02nd week of 2011 patent applcation highlights part 58 |
Patent application number | Title | Published |
20110010675 | Use of Real Time Location Information for User Authentication and Authorization in Virtual Environments - Provided is a method for authentication and verification of a user in a virtual world (VU) based upon such criteria as the physical location of a user in the real world and the logical location of the user's avatar in the VU. The disclosed technology combines physical and application aspects of security to enhance security options within virtual environments. In addition to traditional credential-based authentication, physical constraints corresponding to the real world and logical locations in a VU are employed, wherein an authentication server requires each component to be in the proper association state location or proximity before authenticating a user. Further, the disclosed technology provides for the termination of a user's authentication if the user moves from an approved physical or VU location to an unapproved location. Techniques are provided to track a user's credentials and real-time physical and logical location of a user. | 2011-01-13 |
20110010676 | SYSTEM AND METHOD FOR ALLOCATING DIGITAL GRAFFITI OBJECTS AND CANVASSES - The subject specification provides a system, method, and computer readable storage medium directed towards allocating digital canvasses for digital graffiti. The specification discloses receiving data corresponding to digital graffiti formed from a gesture undergone by a device. The specification also discloses identifying a digital canvas corresponding to the digital graffiti as a function of the received data. | 2011-01-13 |
20110010677 | METHOD AND SYSTEM FOR LITHOGRAPHIC SIMULATION AND VERIFICATION - Methods and systems for lithographic simulation and verification comprising a process in the frequency domain or in the spatial domain of calculating intensity at a location (x, y) for a number of defocus values. In addition, evaluating the intensity calculation result to determine if the intensity level will result in the mask pattern being written onto a wafer. The verification process may be calculated in the spatial domain or in the frequency domain. The calculations may be done such that full focus window calculations may be obtained by isolating the defocus parameter “z” in the calculations. | 2011-01-13 |
20110010678 | Method and Apparatus for Reference Distribution Aerial Image Formation Using Non-Laser Radiation - A non-laser beam of electromagnetic radiation is divided into an illumination beam and a reference beam. A portion of the illumination beam is passed through, or reflected off of, a subject to create a subject distribution, and a portion of the reference beam is passed through a reference object, or reflected off a reference object reflector, to produce a reference distribution. An imaging system is used to form an aerial image of the subject distribution and the reference distribution. The resulting aerial image of the subject distribution exhibits improved resolution, depth of field and field size. | 2011-01-13 |
20110010679 | METHOD FOR MULTI-CYCLE CLOCK GATING - An apparatus includes a multi-cycle clock gater and a circuit design updater. The multi-cycle clock gater generates multi-cycle gating groups of data latching devices of a circuit design. The circuit design updater updates the circuit design with selected multi-cycle gating groups. Each gating group is associated with a single gating function. For each gating group, data latching devices of 0 | 2011-01-13 |
20110010680 | Apparatus and Method of Delay Optimization - Aspect of the technology are a method of designing a circuit layout and corresponding computer systems and nontransitory computer media. The circuit layout is for use in forming a lithographic mask set for use in fabricating an integrated circuit. In the method the computer system divides a synthesized circuit design into cell partitions along critical paths of the synthesized circuit design. The computer system associates pins of the plurality of cell partitions with normalized pin timing values. The normalized pin timing values store magnitude differences between a reference timing slack and timing slacks of the plurality of pins. After optimizing the synthesized circuit design, the computer system repeats the method, and then the computer system determines whether to further optimize the plurality of cell partitions by comparing: (i) the pre-optimization normalized pin timing values of the plurality of cell partitions with (ii) the post-optimization normalized pin timing values of the plurality of cell partitions. | 2011-01-13 |
20110010681 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE AND ITS CIRCUIT INSERTING METHOD - A semiconductor integrated circuit device is disclosed. The semiconductor integrated circuit device includes a first circuit whose output never or seldom changes when the output from an Enable generator is off, a second circuit whose output frequently changes, an input controller which receives the respective outputs from the second circuit and the Enable generator and passes through the input from the second circuit only when the output from the Enable generator is on, a combination circuit which receives the respective outputs from the first circuit and the input controller, and a memory which receives the output from the combination circuit and is driven by the output from the clock controller. | 2011-01-13 |
20110010682 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE, SEMICONDUCTOR INTEGRATED CIRCUIT DESIGN METHOD, AND SEMICONDUCTOR INTEGRATED CIRCUIT DESIGN APPARATUS - A semiconductor integrated circuit design method includes a step (L) of providing layout information for laying out elements making up a logical circuit on a semiconductor substrate; a step (P) of providing logical circuit information; a step (a) of classifying logical circuits in response to the logical circuit propagation route of a signal based on the logical circuit information and a step (b) of isolating the logical circuits forming the route obtained in the classifying step (a) for each number of stages; a step (c) of classifying the elements making up the logical circuit according to substrate voltage for each number of stages of the logical circuit; and a layout correction step (d) of correcting the layout information so that each element with the larger stage number of the logical circuit is placed at a point closer to a substrate contact. | 2011-01-13 |
20110010683 | Trace Routing According To Freeform Sketches - Methods and apparatuses for routing traces in a layout design, such as for example a layout design for an integrated circuit, are disclosed. In various implementations, a group of netlines within a layout design and a freeform sketch are identified. Subsequently, the netlines are routed as traces according to the freeform sketch. More particularly, the geometry of the traces is determined by approximating the geometry of the freeform sketch. Various implementations of the invention provide for the netlines to be routed by an automated trace routing engine. With further implementations of the invention, ball grid array escapes and trace fanouts are additionally routed. For example, ball grid array escapes may be routed prior to netlines being routed according to the freeform sketch. In further implementations of the invention, the freeform sketch is deleted after the traces have been routed. With various implementations of the invention, the netlines are routed as traces by forming a container shape around the freeform sketch, approximating the geometry of the freeform sketch within the container shape, and routing traces within the container shape using the approximation of the freeform shape as a guide. | 2011-01-13 |
20110010684 | SEMICONDUCTOR INTEGRATED CIRCUIT AND METHOD OF DESIGNING THE SAME - A semiconductor integrated circuit comprising: a clock gating cell to which an enable signal and a clock signal are input, so as to output a gated clock signal generated by output-controlling said clock signal according to said enable signal; a first flip-flop circuit to which a first input data signal and said gated clock signal are input, so as to retain and output said first input data signal as a first output data signal in synchronization with said gated clock signal; and a second flip-flop circuit to which a second input data signal is input, so as to retain and output said second input data signal as a second output data signal in synchronization with said clock signal if the logical values of said second input data signal and said second output data signal differ from each other, or so as to retain said second output data signal if the logical values of said second input data signal and said second output data signal are the same. | 2011-01-13 |
20110010685 | SYSTEM AND METHOD FOR DEVELOPING A RULE-BASED NAMED ENTITY EXTRACTION - A system and method for developing a rule-based named entity extraction system is provided. The method includes analyzing requirements of business users. The method further includes designing the rule-based named entity extraction system based on the requirement analysis. Further, the method includes implementing the design of rule-based named entity extraction system using one or more GUI-based tools. Thereafter, regression testing of the rule-based named entity extraction system is conducted. Finally, rule-based named entity extraction system is deployed. | 2011-01-13 |
20110010686 | SYSTEM AND METHOD FOR INTEGRATING OBJECT-ORIENTED MODEL PROFILES AND OBJECT-ORIENTED PROGRAMMING LANGUAGES - A method includes receiving a modeling template, the modeling template comprising a plurality of modeling constructs and profile constructs, each profile construct generated from a modeling profile and comprising an extension of one of the modeling constructs. The method further includes parsing the modeling template into the plurality of modeling constructs and profile constructs. One or more object-oriented constructs are defined based, at least in part, on the parsed modeling constructs and profile constructs. Source code is automatically generated in an object-oriented programming language based, at least in part, on the defined object-oriented constructs. The object-oriented programming language comprises an object-oriented programming language with embedded inferencing. | 2011-01-13 |
20110010687 | SYNCHRONIZATION OF CONCURRENTLY MODIFIED INTERDEPENDENT SEMI-DERIVED ARTIFACTS - Described is a method for synchronizing interdependent artifacts that are each modified independent of a modification to the other artifact after a last synchronization. Each artifact has a plurality of elements and is of a different formant from the other artifact. The method includes generating a temporary artifact having all the elements of a last synchronized version of the first artifact and having all the elements of a latest version of the second artifact transformed as the first artifact. The temporary artifact is merged with a latest version of the first artifact to create a synchronized version of the first artifact. A synchronized version of the second artifact having all the elements of the latest version of the second artifact and having all the elements of the synchronized version of the first artifact transformed as the second artifact is generated. | 2011-01-13 |
20110010688 | Encapsulating a Graphical Program within a Standard Image File - A system and method for encapsulating a graphical program within an image or other object are described. Graphical program information representing the graphical program may be stored within the image. The graphical program information may specify a plurality of interconnected nodes of the graphical program. In addition to the graphical program information, the image also includes pixel information for displaying the image. The image may subsequently be provided to a graphical programming development environment. The graphical programming development environment may retrieve the graphical program information from the image and use the graphical program information to automatically instantiate an editable, executable version of the graphical program. | 2011-01-13 |
20110010689 | System for Writing a Simulation Program - The invention relates to a system for writing a simulation program for simulating an automation installation. To facilitate the writing of a simulation program for a complex automation installation, the system comprises —means for defining a respective resource object ( | 2011-01-13 |
20110010690 | System and Method of Automatically Transforming Serial Streaming Programs Into Parallel Streaming Programs - A commerce transaction is controlled by transforming serial code segments into parallel code segments. An application is parsed by determining the code segments that must be executed as serial code segments and the code segments that can be executed as parallel code segments. A parallel file is generated for each parallel code segment. The parallel file contains the parallel code segment and the code segments of the application called by the parallel code segment. The application executes through the serial code segments and parallel code segments. When encountering the parallel file, a tag is written to the output stream to reserve a position to write an output value of the parallel file when complete. The parallel file is executed simultaneously with the serial code segment, and the output value of the parallel file is written in the reserved position of the output stream when the parallel file execution completes. | 2011-01-13 |
20110010691 | Distributed Software Testing Using Cloud Computing Resources - A method of creating computing environment in a cloud computing environment for execution of a test is disclosed. The method includes loading a setup script from a script store. The loading is performed by a test manager that is in communication with the script store. The test manager checks if there are more setup scripts to be loaded. If yes, the remaining setup scripts are loaded by the test manager. The test manager then calculates computing resources needed to run all tests as coded in all loaded scripts. The test manager then attempts to reserve needed computing resources in a virtual data center using a data center infrastructure manager. | 2011-01-13 |
20110010692 | APPLICATION DEVELOPMENT SUPPORT DEVICE, PROGRAM AND STORAGE MEDIUM - The development of an application program that includes a user interface (UI), which can provide a processing parameter to be handed to a web service when a UI screen is called via a link, is realized without coding operations. When the UI screen is called via the link, in which link information is embedded with the processing parameter, a platform program obtains the processing parameter and stores the processing parameter in a corresponding storage region. A call program that has been attached to an unconditional starting button, which is located in the UI screen by a developer, in advance activates the web service by using the processing parameter in the storage region as an argument. After the processing for storing the output variables of the web service in the corresponding storage region is carried out, the processing, in which the called UI screen is generated and distributed, is carried out. | 2011-01-13 |
20110010693 | SYSTEM AND METHOD FOR VERIFICATION OF PROGRAMS USING THREADS HAVING BOUNDED LOCK CHAINS - A system and method for model checking of concurrent multi-threaded programs with bounded lock chains includes analyzing individual program threads in a concurrent multi-threaded program to determine sets of reachable states and lock access patterns for bounded lock chains by tracking sets of states reachable from a given set of states and tracking lock acquisitions and releases by maintaining a bi-directional lock causality graph. Analysis results from multiple threads are combined using an acceptance condition of the lock causality graph to determine whether there is a violation of a correctness property in the concurrent multi-threaded program. | 2011-01-13 |
20110010694 | Method for Creating Sub-Query Related Memory Stores - The present invention relates to a method for creating a memory store for enabling a computer to interpret sub-query programming code in which code reuse is explicitly defined, the method comprising steps for defining data sources for first-order quantified queries, also known as sub-queries, in which method the main query data sources can be used as the sub-query data source for any repeated execution of code over collections of data and combinations of collections of data, such as tables, arrays and object collections. The method is preferably able to create a memory store for enabling a computer to interpret programming code in which first-order quantified queries, also known as sub-queries, can explicitly or implicitly reuse data sources defined for any repeated execution. | 2011-01-13 |
20110010695 | ARCHITECTURE FOR ACCELERATED COMPUTER PROCESSING - A data processing system includes a host computer, an additional computer, an application module including a first executable code, a module for analyzing said first executable code and a module for generating a second executable code segmented notably into code blocks which are executed in a preferential manner on one of the two computers. The second executable code includes a sub-module for managing the distribution of the processing operations between the host computer and the additional computer and a sub-module for managing the additional computer as a virtual machine which executes the blocks allocated to the additional computer. | 2011-01-13 |
20110010696 | DUPLICATE VIRTUAL FUNCTION TABLE REMOVAL - One or more embodiments of the present invention relate to a method for duplicate virtual function table removal. The method includes identifying, using a processor of a computer, a first virtual function table formed when a first source code is compiled into a first object code. The method further includes using the processor, identifying a second virtual function table formed when a second source code is compiled into a second object code. The method further includes, independent of linking the first object code to a first executable binary code and the second object code to a second executable binary code, identifying, using the processor, that the first virtual function table and the second virtual function table are identical and, using the processor, deleting the second virtual function table. | 2011-01-13 |
20110010697 | Systems and Methods for Detecting Obfuscated Malware - Disclosed are systems, methods and computer program products for efficient and reliable analysis, optimization and detection of obfuscated malware. One disclosed example method for malware detection includes loading an executable software code on a computer system and disassembling the software code into an assembly language or other low-level programming language. The method then proceeds to simplifying complex assembly instructions and constructing a data flow model of the simplified software code. The dependencies and interrelations of code elements of the data flow model are analyzed to identify obfuscated software codes therein. The identified obfuscated codes are then optimized. Based on the results of optimization, determination is made whether the software code is malicious and/or whether further antimalware analysis of the optimized software code is necessary. | 2011-01-13 |
20110010698 | TEST PARTITIONING FOR A NON-VOLATILE MEMORY - Systems and methods are provided for testing a non-volatile memory, such as a flash memory. The non-volatile memory may be virtually partitioned into a test region and a general purpose region. A test application may be stored in the general purpose region, and the test application can be executed to run a test of the memory locations in the test region. The results of the test may be stored in the general purpose region. At the completion of the test, the test results may be provided from the general purpose region and displayed to a user. The virtual partitions may be removed prior to shipping the electronic device for distribution. | 2011-01-13 |
20110010699 | Methods and Systems for Upgrade and Synchronization of Securely Installed Applications on a Computing Device - Embodiments of the present disclosure provide for upgrades and synchronization of applications installed on a device, such as a mobile device. In one embodiment, a device may include applications purchased and downloaded via a content management system. The device maintains a list or database of applications that are authorized for each device. This list is also replicated in a remote cache that is maintained by an archive host. The device may then synchronize and upgrade these applications across multiple platforms, such as one or more computers that can be coupled to the device or the archive host. The archive host allows for files of the application be provided back to the device. Upon installation, the device can then confirm the authorization and identity of the newly installed application. | 2011-01-13 |
20110010700 | VIRTUALIZATION OF CONFIGURATION SETTINGS - A hardware and/or software translation system to automatically apply user-specific configuration settings to a computer irrespective of the application version or operation system version for which the settings were originally established. By automatically applying user-specific configuration settings to a version of an application or operating system, the translation system eliminates any post-installation reconfiguration, thereby simplifying the process of changing or upgrading the version of an application or operating system. | 2011-01-13 |
20110010701 | Methods and Systems for Archiving and Restoring Securely Installed Applications on a Computing Device - Embodiments of the present disclosure provide methods and systems of backing up applications and their associated data installed on a device, such as a mobile device. In particular, data for a backed-up application is stored on a remote archive host and can be restored to dynamically managed containers of securely installed applications on the device. Upon request, the archive host may provide a package of files to the device. The device may then restore the application based on the contents of the package. The package may comprise all the files needed to install the application including the program code, data, and documents. Alternatively, the package may simply comprise just some of the files, such as just the data or documents for an application. After installation, a secure installer framework may be used to verify the applications and authorize the application's execution on the device. | 2011-01-13 |
20110010702 | METHOD AND SYSTEM FOR SHARING PACKAGES IN A FRAMEWORK - A method and device for specifying multiple packages with a single entry to be shared by a bundle, are provided. A plurality of packages may be associated with an expression. The expression may be included in a description of a bundle that enables deployment of the plurality of packages in the framework. The plurality of packages may be exported by the bundle to the framework which provides an environment for execution of the plurality of packages. | 2011-01-13 |
20110010703 | DELIVERY SYSTEM, SERVER DEVICE, TERMINAL DEVICE, AND DELIVERY METHOD - A distribution system comprising a server device and a terminal device communicably connected to each other via a network. Wherein, the terminal device transmits an acquisition request of the distribution package to the server device, receives the distribution package from the server device and stores the distribution package, determines whether current date and time is the application start timing based on the application start timing information included in the distribution package, and applies the resource by executing the application script when the current date and time is determined to be the application start timing. And the server device receives the acquisition request of the distribution package from the terminal device, and transmits the distribution package to the terminal device when the acquisition request is received. | 2011-01-13 |
20110010704 | METHOD AND APPARATUS FOR INSTALLING APPLICATION USING APPLICATION IDENTIFIER - An application installation method and apparatus using an application identifier (AI) are disclosed. The application installation method includes: transmitting, by a terminal, an AI inputted by a user and terminal information to an installation information providing server; acquiring, by the installation information providing server, installation information corresponding to the AI and the terminal information, and transmitting the acquired installation information; and connecting, by the terminal, to an installation file providing server according to the installation information, downloading an installation file corresponding to the AI, and installing an application corresponding to the AI. | 2011-01-13 |
20110010705 | System and Method of Owner Application Control of Electronic Devices - Systems and methods of owner application control of an electronic device are provided. Owner application control information is stored on the electronic device and/or one or more remote servers. Owner application control information is consulted to determine if one or more required applications are available for execution on the electronic device. If not, one or more required applications not available are downloaded and installed. This could be in a manner transparent to the user of the electronic device. If one or more required applications are not available on the electronic device, the device can be functionally disabled in whole, or in part, until one or more required applications are available. | 2011-01-13 |
20110010706 | System and Method for Providing Redundancy for Management Controller - Systems and methods for reducing problems and disadvantages associated with traditional approaches to providing redundancy for a management controller are provided. A method may include executing, by a hypervisor executing on a management controller, a first guest OS and second guest OS. The method may additionally include executing, by the first guest OS, one or more first management applications for managing one or more information handling resources communicatively coupled to the management controller. The second guest OS may: (i) execute one or more second management applications for managing the one or more information handling resources communicatively coupled to the management controller; (ii) execute one or more monitoring applications for monitoring redundancy status of the first guest OS and the second guest OS; (iii) sleeping the one or more second management applications; and (iv) monitoring, by the one or more monitoring applications, the operability of the first guest OS. | 2011-01-13 |
20110010707 | VIRTUAL MACHINE DEVICE AND METHODS THEREOF - A data processing device includes one or more state registers to store state information associated with an execution core of the device. Each state register includes an associated “dirty” bit. When a guest program is executed at the execution core, a dirty bit is set in response to a change in the state information at the associated state register. In response to a world switch from the guest program to a VMM, the state information at each state register is stored to memory only if the associated dirty bit is set. In addition, if the VMM changes any stored state information, it clears a “clean” bit associated with the changed information. In response to a world switch from the VMM to a guest, the state information associated with cleared clean bits is retrieved from memory. | 2011-01-13 |
20110010708 | SYSTEM AND METHOD FOR TRANSPORTING CONFIGURATION PARAMETERS - Configuration settings can be transferred from one machine by executing a first client application on a source machine to retrieve the configuration settings of the source machine. The configuration settings may be transformed into a platform and application independent format before being transferred to a target machine where a second client application transforms the configuration settings into platform or application dependent parameters appropriate for the target machine. In one example, the configuration parameters include a power policy that can be applied across a network. | 2011-01-13 |
20110010709 | Optimizing System Performance Using Spare Cores in a Virtualized Environment - A mechanism for optimizing system performance using spare processing cores in a virtualized environment. When detecting a workload partition needs to run on a virtual processor in the virtualized system, a state of the virtual processor is changed to a wait state. A first node comprising memory that is local to the workload partition is determined. A determination is also made as to whether a non-spare processor core in the first node is available to run the workload partition. If no non-spare processor core is available, a free non-spare processor core in a second node is located, and the state of the free non-spare processor core in the second node is changed to an inactive state. The state of a spare processor core in the first node is changed to an active state, and the workload partition is dispatched to the spare processor core in the first node for execution. | 2011-01-13 |
20110010710 | Image Transfer Between Processing Devices - Methods and devices are provided for copying an image of a medium of a first processing device to a virtual medium of a second processing device. Virtual machine configuration information may be created based on hardware configuration information from the first processing device. The image and the virtual machine configuration information may be copied, or written, to the virtual medium. Instructions may be provided to the second processing device for launching a virtual machine to execute an operating system copied from the image to the virtual medium. At least one executable application copied from the image to the virtual medium may be executed by the virtual machine launched on the second processing device. In some embodiments, the second processing device may provide remote access to the virtual machine for one or more remote processing devices. | 2011-01-13 |
20110010711 | Reliable movement of virtual machines between widely separated computers - This invention describes an improved method of transferring running VMs between servers that would allow them to move between datacenters, even ones that are halfway across the world from each other. | 2011-01-13 |
20110010712 | Methods for Improving Atomicity of Runtime Inspections - A method for achieving atomicity while inspecting a running computer process using a copy-on-write process in a supervisor to generate a copy of a target's memory page being written to, prior to executing the write, the copy along with any unwritten to memory pages in the target being mapped to a measurement agent (MA) and used to reflect the state of the target at a particular moment in time which state when observed by the MA provides an atomic runtime inspection. | 2011-01-13 |
20110010713 | COMPUTER SYSTEM, VIRTUAL MACHINE MONITOR AND SCHEDULING METHOD FOR VIRTUAL MACHINE MONITOR - In a computer system according to the background art, when a request to halt a virtual processor was detected, the virtual processor was blocked. In the blocking method, latency of virtual halt exit of the virtual processor was so long that a problem of performance was caused. A virtual machine monitor selects either of a busy wait method for making repeatedly examination until the virtual halt state exits while the virtual processor stays on the physical processor and a blocking method for stopping execution of the virtual processor and scheduling other virtual processors on the physical processor while yielding the operating physical processor and checking off scheduling of the virtual processor to the physical processor, based on a virtual processor halt duration predicted value of the virtual processor which is an average value of latest N virtual processor halt durations of the virtual processor. | 2011-01-13 |
20110010714 | FAST BOOTING A COMPUTING DEVICE TO A SPECIALIZED EXPERIENCE - Described is a technology by which independent computing functions such as corresponding to separate operating systems may be partitioned into coexisting partitions. A virtual machine manager, or hypervisor, manages the input and output of each partition to operate computer system hardware. One partition may correspond to a special purpose operating system that quickly boots, such as to provide appliance-like behavior, while another partition may correspond to a general purpose operating system that may load while the special purpose operating system is already running. The computer system that contains the partitions may transition functionality and devices from one operating system to the other. The virtual machine manager controls which computer hardware devices are capable of being utilized by which partition at any given time, and may also facilitate inter-partition communication. | 2011-01-13 |
20110010715 | Multi-Thread Runtime System - A runtime system implemented in accordance with the present invention provides an application platform for parallel-processing computer systems. Such a runtime system enables users to leverage the computational power of parallel-processing computer systems to accelerate/optimize numeric and array-intensive computations in their application programs. This enables greatly increased performance of high-performance computing (HPC) applications. | 2011-01-13 |
20110010716 | Domain Bounding for Symmetric Multiprocessing Systems - Methods and apparatuses for developing symmetric and asymmetric software applications on a single monolithic symmetric multiprocessing operating system are disclosed. An enabling framework for one or all of the following software design patterns; application work load sharing between all processors present in a multi-processor system in a symmetric fashion, application work load sharing between all processors present in a multi-processor system in a asymmetric fashion using task to processor soft affinity declarations, application work load sharing between all processors present in a multi-processor system using bound computational domains may be provided. Further, a particular computational task or a set of computational tasks may be bound to a particular processing unit. Subsequently, when one such task is to be scheduled, the symmetric multiprocessing operating system ensures that the bound processing unit processes the instruction. When the bound processing unit is not processing the particular computational instruction, the bound processing unit may enter a low power or idle state. | 2011-01-13 |
20110010717 | JOB ASSIGNING APPARATUS AND JOB ASSIGNMENT METHOD - A job assigning apparatus connected to a plurality of arithmetic units for assigning a job to each of the arithmetic units, the job assigning apparatus includes a power consumption acquiring processor for acquiring power consumptions with respect to each of the arithmetic units, a selector for selecting one of the arithmetic units as a submission destination in increasing order of the power consumptions acquired by the power consumption acquiring processor, and a job submitting processor for submitting a job to the submission destination. | 2011-01-13 |
20110010718 | ELECTRONIC DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT HAVING COMPUTER-READABLE INFORMATION PROCESSING PROGRAM - An electronic device includes a status management unit detecting a change in a status of the electronic device and recognizing the status; an added program control unit applying an added program to a program of the electronic device in response to a validation request for the added program, the added program being capable of dynamically interrupting the program of the electronic device with a process; and an application determination information storage unit storing application determination information indicating whether the added program can be applied to the program of the electronic device depending on the status of the electronic device recognized by the status management unit. The added program control unit determines whether the added program can be applied based on (1) the status of the electronic device recognized by the status management unit upon reception of the validation request, and (2) the application determination information. | 2011-01-13 |
20110010719 | ELECTRONIC DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An electronic device includes a control information storing unit; a setting unit configured to request a user to specify, for each first program in the electronic device, a reception setting indicating whether to allow reception of a second program to be applied to the first program and to store the reception setting as control information for the first program in the control information storing unit, the second program being configured to insert a process in a process of the first program; a reception determining unit configured to determine whether to allow reception of the second program based on the control information for the first program; and a receiving unit configured to receive or refuse to receive the second program according to the determination result of the reception determining unit. | 2011-01-13 |
20110010720 | SYSTEM AND METHOD FOR MANAGING ELECTRONIC ASSETS - An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location. The controller can communicate remotely over the Internet or other network to control one or more secondary or remote servers, herein referred to as appliances. The appliances can be situated at different manufacturing, testing or distribution sites. The controller and appliances comprise hardware security modules (HSMs) to perform sensitive and high trust computations, store sensitive information such as private keys, perform other cryptographic operations, and establish secure connections between components. The HSMs are used to create secure end-points between the controller and the appliance and between the appliance and the secure point of trust in an asset control core embedded in a device. | 2011-01-13 |
20110010721 | Managing Virtualized Accelerators Using Admission Control, Load Balancing and Scheduling - A system and method is shown that includes an admission control module that resides in a management/driver domain, the admission control module to admit a domain that is part of a plurality of domains, into the computer system based upon one of a plurality of accelerators satisfying a resource request of the domain. The system and method also includes a load balancer module, which resides in the management/driver domain, the load balancer to balance at least one load from the plurality of domains across the plurality of accelerators. Further, the system and method also includes a scheduler module that resides in the management/driver domain, the scheduler to multiplex multiple requests from the plurality of domains to one of the plurality of accelerators. | 2011-01-13 |
20110010722 | MEMORY SWAP MANAGEMENT METHOD AND APPARATUS, AND STORAGE MEDIUM - A memory swap management method that can preferentially place in a primary storage device a process that has a high possibility of being executed next, thereby shortening the time to start executing the next process. A planned execution sequence of jobs is stored when there are a plurality of jobs waiting to be executed. A process as a swap-out candidate and a process as a swap-in candidate are determined based on the execution sequence and types of processes stored in the primary storage device. According to the determination, the process as the swap-out candidate is swapped out from the primary storage device to a secondary storage device, and the process as the swap-in candidate is swapped in from the secondary storage device into an area of the primary storage device freed as a result of the swap-out. | 2011-01-13 |
20110010723 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND COMPUTER-READABLE STORAGE MEDIUM - An information processing apparatus has a communication unit to perform an inter-process communication via a kernel space among a plurality of processes existing in a user space, and a log recording unit to record a log of the inter-process communication within the kernel space. | 2011-01-13 |
20110010724 | COMMUNICATION BRIDGE - Presented is a method and system for providing a communication bridge between two computer technologies. The method includes defining interfaces for the two computer technologies, wherein each interface includes certain parameters, generating classes that contain methods in the two computer technologies, based on the parameters included in the interfaces, publishing the interfaces for invocation of methods between the two computer technologies. | 2011-01-13 |
20110010725 | BROWSER ELEMENTS FOR COMMUNICATING WITH OTHER BROWSER ELEMENTS AND WITH EXTERNAL APPLICATIONS - A method includes executing a web script by a browser element to access a web service executing on a web server and providing access to a web application, subscribing to the web service by the browser element so that data will be sent from the web service without requiring the browser element to initiate a request for the data, receiving the data from the web service by a communicator module executing on the client computing device, and sending the data to the browser element by the communicator module. A system includes a browser having at least one browser element configured to subscribe to data from an external web service. | 2011-01-13 |
20110010726 | METHOD AND APPARATUS FOR ASSIGNING PRIORITIES TO COMPOSITE EVENTS - Systems and methodologies are described herein that facilitate computation of composite priorities for composite events associated with a multi-radio wireless device. As described herein, respective priority values can be assigned to composite events (e.g., radio events associated with a plurality of distinct radios) in a variety of manners. Upon assignment of priority values, a radio coexistence manager and/or other suitable means can be utilized to selectively grant respective events from among a set of events that are identified within the same time period. In various examples described herein, priorities can be computed for composite events such that relative priorities of composite events are higher if the constituent atomic events of the composite events have higher priorities, such that the relative priority of a composite event is greater than the priority of any subset of its events, and/or according to any other suitable criteria. | 2011-01-13 |
20110010727 | METHOD AND DEVICE FOR PLAYING BACK MEDIA DATA WITH LIMITED CONTROL - A method and apparatus for restricting a control operation with respect to reproduction of media data so as to commercially implement consumption of the media data, the method and apparatus including: restricting the control operation with respect to reproduction of the media data by using a predetermined Application Programming Interface (API); and reproducing the media data received from a media server, according to the restricted control operation. | 2011-01-13 |
20110010728 | Method and System for Service Provisioning - Embodiments disclosed herein provide systems and methods that can bridge the gap between business operations and data management operations. An interface layer provides customizable interfaces for interactions with a master entity index (MEI) system to accomplish association, storage, management or processing of data records based on user-defined business service operations. The interface layer allows a user to define business services, operations, and logical procedures according to a desired data model such that the inputs and outputs for each operation of the service correspond to the particular needs of the user and allow different terminology to be employed by the user. | 2011-01-13 |
20110010729 | OPTICAL DISK DRIVE - An optical disk drive includes a cassette mechanism and a protective structure. The protective structure includes a protective member. The protective member includes a protective portion with a passage that can deform to increase the width of the passage when an optical disk enters the passage, and returning to the original width of the passage when the optical disk has passed through the passage. | 2011-01-13 |
20110010730 | Disc apparatus - A disc apparatus includes: a housing; a recording/reproducing unit provided in the housing for recording and/or reproducing information in and/or from a disc-shaped recording medium; an insertion/ejection port provided on the housing through which the disc-shaped recording medium is inserted and ejected, the insertion/ejection port having a width greater than the diameter of the disc-shaped recording medium; a disc transport mechanism provided in the housing to transport the disc-shaped recording medium between the insertion/ejection port and the recording/reproducing unit; and an identification mechanism to identify the disc-shaped recording medium as a first disc-shaped recording medium having a first diameter or a second disc-shaped recording medium having a diameter smaller than the first diameter The identification mechanism includes a pair of levers, a pair of gear members, urging means, a stopper, first detection means, and control means. | 2011-01-13 |
20110010731 | TRANSPORTATION BODY FOR FLEXIBLE OPTICAL DISK, OPTICAL DISK TRANSPORTATION APPARATUS, AND OPTICAL DISK TRANSPORTATION METHOD - A transportation body | 2011-01-13 |
20110010732 | SYSTEM AND METHOD FOR DELIVERING AND OPTIMIZING MEDIA PROGRAMMING IN PUBLIC SPACES WITH PEER-TO-PEER DIGITAL SIGNAGE NETWORKS - A system and corresponding methods for automating the execution, measurement, and optimization of in-store promotional digital media campaigns are provided. In one embodiment, a method in a computing system for deploying content to digital signage networks includes receiving from a user a marketing campaign goal and at least one optimization constraint suitable for generating a playlist. The method also includes generating a playlist designed to maximize a learning opportunity to achieve the marketing campaign goal. The method further includes provisioning the playlist to a point of presence on the digital signage network. | 2011-01-13 |
20110010733 | AUTOMATIC DETECTION OF A CABLE TRAP - Firmware is installed in a cable modem, enabling detection of the presence or absence of a cable trap in the feed of a customer location. Such a cable modem includes a trap-detection module and a trap-detection object. The trap-detection module is configured to determine whether a video signal is present at a cable-television frequency. The trap-detection object is configured to store data as to whether the video signal is present. For example, a first piece of data is stored if the video signal is present, indicating absence of a properly functioning cable trap between a cable head-end and the cable modem. A second piece of data is stored if the video signal is absent, indicating presence of a properly functioning cable trap between the cable head-end and the cable modem. | 2011-01-13 |
20110010734 | SEPARATE ADDRESSING OF A MEDIA CONTENT RECEIVER AND AN INSTALLED REMOVABLE CIRCUIT DEVICE - A method of communication involving a media content receiver is presented. In the method, the media content receiver receives a message including an address. The receiver processes the address to determine whether the address is associated with the media content receiver. Additionally, if a removable circuit device is installed in the receiver, the receiver processes the address to determine whether the address is associated with the installed removable circuit device. If the address is associated with the media content receiver, the receiver processes the message. If the address is associated with the removable circuit device, the receiver transfers the message to the removable circuit device, which then processes the message. | 2011-01-13 |
20110010735 | Addressable Account Commands - One embodiment takes the form of an apparatus or method for generating and transmitting distribution system commands addressed by a general identification, such as a customer-specific identification. The general identification may take the form of a customer number or any other identifier unique to a customer account. The identifier may be stored in the computer-readable memory of several or all of the set-top boxes associated with a particular customer such that commands addressed with the unique identifier may be decrypted and executed by the set-top boxes. Thus, a single command addressed with the customer identification may be received and executed by several or all of the set-top boxes for a particular customer without the need for addressing the command to each set-top box individually. | 2011-01-13 |
20110010736 | MULTIPURPOSE TV CONVERTER SYSTEM - The present invention relates to an improved TV converter system for changing digital TV signal to analog and/or having multipurpose capabilities that the host computer of the TV broadcast station remotely controls the TV converter system according to the address and transmits a national emergency disaster warning signal, a digital file of printing contents such as newspaper, commercial catalogues or books, and contents of VOD to the specific TV converters by its' address. | 2011-01-13 |
20110010737 | METHOD AND APPARATUS FOR NOTIFICATION-BASED CUSTOMIZED ADVERTISEMENT - Systems and methods are provided for realizing fully customized mobile advertisement services based on notifications. Such systems and methods in accordance with various embodiments, allow for full customization of advertisement content, display time, and location. A notification framework may be utilized to transmit and receive notification messages that include information about at least one of a scheduled advertisement period, announcement of the availability of at least one advertisement, and a trigger of presentation associated with the advertisement. | 2011-01-13 |
20110010738 | SYSTEM AND METHOD FOR SELECTION OF TELEVISION CONTENT USING TAB-BASED SELECTION FEATURES - There is provided a system and method for selection of television content. More specifically, in one embodiment, there is provided an electronic device, comprising a processor that is adapted to receive video data from a plurality of source types and to create an on-screen content selection interface on a display, the on-screen content selection interface including a graphical tab corresponding to each of the plurality of source types of video data. | 2011-01-13 |
20110010739 | METHOD AND APPARATUS FOR TRANSMITTING/RECEIVING STEREOSCOPIC VIDEO IN DIGITAL BROADCASTING SYSTEM - Provided is a method for transmitting a stereoscopic video in a digital broadcasting system, the stereoscopic video being composed of a left view and a right view. The method includes: generating information indicating that the video is stereoscopic, information about a composition type of the stereoscopic video, and additional information based on the composition type; and transmitting the stereoscopic video and the generated information. The composition type is to compose the stereoscopic video of a single or two encoding streams by using the left view and the right view. In the case of a single stream mode in which the stereoscopic video is composed of the single encoding stream, the additional information includes information about positions of the left and right views. In the case of a dual stream mode in which the stereoscopic video is composed of the two encoding streams, the additional information includes information indicating whether the respective encoding streams are the left view or the right view and information indicating correlation between the respective encoding streams. | 2011-01-13 |
20110010740 | DEVICE AND METHOD FOR RECEIVING DIGITAL MULTIMEDIA BROADCASTING - A device and method for receiving digital multimedia broadcasting include a method for receiving a digital broadcasting signals, creating a playlist containing plural program items scheduled to be broadcasted through at least one broadcast channel, each program item having delimiters and program information; monitoring an advent of one of the delimiters; and performing, if a delimiter is detected, an operation corresponding to the delimiter. The device and method for receiving the digital multimedia broadcasting allow the user to create and edit a playlist, which contains at least one program items obtained from EPG data and information on the program items, and automates channel switching and playbacks of the program item, resulting in improved user convenience. | 2011-01-13 |
20110010741 | METHOD, SYSTEM AND DEVICE FOR CONTROLLING INTERACTIVE VIDEO SERVICE - A method for controlling an interactive video service is provided. The method includes the following steps: receiving a control request sent by a terminal device; obtaining an identifier of a Set Top Box (STB) device corresponding to the terminal device; and controlling a media stream of the STB device corresponding to the identifier of the STB device according to the control request. A system and a device for controlling an interactive video service are also provided. Thus, through the interaction between the terminal device and a Video On Demand (VOD) system, the program guide browsing and on-demand control for the interactive video service are realized for STB users. Therefore, without significantly modifying the broadcast and television network, the problem that some STB users cannot use an interactive video service currently is solved. In addition, the STB users can perform operations such as program guide browsing, on-demand initiating, and on-demand session control on handset devices, so that desirable service experience is achieved. | 2011-01-13 |
20110010742 | ENHANCED NETWORK SEARCH - A set-top box (STB) suitable for use with a multimedia distribution network is also provided with a broadband network connection to a server operated by the multimedia provider. The server contains electronic programming guide (EPG) information, and provides a highly-functional search interface accessible by the STB. Under normal conditions, when a user attempts to search EPG data, the STB will access the search interface and provide results to the user. The STB also has the ability to detect the status of the broadband network connection. If the broadband network connection is in a disconnected state, the STB will provide a reduced-functionality localized EPG search. | 2011-01-13 |
20110010743 | Method for Re-establishment of Multimedia Content - The invention concerns a method for recording and reestablishing a multimedia content including the following steps: transmission of a multimedia content to a mobile terminal ( | 2011-01-13 |
20110010744 | CONTROL SYSTEM AND USER INTERFACE FOR HOME THEATER NETWORK - Apparatus, methods, and systems for centrally and uniformly controlling the operation of a variety of devices, such as communication, consumer electronic, audio-video, analog, digital, 1394, and the like, over a variety of protocols within a network system and, more particularly, a control system and uniform user interface for centrally controlling these devices in a manner that appears seamless and transparent to the user. In a preferred embodiment, a command center or hub of a network system includes a context and connection permutation sensitive control system that enables centralized and seamless integrated control of all types of input devices. The control system preferably includes a versatile icon based graphical user interface that provides a uniform, on-screen centralized control system for the network system. The user interface, which includes a visual recognition system, enables the user to transparently control multiple input devices over a variety of protocols while operating on a single control layer of an input command device. In an alternative embodiment, the control system also enables gated signal pass-through control while avoiding signal jamming. | 2011-01-13 |
20110010745 | METHOD AND SYSTEM FOR PROVIDING COMMUNICATION SERVICES - A system that incorporates teachings of the present disclosure may include, for example, a device including a base station communicatively coupled to a communication system, and a communicative device communicatively coupled to the base station for providing voice communication services to a user, wherein the communicative device serves as a proxy to make telephone calls on behalf of a set-top box presenting media services to a presentation device. Other embodiments are disclosed. | 2011-01-13 |
20110010746 | SET TOP BOX BROWSER CONTROL VIA A WIRELESS HANDSET - A system and method for providing Internet access via a set top box may include operating, on the set top box, a browser configured to display data associated with a website. A command may be received from a wireless communications device via a communications network. The command may include a network address of the website. In response to receiving the command, the website data may be displayed on a television to which the set top box is in communication. | 2011-01-13 |
20110010747 | METHOD AND SYSTEM FOR CUSTOMIZED INITIALIZATION OF DIGITAL HOST DEVICE - A method and system for customizing an interactive cable host initialization process for a cable host device, is provided. One implementation involves triggering an interactive cable host initialization process for a cable host device, detecting a initialization stage event for the cable host device and providing initialization stage event notification, and dynamically receiving content determined by a Multiple Service Operator (MSO) cable headend based on the initialization stage event notification over a network. | 2011-01-13 |
20110010748 | VIDEO DISTRIBUTION DEVICE, VIDEO DISTRIBUTION SYSTEM, AND VIDEO DISTRIBUTION METHOD - To provide a video distribution device which can realize a smooth change of reproduction speed without increasing a data transfer rate from the time of a normal reproduction and decrease a decoding load even when the reproduction speed is changed. | 2011-01-13 |
20110010749 | FILTER CIRCUIT - A filter for use in a coaxial cable network includes a printed circuit board having first and second opposed major surfaces, and first and second opposing sides. The opposed major surfaces are substantially parallel to a single plane, and are bisected by a longitudinal axis. The first and second opposing sides are substantially parallel to the longitudinal axis. The filter further includes an input terminal and an output terminal connected to the printed circuit board. The input terminal and the output terminal have an axis extending substantially parallel to the longitudinal axis. A signal path is disposed on the printed circuit board and extends from the input terminal toward the output terminal. The filter further includes a plurality of resonator elements fabricated upon the first opposed major surface. In one embodiment, the inductor elements are arranged in series along the signal path defining a footprint of less than 540 square millimeters. The filter passes a first range of frequencies in a provider bandwidth and attenuates a second range of frequencies in a personal data network bandwidth. In one embodiment, the resonator elements are parallel inductor elements and capacitor elements, the inductor elements being etched spiral inductors. | 2011-01-13 |
20110010750 | NO POP SWITCH - A switch can be configured to receive a first signal at a first input and provide an output signal at an output, depending on a state of the switch. A switch state change can be delayed until an indication of a requested switch state different than a current switch state is received and the first signal reaches a threshold. | 2011-01-13 |
20110010751 | Systems and Methods for Self-Organizing Networks Using Dynamic Policies and Situation Semantics - Communication nodes, systems and methods are described which manage and process management information using dynamic semantic variable entities governed by a formal logic and upon which computations can be performed. Such semantic variable entities include, for example, management infons and or management situations which can be used, for example, to manage policy enforcement in communication networks. Action logic is amalgamated with static situation semantics to enable dynamic policy enforcement in such networks. | 2011-01-13 |
20110010752 | ENABLING INCOMING VOIP CALLS BEHIND A NETWORK FIREWALL - A network device is configured to receive a registration message from a private user device including a private internet protocol (IP) address associated with the private user device. A public IP address and discrete port number are assigned to the private user device and private IP address and stored in an incoming call table. The registration message is translated to include the public IP address and discrete port number. The registration message is forwarded to a proxy server for registration. An incoming call invitation message is received from a public user device, where the call invitation message is directed to the public IP address and discrete port number associated with the private user device. The call invitation message is translated to include the private IP address associated with the private user device based on the received public IP address and discrete port number and the incoming call table. The call invitation message is forwarded to the private user device. | 2011-01-13 |
20110010753 | METHOD FOR DATA TRANSFER IN A NETWORK - A sophisticated gateway is connectable with at least one device, further sophisticated gateways, and/or a network. The sophisticated gateway includes an emulator proxy module and/or a presenter proxy module. The emulator proxy module receives higher layer data of a higher network layer, and processes the higher layer data thereby generating second intermediate layer data of an intermediate network layer. The processing includes a security function ensuring that the second intermediate layer data conform with a predetermined security level. The presenter proxy module receives and/or processes first intermediate layer data thereby generating the higher layer data. The processing within the presenter proxy module includes a security function ensuring that the higher layer data conform with a predetermined security level. | 2011-01-13 |
20110010754 | ACCESS CONTROL SYSTEM, ACCESS CONTROL METHOD, AND RECORDING MEDIUM - When access control implementing sections of many types different depending on an object are connected simultaneously, an access control list applied to each of the access control implementing sections is generated in a format corresponding to each access control implementing section, and a process of transferring to each access control implementing section is collectively executed based on an access control policy. Specifically, the access control lists different every access control implementing section are generated from a same access control policy based on a relation between an object and an access control implementing section for the access control implementing sections. A setting file in a format different every access control implementing section is generated from the access control list described in a format which does not depend on a kind of the access control implementing section, based on a relation of a format template of the setting file describing contents of the access control list and the access control implementing section. The setting file is distributed based on a relation of a distribution destination of the setting file and the access control implementing section. | 2011-01-13 |
20110010755 | INTERACTION BETWEEN SECURED AND UNSECURED ENVIRONMENTS - A method comprising: receiving a data structure including an identifier identifying a process for performance by a secured environment; and identifying to an unsecured environment the process identified by the data structure. | 2011-01-13 |
20110010756 | VIRTUAL APPLICATION PROGRAM SYSTEM, STORING DEVICE, METHOD FOR EXECUTING VIRTUAL APPLICATION PROGRAM AND METHOD FOR PROTECTING VIRTUAL ENVIRONMENT - The present invention relates to a virtual application program system, a storage device, a method of executing a virtual application program, and a method of protecting a virtual environment. The virtual application program system includes an execution control module for executing a virtual application program, and a virtual environment protection module loaded by the execution control module and configured to block non-permitted application programs from accessing a virtual environment accessed by the virtual application program. Accordingly, the virtual environment can be protected from a host application program, etc., and independency and security of a task using a virtual application program can be guaranteed. | 2011-01-13 |
20110010757 | ELECTRONICALLY IMPLEMENTED METHOD AND SYSTEM FOR AUTHENTICATION AND SHARING OF DOCUMENTS VIA A COMMUNICATION NETWORK - The invention provides a method and system of authentication and online sharing of documents by electronic means, through a third party, conducted via a communication network. The method involves, creation of a website, subject to the control of an administration entity; uploading the scanned version of the original document by the user at the allotted location in the website, using the obtained user name and created password; assigning a uniquely identifiable indicia to the scanned document; sending the scanned document to the authenticating entity; accessing and verifying the authenticity of scanned document by the authenticating entity, by comparison with the original document available in the database of the authenticating entity. The authentication is performed through an electronically simple mechanism only once, in which, irrespective of the date of issue of the document, the document may be attested and the record may be maintained permanently. | 2011-01-13 |
20110010758 | METHOD AND APPARATUS FOR ASCERTAINING DATA ACCESS PERMISSION OF GROUPS OF USERS TO GROUPS OF DATA ELEMENTS - A method for ascertaining access permissions of users to computer resources on a storage unit, the method including grouping users into a plurality of user groups wherein all members of at least one of the user groups have at least nearly identical user/resource access permissions to the computer resources, grouping resources into a plurality of resource groups wherein all members of at least one of the resource groups have at least nearly identical resource/user access permissions, ascertaining whether a given user is a member of a user group, if the given user is a member of a user group, ascribing to the given user the user/resource access permissions of the user group, ascertaining whether a given resource is a member of a resource group, and if the given resource is a member of a resource group, ascribing to the given resource the resource/user access permissions of the resource group. | 2011-01-13 |
20110010759 | PROVIDING A CUSTOMIZED INTERFACE FOR AN APPLICATION STORE - Embodiments of the present disclosure provide a system and method of providing customized access to an electronic storefront for downloading software for a mobile device based on authorization data stored on the mobile device. In one embodiment, mobile devices have stored one or more profile. Each profile is signed by a particular entity (a particular developer or enterprise) and includes authorization data authorizing one or more devices to install and use software associated with the entity. A content management application associated with the storefront (e.g., iTunes) identifies one or more storefronts associated with the entities of authorized profiles for a particular device upon access to the storefront and provides the entity storefronts to a user of the device based on the authorization data stored on the device. In one embodiment, a profile is authorized, e.g., using encryption and installed to the device by the particular entity. Software for which distribution is limited to those authorized by an enterprise or other entity is thus only available for download to a properly profiled and authorized device. | 2011-01-13 |
20110010760 | COMMUNICATION APPARATUS, CONTROL METHOD OF COMMUNICATION APPARATUS, AND PROGRAM - If automatic setting of communication parameters is performed in an ad hoc network when a communication apparatus is connected to an infrastructure network, there is a possibility that infrastructure network information is leaked to the infrastructure network. When an instruction to start the automatic setting of communication parameters is issued, a network participation state of the communication apparatus is determined and the automatic setting of communication parameters is not performed during enterprise connection. | 2011-01-13 |
20110010761 | CONNECTIVITY DEPENDENT APPLICATION SECURITY FOR REMOTE DEVICES - Conditional access to security-sensitive applications and/or content in a remote device may be granted based on a history of access to connectivity (e.g., access to a communication network) for the remote device. A remote device may monitor access to connectivity. If it is determined that the remote device has a first history to access to connectivity (e.g., a recent access to connectivity), a first security level is applied in providing access to the security-sensitive application. Otherwise, if a second history of access to connectivity is ascertained (e.g., no recent access to connectivity), a second security level is applied in providing access to the security-sensitive application, where the second security level is more stringent then the first security level. If the remote device is lost, a remote server may send a request to the remote device to restrict or disable access to the security-sensitive applications and/or content | 2011-01-13 |
20110010762 | IDENTITY MANAGEMENT - In providing identity management in distributed systems, it is known to provide a user with a single sign-on to accounts with different service providers with whom the user interacts by communicating with the service providers' computers. Such a single sign-on is provided by having the user authenticate himself to an identity provider computer, and thereafter relying on that identity provider computer to issue identity assertions on his behalf. An identity provider validation service is proposed with which service providers can interact on receiving an identity assertion on behalf of a user. This allows the service provider to rely only on the identity provider validation service rather than having to rely on the numerous identity providers who might issue identity assertion on behalf of one of their users. Furthermore, the identity assertions include a level of assurance indication, and the identity provider validation service indicates whether each identity provider can be trusted to properly issue an identity assertion claiming that level of assurance. This provides a more fine-grained and adaptable identity management than has hitherto been provided. | 2011-01-13 |
20110010763 | TOOL AND METHOD FOR GENERATING PASSWORDS - A grid is provided for creating secure and confidential passwords for use in sign-in procedures on electronic user accounts. The tool includes a grid having multiple rows and columns defining cells, with each cell having randomly assigned keyboard characters, such as letters, numbers, and symbols. A user creates a password by selecting a starting cell, and progressing in a user-selected pattern through a pre-selected number of cells. Multiple unique grids may be provided in hard copy or digital form for use in creating multiple passwords which may be created using the same or different starting cells and/or patterns. | 2011-01-13 |
20110010764 | ONE-PASS AUTHENTICATION MECHANISM AND SYSTEM FOR HETEROGENEOUS NETWORKS - A one-pass authentication mechanism and system for heterogeneous networks are provided. The mechanism comprises authenticating a user based on an authentication key and an authentication algorithm in response to a request of the user to register a first network, wherein the authentication key and the authentication algorithm are associated with a first user identity for the first network and a second user identity for a second network; and if the authentication is successful, then comparing the first user identity retrieved from an authentication database through the second user identity provided by the user to the first user identity provided by the user in the authentication, in response to a request of the user to register the second network, and setting up security associations between the user and the second network if the retrieved first user identity matches the first user identity provided by the user. | 2011-01-13 |
20110010765 | FORENSIC TOOLKIT AND METHOD FOR ACCESSING DATA STORED ON ELECTRONIC SMART CARDS - A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card, and a control card. The card reader and recorder is operative to read and copy the electronic SMART card onto the storage card, and to read the control card, the storage card comprising a storage card security key. The control card comprises code generation means operative to generate a control card security key, copying of the electronic SMART card onto the storage card being prevented unless the control card security key is verified against the storage card security key. | 2011-01-13 |
20110010766 | System and Method for Policy Enforcement and Token State Monitoring - Systems and methods for monitoring the state of a token and communication exchanges between the token containing an embedded integrated circuit chip and a system are provided. Communications between the token and the system are established and the exchanged of commands and responses between the token and the system are monitored and evaluated for compliance with an identified policy. The identified policy contains lists of impermissible commands, responses and content, and delivery of the commands and responses is contingent upon compliance with the identified policy. The token is in communication with a token reader which communicates with the system using token reader driver software. Either the token reader driver software or the token itself is adapted to provide for the desired monitoring, evaluation and policy enforcement. Systems and methods are also provided that enforce policies at access points within a physical access system. The physical access system can be used in combination with tokens. | 2011-01-13 |
20110010767 | Server System, Communication Method, Computer, Program And Recording Medium - Establishment of communication between client apparatuses and an arithmetic function unit is performed based on communication information acquired by communication using HTTP between the client apparatuses and the arithmetic function unit through a firewall function unit, where the client apparatuses download encrypted contents data from the arithmetic function unit by P2P without passing a firewall. | 2011-01-13 |
20110010768 | Method and Apparatuses for End-to-Edge Media Protection in ANIMS System - An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept. A method for supporting a call by a telecommunications node. | 2011-01-13 |
20110010769 | Preventing Spoofing - A method and access node for preventing spoofing while connecting subscribers to an Ethernet network. The access node includes a filter mechanism for filtering packets destined to subscribers attached to the access node. The filter mechanism includes a database of allocated IP destination addresses and MAC addresses. The filter mechanism blocks any packet directed to a subscriber but containing an incorrect IP or MAC address. The mechanism prevents users from changing their address information to illegally appropriate packets from other users or to disguise their identity. | 2011-01-13 |
20110010770 | SYSTEM AND METHOD FOR PERFORMING KEY INJECTION TO DEVICES - A key injection service module for an asset management system is provided for a secure means of injecting keys into products. To provide this service, a controller is used to define one or more key types defining the format of the keys in a file. The controller is then used to define a product model, and then to bind each key type to the product models. | 2011-01-13 |
20110010771 | DETECTING A DENIAL OF SERVICE ATTACK - A plurality of ranging processes are performed to monitor a status of a wireless link associated with a device identifier. A ranging request that includes the device identifier and a message skip indicator is received. It is determined that the device identifier is already associated with the wireless link. A duration since a previously completed ranging process is determined. Based on the duration, and the message skip indicator, it is determined whether to respond to the ranging request. | 2011-01-13 |
20110010772 | File System Event Tracking - Automated file system event tracking and reporting techniques are described in which file system events requested by a user application are intercepted and recorded prior to the request being permitted to pass to the file system for execution. Similarly, file system responses to a prior captured file system event are also intercepted and recorded. Predefined patterns of file system event may be aggregated and reported as a single event. | 2011-01-13 |
20110010773 | HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT WITH RESTRICED COMMAND ENFORCEMENT CAPABILITY - A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot execute an instruction that is not authorized. A Command Filter Matrix stores entries comprising instructions and associated data memory ranges. A hardware arrangement denies command execution if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in the Command Filter Matrix. The Command Filter Matrix may be implemented in a Field Programmable Gate Array such that the memory cell content is pre-programmed with entrusted code by a separate trusted hardware source. In this way, an operating system may function normally but only execute trusted instructions, commands and memory operations. The Command Filter Matrix also contains external write-only capability to enable external monitoring of performance. | 2011-01-13 |
20110010774 | MULTIMEDIA PLAY APPARATUS AND METHOD - Provided are a multimedia play apparatus and method. The multimedia play apparatus and method enable synchronization between an audio and a video through existing multimedia play time information, and even in a multimedia service that simultaneously provides multimedia and a message, the multimedia play apparatus and method enable synchronization between multimedia and a message that occurs by terminal characteristics between different environments and different users on the basis of existing multimedia play time information and multimedia meaning information. Moreover, by performing synchronization between multimedia and a message on the basis of the multimedia meaning information, the multimedia play apparatus and method can prevent the damage of a multimedia service that provides multimedia and a message together because of a spoiler corresponding to a malicious message. | 2011-01-13 |