 2015
    Publication date: April 13, 2017
    Inventors: Guy HALFON, Boaz APT
  • Publication number: 20170104777
    Abstract: A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems within a security intelligence platform which accumulate events within the IT environment associate an event ingest time with the event. When the events are provided for analysis, the device time accumulation operation analyzes the ingest times as well as the emit time to take into account historical time data associated with the accumulated events.
    Type: Application
    Filed: December 16, 2015
    Publication date: April 13, 2017
    Inventors: Gregory A. Davis, Irakle Dzneladze, Jason D. Keirstead, Helene Saint-Amour
  • Publication number: 20170104778
    Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
    Type: Application
    Filed: October 12, 2016
    Publication date: April 13, 2017
    Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
  • Publication number: 20170104779
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for an engine for exposing vulnerability within applications based on application characteristic identification. In this way, the engine identifies existing data sets that aid in understanding the possible privacy vulnerabilities associated with technologies such as applications, operated by an entity. The engine comprises dials and levers that allow for prioritization visualization of vulnerabilities critical to a particular portion of the entity. In this way, a user can drive the application engine allowing them to narrow the focus on any number of variations of application characteristics including, but not limited to types of vulnerabilities, status of the vulnerabilities, critical applications, regulated applications, vulnerabilities, business continuity and/or accessibility to the applications.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Inventors: Daniel Edward Middleman, John Henry Denning, Keith Allen Topel
  • Publication number: 20170104780
    Abstract: A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element. For each one of the twice-tested component stages, comparing results from the first test and the second test, wherein the comparison yields or leads to information helpful in assessing effectiveness of the first cybersecurity technology on each respective one of the twice-tested component stages at the computer network element.
    Type: Application
    Filed: October 6, 2016
    Publication date: April 13, 2017
    Inventors: Kara Zaffarano, Joshua Taylor, Samuel Hamilton
  • Publication number: 20170104781
    Abstract: A system is described for securing data saved on servers against external security threats. The system includes a computing device connected to a data vault via a communications network and a server. The data vault stores personal information of a user. An alias is assigned to the personal information so that it is not disclosed during processing of a transaction by a server. When the user desires to complete a purchase, the user logs into a website having access to the server. To complete a purchase, the server queries the data vault for the user's sensitive personal information. The data vault responds with the aliases corresponding to the user's personal information so that the user may select payment and shipping information from among the aliases. Payment and shipping information are confirmed by selecting the desired aliases, which the server then transmits to the data vault for completion of the transaction.
    Type: Application
    Filed: October 10, 2016
    Publication date: April 13, 2017
    Inventor: Michael C. Wood
  • Publication number: 20170104782
    Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.
    Type: Application
    Filed: October 22, 2015
    Publication date: April 13, 2017
    Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
  • Publication number: 20170104783
    Abstract: Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.
    Type: Application
    Filed: October 13, 2015
    Publication date: April 13, 2017
    Inventors: ODED VANUNU, Liad Mizrachi
  • Publication number: 20170104784
    Abstract: A method includes receiving a set of strings and applying one or more filters to generate a subset of strings that are determined to correspond to strings of interest. The method also includes retrieving domain name system (DNS) information associated with a first string of the subset. The method includes executing a rule-based engine to determine, based on application of one or more rules to the DNS information, whether to add the first string to a set of suspicious hostnames.
    Type: Application
    Filed: December 22, 2016
    Publication date: April 13, 2017
    Inventors: Mark Richard Stemm, Arlyn Robert Johns
  • Publication number: 20170104785
    Abstract: A system that generates decoy emails and documents by automatically detecting concepts such as dates, times, people, and locations in e-mails and documents, and shifting those concepts. The system may also generate an email or document reciting a URL associated with a fake website and purported login credentials for the fake website. The system may send an alert to a user of the system when someone seeks to access the fake website.
    Type: Application
    Filed: August 10, 2016
    Publication date: April 13, 2017
    Inventors: Salvatore J. Stolfo, Carl Sable
  • Publication number: 20170104786
    Abstract: An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active TLS session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point. The technique enables an origin to authorize the edge server to inject cached data at certain points in a TLS session, as well as to mathematically and cryptographically revoke any further access to the stream until the origin deems appropriate.
    Type: Application
    Filed: December 26, 2016
    Publication date: April 13, 2017
    Inventors: Charles E. Gero, Michael R. Stone
  • Publication number: 20170104787
    Abstract: A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such communications for purposes of identifying communication issues that may affect user QoE (quality of experience). In certain embodiments, an application may be modified to log communication data before encryption and after decryption. For example, the application program may be decompiled and logging instructions may be inserted before portion that result in data encryption and after portions where received data is decrypted. The modified application program may then be recompiled and executed on a device to produce an unencrypted log of data. In other embodiments, elements of the device operating system may be modified to log data before encryption and after decryption.
    Type: Application
    Filed: October 9, 2015
    Publication date: April 13, 2017
    Inventor: Peter P. Myron
  • Publication number: 20170104788
    Abstract: Systems, methods, and computer program products to perform an operation comprising determining that a first component of a first compute node violates a compliance rule, wherein the first compute node executes a plurality of workloads and is of a plurality of compute nodes in a computing cluster, performing a predefined operation to defer need to apply a software update configured to correct the violation of the compliance rule by the first component of the first compute node, and executing, by the first compute node, at least one of the plurality of workloads without applying the software update.
    Type: Application
    Filed: October 9, 2015
    Publication date: April 13, 2017
    Inventors: Gary D. CUDAK, Christopher J. HARDEE, Adam ROBERTS, Adrian X. RODRIGUEZ
  • Publication number: 20170104789
    Abstract: Methods to perform an operation comprising determining that a first component of a first compute node violates a compliance rule, wherein the first compute node executes a plurality of workloads and is of a plurality of compute nodes in a computing cluster, performing a predefined operation to defer need to apply a software update configured to correct the violation of the compliance rule by the first component of the first compute node, and executing, by the first compute node, at least one of the plurality of workloads without applying the software update.
    Type: Application
    Filed: October 9, 2015
    Publication date: April 13, 2017
    Inventors: Gary D. CUDAK, Christopher J. HARDEE, Adam ROBERTS, Adrian X. RODRIGUEZ
  • Publication number: 20170104790
    Abstract: In one implementation, a risk assessment of an asset is compared to a risk level of a security policy and network traffic associated with the asset is assigned to a group associated with the security policy when the risk assessment achieves the risk level of the security policy.
    Type: Application
    Filed: December 22, 2016
    Publication date: April 13, 2017
    Applicant: Trend Micro Incorporated
    Inventors: Russell MEYERS, Scott RIVERS, Matthew LASWELL
  • Publication number: 20170104791
    Abstract: Embodiments disclosed herein provide feature-level access control functionality useful for enforcing access controls to features and subfeatures on uncontrolled, third party Web Applications such as those associated with social networking sites. Specifically, pages of uncontrolled Web applications are programmatically inspected as they are accessed by users of an enterprise computing environment. Specific features on the pages are located and access to these features is enabled or disabled on a per user basis. A modified page is generated if feature(s) on a Web page is/are to be disabled. To block certain feature(s), content may be rewritten on-the-fly. Because embodiments disclosed herein can programmatically inspect a Web page and understand what is on the page at a much finer granularity, it is possible for enterprises to gain benefits that may come from embracing social networking sites without risking the downsides of allowing enterprise users access to uncontrolled Web applications.
    Type: Application
    Filed: December 22, 2016
    Publication date: April 13, 2017
    Inventor: Cameron Blair Cooper
  • Publication number: 20170104792
    Abstract: A method of establishing a media session between a first mobile station and a second mobile station, the method including receiving, at an MQTT messaging service and from the first mobile station, a first MQTT subscription request for a first topic name used to indicate the second mobile station agrees to establish a media session with a mobile station; receiving, at the MQTT messaging service and from the first mobile station, a first MQTT application message having a second topic name used to indicate a mobile station requests establishing a media session with the second mobile station; issuing, in response to receiving the first MQTT application message, an indication to the second mobile station that a mobile station requests establishing a media session with the second mobile station; receiving, at the MQTT messaging service and from the second mobile station, a second MQTT application message having the first topic name; forwarding the second MQTT application message to the first mobile station; receivi
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Inventors: Kumar Sanjeev, Dongliang Hu
  • Publication number: 20170104793
    Abstract: Systems and methods are provided for enabling real-time synchronous communication with persons appearing in image or video files. For example, an image or video file is displayed on a display screen of a computing device. The computing device detects a user selection of a person present in the displayed image or video. A request is sent from the computing device to a service provider for profile information associated with the user-selected person. The computing device receives from the service provider profile information associated with the user-selected person, wherein the profile information includes a communications address of the user-selected person. The communications address is utilized to initiate a communications session on the computing device with the user-selected person present in the displayed image or video.
    Type: Application
    Filed: December 13, 2016
    Publication date: April 13, 2017
    Inventor: Robert G. Farrell
  • Publication number: 20170104794
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Application
    Filed: December 16, 2016
    Publication date: April 13, 2017
    Inventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
  • Publication number: 20170104795
    Abstract: In one embodiment a router connects to a cellular network using at least one authentication credential stored on a smart card of the router. The router receives, from a client device coupled to the router, a Session Initiation Protocol (SIP) request to register with an Internet Protocol Multimedia Subsystem (IMS) network coupled to the cellular network. The router sends a SIP registration request for the client device to the IMS network, the SIP registration request comprising authorization information associated with the router, wherein the authorization information associated with the router is used by the IMS network to register the client device with the IMS network.
    Type: Application
    Filed: October 12, 2015
    Publication date: April 13, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Srinath Gundavelli, Vimal Srivastava, Vojislav Vucetic
  • Publication number: 20170104796
    Abstract: A method, system, and apparatus for simultaneous media collaboration between remotely located users is disclosed. Unlike the existing collaboration methods currently used, which often include emailing files and comments back and forth between different users, the disclosed system and method enables real-time communication and collaboration between remotely located users without requiring the use of email or editing software.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Applicant: ARMORED INFO, LLC
    Inventor: Michael J. Fahey
  • Publication number: 20170104797
    Abstract: In certain information handling system environments, remote conferencing may require the transmission of multi-media content. The server may query a client that has joined the remote conference to determine if the client supports the encoding format of the multi-media content. A source filter may load the requested multi-media content whereupon the multi-media content is split into audio content and video content by a demultiplexor and then transmitted via a multi-media redirection multiplier filter to a proxy client of each client joined to the remote conference or only selected clients. The multi-media content is processed and decoded at the client system using local hardware at the client thereby offloading demand on the server to the client.
    Type: Application
    Filed: October 13, 2015
    Publication date: April 13, 2017
    Inventor: Ramanujam Kaniyar Venkatesh
  • Publication number: 20170104798
    Abstract: Systems and methods for broadcasting events are provided. The system, for example, may include, but is not limited to, a communication system, a memory, and a processor. The processor may be configured to receive, from the communication system, a session identifier identifying a broadcast session and at least one application event corresponding to the broadcast session from a presenting electronic device, update a playback queue corresponding to the broadcast session stored in the memory based upon the received at least one application event, receive, from the communication system, a subscription request to the broadcast session from at least one subscribing electronic device, and transmit, via the communication system, a corresponding playback queue to each electronic device subscribed to the broadcast session, the playback queue including instructions to regenerate the application event within an application operating on the at least one subscribing electronic device.
    Type: Application
    Filed: October 9, 2015
    Publication date: April 13, 2017
    Applicant: SALESFORCE.COM, INC.
    Inventor: Santhosh Kumar Kuchoor
  • Publication number: 20170104799
    Abstract: A method and system for providing information to an application related to an occurrence at a data node. A data node may include an application running on a mobile device. The data node generates an event when it observes a predefined occurrence. The predefined occurrence may be functionality of an application, data being copied, a message being received, or the like. The event generated by the data node includes information taken from a semantic space defined by a domain but selected based at least in part on the occurrence. A request is received from an application for events meeting interest criteria specified by the application. The system determines whether to establish a subscription for the application. If it does, the system delivers events meeting interest criteria for the subscription to the subscriber application.
    Type: Application
    Filed: October 7, 2016
    Publication date: April 13, 2017
    Inventors: Leslie Prock, Steve Kondik, Ravi Subramanian
  • Publication number: 20170104800
    Abstract: Disclosed are various embodiments for a streaming video application. The application downloads, decodes, and renders video frame data at different frame rates. Based on the differences between these frame rates, the downloading frame rate is adjusted to minimize performance degradation.
    Type: Application
    Filed: December 20, 2016
    Publication date: April 13, 2017
    Inventor: KEITH E. BELOVAY
  • Publication number: 20170104801
    Abstract: In one embodiment, a client device includes a processor to send a first GET request to a server for a first data chunk of a data item, a communication interface to receive packets of the first data chunk, a buffer to buffer the packets, wherein the processor is operative to obtain a first measure of round trip time (RTT), the processor is operative to estimate a time t1 when receipt of the last packet of the packets of the first data chunk in the buffer will be completed, the processor is operative to determine a next fetch time, t2, to send a second GET request to the server for a second data chunk of the data item, based on the time t1 adjusted by a portion of the first measure of RTT, the processor is operative to send the second GET request to the server at about time t2.
    Type: Application
    Filed: October 13, 2015
    Publication date: April 13, 2017
    Inventors: Bill VER STEEG, Ali C. Begen
  • Publication number: 20170104802
    Abstract: Aspects of the subject technology relate to mixing an aggregated content data structure into a content stream. A first plurality of aggregated content data structures is be received, each comprising a group of content items for display in a content stream of a user and being associated with a respective score. A first aggregated content data structure may be selected from among the first plurality of aggregated content data structures based on the scores and predetermined type target percentages associated with the user. The first aggregated content data structure may be mixed into a content stream associated with a user, and the content stream provided for display.
    Type: Application
    Filed: October 7, 2016
    Publication date: April 13, 2017
    Inventors: Harish CHANDRAN, Lucian Florin CIONCA, Amogh Sanjay ASGEKAR, Panchapagesan KRISHNAMURTHY
  • Publication number: 20170104803
    Abstract: An apparatus comprises a receiver configured to receive a request for an adaptive streaming media presentation description (MPD), a processor coupled to the receiver and configured to generate the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information, and a transmitter coupled to the processor and configured to transmit the MPD. A method comprises receiving a request for an adaptive streaming media presentation description (MPD), generating the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information, and transmitting the MPD. An apparatus comprises a processor configured to generate a request for an adaptive streaming media presentation description (MPD), a transmitter coupled to the processor and configured to transmit the request, and a receiver coupled to the processor and configured to receive the MPD, wherein the MPD indicates an event, and wherein the event is time-related auxiliary information.
    Type: Application
    Filed: December 16, 2016
    Publication date: April 13, 2017
    Inventors: Alexander Giladi, Xin Wang
  • Publication number: 20170104804
    Abstract: Methods and devices for image data encoding are provided. Image data is created using at least one image captured by a camera of the electronic device. First encoded image data is created by encoding at least a portion of the image data in a first manner. Second encoded image data is created by encoding the at least a portion of the image data in a second manner. The second manner is different from the first manner. The first encoded data is stored in a memory of the electronic device. The second encoded data is transmitted from the electronic device to an external device.
    Type: Application
    Filed: September 27, 2016
    Publication date: April 13, 2017
    Inventors: Taewon DO, Kichoon Gong, Jinkyu Kim
  • Publication number: 20170104805
    Abstract: Embodiments relate to providing a method for an authenticated user of an item of streaming media content to create a shareable clip of a portion of the item. The method comprises using an interface on a first device to accept, from the authenticated user, a first input to define the clip and a second input to create a comment; creating an identifier, uniquely corresponding to the authenticated user and the clip; and sending the identifier and the comment to a second user in a form that includes a clickable link. If the second user clicks on the clickable link, the clip is streamed to the second user to play on a second device, independent of whether the second user is authorized to access the whole of the content. The clickable link expires either after a predetermined time or after a predetermined number of plays by the second user.
    Type: Application
    Filed: December 20, 2016
    Publication date: April 13, 2017
    Applicant: SONY INTERACTIVE ENTERTAINMENT NETWORK AMERICA LLC
    Inventor: Margaret Plumley
  • Publication number: 20170104806
    Abstract: Methods and systems are provided for encoding content using a first encoding algorithm to produce first encoded content. Content can also be encoded using a second encoding alaorithm to produce second encoded content, where the second encoded content can comprise data that can be used to reconstruct the first encoded content. At any time relative to the encoding, a request for the content can be received from a user device. In response to receipt of the request, the first encoded content is transmitted to the user device and the second encoded content is transmitted to the user device.
    Type: Application
    Filed: October 13, 2015
    Publication date: April 13, 2017
    Inventors: Zhen Zhao, Sadasivan Ponnuswamy
  • Publication number: 20170104807
    Abstract: Systems and methods for remote control of computers and computing devices, such as tablets and mobile phones, including control software run on a control device, and a client application running on one or more controlled devices in network communication with the control device. The control device can be used to selectably lock or otherwise control the controlled device from further usage. In some examples, the systems and methods include multiple controlled devices. In some further examples, the systems and methods include a third-party provider that stores user credential information and generates corresponding external IDs, and both the control software and client application query the third-party provider upon startup to validate that the controlling user is authorized to lock the controlled devices.
    Type: Application
    Filed: October 7, 2015
    Publication date: April 13, 2017
    Inventors: Matthew Braun, Maria Braun
  • Publication number: 20170104808
    Abstract: A control method of a network appliance, a network appliance, a mobile terminal and system, are provided. The control method includes: acquiring, by a feature phone, a control webpage address of the network appliance; opening, by the feature phone, a control webpage corresponding to the control webpage address through a browser, wherein the control webpage includes a control element and an address of the network appliance; and sending, by the feature phone, control request information corresponding to the control element to the network appliance through an internet by using the address of the network appliance as a destination address, when detecting that the control element is triggered.
    Type: Application
    Filed: September 2, 2016
    Publication date: April 13, 2017
    Inventor: ZHEN LI
  • Publication number: 20170104809
    Abstract: The present invention, generally speaking, provides a broad-based solution for acquisition, processing and distribution of media objects including pictures (images), movies, videos, graphics, sound clips, etc via the Internet or the like. And specifically, it is a solution to such systems for use in applications wherein there are multiple originators of media objects that will be viewed in multiple web sites having different viewing requirements. A browser-based prepare and post tool prepares and submits media objects from inside a standard browser to a remote server. A Media Acquisition, Processing and Distribution (MAPD) system receives these media objects, processes them to meet specific requirements, and delivers them for integration into remote databases. MAPD system services include media object submission, processing, hosting and mirroring. The hosting service delivers a media object URL to a remote database, allowing the media object to be requested and served by the media object server.
    Type: Application
    Filed: August 19, 2016
    Publication date: April 13, 2017
    Inventors: Lisa T. Wood, Scott M. Lewis, Robin T. Fried
  • Publication number: 20170104810
    Abstract: The present disclosure discloses a device and method for processing slice data. The method comprises: sending a download request for slice data adjacent to the newest continuous data to a server, determining whether or not a adjacent slice interval is filled with the slice data returned by the server; if yes, inserting the returned slice data into a database, setting the displaying mark thereof as valid, setting the displaying mark of downloaded data between the adjacent slice interval and the next slice interval to the adjacent slice interval as valid, and deleting the adjacent slice interval from the database; if not, inserting the returned slice data into the database, setting the displaying mark thereof as valid, and amending the border of the adjacent slice interval.
    Type: Application
    Filed: December 16, 2016
    Publication date: April 13, 2017
    Inventors: Jiongxuan ZHANG, Guofeng FAN
  • Publication number: 20170104811
    Abstract: The invention provides, in one aspect, an improved system for data access comprising a file server that is coupled to a client device or application executing thereon via one or more networks. The server comprises static storage that is organized in one or more directories, each containing, zero, one or more files. The server also comprises a file system operable, in cooperation with a file system on the client device, to provide authorized applications executing on the client device access to those directories and/or files. Fast file server (FFS) software or other functionality executing on or in connection with the server responds to requests received from the client by transferring requested data to the client device over multiple network pathways. That data can comprise, for example, directory trees, files (or portions thereof), and so forth.
    Type: Application
    Filed: December 20, 2016
    Publication date: April 13, 2017
    Applicant: PME IP PTY LTD
    Inventors: MALTE WESTERHOFF, DETLEV STALLING
  • Publication number: 20170104812
    Abstract: A system, apparatus, and method for managing applications as Internet of Things (IoT) objects includes an IoT server, a computing device, and an IoT application. The IoT server and the computing device communicate via a network. The computing device has an IoT interface and an IoT-enabled application with an RPC interface. The IoT interface uses the RPC interface to communicate with the IoT-enabled application. The IoT interface communicates with the IoT server or the IoT application using an IoT protocol. The IoT interface operates the IoT-enabled application as an IoT device in the system.
    Type: Application
    Filed: October 12, 2015
    Publication date: April 13, 2017
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Minseok CHOI, Sung Hwan LEE, Pei ZHENG
  • Publication number: 20170104813
    Abstract: In an embodiment of the present disclosure, there is provided a computer-implemented method, wherein the computer is operable between a management server and at least one cloud server providing a cloud service, the method comprising: collecting management data related to the cloud service through a standard protocol for network management, wherein the standard protocol allows communication of the management data via a designated port; and sending at least part of the management data to the management server.
    Type: Application
    Filed: October 28, 2015
    Publication date: April 13, 2017
    Inventors: Guang Ya Liu, Yi Li Wang, Qing Yin, Ming Zhao
  • Publication number: 20170104814
    Abstract: Computing systems, devices, and associated processes for distributed execution of extensions are disclosed herein. In one embodiment, a method includes receiving a user input at a client device for initiating an extension in a web page associated with a web site. In response to the received user input, a communication link between the client device and a remote computing facility can be established. The method can also include transmitting a request for initiating the extension, from the client device, to the remote computing facility via the established communication link and receiving, at the client device, data representing execution results of the requested extension from the remote computing facility.
    Type: Application
    Filed: February 10, 2016
    Publication date: April 13, 2017
    Inventors: Alvaro Dias, Brad Olenick, Julio Casal Terreros, Marck Robinson, Madhur Joshi, Yu Zhao, Vinela Pothineni, Wissam Zeidan
  • Publication number: 20170104815
    Abstract: Systems and methods are provided for managing server loads that accounts for various measures of risk associated with different workloads assigned to servers. The systems and methods may include a memory storing instructions for server load management operations, and a processor configured to execute the stored instructions. The processor may receive a workload, determine a value associated with the workload indicating a predetermined importance of the workload, receive information for a plurality of active servers in a server cluster associated with the processor, determine risk levels associated with the active servers based on the received information, and assign the received workload to one of the active servers based on the determined value and the determined risk levels.
    Type: Application
    Filed: October 7, 2016
    Publication date: April 13, 2017
    Inventors: Tao TAO, Santosh BARDWAJ, Il Sun YOO, Yihui TANG, Jeremy GERSTLE