|| List of recent Redirection-related patents
| Systems and methods for risk rating and pro-actively detecting malicious online ads|
Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module.
| Data retrieval redirection|
An asset location request redirection system (18) receives first asset location data (251) from a user terminal. The first asset location data relates to a first content delivery network, and the redirection system (18) generates a signed second asset location data (26) for return to the user terminal, allowing it to retrieve content from a second content delivery network.
| Command line output redirection|
In one embodiment the invention provides a method. The method includes invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, wherein the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier..
| Multimedia redirection in a virtualized environment using a proxy server|
Methods and systems for multimedia redirection in a virtualized environment using a proxy server are described herein. The proxy server may store scripting code that may be injected into web content retrieved from a content resource server.
| Multi-modal early media|
A method and system for transmitting early media notifications (emns) of communication services, for example, call completion, etc., is provided. A network component, a calling party device, and/or a called party device detect a call made by a calling party to a called party, and occurrence of events, for example, a call attempt, start of ringing the called party, an incomplete call, call redirection, etc.
|Out-of-band framework libraries within applications|
An enhanced binder provides flexibility and certainty when selecting a version of a software library to load, and an enhanced loader prevents a library version vulnerable to a security flaw from being loaded. The binder can perform unification, implicit override, and/or redirection.
|Redirecting data from a defective data entry in memory to a redundant data entry prior to data access, and related systems and methods|
Embodiments disclosed include redirecting data from a defective data entry in memory to a redundant data entry prior to data access. Related systems and methods are also disclosed.
|Optical element stacks for the direction of light|
Provided herein are devices and associated methods for the direction of light, e.g. Sunlight.
|Inner premix tube air wipe|
An inner premix tube for a fuel injector of a gas turbine engine includes a transition end, a tip end, and a premix tube inner surface. The transition end includes an annular disk portion with an annular disk shape and a redirection portion extending radially inward and axially from the annular disk portion.
|Honey monkey network exploration|
A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine.
|Accelerating usb redirection over a network|
In particular embodiments, a client computing device identifies a usb device connected to the client computing device. The client computing device redirects the usb device to a remote server computing device.
|Range extending system for subterranean rf devices|
Embodiments of the invention comprise a system for improving subterranean rf signal propagation. Embodiments comprise a redirecting antenna element which includes a redirecting conductive arrangement, a feed point, and a receiving antenna element which includes at least one or more planes.
|Static redirection for objective c|
Particular embodiments establish static redirection of a function that is a member of a class to an alternate implementation of the function. A software tool executing on a computer server receives an executable file for an application and a location for an alternate implementation of the function.
|Server, client device, and usb redirection method|
A client device obtains data from a universal serial bus (usb) device and compresses the data. The client device sends the compressed data to a server using a usb redirection.
|Flash redirection with caching|
In particular embodiments, a server loads in a browser a webpage including flash content including an actionscript, the actionscript including at least one function. The browser loads a flash redirection plugin and requests the plugin to execute the actionscript.
|Flash redirection with browser calls caching|
In particular embodiments, a client loads a flash player. The flash player requests a flash redirection browser to execute an npn call, the npn call including a string.
|Redirection of far-infrared energy away from patients receiving light therapy|
Other embodiments are described and anticipated.. .
|Systems and methods for email tracking and email spam reduction using dynamic email addressing schemes|
An email redirection server handles email sent by subscribers or intended for subscribers, obfuscating the subscriber's identity through replacement of the subscriber's native email address with a proxy address in the message header and forwarding the email with only the proxy address. Acquiring a proxy address includes assignment by the email redirection server of a child domain in the dns namespace for the subscriber's exclusive use.
|Methods and apparatuses for dynamic content offloading|
Methods and apparatuses for dynamic content offloading are provided. For example, a method includes sending, by a client device, a request for one or more data files and receiving a redirection message redirecting the client device to receive the one or more data files through a broadcast channel if offloading is available for the one or more data files.
|User plane traffic handling using network address translation and request redirection|
For handling user plane traffic in a communication network, a nat node (100) determines a mapping between a network address (200-e) of a server (200) and a replacement network (200-i) address matching a packet classification rule implemented in the communication network. If the nat node (100) receives an ul data packet (403) in which a source address identifier corresponds to a network address of a user equipment (10) and a destination address identifier corresponds to the replacement network address (200-i), it performs nat of the ul data packet (403) in accordance with the mapping.
|Client apparatus, server apparatus, multimedia redirection system, and method thereof|
A client apparatus, a server apparatus, a multimedia redirection system, and a method thereof includes: a client interface which communicates with a server apparatus that supports a multimedia redirection function; a connector which is connected to a client local storage that stores a client content; a data processor which processes the client content; a controller which transmits information about the client content to the server apparatus and, if a play command with respect to the client content is received from the server apparatus, controls the data processor to process the client content as a form that is output; and an output unit which outputs the processed client content.. .
|Method and apparatus for selecting frequency for call redirection in a mobile communication system|
A communication method of a mobile terminal for reliably performing call redirection between heterogeneous or homogeneous mobile communication systems is provided. The communication method includes requesting a first base station of a first mobile communication system to establish a call connection, receiving information about a first frequency of an adjacent base station for call redirection from the first base station in response to the call connection request, searching for one or more frequencies for the call redirection using the information about the first frequency and information about a second frequency of at least one second mobile communication system, selecting a frequency for the call redirection from among the searched frequencies, and sending a call connection request to a second base station using the selected frequency..
|Transparent electrode apparatus, method, and applications|
A shaped electrode on a light transmitting substrate utilizes total internal reflection to provide improved transmission of electromagnetic radiation (‘light’) compared to standard electrode designs that involve flat electrode surfaces. Redirection of incident light by a tilted or otherwise shaped contact or material added on the contact provides otherwise reflected light to an open surface region.
|Frequency redirection for inband signaling|
A channel remapping pre-notification (rpn) message is transmitted in each of multiple frequencies prior to movement of data associated with one or more virtual channels to one or more different frequencies. The rpn message is also sent prior to transmission of a virtual channel table (vct) reflecting channel movement.
|Method and device for policy based routing|
A method and a device for policy based routing. The method comprises: setting interfaces of router(s) to be multiple redirection groups, the redirection groups being ordered according to a priority order; detecting interface states of interfaces in the redirection groups; and switching traffic among the multiple redirection groups according to the interface states of the interfaces in the redirection groups.
|Systems and methods for folder redirection|
A method for redirecting, to a second machine, without user intervention, a request for access to a folder on a first machine, the request made by a resource executing within a remote access session on the first machine, includes receiving, by a component on a first machine, folder mapping information associated with a folder provided by a shell namespace on a second machine. The component intercepts a request by a resource executing on the first machine for access to file system data on the first machine.
|Light management for image and data control|
A light control and display technology applicable to light redirection and projection with the capacity, in a number of embodiments modified for particular applications, to produce managed light, including advanced images. Applications include miniature to very large scale video displays, optical data processing, 3-dimensional imaging, and lens-less vision enhancement for poor night-driving vision, cataracts and macular degeneration..
|Software build optimization|
A method for optimization of a software build includes collecting first data representative of inputs for a build process obtained by a set of data accessing operations implemented during a first execution of the build process, the set including a file accessing operation and a non-file accessing operation. A redirection routine embedded within the build process captures the inputs.
|System and method of web-based keyboard, video and mouse (kvm) redirection and application of the same|
Certain aspects of the present disclosure are directed to a method of performing web-based keyboard, video and mouse (kvm) redirection implemented by a baseboard management controller (bmc). The method includes: (a) receiving, at a bmc, first and second video frames redirected from a host computer, the bmc performing a management function of the host computer, (b) generating a webpage at a web server of the bmc and sending the webpage to a browser program running on a computing device in a network, the webpage being programmed to instruct the browser program to initiate a drawable area and to establish a web socket connection with the web server, (c) generating a processed image representing the second video frame, (d) establishing a web socket connection between the web server and the browser program, and (e) sending the processed image to the browser program through the web socket connection..
|Redirection service resource locator mechanism|
A system can include circuitry that processes a url for information; circuitry that transmits at least a portion of the information via a network interface; circuitry that receives metadata via the network interface responsive to the transmission of at least a portion of the information; circuitry that associates at least a portion of the metadata with a short url; and circuitry that transmits the short url. Various other apparatuses, systems, methods, etc., are also disclosed..
|System and method of web-based virtual media redirection|
Certain aspects of the present disclosure are directed to a method of performing a virtual media redirection. The method includes: (a) establishing a web socket connection between a web server of a baseboard management controller (bmc) and a browser program of a computing device in a network, the bmc performing a management function of a host computer; (b) emulating, at the bmc, virtual media to the host computer; (c) receiving, at the bmc, a read command from the host computer and directed to the emulated virtual media, the read command specifying a first file; (d) in response to the read command, sending, at the bmc, a request for the first file according to the read command to the browser program through the web socket connection; and (e) receiving, at the web server, the first file from the browser program through the web socket connection..
|Hashtag communication method and system|
An uniform resource identifier (uri) fragment based web portal browsing (#wise) represents a functionality that allows internet users to use the universal resource identifiers with “#” (number sign) and either an empty or a non empty fragment to, based on predetermined set of rules, technical and other conditions and the internet user interaction history, quickly and efficiently browse a certain website by being presented with suggested website administrator managed non-user-generated content (such as, but not limited to videos, pdf documents, drawings, etc.), redirections (other uris) and actions (such as, but not limited to sending an email to a certain email address, initiating audio/video/chat conversation, posting a support ticket etc.) requiring minimal amount of additional user intervention. .
|Redirection of multimedia content between receiver devices associated with a user|
A system that incorporates teachings of the subject disclosure may include, for example, a provider network configured to redirect multimedia content between receiver devices associated with a user. A first multimedia stream representative of the multimedia content is transmitted to a first receiver device associated with the user.
|Automatic updating of redirected location references|
Content items such as web pages can be updated through a client-driven process when the client detects that a target location reference in a source content item has been redirected to another (destination) location reference. Based on a target location reference in a source content item, a client can request a target content item from a target server and can receive a redirected destination target location reference.
|Method and apparatus for modifying internet content through redirection of cascading style sheet objects|
Disclosed is a method for directing an alternative cascading style sheet object to an internet user client. In the method, a system analyzes an http transaction involving the internet user client to detect a request for an embedded cascading style sheet object.
|Method and apparatus for signal interference processing|
A system that incorporates the subject disclosure may include, for example, a method for mitigating interference by filtering or redirection of communications traffic. Other embodiments are disclosed..
|Room dividing lighting device and method of installing the room dividing lighting device|
A room dividing lighting device 120, 122, the use of the room dividing lighting device and a method of installing the room dividing lighting device are provided. The room dividing lighting device 120, 122 comprises a light emitting means.
The snow rider provides a rider with a platform that is stable, simple to use, and provides a significant amount of control for the rider. The snow rider makes use of two pairs of parallel-oriented articulated skis that are interconnected by a platform on which the rider's bindings are attached.
|Continously-operable flow stream processing system and method|
A continuously-operable flow stream processing system and method has two or more fluid processing media arranged in a fluid conduit network to provide alternate flow paths for a flow stream to be processed (e.g. Filtered).
|Goal tender leg pad|
A goaltender leg pad providing profile adjustment, toe attachment and/or toe thickness adjustment. The leg pad can include an adjuster element that configures adjacent pads at a user selected angle or configuration to provide a desired front profile of the leg pad.
|Low latency server-side redirection of udp-based transport protocols traversing a client-side nat firewall|
Systems, methods, and machine-readable media for low latency server-side redirection of user datagram protocol (udp)-based transport protocols traversing a client-side network address translation (nat) are provided. At a first server, a request for directing a data resource to a client may be received.
|Systems and methods for maintaining transparent end to end cache redirection|
The present disclosure presents systems and methods for maintaining original source and destination ip addresses of a request while performing intermediary cache redirection. An intermediary receives a request from a client destined to a server identifying a client ip address as a source ip address and a server ip address as a destination ip address.
|Dynamic control system for managing redirection of requests for content|
Requests for content are received, for example, an http request for a web page is received. Each request has a landing context, which may include information about the user sending the request, the request itself, the referrer, or another subject.
|Devices and methods for facilitating h-rnti updates in network-initiated cell redirection|
Access terminals are adapted to facilitate updating an access terminal with a valid h-rnti in response to a network-initiated redirection of an access terminal from a serving cell to a target cell in a wireless communications system. According to at least one example, an access terminal can acquire a target cell in response to a network-initiated redirection indicated by a received redirection message.
|System and method for rapid vlt connection failure handling|
A system and method for rapid virtual link trunk connection failure handling includes receiving a packet at a first network switching unit where the packet is to be forwarded to a second network switching unit, detecting a failure in a network connection between the first network switching unit and the second network switching unit and associated with a first lag of the first network switching unit, determining a second lag associated with an inter-chassis link (icl) as a failover lag for the first lag, redirecting the packet to the second lag, altering the packet to set a redirection status bit to a logic value, and forwarding the altered packet using the icl.. .
|Proactive redirection of traffic during low voltage (brownout) condition and preferential treatment of high priority traffic|
A methodology is described such that when a brownout condition is being experienced by a network node, the network node may autonomously notify the adjacent nodes to reroute the traffic for different classes of service based on programmable low voltage thresholds. The present approach helps lower transit traffic disruption while providing a framework to give preferential treatment to high priority traffic traversing the node..
|Sunlight redirecting mirror arrays|
Sunlight redirector (30) incorporates closely proximate mirror arrays (32, 34) having parallel, uniformly spaced, longitudinal mirror segments (38, 44). Prismatic sheet (36) is positioned behind and closely proximate second array (34).
|Content delivery network interconnection (cdni) mechanism|
Embodiments contemplate the movement of mobile node (mn) from a first access network to a second access network, while in communication with a cdn server (e.g. A surrogate providing a multimedia streaming session).
|Radio control apparatus, connection destination switching method, and system|
A radio control apparatus determines a call type of a communication terminal, and transmits a release redirection control signal to the communication terminal. When the call type is a general call, the release redirection signal not including broadcast information is transmitted to the communication terminal.
|Dynamic drop redirection for drop on demand printing|
Systems and methods selectively remove flush drops from a plurality of ink drops ejected by a print engine when printing data for a print job. One embodiment comprises a control system of a printing system.
|Per-request control of dns behavior|
In various embodiments, a user or subscriber of a domain name system (dns) service that provides various dns resolution options or features, such as misspelling redirection, parental filters, domain blocking, or phishing protection through the dns process, can influence how requests for domain name (dns) information are handled on a per-request basis. The user or subscriber may configure the dns client software of their personal computer or configure their broadband router to provide control information to a dns server with dns resolution options that enables the dns server to resolve dns queries with the dns resolution options on a per-request basis.
|Service redirection from a policy and charging control architecture|
For authorizing redirection services in a policy and charging control architecture, a policy and charging control rules function (pcrf) server determines control rules and redirection information per service in an internet protocol connectivity access network session, and a policy charging and enforcement function (pcef) device receives control rules and redirection information per service basis, determines redirection per service request, and triggers the redirection. Upon a first request for a service, the pcef device returns a redirection message with a redirection identifier; and upon completion of the service redirection, the first request for the service reaching the pcef, the pcef verifies the service is authorized and submits a service allowance toward the service server in charge of the service.
|Selecting a type of circuit switched fallback|
A type of circuit switched fallback (csfb) is selected based on the target access point for the csfb. For example, redirection-based csfb may be selected for some types of target access points, while handover-based csfb is selected for other types of target access points.
|Optical redirection adapter|
An optical redirection adapter for an electronic device having a camera includes a housing and an optical element. The optical element is attached to the housing and positioned such that, when the adapter is attached the electronic device, the optical element is positioned in the camera's field of view.
|Force redirection strap, system and method of use|
A force re-direction strap, system, and method of use.. .
|Component update using management engine|
Embodiments of systems and methods for applying a component update using a management engine are disclosed. A computing device may include a management engine to store a bootable image containing an update for a component of the computing device in a secured memory location and configure the computing device to boot from the bootable image.
|Preventing redirection loops during collaborative web browsing|
A system for preventing redirection loops during collaborative web browsing is provided including: a cpu; a memory in communication with the cpu; instructions stored in the memory and executable by the cpu to prevent redirects encountered during a collaborative web browsing session, the instructions further comprising: instructions enabling a device to join a collaborative web browsing session; instructions enabling detection of a redirection loop based upon a query to a uniform resource locator (url) history stored in a memory; and instructions enabling termination of the redirect loop; wherein, upon the detection of a redirection loop, the device ignores url updates of the collaborative web browsing session for a predetermined amount of time.. .
|Blind handover or blind redirection method and system|
A blind handover or blind redirection method and system are provided. The method includes: when a ue needs to perform blind handover or blind redirection, it is determined whether there is a history record of handover or redirection of the ue; and when there is the history record, a target cell which the ue is about to be blindly handed over to or blindly redirected to is selected according to the history record.
|Method and system for improving the data security of cloud computing|
A method and system for improving the data security of cloud computing comprising: users establishing an index information table for physical lun devices available to cloud computing service instances, and setting mapping rules of virtual lba address space for virtual lun devices and physical lba address space for data storage according to the index information table; according to the mapping rules, users establishing and saving a mapping relationship between virtual lba address space and physical lba address space for data storage; according to the mapping relationship, acquiring storage position information of actual data mapping to the virtual lba address space pointed by read/write requests, and completing i/o redirection. The system includes an establishment module, setting module, establishment and saving module, and redirection module.
|Systems, methods, and devices for defending a network|
Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and comprising attack traffic and non-attack traffic, the attack traffic simultaneously carried by the backbone network with the non-attack traffic: redirecting at least a portion of the attack traffic to a scrubbing complex; and allowing at least a portion of the non-attack traffic to continue to the particular target without redirection to the scrubbing complex.. .
|Systems and methods for parcel delivery to alternate delivery locations|
A system, in various embodiments, is configured to redirect undeliverable parcels to alternate delivery locations. The parcels may be undeliverable due to an unavailability of an intended recipient of the parcels to sign for the parcels or otherwise take delivery of the parcels at the delivery address.
|Authentication server, and method authenticating application|
An application authentication program causes a data server and an application server to execute the processes of: accepting an access request containing application-related information and redirection information from an application running on a communication terminal; and when judging that the redirection information is legitimate, transmitting an access response being a response to the access request and containing application identification information corresponding to the application-related information to the communication terminal including a redirection destination corresponding to the redirection information.. .
|Administration of access lists for femtocell service|
A subscriber account associated with a femtocell can be managed and access can be provided thereto. The account service management can be accessed through a broadband network and comprises two operational layers deployed within respective demarcation zones.
|Waveguide bodies including redirection features and methods of producing same|
According to one aspect, a waveguide includes a body exhibiting a total internal reflectance characteristic and having a first face and a second face opposite the first face wherein the first and second faces extend along a lateral direction and a coupling cavity adapted to receive a light emitting diode (led) that is configured to direct light into the body. The body additionally includes an extraction feature disposed on one of the first and second faces and configured to direct light traveling through the body out of at least one of the first and second faces.
|System and method for embedding multimedia controls and indications in a webpage|
A system and a method embed multimedia controls and indications in a webpage which may provide access to internet media content. The multimedia controls and indications embedded in the webpage may be accessible using a standard web browser and may enable a user of the standard web browser to invoke enhanced media functions for internet media content available through the webpage.
|Redirection service mechanism|
A system can include an interface that receives a url that includes information; circuitry that processes at least a portion of the information for entity information and internet merchant information; circuitry that accesses database entries in an entity field and in an affiliate program criterion field; circuitry that associates the url with an entity field database entry based at least in part on the entity information; circuitry that includes selection logic that selects at least one affiliate program from a plurality of affiliate programs based at least in part on an affiliate program criterion field entry associated with the entity field database entry; and circuitry that formulates a redirection url based at least in part on the internet merchant information wherein the redirection url comprises affiliate program information for the at least one selected affiliate program. Various other apparatuses, systems, methods, etc., are also disclosed..
|Methods and systems for preventing security breaches|
A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (api) calls to system resources from the binary executable file via export address redirection back to the security payload.