|| List of recent Ver-related patents
| Verification that a user attempting to access content is a human user|
An easier and less frustrating way of verifying that a user attempting to access content is a human user is provided. For example, data indicative of a request by a user to access content from a content server is received.
| Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program|
A long-term signature system 1 can generate long-term signature data for each of a plurality of pieces of original data in cooperation with a long-term signature server 2 while retaining original data and a secret key for signature in a client terminal 3 without sending original data and the secret key to the outside. In the long-term signature system 1, there are pades and xades as a long-term signature scheme, a scheme is designated for each piece of original data, and in a state where the plurality of schemes are mixed, long-term signature data can be generated in parallel.
| Cross-user correlation for detecting server-side multi-target intrusion|
Technologies are generally described for time-correlating administrative events within virtual machines of a datacenter across many users and/or deployments. In some examples, the correlation of administrative events enables the detection of confluences of repeated unusual events that may indicate a mass hacking attack, thereby allowing attacks lacking network signatures to be detected.
| Methods and structure for implementing security in systems that utilize small computer system interface enclosure services|
Methods and structure are provided for implementing security features in scsi enclosure services (ses) systems. The system comprises an ses device server, which includes a frontend interface, control unit, and backend interface.
| Method, apparatus and system of controlling remote login|
The disclosure provides a multiple location login control method, device, and system. The method may include receiving, by a server, login information recorded for a current login, wherein the login information includes a login id, a first login time, and a first geographic location of a client for the current login.
| Authentication and notification heuristics|
Server-side authentication of user accounts by using multiple authentication tokens and transmission of update statement to users for updates to applications installed on their devices. Prompting users that updates are available upon determining that a threshold event has occurred and if requisite network and situational conditions exist.
| Wireless device, registration server and method for provisioning of wireless devices|
The present invention relates to auto-provision of wireless devices. A wireless device (1) has a device identifier and a first private key generated from the device identifier.
| Communication system|
A content distribution server receives from an information processing device, a first password generated from first data indicating a key and server specific information specific to the server with the use of a predetermined function. Then, the received first password and processing designation information designating processing are transmitted to a terminal.
| Authentication system, information registration system, server, program, and authentication method|
The authentication system includes a plurality of user terminals that are used by the same user, and a server capable of communicating with the plurality of user terminals. A user terminal transmits, to the server, an identification id of the user terminal, a first code that is used in common in the plurality of user terminals, and a second code that was encrypted using the first code.
| System and method for access control via mobile device|
A system is described for controlling an actuating unit that restricts physical access such as a motorized garage door actuator unit. The system comprises a mobile wireless communication device, an electro-mechanical access control security device, and a receiving unit controlling the electro-mechanical access control security device, the receiving unit paired with the mobile wireless communication device for receiving user input for activating the electro-mechanical access control security device via a peer-to-peer communication directly with the mobile wireless communication device, and a pre-authorization of communication of the receiving unit with the mobile wireless communication device, the mobile wireless communication device receiving the pre-authorization from a central security server..
| Wireless device registration, such as automatic registration of a wi-fi enabled device|
A system for providing a wireless device with access to a computer network includes an access point that sets up a radio link with the wireless device and couples the wireless device to the network. The system also includes a server that receives data packets from the access point through the computer network.
| Event centric network application|
A system and method implementing an event centric network application including software controlled processes on one or more servers, and client applications or user side software processes controlling user hardware to implement social networking capabilities specifically aimed at and around multiuser attended events. A portal or server side software process serves event related communications between, the system hardware that is controlled by event organizers, advertisers, and individuals attending the event from user devices such as phones or other communications enabled computing devices.
| System and method for providing virtual av service|
A system for providing virtual av service includes a local device middleware (ldm) media server which stores av contents and a resource cooperation server (rcs) which separates the av contents from the ldm media server into video contents and audio contents. The video contents and the audio contents are reproduced by an ldm video renderer and an ldm audio renderer, respectively.
| Targeted television advertising based on a profile linked to an online device associated with a content-selecting device|
A profile provider: (i) associates a set of devices (including two or more online devices and possibly a set-top box); and (ii) delivers an advertisement targeted using profile information associated with one of the online devices. The advertisement is presented along with media content.
| Remote inking|
In one or more embodiments, a bus driver, included on a local computing system, enables detection of hardware available on a host computing system for a remote access session. Upon detecting a hardware device on the host computing system, an operating system included in the local computing system may obtain a device driver for controlling data captured from the hardware device.
| Driver interface functions to interface client function drivers|
In embodiments of driver interface functions to interface client function drivers, a set of serial communication protocol driver interfaces are exposed by a core driver stack, and the serial communication protocol driver interfaces include driver interface functions to interface with client function drivers that correspond to client devices configured for data communication in accordance with the serial communication protocol. A client function driver can check for the availability of a driver interface function before interfacing with the core driver stack via the serial communication protocol driver interfaces.
| Method and system for synchronization of workitems with divergent control flow|
Disclosed methods, systems, and computer program products embodiments include synchronizing a group of workitems on a processor by storing a respective program counter associated with each of the workitems, selecting at least one first workitem from the group for execution, and executing the selected at least one first workitem on the processor. The selecting is based upon the respective stored program counter associated with the at least one first workitem..
| Cloud computing gateway, cloud computing hypervisor, and methods for implementing same|
Embodiments of the present invention provide a cloud gateway system, a cloud hypervisor system, and methods for implementing same. The cloud gateway system extends the security, manageability, and quality of service membrane of a corporate enterprise network into cloud infrastructure provider networks, enabling cloud infrastructure to be interfaced as if it were on the enterprise network.
| Device, recording medium, and method|
A device includes a memory which stores a program, and a processor which executes, based on the program, a procedure comprising deciding, based on maximum bandwidth information included in bandwidth setting information corresponding to a network device existing on a route between a physical server serving as an allocation destination candidate of a virtual machine and a gateway, maximum bandwidth information of the virtual machine, available bandwidth information of the network device, and hardware resource information of the physical server, and instructing a decided physical server to create the virtual machine.. .
| Method and apparatus for supporting virtualization of loadable module|
Disclosed herein is a method and apparatus for supporting virtualization. In the method, conversion of source code of a loadable module is initiated.
| Method and system for cross-operating systems execution of software applications|
A method for cross-operating systems execution of a legacy software application on a user computing device is provided. The method comprises upon launching a native application on the user computing device, executing, on a server, a cloudified application corresponding to the legacy software application, the legacy software application is compliant with a first operating system, wherein the user computing device is compliant with a second operating system, the first operating system and the second operating system are incompatible with each other; rendering outputs responsive of inputs generated by the native application and received at the cloudified application; streaming the rendered outputs to the user computing device to be displayed by the native application; and performing file system operations requested by at least one of the native application and the cloudified application on at least a cloud storage service..
| Installing applications remotely|
A method includes accessing configuration that represents one or more installed software applications, and transmitting information that, when rendered at the remote computer, is operable to cause display of an interface for installing applications at the mobile device. The interface is based at least in part on the configuration information.
| Cloud system having flexible applications|
A cloud system having flexible applications mainly includes an executing module of client computers, a packager for software virtualization, and a server for software virtualization. The packager and the server are constructed on a cloud platform.
| Automatically installing and removing recommended applications|
Concepts and technologies are described herein for automatically installing and removing recommended applications. In accordance with some of the concepts and technologies disclosed herein, a marketplace server computer determines a recommended application for user, adds the recommended application to an entitlement associated with the user, and sends the recommended application along with instructions to automatically install the recommended application to a user device associated with the user.
| System and method for distributed patch management|
A method and system for distributing patches (e.g., software patches) to network nodes in a peer-to-peer network. A plurality of network nodes may be designated or associated as server nodes.
| Computing device update control|
Techniques for computing device update configuration are described. In implementations, an update service is employed to manage update groups for various types and/or classifications of computing devices.
| Version labeling in a version control system|
Version labeling of an artifact in a version control system. An embodiment can include accepting at least one change set into a configuration for the artifact.
| Version labeling in a version control system|
Version labeling of an artifact in a version control system. An embodiment can include accepting at least one change set into a configuration for the artifact.
| Exchanging project-related data in a client-server architecture|
Techniques are described for exchanging data between software applications, such as project-related data between a project management software application (“pmsa”) and an unaffiliated organizational project tracking software application (“optsa”). A computing architecture with multiple interacting computer systems, such as a client-server architecture, can be used to allow users of remote computing systems to access project-related data and/or functionality from other computing systems, such as a thin client computing system with limited or no local capabilities to execute software applications and/or store associated application data accessing a remote central server computing system in order to interact with a pmsa executing on the server, to interact with an optsa executing on the server, and/or to invoke data exchange functionality available at the server for exchanging project-related data between the pmsa and optsa..
| Power and timing optimization for an integrated circuit by voltage modification across various ranges of temperatures|
A method of optimizing power and timing for an integrated circuit (ic) chip, which uses an ic technology that exhibits temperature inversion, by modifying a voltage supplied to the ic chip, while meeting power consumption and timing delay performances across lower and higher temperature ranges. A high voltage is selected that meets a closed timing analysis across a full temperature range to meet a timing performance and a low voltage is selected to meet the timing performance and the power performance across a lower temperature range to a temperature cut point in the higher temperature range.
| Integrated electronic design automation system|
An electronic design automation system combines features of discrete eda/cad systems and manufacturing systems into a monolithic system to enable a layperson to efficiently design, construct and have manufactured a specific class of custom electronic device, namely a computer processing unit with embedded software. A graphical user interface (gui) is provided as the front-end to a computer aided design (cad) server that generates sophisticated control and manufacturing instructions that are delivered to a fabrication supply chain, which produces a specified device that is then transported via managed logistics into inventory and ordering systems at vendors for delivery to a designated customer..
| Systems and methods for a unified game experience in a multiplayer game|
In some embodiments, a system comprises game state information, a first user device, a second user device, and a processing server. The first and second user devices may include a first and second user interface modules configured to receive first and second user selections, respectively, associated with gameplay of a multiplayer game.
| Methods and apparatuses for sharing information|
A method for sharing information for use in a first terminal, including: receiving, through an information display interface of the first terminal, a copy instruction for copying selected information; and transmitting, in response to the receiving of the copy instruction, the information to a server.. .
| System and method for managing mobile multimedia messages|
A mobile application in communication with a mobile message server is disclosed. The mobile application enables users to have a conversation utilizing a media format selected from at least video and audio based on sensor feeds from a mobile device.
| Systems and methods for selection and personalization of content items|
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for selecting and personalizing content items, including but not limited to advertisements, are disclosed. A content item is selected from a plurality of content items.
| Systems and methods for dynamically providing fonts based on language settings|
A server dynamically provides fonts to a user device. The user device is provided with access to a document via a network.
| Brainstorming in a cloud environment|
The embodiments provide a cloud brainstorming service implemented on at least one cloud server. The brainstorming service includes a message service component configured to receive a plurality of ideas, over a network, from one or more users of devices.
| Mobile content management system|
A system, method, and apparatus for a mobile content management system that has interactive features to enable creation of mobile website are described. The mcms software is cloud-based, but other versions may include standalone software that can be installed on a user's desktop or a mobile device such as a tablet or a smartphone.
| Method and system for measuring opportunity to see by a panelist using a router-based web meter|
A method for determining a user's web browsing activities on a computing device is implemented at a computer system having memory and one or more processors. The computer system is communicatively coupled to the computing device.
| Document management server, document management method, and storage medium|
A document management server, in a case where a document of the same name as that of a document being requested to be registered from a client has been registered, determines whether the document of the same name has a plurality of versions. If the document management server determines that the document of the same name has a plurality of versions, after the document name of the document of the same name has been changed, the document management server registers the document being requested to be registered.
| Partial packet recovery in wireless networks|
Systems and methods for improved packet throughput using partial packets are provided in which data recovery of partial packets of a plurality of received coded packets is performed across the plurality of received coded packets. The plurality of received coded packets, including the received partial packets, can be buffered in a memory and used in recovering the data for the partial packets.
| Tester hardware|
A server stores multiple configuration data. A tester hardware is configured to be capable of changing at least a part of its functions according to configuration data stored in rewritable nonvolatile memory, to supply a power supply voltage to a dut, to transmit a signal to the dut, and to receive a signal from the dut.
| Debugging method, chip, board, and system|
Embodiments of the present invention provide a debugging method, a chip, a board, and a system and relate to the communications field. Remote debugging can be performed on a board having no main control cpu without affecting hardware distribution and software performance.
| Server and method of manipulation in relation to server serial ports|
A server in communication with a remote control device and a display device includes a super input/output (sio) microchip, a basic input/output system (bios), and a baseboard management controller (bmc). The sio microchip outputs debugging commands and ipmi commands.
| Hardware platform validation|
A system for validating a hardware platform is provided. The system includes a database that stores one or more test specifications, a compiler that generates a target image based on (i) a device driver obtained from a device driver generator, (ii) a platform independent target application code, (iii) a kernel source, and (iv) a run time environment, and a software driven validation generator that analyses the run time specification and the device programming specification and generates (i) one or more test cases based on (a) the one or more test specifications, and (b) the device programming specification, and (ii) a control software based on the test cases.
| Repair control circuit and semiconductor integrated circuit using the same|
A repair control circuit and a semiconductor integrated circuit using the same, which can reduce test time, are provided. The semiconductor integrated circuit includes a plurality of memory blocks in which a plurality of word lines are arranged, a plurality of word line drivers driving one or more of the plurality of word lines in response to a plurality of memory block selection signals, and a repair control circuit determining whether to perform a repair through comparison of repair addresses generated in response to surplus addresses and the plurality of memory block selection signals with external addresses..
| Systems and methods for disaster recovery of multi-tier applications|
A computer-implemented method for disaster recovery of multi-tier applications may include 1) identifying a multi-tier application that is provisioned with a plurality of production clusters at a production site, 2) identifying a disaster recovery site including a plurality of recovery clusters, 3) identifying, at the disaster recovery site, a failure of the multi-tier application at the production site, and 4) initiating, from the disaster recovery site, a migration of the multi-tier application from the production site to the disaster recovery site. Various other methods, systems, and computer-readable media are also disclosed..
| Methods and systems for automatically rerouting logical circuit data from a logical circuit failure to a dedicated backup circuit in a data network|
An example method of rerouting data involves rerouting a logical circuit from a first set of switches to a second set of switches to communicate data between network devices without breaking the logical circuit. The logical circuit comprises variable communication paths.
| Failover of interrelated services on multiple devices|
A device may include a network interface for communicating with a failover device, a memory for instructions, and a processor for executing the instructions. The processor may execute the instructions to communicate with the failover device, via the network interface, to fail over the device to the failover device in a cluster by pushing a process on the device to the failover device when a first failover event occurs.
| Automated disaster recovery system and method|
Methods and systems for recovering a host image of a client machine to a recovery machine comprise comparing a profile of a client machine of a first type to be recovered to a profile of a recovery machine of a second type different from the first type, to which the client machine is to be recovered, by a first processing device. The first and second profiles each comprise at least one property of the first type of client machine and the second type of recovery machine, respectively.
| Uninterruptable pc power unit for use in personal computer and servers|
Uninterruptable pc power unit (upcpu) for a personal computer (pc) replaces the power supply of a pc. The upcpu comprises an internal battery to be used during ac power interruption.
| Password encryption key|
A password-encrypted key (pek) is generated from a user-supplied password or other identifying data and then used to encrypt the user's password. The encrypted password is stored in a user record on a server.
| Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program|
A client terminal 3 can generate pades while performing communication with a long-term signature server 2 without delivering a pdf document and a secret key used in an electronic signature to the long-term signature server 2. Pades is a long-term signature format which is specified for a pdf file.
| Confidential message exchange using benign, context-aware cover message generation|
Systems and methods are disclosed permitting a sender to send a secret and secure message to a recipient. An application on a sender device interfaces with known message generating tools to permit a user to generate a message.
| Recipient blind cryptographic access control for publicly hosted message and data streams|
Private message system, method, and apparatus are described. A private message that includes encrypted data and identifying information indicating a recipient client device authorized to read the private message is stored at a server computer.
| Self-keyed protection of anticipatory content|
Systems and methods are provided to facilitate anticipatory pushing of content to clients of a communications network in such a way that the content is unusable by the anticipatory clients until explicitly requested. Embodiments apply one or more self-keying techniques to a content dataset to generate an anticipatory dataset, such that the anticipatory dataset cannot be used to reconstruct the content dataset without a keying dataset that also can only be generated using the content dataset.
| Establishing trust within a cloud computing system|
A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a common aspect, and a plurality of authentication servers, where an authentication server is associated with one of the plurality of sets of devices based on the common aspect. The cloud computing system functions to establish trust between a corresponding one of the plurality of authentication servers and the one or more devices of one of the plurality of sets of devices, between the corresponding one of the plurality of authentication servers and the cloud system managing unit, and between the cloud system managing unit and the one or more devices.
| Method and system for automatic generation of context-aware cover message|
One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system first transmits an encrypted message to a secure message server, wherein the encrypted message is addressed to the receiving device.
| Method, apparatus and instructions for parallel data conversions|
Method, apparatus, and program means for performing a conversion. In one embodiment, a disclosed apparatus includes a destination storage location corresponding to a first architectural register.
| Host memory locking in virtualized systems with memory overcommit|
A system and method for handling requests by virtual machines (vms) to lock portions of main memory are disclosed. In accordance with one embodiment, a host operating system (os) of a computer system receives a request by the guest os of a vm to lock a portion of main memory of the computer system.
| Shared library in a data storage system|
The library server according to certain aspects can manage the use of tape drives according to the data requirements of different storage operation cells. The library server according to certain aspects can also facilitate automatic management of tape media in a tape library by allocating the tapes and slots to different cells.
| Methods and systems for retrieving and caching geofence data|
Mobile device systems and methods for monitoring geofences cache a subset of geofences within a likely travel perimeter determined based on speed and direction of travel, available roads, current traffic, etc. A server may download to mobile devices subsets of geofences within a likely travel perimeter determined based on a threshold travel time possible from a current location given current travel speed, direction and roads.
| Processing input event of external device|
The disclosure is related to processing an input event of an external device in user equipment. Coupling event data may be received from the external device coupled to the user equipment.
| Dynamic and intelligent dns routing with subzones|
A request to resolve an ip address is received by a domain name server (dns). A record, such as an mx record, relating to the request is obtained that comprises a unique label (e.g.
| Method for connecting a remote network and system for connecting a remote network|
Disclosed is a remote network connection method of easily establishing network connection between an information processing apparatus and a terminal device. The remote network connection method includes connecting to a gateway, transmitting connection information including at least one of gateway connection information and information processing apparatus identification information to a server, and setting network connection to a terminal device connected to the gateway on the basis of the connection information through the gateway.
| Cascading architecture for audio and video streams|
An approach to supplying a data stream, for e.g., an internet-based video conference, to multiple client devices in a network, including attempting, at a first client device, to join an internet protocol (ip) multicast session in a network in which the first client device is operating and, if unsuccessful to attempt to join a unicast transmission of the data stream from a network node other than the meeting server and that is in a same subnet as the first client device, and if the unicast join within the same subnet is unsuccessful, registering the first client device with the meeting server to obtain at least one candidate node from which to receive the data stream.. .
| System and method for seamless horizontal scaling using logical scalable units|
The performance of a scalable computing environment in a telecommunication network may be improved by configuring a server computing system to monitor a level of traffic throughput within the telecommunication network to determine whether an increase in throughput capacity is needed or a decrease in throughput capacity is acceptable, and increasing a throughput capacity of the telecommunication network when an increase in throughput capacity is needed by adding a logical scalable unit to the telecommunication network. The logical scalable unit may including a minimum combination of logical components required to provide in a single multiprocessor system a complete set of telecommunication functionalities for a subset of users in the telecommunication network..
| Contextual network access optimizer|
A method and apparatus for optimizing access to a contextual network are described. The apparatus has a registration manager module, a configuration manager module, an access manager module, and an access optimizer module.
| Systems, methods and media for providing client-side interportlet communication|
A method for providing client-side interportlet communication includes: executing an even manager, generated at a portal server, on a client device hosting a portal page for providing interportlet communication to portlets contained in the portal page; receiving at the event manager running on a client device a registration request from each of the portlets when the portal page containing the portlets is loaded; and receiving at the event manager an event set off by one of the portlets wherein the event is defined by a token published by the one of the portlets. If the token defining the event matches the published token defined in a behavior of the portal page, the method also includes invoking at the event manager callback functions of one or more of the portlets having at least one subscription token that matches the corresponding subscribed token defined in the behavior..
| Linkage policy implementation method and apparatus, open platform board, and device|
Embodiments of the present invention disclose a linkage policy implementation method, which includes: receiving, by a linkage proxy module, a linkage policy request delivered by a third-party application service; calling a corresponding protocol converter according to a protocol identifier in the linkage policy request, and performing protocol conversion for the linkage policy request to convert it into a linkage policy request in a set protocol format; and sending the protocol-converted linkage policy request to a linkage client to instruct the linkage client to parse the linkage policy request based on the set protocol and execute linkage policy configuration. With the present invention, a linkage proxy is set to execute protocol conversion of various protocols.
| Network controller with integrated management controller|
An network controller provides both network controller and management controller functionality. Accordingly, the system host sees, in a single device, both network functionality as well as management functionality.
| Consistent association of a user id with a user|
Disclosed herein are systems, methods, and computer-readable storage media for consistently associating a user id with a user. In one aspect, a method may comprise receiving a data request at a transceiver accessible by a server computing device, wherein, in response to receiving the data request, the server computing device is configured to: access, by one or more processors coupled to the transceiver, a first value embedded in a first cookie associated with a first expiration time; set a second cookie embedded with a second value; and reset the first cookie responsive to receiving an indication that the first cookie is expiring, wherein to reset the first cookie comprises replacing the first cookie with a third cookie set with a value equal to the first value and a third expiration time later than the first expiration time.
| Balancing management duties in a cloud system|
A method for balancing management duties in a cloud system can include determining a relationship between a number of configuration items (ci) in a cloud system. The number of cis are grouped into a number of cluster levels based on the relationship of the number of cis.
| Server management connections|
Systems, methods, and logic are provided for providing a server management network internal to a computing device. Providing a server management network internal to a computing device can include connecting each of a plurality of network interface controllers (nics) in the computing device to a limited layer network device in the computing device via mutually isolated connections.
| Server migration|
In one embodiment, the invention provides a method of configuring a migration from a plurality of distributed virtual servers to a system of blades, the method comprising: identifying among the plurality of distributed virtual servers a plurality of candidate virtual servers for inclusion in the migration; collecting performance data for each candidate virtual server; consolidating the performance data for each candidate virtual server into a usage profile; normalizing the usage profile to allow representation of a statistical measure of resource usage by the candidate virtual server; and constructing a configuration for the plurality of candidate virtual servers within the system of blades.. .
| System and method for differentiating and calculating royalties for copyright-protected song samples used by artists in new works|
A method is disclosed for calculating the value a “sample” of a copyright-protected work of art adds when included in a new work. The method is embodied in a computer program or series of computer programs, available from a web portal linked to a server, which stores relevant information about an owner's “samples;” allows the owner to assign specific value criteria to all “samples;” allows an artist to download specified “samples,” incorporate them into new works, and upload the new works to the web portal, where a series of calculations then derive the value each “sample” adds to the new work; and creates conditions obligating the artist to upload information regarding the distribution of the new work to the web portal so the value added by each “sample” can be distributed to the “sample” owners in proportion to the value each “sample” adds to the new work..
| Adaptive hypertext transfer protocol ("http") media streaming systems and methods|
An exemplary adaptive hypertext transfer protocol (“http”) media streaming system may be configured to stream a media program from an http media streaming server subsystem to a client device during an adaptive http media streaming session in which predefined segments of the media program are progressively downloaded from the http media streaming server subsystem to the client device by way of a network connection. For each next predefined segment of the media program to be downloaded, the server subsystem may dynamically select, based on one or more of the exemplary factors disclosed herein, a version of the next predefined segment of the media program from a plurality of versions of the next predefined segment of the media program and download the selected version of the next predefined segment of the media program to the client device.
| Mechanism for location-aware web service-based application skinning for web applications|
A mechanism for location-aware web service-based application skinning for web applications is disclosed. A method includes identifying, by a server device, a locale of an originator of a request for a web page of a web application hosted by the server device, obtaining skinning files associated with a combination of the web application and the identified locale; and rendering, in response to the request, the web page comprising the skinning files, wherein the skinning files provide a language and style to a user interface (ui) of the web page based on the identified locale that is separate from a development of the web application..
| Method for providing augmented reality service, server and computer-readable recording medium|
According some aspects of the present invention, there is provided a method for providing an augmented reality service, including (a) receiving an image through a camera, (b) performing image matching operation on the input image in an image matching server, (c) determining by an api server whether the image can be implemented as augmented reality using a result of the image matching if the image is matched to a specific image among previously stored images, (d) providing by an ar content server augmented reality content for implementing an augmented reality scenario, if it is determined that the image can be implemented as augmented reality and (e) implementing the augmented reality using the augmented reality content by a terminal. Various images input through a camera may be implemented as augmented reality by receiving only the data needed to implement a corresponding image into the augmented reality from a server by applying an image matching technique before implementing the augmented reality, without storing the data required for implementing the augmented reality in a limited memory space of a terminal..
| Providing and receiving content for computer networks using a gateway and server|
Providing and receiving content for nodes of a computer network. In one aspect, a method for receiving content for nodes on a network includes establishing a computer device as a gateway device that can communicate in a first network and communicate with a server in a second network.
| Address allocation processing method, apparatus and system|
The present invention provides an address allocation processing method, apparatus and system. The method includes: receiving, by a first bras, a dhcp relay packet sent by a second bras, wherein the dhcp relay packet includes a gateway ip address and source ip address-based response information; parsing, by the first bras, the dhcp relay packet, acquiring the gateway ip address, and allocating an idle ip address from an acquired address pool matching the gateway ip address; encapsulating, by the first bras, a source ip address in the dhcp relay packet into a destination ip address in a response packet according to the source ip address-based response information, and sending the idle ip address carried in the encapsulated response packet to the second bras.
| Information processing apparatus, information processing method and storage medium|
When an instruction to access a web server of an external device connected via a local interface is acquired from a user, access destination information for accessing the web server via the local interface is acquired. Based on the acquired access destination information, communication is performed with the web server of the external device via the local interface..
| Posted information sharing system, information-processing system, information processing method, storage medium, and computer platform|
An exemplary posted information sharing system includes: an information-processing system; and a server, wherein the information-processing device includes an executing unit that executes an application program, and an accessing unit that accesses an item of posted information depending on the application program that is being executed or whose execution is suspended, the posted information being stored on the server, and the server includes a providing unit that provides access to the posted information by the information-processing device, in response to a request from the accessing unit.. .
| System and method for monitoring network connections|
System and method for monitoring network connection are provided. The system includes at least one client device configured for providing a user access to a public network via a network connection and a network monitoring module coupled to the client device, the network monitoring module configured for monitoring the network connection based on an establishment of a transmission control protocol connection between the client device and the public network.
| Use of reversed dns records for distributed mapping of asymmetric cryptographic keys to custom data|
A server sends a lookup request for a first domain name to a domain name system (dns) in response to receiving data associated with a user. The first domain name includes the data associated with the user.