최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0017445 (2013-09-04) |
등록번호 | US-9591381 (2017-03-07) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 462 |
A method, apparatus and system related to automated discovery and launch of an application on a network enabled device are disclosed. In one embodiment, a method of a client device includes determining that a networked media device sharing a local area network common with the client device has autom
A method, apparatus and system related to automated discovery and launch of an application on a network enabled device are disclosed. In one embodiment, a method of a client device includes determining that a networked media device sharing a local area network common with the client device has automatically detected an audio-visual data and/or an application currently being accessed by a user of the client device. The client device automatically communicates a present state of the audio-visual data and/or the application currently being accessed by the user of the client device to the networked media device. Then, the client device detects that the audio-visual data and/or the application currently being accessed by the user of the client device has been launched on the networked media device. Optionally, a haptic gesture may be applied on the client device by the user to transport the audio-visual data and/or the application from the client device to the networked media device. The application may serve a control point when the present state of the audio-visual data and/or the application currently being accessed by the user of the client device is communicated to the networked media device. In addition, an automatic content recognition algorithm in the client device and/or the networked media device may generate a meta-data associated with content in the present state of the audio-visual data.
1. A method of a networked device comprising: automatically detecting that at least one of an audio-visual data and an application currently being accessed by a user of a client device is sharing a local area network common with the networked device;determining a present state of at least one of the
1. A method of a networked device comprising: automatically detecting that at least one of an audio-visual data and an application currently being accessed by a user of a client device is sharing a local area network common with the networked device;determining a present state of at least one of the audio-visual data and the application currently being accessed by the user of the client device;automatically launching at least one of the audio-visual data and the application currently being accessed by the user of the client device on the networked media device;announcing a sandbox reachable service of the networked device to a discovery module using a processor and memory;automatically instantiating a communication between the sandbox reachable service of the networked device and a client device when a relay module sends a request from a sandboxed application of the client device to the sandbox reachable service; andappending a header of a hypertext transfer protocol to permit the networked device to communicate with the sandboxed application as a permitted origin domain through a Cross-origin resource sharing (CORS) algorithm, wherein the header is either one of a origin header when the CORS algorithm is applied and a referrer header in an alternate algorithm, and wherein the client device to operate in at least one manner such that the client device: to process an identification data associated with the sandbox reachable service sharing a public address with the client device;to determine a private address pair of the sandbox reachable service based on the identification data; andto establish a communication session between the sandboxed application and the sandbox reachable service using a cross-site scripting technique of a security sandbox. 2. The method of claim 1 wherein the client device: to extend a security sandbox with a discovery algorithm and a relay algorithm through the discovery module and the relay module added to the security sandbox; andto bypass a pairing server having the discovery algorithm and the relay algorithm when establishing the communication between the sandboxed application and the sandbox reachable service when the security is extended with the discovery algorithm and the relay algorithm through the discovery module and the relay module added to the security sandbox. 3. The method of claim 2 wherein the client device: to apply the discovery algorithm of the security sandbox to determine that the networked device having the sandbox reachable service communicates in a shared network common to the client device and the networked device; andto apply the relay algorithm of the security sandbox to establish the communication between the sandboxed application and the sandbox reachable service of the networked device. 4. The method of claim 3: wherein the discovery algorithm utilizes a protocol comprising at least one of a Bonjour® protocol, a SSDP protocol, a LSD uTorrent® protocol, a multicast protocol, an anycast protocol, and another Local Area Network (LAN) based protocol that discovers services in a LAN based on a broadcast from any one of an operating system service, the security sandbox, the client device, the sandbox reachable service, and the networked device. 5. The method of claim 4: wherein a cookie associated with the security sandbox is used to store a remote access token on a storage of the client device,wherein the remote access token identifies at least one of a set of communicable private Internet Protocol (IP) addresses and hardware addresses associated with sandbox reachable services that previously operated on a common shared network with the client device, andwherein the client device can communicate with the sandbox reachable services that previously operated on the common shared network through the remote access token. 6. The method of claim 5: wherein the client device and the networked device reside on networks that are incommunicable with each other comprising at least one of a firewall separation, a different network separation, a physical separation, an unreachable connection separation, andwherein the sandboxed application of the security sandbox of the client device and the sandbox reachable service of the networked device communicate with each other through a relay service employed by the pairing server having the discovery module and the relay module to facilitate a trusted communication between the sandboxed application and the sandbox reachable service. 7. The method of claim 6: wherein the trusted communication is facilitated in a manner such that the sandboxed application never learns at least one of a private IP address and a hardware address of the networked device when: a first Network Address Translator (NAT) device coupled with a network on which the client device operates to receives communications from a public IP address of a different network on which the sandbox reachable service operates, andwherein a second NAT device coupled with the different network on which the networked device operates to translates the private IP address of the networked device to the public IP address visible to the sandboxed application. 8. The method of claim 7: wherein the networked device comprises a plurality of sandbox reachable applications including the sandbox reachable application, and wherein a service agent module of the networked device coordinates communications with the discovery module of at least one of the security sandbox and the pairing server,wherein the security sandbox is at least one of an operating system on which the sandboxed application is hosted and a browser application of the operating system, andwherein the networked device is at least one of a television, a projection screen, a multimedia display, a touchscreen display, an audio device, a weather measurement device, a traffic monitoring device, a status update device, a global positioning device, a geospatial estimation device, a tracking device, a bidirectional communication device, a unicast device, a broadcast device, and a multidimensional visual presentation device. 9. The method of claim 8 wherein the client device: to utilize at least one of a WebSocket and a long polling service message query interface to reduce a latency of message delivery during the trusted communication between the sandboxed application and the sandbox reachable service; andto optimize a polling period between polling such that it is less than a timeout period of a session through the relay service. 10. The method of claim 9 wherein the client device: to initiate the relay service through at least one of a series of web pages where information is communicated using hyperlinks that point at the pairing server, and a form having a confirmation dialog that is submitted back to the pairing server, andwherein a global unique identifier is masked through the pairing server when the confirmation dialog is served from the pairing server. 11. The method of claim 1 wherein the client device: to access a pairing server when processing the identification data associated with the sandbox reachable service sharing the public address with the client device, wherein the pairing server performs a discovery lookup of any devices that have announced that they share the public address associated with the client device, andwherein the sandbox reachable service announces itself to the pairing server prior to the establishment of the communication session between the sandboxed application and the sandbox reachable service. 12. The method of claim 11 further comprising at least one of: announcing an availability of the sandbox reachable service across a range of public addresses such that the sandboxed application communicates with the sandbox reachable service in any one of the range of the public addresses; andcommunicating at least one of a global unique identifier, a hardware address, and an alphanumeric name to the pairing server along with the private address pair of the sandbox reachable service, and wherein the private address pair includes a private IP address and a port number associated with the sandbox reachable service. 13. The method of claim 11 further comprising: eliminating a communication through a centralized infrastructure when the sandboxed application and the sandbox reachable service communicate in a shared network common to the client device and the networked device when the communication is established, wherein the shared network is at least one of a local area network, a multicast network, an anycast network, and a multilan network;minimizing a latency in the communication session when the sandboxed application and the sandbox reachable service communicate in the shared network common to the client device and the networked device when the communication is established; andimproving privacy in the communication session when the sandboxed application and the sandbox reachable service communicate in the shared network common to the client device and the networked device when the communication is established. 14. The method of claim 1: wherein the sandboxed application is at least one of a web page, a script, a binary executable, an intermediate bytecode, an abstract syntax tree, and an executable application in a security sandbox,wherein the sandboxed application comprises at least one of a markup language application such as a HyperText Markup Language 5 (HTML5) application, a Javascript® application, an Adobe® Flash® application, a Microsoft® Silverlight® application, a JQuery® application, and an Asynchronous Javascript® and a XML (AJAX) application, andwherein an access control algorithm governs a policy through which a secondary authentication is required when establishing a communication between the sandboxed application and the networked device. 15. The method of claim 14 wherein the client device: to utilize an exception to a same origin policy through a use of at least one of a hyperlink, a form, the script, a frame, a header, and an image when establishing the communication between the sandboxed application and the sandbox reachable service. 16. The method of claim 1 further comprising: accessing the application on the client device serving as a control point when the present state of at least one of the audio-visual data and the application currently being accessed by the user of the client device is communicated to the networked media device; andutilizing an automatic content recognition algorithm in at least one of the client device and the networked media device to generate a meta-data associated with content in the present state of the audio-visual data. 17. A system comprising: a networked device to launch at least one of an audio-visual data and an application currently being accessed in a local area network in which the networked device is affiliated; anda client device sharing the local area network with the networked device to automatically communicate a present state of at least one of the audio-visual data and the application currently being accessed to the networked media device; constrain an executable environment in a security sandbox, to execute a sandboxed application in the security sandbox, and to automatically instantiate a connection between the sandboxed application and the sandbox reachable service of the networked device;to process an identification data associated with the sandbox reachable service sharing a public address with the client device;to determine a private address pair of the sandbox reachable service based on the identification data; andto establish a communication session between the sandboxed application and the sandbox reachable service using a cross-site scripting technique of the security sandbox. 18. The system of claim 17 wherein the client device: to extend the security sandbox with a discovery algorithm and a relay algorithm through the discovery module and a relay module added to the security sandbox, andto bypass a pairing server having the discovery algorithm and the relay algorithm when establishing the connection between the sandboxed application and the sandbox reachable service when the security is extended with the discovery algorithm and the relay algorithm through the discovery module and the relay module added to the security sandbox. 19. The system of claim 18 wherein the client device: to apply the discovery algorithm of the security sandbox to determine that the networked device having the sandbox reachable service communicates in a shared network common to the client device and the networked device, andto apply the relay algorithm of the security sandbox to establish the connection between the sandboxed application and the sandbox reachable service of the networked device. 20. The system of claim 19: wherein the discovery algorithm utilizes a protocol comprising at least one of a Bonjour® protocol, a SSDP protocol, a LSD uTorrent® protocol, a multicast protocol, an anycast protocol, and another Local Area Network (LAN) based protocol that discovers services in a LAN based on a broadcast from any one of an operating system service, the security sandbox, the client device, the sandbox reachable service, and the networked device. 21. The system of claim 20: wherein a cookie associated with the security sandbox is used to store a remote access token on a storage of the client device,wherein the remote access token identifies at least one of a set of communicable private Internet Protocol (IP) addresses and hardware addresses associated with sandbox reachable services that previously operated on a common shared network with the client device, andwherein the client device can communicate with the sandbox reachable services that previously operated on the common shared network through the remote access token. 22. The system of claim 21: wherein the client device and the networked device reside on networks that are incommunicable with each other comprising at least one of a firewall separation, a different network separation, a physical separation, an unreachable connection separation, andwherein the sandboxed application of the security sandbox of the client device and the sandbox reachable service of the networked device communicate with each other through a relay service employed by the pairing server having the discovery module and the relay module to facilitate a trusted communication between the sandboxed application and the sandbox reachable service. 23. The system of claim 22: wherein the trusted communication is facilitated in a manner such that the sandboxed application never learns at least one of a private IP address and a hardware address of the networked device when: a first Network Address Translator (NAT) device coupled with a network on which the client device operates to receives communications from a public IP address of a different network on which the sandbox reachable service operates, andwherein a second NAT device coupled with the different network on which the networked device operates to translates the private IP address of the networked device to the public IP address visible to the sandboxed application. 24. The system of claim 23: wherein the networked device comprises a plurality of sandbox reachable applications including the sandbox reachable application, and wherein a service agent module of the networked device coordinates communications with the discovery module of at least one of the security sandbox and the pairing server,wherein the security sandbox is at least one of an operating system on which the sandboxed application is hosted and a browser application of the operating system, andwherein the networked device is at least one of a television, a projection screen, a multimedia display, a touchscreen display, an audio device, a weather measurement device, a traffic monitoring device, a status update device, a global positioning device, a geospatial estimation device, a tracking device, a bidirectional communication device, a unicast device, a broadcast device, and a multidimensional visual presentation device. 25. The system of claim 24 wherein the client device: to utilize at least one of a WebSocket and a long polling service message query interface to reduce a latency of message delivery during the trusted communication between the sandboxed application and the sandbox reachable service, andto optimize a polling period between polling such that it is less than a timeout period of a session through the relay service. 26. The system of claim 25 wherein the client device: to initiate the relay service through at least one of a series of web pages where information is communicated using hyperlinks that point at the pairing server, and a form having a confirmation dialog that is submitted back to the pairing server, andwherein a global unique identifier is masked through the pairing server when the confirmation dialog is served from the pairing server. 27. The system of claim 17 wherein the client device: to access a pairing server when processing the identification data associated with the sandbox reachable service sharing the public address with the client device, wherein the pairing server performs a discovery lookup of any device that have announced that they share the public address associated with the client device, andwherein the sandbox reachable service announces itself to the pairing server prior to the establishment of the communication session between the sandboxed application and the sandbox reachable service. 28. The system of claim 27 wherein the networked device to at least one of: announce a sandbox reachable service of the networked device to a discovery module using a processor and memory,announce an availability of the sandbox reachable service across a range of public addresses such that the sandboxed application communicates with the sandbox reachable service in any one of the range of the public addresses,communicate at least one of a global unique identifier and an alphanumeric name to the pairing server along with at least one of a hardware address associated with the networked device, a public address pair associated with a sandbox reachable service of the networked device, and a private address pair associated with the sandbox reachable service of the networked device, andwherein the private address pair includes a private IP address and a port number associated with the sandbox reachable service. 29. The system of claim 28 wherein the client device: to eliminate a communication through a centralized infrastructure when the sandboxed application and the sandbox reachable service communicate in a shared network common to the client device and the networked device when the connection is established, wherein the shared network is at least one of a local area network, a multicast network, an anycast network, and a multilan network;to minimize a latency in the communication session when the sandboxed application and the sandbox reachable service communicate in the shared network common to the client device and the networked device when the connection is established; andto improve privacy in the communication session when the sandboxed application and the sandbox reachable service communicate in the shared network common to the client device and the networked device when the connection is established. 30. The system of claim 17: wherein the sandboxed application is at least one of a web page, a script, a binary executable, an intermediate bytecode, an abstract syntax tree, and an executable application in the security sandbox,wherein the sandboxed application comprises at least one of a markup language application such as a HyperText Markup Language 5 (HTML5) application, a Javascript® application, an Adobe® Flash® application, a Microsoft® Silverlight® application, a JQuery® application, and an Asynchronous Javascript® and a XML (AJAX) application, andwherein an access control algorithm governs a policy through which a secondary authentication is required when establishing a communication between the sandboxed application and the networked device. 31. The system of claim 30 wherein the client device: to utilize an exception to a same origin policy through a use of at least one of a hyperlink, a form, the script, a frame, a header, and an image when establishing the connection between the sandboxed application and the sandbox reachable service. 32. The system of claim 17: wherein the communication session is established by appending a header of a hypertext transfer protocol to permit the networked device to communicate with the sandboxed application as a permitted origin domain through a Cross-origin resource sharing (CORS) algorithm, wherein the header is either one of a origin header when the CORS algorithm is applied and a referrer header in an alternate algorithm. 33. A method of a client device comprising: determining that a networked media device sharing a local area network common with the client device has automatically detected at least one of an audio-visual data and an application currently being accessed by a user of the client device;automatically communicating a present state of at least one of the audio-visual data and the application currently being accessed by the user of the client device to the networked media device;detecting that at least one of the audio-visual data and the application currently being accessed by the user of the client device has been launched on the networked media device;constraining an executable environment in a security sandbox;executing a sandboxed application in the executable environment using a processor and a memory;automatically instantiating a connection between the sandboxed application and a sandbox reachable service of a networked media device;processing an identification data associated with the sandbox reachable service sharing a public address with the client device;determining a private address pair of the sandbox reachable service based on the identification data;establishing a communication session between the sandboxed application and the sandbox reachable service using a cross-site scripting technique of the security sandbox; andappending a header of a hypertext transfer protocol to permit the networked media device to communicate with the sandboxed application as a permitted origin domain through a Cross-origin resource sharing (CORS) algorithm, wherein the header is either one of a origin header when the CORS algorithm is applied and a referrer header in an alternate algorithm. 34. The method of claim 33: wherein the client device and the networked media device reside on networks that are incommunicable with each other comprising at least one of a firewall separation, a different network separation, a physical separation, an unreachable connection separation, andwherein the sandboxed application of the security sandbox of the client device and the sandbox reachable service of the networked media device communicate with each other through a relay service employed by a pairing server having a discovery module and a relay module to facilitate a trusted communication between the sandboxed application and the sandbox reachable service. 35. The method of claim 34: wherein the trusted communication is facilitated in a manner such that the sandboxed application never learns at least one of a private IP address and a hardware address of the networked media device when: a first Network Address Translator (NAT) device coupled with a network on which the client device operates to receive communications from a public IP address of a different network on which the sandbox reachable service operates, andwherein a second NAT device coupled with the different network on which the networked media device operates to translate the private IP address of the networked media device to the public IP address visible to the sandboxed application. 36. The method of claim 35: wherein the networked media device comprises a plurality of sandbox reachable applications including the sandbox reachable application, and wherein a service agent module of the networked media device coordinates communications with the discovery module of at least one of the security sandbox and the pairing server,wherein the security sandbox is at least one of an operating system on which the sandboxed application is hosted and a browser application of the operating system, andwherein the networked media device is at least one of a television, a projection screen, a multimedia display, a touchscreen display, an audio device, and a multidimensional visual presentation device. 37. The method of claim 36 further comprising: utilizing at least one of a WebSocket and a long polling service message query interface to reduce a latency of message delivery during the trusted communication between the sandboxed application and the sandbox reachable service; andoptimizing a polling period between polling such that it is less than a timeout period of a session through the relay service. 38. The method of claim 37 further comprising: initiating the relay service through at least one of a series of web pages where information is communicated using hyperlinks that point at the pairing server, and a form having a confirmation dialog that is submitted back to the pairing server, andwherein a global unique identifier is masked through the pairing server when the confirmation dialog is served from the pairing server. 39. The method of claim 33 further comprising: extending the security sandbox with a discovery algorithm and a relay algorithm through a discovery module and a relay module added to the security sandbox; andbypassing a pairing server having the discovery algorithm and the relay algorithm when establishing the connection between the sandboxed application and the sandbox reachable service when the security sandbox is extended with the discovery algorithm and the relay algorithm through the discovery module and the relay module added to the security sandbox. 40. The method of claim 39 further comprising: applying the discovery algorithm of the security sandbox to determine that the networked media device having the sandbox reachable service communicates in a shared network common to the client device and the networked media device; andapplying the relay algorithm of the security sandbox to establish the connection between the sandboxed application and the sandbox reachable service of the networked media device. 41. The method of claim 40: wherein the discovery algorithm utilizes a protocol comprising at least one of a Bonjour® protocol, a SSDP protocol, a LSD uTorrent® protocol, a multicast protocol, an anycast protocol, and another Local Area Network (LAN) based protocol that discovers services in a LAN based on a broadcast from any one of an operating system service, the security sandbox, the client device, the sandbox reachable service, and the networked media device. 42. The method of claim 33 further comprising: accessing a pairing server when processing the identification data associated with the sandbox reachable service sharing the public address with the client device, wherein the pairing server performs a discovery lookup of any device that has announced that it shares the public address associated with the client device, andwherein the sandbox reachable service announces itself to the pairing server prior to the establishment of the communication session between the sandboxed application and the sandbox reachable service. 43. The method of claim 42 further comprising at least one of: wherein the sandbox reachable service announces an availability of the sandbox reachable service across a range of public addresses such that the sandboxed application communicates with the sandbox reachable service in any one of the range of the public addresses,wherein the range of public addresses is known by the pairing server so that the announcement of the availability of the sandbox reachable service across the range of public addresses is unnecessary,wherein the sandbox reachable service communicates at least one of a global unique identifier and an alphanumeric name to the pairing server along with the private address pair of the sandbox reachable service, andwherein the private address pair includes a private IP address and a port number associated with the sandbox reachable service. 44. The method of claim 33 further comprising: wherein the sandboxed application is at least one of a web page, a script, a binary executable, an intermediate bytecode, an abstract syntax tree, and an executable application in the security sandbox,wherein the sandboxed application comprises at least one of a markup language application such as a HyperText Markup Language 5 (HTML5) application, a Javascript® application, an Adobe® Flash® application, a Microsoft® Silverlight® application, a JQuery® application, and an Asynchronous Javascript® and a XML (AJAX) application, andwherein an access control algorithm governs a policy through which a secondary authentication is required when establishing a communication between the sandboxed application and the networked media device. 45. The method of claim 44 further comprising: utilizing an exception to a same origin policy through a use of at least one of a hyperlink, a form, the script, a frame, a header, and an image when establishing the connection between the sandboxed application and the sandbox reachable service. 46. The method of claim 33 further comprising: utilizing the application as a control point when the present state of at least one of the audio-visual data and the application currently being accessed by the user of the client device is communicated to the networked media device; andutilizing an automatic content recognition algorithm in at least one of the client device and the networked media device to generate a meta-data associated with content in the present state of the audio-visual data,wherein a haptic gesture is applied on the client device by the user to transport at least one of the audio-visual data and the application from the client device to the networked media device. 47. The method of claim 33 further comprising: eliminating a communication through a centralized infrastructure when the sandboxed application and the sandbox reachable service communicate in a shared network common to the client device and the networked media device when the connection is established, wherein the shared network is at least one of the local area network, a multicast network, an anycast network, and a multilan network;minimizing a latency in the communication session when the sandboxed application and the sandbox reachable service communicate in the shared network common to the client device and the networked media device when the connection is established; andimproving privacy in the communication session when the sandboxed application and the sandbox reachable service communicate in the shared network common to the client device and the networked media device when the connection is established. 48. The method of claim 33: wherein a cookie associated with the security sandbox is used to store a remote access token on a storage of the client device,wherein the remote access token identifies at least one of a set of communicable private Internet Protocol (IP) addresses and hardware addresses associated with sandbox reachable services that previously operated on a common shared network with the client device, andwherein the client device can communicate with the sandbox reachable services that previously operated on the common shared network through the remote access token.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.