04th week of 2011 patent applcation highlights part 63 |
Patent application number | Title | Published |
20110023043 | EXECUTING MULTIPLE THREADS IN A PROCESSOR - Provided are a method, system, and program for executing multiple threads in a processor. Credits are set for a plurality of threads executed by the processor. The processor alternates among executing the threads having available credit. The processor decrements the credit for one of the threads in response to executing the thread and initiates an operation to reassign credits to the threads in response to depleting all the thread credits. | 2011-01-27 |
20110023044 | SCHEDULING HIGHLY PARALLEL JOBS HAVING GLOBAL INTERDEPENDENCIES - A method of scheduling highly parallel jobs with global interdependencies is provided herein. The method includes the following steps: grouping input elements, each group being associated with an interdependency tag reflecting a level of interdependency between data associated with different input elements within a group; clustering the groups into collections of groups, wherein the clustered groups are associated with an interdependency tag reflecting a level of interdependency between groups, above a specified value; applying a conflict check to the collections of groups and to active jobs of a working set, to yield a conflict level between each collection of groups and each active job, by analyzing the interdependency tags of the collections of groups vis à vis interdependency tags associated with the active jobs; and adding collections of groups into the working set, wherein added collections of groups are associated with a conflict level below an acceptable conflict level. | 2011-01-27 |
20110023045 | Targeted communication to resource consumers - A method of communicating to a consumer is disclosed. The consumer's usage of a resource is compared to a relevant cohort's usage of the resource. Based at least in part on a result of the comparison, a message is selected to be provided to the consumer. | 2011-01-27 |
20110023046 | MITIGATING RESOURCE USAGE DURING VIRTUAL STORAGE REPLICATION - Systems and methods of mitigating resource usage during virtual storage replication are disclosed. An exemplary method comprises detecting quality of a link between virtual storage libraries used for replicating data. The method also comprises determining a number of concurrent jobs needed to saturate the link. The method also comprises dynamically adjusting the number of concurrent jobs to saturate the link and thereby mitigate resource usage during virtual storage replication. | 2011-01-27 |
20110023047 | CORE SELECTION FOR APPLICATIONS RUNNING ON MULTIPROCESSOR SYSTEMS BASED ON CORE AND APPLICATION CHARACTERISTICS - Techniques for scheduling an application program running on a multiprocessor computer system are disclosed. Example methods include but are not limited to analyzing first, second, third, and fourth core components for any within-die process variation, determining an operating state of the first, second, third and fourth core components, selecting optimum core components for each component type with the aid of bloom filters, statically determining which core component types are used by the application program, and scheduling the application program to run on a core having an optimum core component for a core component type used by the application program. | 2011-01-27 |
20110023048 | INTELLIGENT DATA PLACEMENT AND MANAGEMENT IN VIRTUAL COMPUTING ENVIRONMENTS - Methods and apparatus involve intelligently pre-placing data for local consumption by workloads in a virtual computing environment. Access patterns of the data by the workload are first identified. Based thereon, select data portions are migrated from a first storage location farther away the workload to a second storage location closer the workload. Migration also occurs at a time when needed by the workload during use. In this manner, bandwidth for data transmission is minimized. Latency effects created by consumption of remotely stored data is overcome as well. In various embodiments, a data vending service and proxy are situated between a home repository of the data and the workload. Together they serve to manage and migrate the data as needed. Data recognition patterns are disclosed as is apportionment of the whole of the data into convenient migration packets. De/Encryption, (de)compression, computing systems and computer program products are other embodiments. | 2011-01-27 |
20110023049 | OPTIMIZING WORKFLOW EXECUTION AGAINST A HETEROGENEOUS GRID COMPUTING TOPOLOGY - Optimizing workflow execution by the intelligent dispatching of workflow tasks against a grid computing system or infrastructure. For some embodiments, a grid task dispatcher may be configured to dispatch tasks in a manner that takes into account information about an entire workflow, rather than just an individual task. Utilizing information about the tasks (task metadata), such a workflow-scoped task dispatcher may more optimally assign work to compute resources available on the grid, leading to a decrease in workflow execution time and more efficient use of grid computing resources. | 2011-01-27 |
20110023050 | SYSTEM AND METHOD FOR TIME-AWARE RUN-TIME TO GUARANTEE TIME - A method and system for achieving time-awareness in the highly available, fault-tolerant execution of components in a distributed computing system, without requiring the writer of these components to explicitly write code (such as entity beans or database transactions) to make component state persistent. It is achieved by converting the intrinsically non-deterministic behavior of the distributed system to a deterministic behavior, thus enabling state recovery to be achieved by advantageously efficient checkpoint-replay techniques. The system is deterministic by repeating the execution of the receiving component by processing the messages in the same order as their associated timestamps and time-aware by allowing adjustment of message execution based on time. | 2011-01-27 |
20110023051 | PROCESS MANAGEMENT SYSTEM AND METHOD - A process management system includes a display, a process handling module and a plurality of window process modules communicating with the process handling module. Each window process module processes one function on the display. The process handling module stops an executing window process module before the process handling module starts another window process module. | 2011-01-27 |
20110023052 | COMPRESSED DATA MANAGING SYSTEM AND METHOD FOR CIRCULAR BUFFER - The invention relates to a compressed data managing system and method for circular buffer. By using the system and method of the invention, when storing the compressed data in a circular buffer and an event occurs, the hardware compression mechanism can stop immediately, without jeopardizing the decompression of the compressed data. Therefore, the system and method of the invention can overcome the following conventional problem: Conventional real-time tracers need several cycles to write the compressed data into the trace memory, which is unbeneficial to error diagnosis. Since when an error occurs, the system might enter the unstable state, this could cause that the tracers fail to write the last compressed data into the trace memory. | 2011-01-27 |
20110023053 | SYSTEM AND METHOD FOR CONSOLIDATING MIDDLEWARE FUNCTIONALITY - A method and server manage a consolidation of multiple middleware threads, by identifying types of a plurality of middleware, selecting a main middleware from the plurality of middleware, and initializing the main middleware as a main middleware thread. The managing also includes identifying other middleware from the plurality of middleware, based on a consolidated middleware functionality, and selecting slave middleware from the identified other middleware. The managing further includes initializing the slave middleware as slave middleware threads by the main middleware thread, such that each initialized slave middleware thread functions independently of the main middleware thread. | 2011-01-27 |
20110023054 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND STORAGE MEDIUM - A unified application acquires a printer driver, which is an example of a device driver, managed by an operating system of the information processing apparatus, and a printer object corresponding to a printer port. The printer object is an example of a device object. The unified application determines whether a function of the printer driver corresponding to the printer object satisfies a condition for registering a printer icon of the unified application. | 2011-01-27 |
20110023055 | STANDARDIZED DATABASE CONNECTIVITY SUPPORT FOR AN EVENT PROCESSING SERVER - Techniques for facilitating communication between one or more client applications and an event processing server. In one set of embodiments, a framework is provided that enables a client application to communicate with an event processing server via a standard database connectivity API, such as Java Database Connectivity (JDBC). | 2011-01-27 |
20110023056 | Spindle Motor - Disclosed is a spindle motor comprising: an integral turntable including: a table on which a rotating body to be installed, and an inner side wall and an outer side wall formed to be recessed upwards at a portion therebetween on a lower surface of the table so that a predetermined hollow is formed, a surface of thereof being formed slant; a ball cover for covering a ball inserted into the hollow and the hollow; a rotation shaft an upper portion of which is inserted into a center of the integral turntable; a bearing supporting a lower portion of the rotation shaft; a coil formed on an outside of the rotation shaft; and a magnet formed on an outside of the coil. | 2011-01-27 |
20110023057 | BRUSHLESS MOTOR, AND DISK DRIVE EQUIPPED WITH THE SAME - In a brushless motor for use in a disk drive, a rotor is mounted onto a tube portion of a housing. A retaining claw is formed at an upper end of the tube portion. A turntable has a central concave portion which accommodates an upper portion of the tube portion of the housing. A retaining member is provided radially outside the central concave portion, and includes a plurality of retaining pieces extending to the inside of the central concave portion. When the rotor is mounted onto the housing, the retaining pieces come into contact with the retaining claw and then move upward. When the rotor moves upward relative to the housing, the retaining pieces come into contact with the retaining claw, thereby restricting upward movement of the rotor. Upward movement of the retaining pieces is restricted by contact between the retaining member and the turntable. | 2011-01-27 |
20110023058 | APPARATUS AND METHOD FOR FACILITATING A PURCHASE USING INFORMATION PROVIDED ON A MEDIA PLAYING DEVICE - Disclosed are apparatus and method for facilitating a purchase in conjunction with media content information. The apparatus includes a receiver configured to receive a transmission of media content, information regarding the content, and information for facilitating a purchase of at least one of a copy of the content, a good, and/or a service. The content may include broadcast media content and entertainment media content. The apparatus also includes a processor configured to process the information regarding the content and the information for facilitating a purchase of the copy of the content, the good, and/or the service. The apparatus also includes a display device for displaying information. | 2011-01-27 |
20110023059 | METHOD AND APPARATUS FOR CONTENT REPLACEMENT IN LIVE PRODUCTION - The insertion of an advertisement or other new content into a time slot between content segments advantageously occurs by selecting the new segment to fill its associated slot as closely as possible. Play out of a successive content segment occurs for distribution over at least one of a first set of channels and at least one second channel until the occurrence of the time slot whereupon the new content segment undergoes play out for distribution over the at least one second channel. If the new content segment has a duration longer than the time slot, the length of at least one content segment gets reduced to provide substantially seamless play out. | 2011-01-27 |
20110023060 | Targeted Video Advertising - A computer-implemented method of providing targeted video promotional material includes transmitting a promotional item for display on a video terminal, determining whether the promotional item was skipped, and updating a profile corresponding to the promotional item or a viewer of the promotional item based on whether or not the promotional item was skipped. | 2011-01-27 |
20110023061 | RESOURCE SCHEDULING APPARATUS AND METHOD, PROGRAM REQUESTING METHOD AND SYSTEM - A resource scheduling apparatus, a resource scheduling method, a program requesting method, a program requesting system, and a Set Top Box (STB) are provided. The resource scheduling method includes: distributing bandwidth greater than an inherent code rate of a program respectively requested by a user to a Video On Demand (VOD) program of the user within available bandwidth of a frequency point according to a received VOD user request; and reducing the bandwidth distributed to at least one VOD program to which bandwidth has been distributed according to the received VOD user request for currently requesting the program when the available bandwidth of the frequency point is smaller than an inherent code rate of a currently requested program, so that the available bandwidth of the frequency point is greater than or equal to the inherent code rate of the currently requested program. Thus, a transmission speed of the program and a utilization ratio of the bandwidth are increased. | 2011-01-27 |
20110023062 | IP BROADCASTING RECEIVER AND METHOD FOR PROVIDING SERVICE IN IP BROADCASTING RECEIVER - An IP broadcast receiver and a method for providing a service in the IP broadcast receiver are disclosed. Information related to an IP broadcast and/or the IP broadcast receiver is provided to a terminal connected to a communication network via a server unit provided in the IP broadcast receiver, and a service related to the IP broadcast and/or the IP broadcast receiver may be performed according to a request from the terminal. Information provided to the terminal may include a menu allowing a user to select one or more services from among an EPG service, a reservation service, a history service, a contents uploading/downloading service. A menu screen image may be provided with a resolution corresponding to the connected terminal. Thus, the operations related to the IP broadcast receiver, e.g., EPG checking, reservation record, reservation watch, history checking, contents uploading/downloading, and the like, can be remotely simply performed, thus enhancing user convenience. | 2011-01-27 |
20110023063 | Inserting Personalized Information into Digital Content - products, for inserting personalized information into digital content. A request for digital video content is received by a computing device. The request includes authentication data associated with a user of a client device. Personalized data to be inserted into the requested video content is generated by the computing device. The personalized data and the requested video content are combined by the computing device. The combining includes replacing one or more frames of the requested video content with the personalized data to generate personalized video content. | 2011-01-27 |
20110023064 | Synchronizing And Windowing External Content In Digital Display Systems - In one embodiment, a system comprises at least a first video source device, at least a first remote control device, a digital display device comprising logic to receive, in a digital display device, a first video signal from a first video source, extract at least a first metadata from the first video signal, use the first metadata to obtain a second video signal from a second video source, present the first video signal on the digital display device, combine at least a portion of the second video signal and at least a portion of the first video signal to generate a combined video signal, and present the combined video signal on a display. | 2011-01-27 |
20110023065 | METHOD FOR PROVIDING A TELEVISION ELECTRONIC GUIDE - A method and apparatus for providing a packet switched television guide such as an Electronic Program Guide or an Electronic Service Guide to a user. An Application Server receives and stores preferences relating to a packet switched television guide. When the Application Server subsequently receives a new or updated packet switched television guide from a packet switched television Guide Application Server, the Application Server filters elements of the packet switched television guide according to the preferences to remove information not relevant to a user associated with the preferences. The filtered packet switched television guide is then sent to the user. In this way, only relevant information is sent, which can reduce the bandwidth required in sending packet switched television guides, the frequency at which packet switched television guide updates need to be sent, and also the processing required by the user's receiving equipment in filtering out irrelevant information from the packet switched television guide. | 2011-01-27 |
20110023066 | METHOD AND APPARATUS FOR GENERATING 3-DIMENSIONAL IMAGE DATASTREAM INCLUDING ADDITIONAL INFORMATION FOR REPRODUCING 3-DIMENSIONAL IMAGE, AND METHOD AND APPARATUS FOR RECEIVING THE 3-DIMENSIONAL IMAGE DATASTREAM - A method of generating a 3-dimensional (3D) image datastream is provided. The method includes generating an elementary stream including an encoded bit string of 3D image data; generating at least one packetized elementary stream by packetizing the elementary stream; generating at least one section including service related information of the 3D image data; inserting 3D image reproduction information for reproducing the 3D image data into a program guide information section from among the at least one section; generating at least one transport stream packet for each of the at least one section and the at least one packetized elementary stream; and generating a transport stream by multiplexing the at least one transport stream packet. | 2011-01-27 |
20110023067 | SYSTEM AND METHOD FOR FACILITATING PURCHASES ASSOCIATED WITH VIDEO PROGRAMMING - A method for facilitating a purchase associated with video programming is provided. The method includes detecting a product signal related to video programming, and activating an indicator within a user interface in a remote control in response to the product signal. The method also includes placing a product corresponding to the product signal within a selected item list in response to an activation of an input selector within the user interface of the remote control. | 2011-01-27 |
20110023068 | METHOD AND SYSTEM TO SEARCH VIEWABLE CONTENT - A system to search to search viewable content in the context of television entertainment is provided. In one example embodiment, the system comprises a communications module to receive a request associated with one or more directional keys on a control device, a search term detector to determine a search term associated with the request, a search module to locate a content item associated with the search term; and a presentation module to present the content item associated with the search term. | 2011-01-27 |
20110023069 | System and Method for Creating and Managing an Internet Protocol Television Personal Movie Library - A system and a method for creating and managing an Internet Protocol television personal movie library are disclosed. An access request for a movie library server and a personal movie library is received over a provider network. A movie search request for an on-demand movie is received over the provider network. The movie library server is searched for the on-demand movie. If the on-demand movie is located in the movie library server, then the on-demand movie is added to the personal movie library. If the on-demand movie is not located in the movie library server, then a content provider is connected to over a public network, the on-demand movie is downloaded from the content provider over the public network, and the on-demand movie is added to the personal movie library. | 2011-01-27 |
20110023070 | Service Discovery in Broadcast Networks - Broadcast configuration data such as service information, program specific information and electronic service guide data may be misconfigured in non-standard or misconfigured broadcast networks. A network and data analysis server may be used to monitor network broadcasts for configuration information, check whether the configuration information is valid and transmit updated information to a central service discovery database system. The service discovery database system may be used to repair misconfigured or incomplete configuration information before storing it to a database. Terminals with fast service discovery enabled or that have received misconfigured data through the broadcast network may request configuration data from the service discovery database system. Additionally, terminals and/or network analysis servers may receive broadcast signals through a first network connection while communicating with the database system over a second network connection. | 2011-01-27 |
20110023071 | Method, System, and Apparatus for Creating Content-on-Demand Service - A method, a system, and an apparatus for creating a Content-on-Demand (CoD) service are disclosed herein. The method includes receiving a Session Initiation Protocol (SIP) service request sent by a User Equipment (UE); converting the SIP service request into a Real-Time Streaming Protocol (RTSP) service request, and sending the RTSP service request to a server; receiving an RTSP service response sent by the server; and converting the RTSP service response into a SIP service response, and sending the SIP service response to the UE to create the CoD service between the UE and the server. | 2011-01-27 |
20110023072 | MULTIPLE AUDIO STREAMS - A system and method for providing multiple audio streams for a video over a network such as the Internet. The system comprises a server that includes an encryption unit and a slicing unit, a plurality of boxes, and an ordering box. The server encodes multiple audio streams and a single video to be sliced into segments. The sliced segments of multiple audio streams and the single video are seeded to a number of the plurality of boxes. This may be repeated for other videos with multiple streams. When the ordering box makes a request for a single video with a single audio, then the number of boxes with segments of the requested video and multiple audio streams, filters and sends the requested video and requested single audio stream to the ordering box. Similarly, multiple closed caption streams can be handled and provided like the audio streams. | 2011-01-27 |
20110023073 | Systems and Methods to Order A Content Item Deliverable Via A Television Service - Methods and systems of ordering a content item that is deliverable via a television service are disclosed. In one embodiment, ordering a content item that is deliverable via a television service can include sending an offer message to a mobile device, the offer message including an offer of a content item that is deliverable via a television service. In one embodiment, ordering the content item that is deliverable via the television service can include receiving an acceptance message that indicates an acceptance of the offer. | 2011-01-27 |
20110023074 | SYSTEMS AND METHODS FOR FACILITATING ANTENNA CONFIGURATION - Various embodiments facilitate antenna peaking, such as by assisting a user in configuring the position and/or orientation of an antenna to improve the quality of a received signal. In one embodiment, an antenna peaking system (“APS”) is provided. The APS includes a receiving device, such as a set-top box, and an antenna peaking assistant. The receiving device determines strength of a signal received by an antenna, and transmits information about the determined signal strength to the antenna peaking assistant. The antenna peaking assistant wirelessly receives the transmitted information, and presents an indication of the signal strength. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 2011-01-27 |
20110023075 | RECORDING/REPRODUCTION APPARATUS, AND POWER SUPPLY CONTROL METHOD OF VIDEO SERVER AND RECORDING/REPRODUCTION APPARATUS - According to one embodiment, a recording/reproduction apparatus includes a power source controller. The power source controller includes a determination unit, a stand-by mode execution unit, and a pause mode execution unit. The determination unit determines whether or not an event associated with at least one of recording and reproduction of the information signal occurs at start-up time. The stand-by mode execution unit executes a stand-by mode in which the power level of each of the encoder, the decoder, the recording medium, and the plurality of signal processors is controlled to be lower than a predetermined level. The pause mode execution unit executes a pause mode in which the power to each of the encoder, the decoder, the recording medium, and the plurality of signal processors is turned off, and the power level of the process controller is controlled to be lower than the predetermined level. | 2011-01-27 |
20110023076 | ADAPTIVE STREAMING FOR DIGITAL CONTENT DISTRIBUTION - One embodiment of the present invention sets forth a technique for adapting playback bit rate to available delivery bandwidth in a content delivery system comprising a content server and a content player. A content player periodically estimates whether a given playback bit rate can feasibly provide complete playback for a given title assuming currently available bandwidth. If playback becomes unfeasible at a current bit rate assuming currently available bandwidth, then the content player adapts the bit rate downward until a feasible bit rate is achieved. If playback is feasible using a higher bit rate, then the content player may adapt the bit rate upward. | 2011-01-27 |
20110023077 | METHOD, SYSTEM AND APPARATUS TO ENABLE CONVERGENT TELEVISION ACCESSIBILITY ON DIGITAL TELEVISION PANELS WITH ENCRYPTION CAPABILITIES - The present invention relates to a method, system and apparatus to enable information accessibility on digital panels such as television panel. In particular, the invention relates to a method, system and apparatus to enable multiple sources of information to be displayed independently onto one or more graphics planes of multimedia devices and, where and when necessary, for securing access to information revealed on one or more graphics planes of multimedia devices such as convergent television and digital displays. | 2011-01-27 |
20110023078 | CONTENT RECEIVER AND CONTENT TRANSMITTER - A transmitting party adds reproduction time information to each transport packet to form an extended transport packet, encapsulates the extended transport packet, adds capsule counter information, and transmits the capsule. A receiving party has a storage means, and transmits a re-send request including the capsule count information to the transmitting party when a packet loss occurs. At the receiving party, the re-sent data received overwrites data in its original storage region. At reproduction, the receiving party decodes the data after compensating for jitter referring to reproduction time information. Accordingly, a packet loss or jitter is compensated for at both transmitting and receiving parties in a communications network such as the Internet so as to prevent the occurrence of a decoding error at the receiving party. | 2011-01-27 |
20110023079 | System and method for processing priority transport stream data in real time in a multi-channel broadcast multimedia system - A system for processing data stream content in a multi-channel broadcast multimedia system including a packet processor having an input control having a filter module for detecting at least one priority data stream from an input data stream, and an output control including a format module for displaying the priority data streams in real-time. The system can include an alarm detector for checking a rate of the priority data stream and issuing an alarm in the event of an alarm condition of the priority data stream. | 2011-01-27 |
20110023080 | CONTROLLED RATE VOD SERVER - A distributed stream processing system including a plurality of storage devices, at least one of which is configured to process at least one segment of a data stream, thereby producing a changed segment of the data stream, and provide output of at least the changed segment of the data stream, and a server configured to accept the output of the storage devices and combine the output into a transport stream. A method for combining a plurality of data streams including using one or more storage devices for processing at least one segment of a data stream, thereby producing a changed segment of the data stream, and providing output of at least the changed segment of the data stream, and combining the output of the storage devices into a combined data stream. Related apparatus and methods are also described. | 2011-01-27 |
20110023081 | REMOTE CONTROL ACCESSORY FOR A WIRELESS COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, a remote control accessory for a wireless communication system, including a radio frequency (RF) to infrared (IR) converter for receiving RF signals transmitted thereto and converting the RF signals to IR commands, a plurality of IR transmitters for transmitting the IR commands, and a housing assembly for carrying the RF to IR converter and the plurality of IR transmitters. The plurality of IR transmitters are integrated into the housing assembly with no exposed wires. Other embodiments are disclosed. | 2011-01-27 |
20110023082 | TECHNIQUES FOR ENFORCING APPLICATION ENVIRONMENT BASED SECURITY POLICIES USING ROLE BASED ACCESS CONTROL - An application platform examines, at runtime, various specified aspects of an application environment in which an application interacts with a user. Such examinations are made to determine a state for each of the various specified aspects. Further, the platform automatically activates particular application environment roles for the user depending on the result of the examinations. For example, an application environment role may be activated representing a particular detected mode of communication (e.g., encrypted network communications) or a particular detected manner of authentication (e.g., password authentication). Such activations are based on the detected states and specified states for the various specified aspects of the application environment. Such activations may occur in the context of an application attempting to perform an operation on an access controlled object on behalf of a user. Further, such activations may occur in the context of establishing or maintaining a user session for a user of an application. | 2011-01-27 |
20110023083 | METHOD AND APPARATUS FOR DIGITAL RIGHTS MANAGEMENT FOR USE IN MOBILE COMMUNICATION TERMINAL - A digital rights management (DRM) apparatus in a mobile terminal includes DRM middleware that makes different types of DRM systems compatible. The DRM middleware includes at least one plug-in module to perform a conversion between different types of DRM contents. A part of the at least one plug-in module is downloaded in real time from a server and is executed. A part of the at least one plug-in module is executed by a server by remote control through a plug-in interface. | 2011-01-27 |
20110023084 | PROTECTION OF COMPUTER RESOURCES - In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats. | 2011-01-27 |
20110023085 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF THE INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND PROGRAM - An information processing apparatus for suitably registering policy information by considering an order of priority while reducing the burden on a user has the following structure. When policy information used for communication with an apparatus of a communication partner is to be registered in a storage unit, and when an address of the apparatus of the communication partner of the policy information to be registered in the storage unit is included in an address of an apparatus of a communication partner of policy information already stored in the storage unit, registering of the policy information to be registered so that an order of priority of the policy information to be registered in the storage unit is set lower than an order of priority of the policy information whose address includes the address of the apparatus of the communication partner of the policy information to be registered is restricted. | 2011-01-27 |
20110023086 | Suppression of malicious SIP messages using the resource priority header - An Internet Service Provider (ISP) node is configured to suppress malicious session initiation protocol (SIP) messages. The ISP node is coupled to receive a new session initiation protocol (SIP) message from a user agent client associated with the ISP. If the SIP message includes a resource priority header (RPH) indicating the new SIP message should be given priority within the network, the ISP node determines whether the user agent client previously sent an initial SIP message with an RPH that has not yet been authorized, and if so, places the new SIP message in a buffer. | 2011-01-27 |
20110023087 | METHOD AND APPARATUS FOR DYNAMIC DESTINATION ADDRESS CONTROL IN A COMPUTER NETWORK - An arrangement to direct a packet sent out from an arbitrary apparatus connected to a network to a predetermined authentication server without changing the configuration of a computer network. A packet transmitted from apparatus, such as a personal computer, newly connected to the network, is guided to an authentication server via communication control apparatus. The communication control apparatus replaces a MAC address of the destination addresses of another server, which is included in the ARP cache of the personal computer, with the MAC address of the communication control apparatus to guide the packet from the personal computer to the communication control apparatus. The communication control apparatus further transmits the received packet to a predetermined authentication server. | 2011-01-27 |
20110023088 | FLOW-BASED DYNAMIC ACCESS CONTROL SYSTEM AND METHOD - A traffic analysis and flow-based dynamic access control system and method. The flow-based dynamic access control system for controlling a user's access to an internal communication network through an external communication network includes an access control unit operating in an access control mode in which traffic received from a user is basically blocked, generating state management information of a flow, which is received from the user, based on a specified packet of the flow, and verifying whether access of the flow to the internal communication network is a normal access. As a proactive defense concept of allowing only normal users to access an internal network, a method of blocking attacks from a system contaminated by a worm virus, detecting a cyber attack on a certain system in advance and automatically avoiding the cyber attack, and guaranteeing the quality of normal traffic even under cyber attacks without performance degradation of the internal network is provided. | 2011-01-27 |
20110023089 | PROFITS GIVE-BACK DEVICE, PROFITS GIVE-BACK METHOD, PROGRAM STORAGE MEDIA, PROFITS GIVE-BACK SYSTEM, CONTENT PROVIDING DEVICE, CONTENT PROVIDING METHOD, PROGRAM STORAGE MEDIA, AND CONTENT PROVIDING SYSTEM - A profit give-back device, profit give-back method, program storage medium, profit give-back system, content providing device, content providing method, program storage media, and content providing system are disclosed. Profits give-back processing is performed according to the accumulated points proportionate to the number of times the content with a commercial video is provided to a client PC 4 and thus the fare profits giveback can be easily performed. A preset content with a commercial video is provided to a user when requested from the client PC 4, and it is possible to surely provide advertisement information without the user being aware of the commercial. | 2011-01-27 |
20110023090 | INTEGRATING SERVICE INSERTION ARCHITECTURE AND VIRTUAL PRIVATE NETWORK - Apparatus, methods, and other embodiments associated with providing service insertion architecture (SIA) differentiated services in a virtual private network (VPN) environment are described. Embodiments may provision an authentication, authorization, and accounting (AAA) server with user-to-SIA service-context mapping information. With the AAA server provisioned, embodiments may acquire, in an IPSec VPN hub, during IPSec tunnel user authentication, from the AAA server, the user-to-SIA service-context mapping information. With the mapping information available, embodiments may dynamically map an SIA service to an IPSec VPN tunnel user based on the service information acquired from the Service Broker or Pseudo-Service Broker. The dynamic mapping facilitates providing differentiated services in the SIA by facilitating forwarding an IPSec packet received on the IPSec VPN tunnel from the user to a service node associated with the SIA service based, at least in part, on the IPSec SADB entry modified using the service information. | 2011-01-27 |
20110023091 | AUTHENTICATION, AUTHORIZATION AND ACCOUNTING SERVICES SOLUTION - Methods, systems and modules for Authentication, Authorization and Accounting (AAA) services. In one embodiment, session information is stored in an external database so that the information can be retrieved to continue a session using a different AAA server than the one which originated the session, and/or can be retrieved by non-AAA systems. | 2011-01-27 |
20110023092 | Method and system of plug-in privilege control - A plug-in privilege control includes authorizing a plug-in, including assigning a plug-in identification number (PIN) to the plug-in wherein the PIN is used to identify an identification (ID) of the corresponding plug-in; notifying the plug-in about the PIN; storing information about the plug-in and a plug-in accessible service to a mapping of services; receiving a request for a service from the plug-in, wherein the request includes the PIN; retrieving the ID of the plug-in according to the PIN; and determining whether to allow the plug-in to access the service that it requested. | 2011-01-27 |
20110023093 | Remote Roaming Controlling System, Visitor Based Network Server, and Method of Controlling Remote Roaming of User Devices - An authorization assisting device sends to the VBN server an authorization request for access to the WAN by a requesting user device. A registration driver has a set of assignable IP address ranges for multiple routing realms, and assigns an IP address to a user device from a relevant IP address range depending on a routing realm from which communication from the user device is received. The assignable IP address ranges include one or more authorization address ranges from which the registration driver assigns an IP address to a user device whose authorization request is received from the authorization assisting device. An authorization module processes the authorization request to generate an authorization response granting or denying access to the WAN by the requesting user device based on registration data in a registration data store and the information in the authorization request. | 2011-01-27 |
20110023094 | METHOD, APPARATUS, AND SYSTEM FOR PREVENTING ABUSE OF AUTHENTICATION VECTOR - A method for preventing abuse of an Authentication Vector (AV) and a system and apparatus for implementing the method are provided. Access network information of a non-3rd Generation Partnership Project (3GPP) access network where a user resides is bound to an AV of the user, so that when the user accesses an Evolved Packet System (EPS) through the non-3GPP access network, even if an entity in the non-3GPP access network is breached, or an Evolved Packet Data Gateway (ePDG) connected to an untrusted non-3GPP access network is breached, the stolen AV cannot be applied to other non-3GPP access networks by an attacker. | 2011-01-27 |
20110023095 | SYSTEM AND METHOD FOR SUPPORTING SECURITY ADMINISTRATION - A transactional server is configured to receive a transactional procedure call from a client to initiate one or more transaction processes. Said transactional server includes a Lightweight Directory Access Protocol (LDAP) authentication server which is configured to forward the transactional procedure call from the transactional server to a distributed authentication server for authentication. When the transactional procedure call to initiate a transaction is received at the transactional server, the LDAP authentication server identifies a user associated with the transactional procedure call, determines that the distributed authentication server should authenticate the user, and initiates an LDAP session between the transactional server and the distributed authentication server. Then, after receiving from the distributed authentication server corresponding user information, the LDAP authentication server creates a token reflecting an authentication result based on the corresponding user security information, which is subsequently used to authenticate the client to participate in the transaction. | 2011-01-27 |
20110023096 | TOKEN-BASED CONTROL OF PERMITTED SUB-SESSIONS FOR ONLINE COLLABORATIVE COMPUTING SESSIONS - In one embodiment, a client device may send one or more sub-session requests to one or more corresponding session controllers through a computer network to obtain one or more corresponding sub-session tokens that indicate in which sub-sessions of an online collaborative computing session the client device is permitted to participate. The client device may then receive particular sub-session tokens (e.g., based on certain permissions), which may then be sent to a collaboration server to establish one or more permitted sub-sessions of the online collaborative computing session with the client device as indicated by the received sub-session tokens. | 2011-01-27 |
20110023097 | AUTHENTICATION METHOD AND FRAMEWORK - Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted. | 2011-01-27 |
20110023098 | METHOD AND SYSTEM FOR MAINTAINING LOGIN PREFERENCE INFORMATION OF USERS IN A NETWORK-BASED TRANSACTION FACILITY - The present invention relates to various aspects for maintaining and utilizing login preference information of users of a network-based transaction facility. In one embodiment, user interface information is communicated to a client via a communications network. The user interface information includes information concerning a plurality of features within the network-based transaction facility. The user interface information also specifies a login interface that facilitates user input of login preference information pertaining to each of the plurality of features. Further, the login preference information is received from the client via the communications network and utilized to control user access to any of the plurality of features within the network-based transaction facility via the communications network. | 2011-01-27 |
20110023099 | USER TERMINAL WITH IDENTITY SELECTOR AND METHOD FOR IDENTITY AUTHENTICATION USING IDENTITY SELECTOR OF THE SAME - The present invention relates to a user terminal ( | 2011-01-27 |
20110023100 | Device Ownership Transfer From A Network - A home relationship is established between a device and a network by storing an ownership record in the device that identifies the network, and storing in the network a device identifier that identifies the device. Thereafter, communication is established between the device and the network. The ownership record is then transmitted from the network to the device, and automatic access to the device is granted to the network once the device verifies the transmitted ownership record against the ownership record stored in the device. In addition, the device identifier is transmitted from the device to the network, and automatic access to the network is granted to the device once the network verifies the transmitted device identifier against the device identifier stored in the network. | 2011-01-27 |
20110023101 | SINGLE LOGIN PROCEDURE FOR ACCESSING SOCIAL NETWORK INFORMATION ACROSS MULTIPLE EXTERNAL SYSTEMS - A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system. | 2011-01-27 |
20110023102 | Image forming apparatus, image processing apparatus and image delivery system - An image forming apparatus connected to plural authentication servers includes an acquiring unit configured to acquire user identifying information identifying a user and a password; a selecting unit configured to select server identifying information identifying two or more of the plural authentication servers; an authentication process unit configured to transmit the user identifying information and the password to the two or more authentication servers, identified by the selected server identifying information, and acquire an authentication result from the two or more authentication servers. The authentication process unit determines that authentication is successful upon reception of the authentication result indicating successful authentication by at least one of the two or more authentication servers. The image forming apparatus further includes a process unit configured to process image data upon determination of successful authentication by the authentication process unit. | 2011-01-27 |
20110023103 | METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN - The invention relates to a method for reading at least one attribute stored in an ID token ( | 2011-01-27 |
20110023104 | SYSTEM FOR HOSTING CUSTOMIZED COMPUTING CLUSTERS - A computer system for hosting computing clusters for clients. The system includes clusters each including a set of computing resources and each implemented in custom or differing configurations. Each of the configurations provides a customized computing environment for performing particular client tasks. The configurations may differ due to configuration of the processing nodes, the data storage, or the private cluster network or its connections. The system includes a monitoring system that monitors the clusters for operational problems on a cluster level and also on a per-node basis such as with monitors provided for each node. The system controls client access to the clusters via a public communications by only allowing clients to access their assigned cluster or the cluster configured per their specifications and performing their computing task. Gateway mechanisms isolate each cluster such that communications within a cluster or on a private cluster communications network are maintained separate. | 2011-01-27 |
20110023105 | IPv6-over-IPv4 Architecture - Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software. | 2011-01-27 |
20110023106 | METHODS AND SYSTEMS FOR ACHIEVING HIGH ASSURANCE COMPUTING USING LOW ASSURANCE OPERATING SYSTEMS AND PROCESSES - A computing system contains and uses a partitioning microkernel (PMK) or equivalent means for imposing memory partitioning and isolation prior to exposing data to a target operating system or process, and conducts continuing memory management whereby data is validated by security checks before or between sequential processing steps. The PMK may be used in conjunction with an Object Request Broker. | 2011-01-27 |
20110023107 | Lifecycle Management Of Privilege Sharing Using An Identity Management System - A method, system and computer-usable medium are disclosed for managing the lifecycle of a shared privileged account. A proxy service is implemented with an Identity Management (IdM) system that defines and manages a plurality of identity services, which in turn manage a plurality of privileged accounts used to access a plurality of managed targets. Each of the identity services is mapped to a privilege group of the proxy service and an ID pool manager is implemented to manage sharing of the privileged accounts. A request is generated to access a managed target with a privileged account. A shared privileges module generates a shared ID authorization account and associates it with the requester. The shared ID authorization account is populated with sign out information for a shared privileged account, which the requester uses to access the corresponding managed target. When use of the shared privileged account is ended, the shared privileges module disassociates the requester with the shared privileged account by deleting the shared ID authorization account. | 2011-01-27 |
20110023108 | Mobile Radio Terminal Device Having a Filter Means and a Network Element for the Configuration of the Filter Means - A mobile radio terminal device having a communicator for communicating with network elements via data packets and a filter for monitoring the data packets, wherein the filter is implemented to receive a filter regulation from a first network element and to prevent a communication with a second network element when a data packet for communicating with the second network element does not correspond to the filter regulation. | 2011-01-27 |
20110023109 | Network Firewall Host Application Identification and Authentication - Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host computer, configured to identify each application in use, tag the application identity with a host identity, combine these and other information into a data packet, and securely transmit the data packet to the network based firewall. The embodiment also includes an application identity listener on the network based firewall, configured to receive the information data packet, decode the data packet and provide to the network based firewall the identity of the application. The network based firewall is provided with an application-awareness via an extension of firewall filtering or security policy rules via the addition of a new application identity parameter upon which filtering can be based. Other systems and methods are also provided. | 2011-01-27 |
20110023110 | Interactive Video Captcha - Provided is a Captcha Access Control System (CACS) for generating an improved captcha that are based, in one described embodiment, upon a command in one format and a response in a different format, one or both of which are rendered in a format that is difficult for an automated system to interpret. A computer system or program to which a user is requesting access generates a textual or audible command. A video device captures the user's response and transmits the response to a response evaluation device. Based upon an analysis of the transmitted video and a comparison between the analyzed video and the command, the computer or program either enables access or denies access. | 2011-01-27 |
20110023111 | CONNECTION DEVICE AUTHENTICATION - A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data connection device installed with a security chip. The connection device may be authenticated prior to enabling a stacking feature. Authentication of a connection device may be used to ensure the quality and performance of the connection device and the data modules. | 2011-01-27 |
20110023112 | Authentication Method, Authentication Device and Computer-Readable Medium Storing Instructions for Authentication Processing Capable of Ensuring Security and Usability - An authentication method in a system having a display and a storage device is provided. The authentication method includes the steps of registering an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in the storage device; and presenting the plurality of objects to the display, accepting selection of an object by a user to be authenticated, and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user. The step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in the storage device. | 2011-01-27 |
20110023113 | System and method for inhibiting access to a computer - A computer security system which prevents an unauthorized user from accessing the computer system when an authorized user has already logged onto the computer system and has temporarily left the workstation. The computer security system generally includes a sensor which is configured to detect the presence of a person in the region around a workstation and a processing unit which logs out of the computer when a person is no longer present in the region. An optional calibration tool may be provided to set the sensitivity of the sensor and prevent accidental logging out when the authorized user is still present in the region around the workstation. | 2011-01-27 |
20110023114 | Method and System For Traffic Management Via Virtual Machine Migration - Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine sate information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack. | 2011-01-27 |
20110023115 | HOST INTRUSION PREVENTION SYSTEM USING SOFTWARE AND USER BEHAVIOR ANALYSIS - In embodiments of the present invention improved capabilities are described for threat detection using a behavioral-based host-intrusion prevention method and system for monitoring a user interaction with a computer, software application, operating system, graphic user interface, or some other component or client of a computer network, and performing an action to protect the computer network based at least in part on the user interaction and a computer code process executing during or in association with a computer usage session. | 2011-01-27 |
20110023116 | METHOD AND APPARATUS FOR SPAM SHORT MESSAGE DETECTION - A method and apparatus for spam short message detection. The method includes obtaining sending characteristics of at least two suspected short message sources, judging whether the two suspected short message sources have similar sending characteristics, and determining the two suspected short message sources as spammer if they have similar sending characteristics. A spammer that makes multiple short message sources send short messages alternately can be detected through similar sending characteristics of the short message sources. | 2011-01-27 |
20110023117 | Method and System for Restricting Access to User Resources - A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in communication with a walled garden proxy server (WGPS), which controls access to a walled garden. The walled garden contains links to one or more servers providing network-based services. The client sends a request to the WGPS to access a service provided by a site in the garden. To provide the service, the site sends the client a message containing code calling a function in the API. The WGPS traps the message from the site and looks up the site in a table to determine the access control list (ACL) for the site. The ACL is a bit-map that specifies which functions of the client's API can be invoked by code from the site. The WGPS includes the ACL in the header of the hypertext transport protocol (HTTP) message to the client. The shell receives the message and extracts the ACL. The shell uses the ACL to determine whether the code has permission to execute any called functions in the API. If the code lacks permission, the shell stops execution and sends a message to the site indicating that the site lacks permission. Otherwise, the shell allows the code to call the function. | 2011-01-27 |
20110023118 | BEHAVIORAL-BASED HOST INTRUSION PREVENTION SYSTEM - In embodiments of the present invention improved capabilities are described for behavioral-based threat detection. An executing computer process is monitored for an indication of malicious behavior, wherein the indication of the malicious behavior is a result of comparing an operation with a predetermined behavior, referred to as a gene. A plurality of malicious behavior indications observed for the executing process are compared to a predetermined collection of malicious behaviors, referred to as a phenotype, which comprises a grouping of specific genes that are typically present in a type of malicious code. Upon matching the malicious behavior indications with a phenotype, an action may be caused, where the action is based on a prediction that the executing computer process is the type of malicious code as indicated by the phenotype. Related user interfaces, applications, and computer program products are disclosed. | 2011-01-27 |
20110023119 | TOPOLOGY-AWARE ATTACK MITIGATION - Techniques are disclosed for preventing malicious attacks or other exploits on a computer server. A network manager may be configured to determine a topology of a plurality of network devices and deploy an intrusion prevention system in one or more of the network devices to mitigate attacks against the vulnerable servers. The one or more network devices may be identified based on the topology and one or more constraints for optimizing the deployment of the intrusion prevention systems. | 2011-01-27 |
20110023120 | METHOD AND SYSTEM FOR CLEANING MALICIOUS SOFTWARE AND COMPUTER PROGRAM PRODUCT AND STORAGE MEDIUM - A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed. | 2011-01-27 |
20110023121 | DETECTION OF UNDESIRED COMPUTER FILES IN DAMAGED ARCHIVES - Systems and methods for an anti-virus detection module that can detect known undesired computer files in damaged archives that may be encrypted, compressed and/or password-protected are provided. According to one embodiment, a damaged or incomplete RAR, CAB or ZIP archive is received. Without decrypting or decompressing the contents, an anti-virus detection module identifies the archive as a RAR, CAB or ZIP archive by assuming each of multiple possible archive types in turn and searching all of or certain parts of the archive for content consistent with a current archive type. Based on the identified type, for each contained file, descriptive information is extracted from corresponding local file headers and a threat evaluation is performed by comparing the descriptive information to signatures of known malicious or undesired files. If the treat evaluation concludes a particular contained file is a threat, then appropriate defensive actions are taken in relation to the archive. | 2011-01-27 |
20110023122 | INFORMATION PROVIDING SUPPORT DEVICE AND INFORMATION PROVIDING SUPPORT METHOD - It is an object to provide an information providing support device which is capable of encouraging a person having an intention or an obligation to provide information to provide safe and good quality information. An information providing support device of the present invention includes: an information storage unit for memorizing at least information input by a user of the information providing support device; an information providing request receiving unit for receiving the information providing request without intermediation of a user operation; an internal information retrieval unit for retrieving relevant information from the information storage unit in response to the information providing request received by the information providing request receiving unit, the relevant information being information relevant to the information providing request; and an information providing request presenting unit for presenting a predetermined information manager with the information providing request for which the relevant information has been retrieved by the internal information retrieval unit and the relevant information in association with each other, the information manager being authorized to permit the provision of the information stored in the information storage unit. | 2011-01-27 |
20110023123 | LICENSED FEATURE ENABLEMENT MANAGER - Systems and methods provide for licensed feature enablement management for deploying software to be used in conformance with a software license agreement. The system includes a software application provider server that deploys a software application and a role hierarchy enumerating a list of roles and features of the software application that each role in the list of roles is licensed to use in accordance with a license agreement. The software application provider server further comprises a role examiner server that determines whether the deployed software application is being used in compliance with the software license. The system also includes a customer enterprise application server that receives the deployed application and role hierarchy and enables use of the application to customer employees based on their assigned roles. The customer enterprise application server comprises a role directory server that responds to queries from the role examiner to maintain conformance with the software license. | 2011-01-27 |
20110023124 | DRM Scheme Extension - A method for achieving a secure recording and storing of a recorded activity is based on an extended Digital Rights Management (DRM) system. A recording and storing procedure is initiated, in response to recognising one or more triggers at a device hosted by a user equipment. On the basis of the one or more triggers a Rights Issuer is located, and a Recording and Storing Instruction (RSI) is retrieved from the RI, using an existing DRM standard. Based on the RSI, a trusted storage for storing the recorded activity is located, and one or more recording procedures, involving one or more recording equipments, are activated and managed by the device. Before the recorded content is forwarded to the trusted storage, a protected content is generated from the recorded content, according to content of the RSI. | 2011-01-27 |
20110023125 | METHOD AND SYSTEM FOR INTEGRATING REMOTE DEVICES INTO A DOMESTIC VLAN - A gateway network device may establish secure connections to a plurality of remote network devices using tunneling protocols to distribute to the remote network devices multimedia content received from one or more content providers. The consumption of the multimedia content may originally be restricted to local network associated with the gateway network device. The secure connections may be set up using L2TP protocol, and the L2TP tunneling connections may be secured using IPSec protocol. Use of multimedia content may be restricted based on DRM policies of the content provider. DRM policies may be implemented using DTCP protocol, which may restrict use of the multimedia content based on roundtrip times and/or IP subnetting. Each content provider may use one or more VLAN identifiers during communication of the multimedia content to the gateway network device, and the gateway network device may associate an additional VLAN identifier with each secure connection. | 2011-01-27 |
20110023126 | LICENSE MANAGEMENT SYSTEM AND AUTHENTICATION METHOD FOR THE SAME - In a license management system, a terminal apparatus and a server apparatus are connected via a network, and the server apparatus manages licenses of software in the terminal apparatus. In this license management system, when the server apparatus receives a request to re-authenticate a license that has previously be authenticated from the terminal apparatus, the server performs re-authentication of the license based on different pieces of terminal identification information and a plurality of pieces of device information that have been transmitted from the terminal apparatus, and a plurality of pieces of device information that have been stored due to authentication processing. | 2011-01-27 |
20110023127 | INTERNET SYSTEM FOR FACILITATING HUMAN USER ADVISEMENT AND LICENSING OF COPYRIGHTED WORKS OF AUTHORSHIP - An Internet system for disseminating information regarding works or authorship, including a server and a client device connected to the Internet and wherein when any one web page out of a set of web pages is displayed on the client device and when a work of authorship is displayed as part of the web page, an image is also displayed near the work of authorship, as part of the webpage and when a user clicks on the image, copyright information concerning the work of authorship is presented in a user-perceivable manner. | 2011-01-27 |
20110023128 | INFORMATION PROCESSING DEVICE, LOCK CONTROLLING METHOD, AND LOCK CONTROLLING PROGRAM - In order to solve a problem in which the operation becomes complex when the user wants to view the data to which the lock is set, an information processing device includes lock temporal control means for bringing data which is locked into a lock canceled state based on a result of comparison between authentication request information input following a request for viewing the data and authentication information for canceling the lock, and display information creation means for creating display information to display the data brought into the lock canceled state, wherein the lock temporal control means locks the data brought into the lock canceled state again after the display information is displayed. | 2011-01-27 |
20110023129 | DYNAMIC ENFORCEMENT OF PRIVACY SETTINGS BY A SOCIAL NETWORKING SYSTEM ON INFORMATION SHARED WITH AN EXTERNAL SYSTEM - An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings. | 2011-01-27 |
20110023130 | Smart Battery System and Methods of Use - A battery pack including a housing; at least one battery cell associated with the housing; at least one memory element associated with the housing; at least one electrical connection associated with the housing for supplying power from the battery cell to the electronic device; and at least one communication interface associated with the housing for receiving data from the electronic device for storage in the memory element and/or for sending data from the memory element to the electronic device can be used for powering electronic devices. The battery pack may be used to increase the efficiency of employment of the electronic devices by storing the data generated by the electronic devices allowing the devices to be immediately redeployed by replacing the battery packs, the data being available for downloading from the battery pack. The battery packs may also be useful in advertising and software distribution systems. | 2011-01-27 |
20110023131 | Method and Apparatus for Checking Aggregated Web Services - Method and apparatus for checking an aggregated web service requested by a terminal user ( | 2011-01-27 |
20110023132 | SYSTEM AND METHOD FOR GENERATING TARGET AREA INFORMATION OF A BATTLEFIELD USING INFORMATION ACQUIRED FROM MULTIPLE CLASSIFICATION LEVELS - A system and method for generating target area information. The system comprises a first processor effective to receive first information of a first classification level and a second processor effective to receive second information of a second classification level distinct from the first classification level. A cross domain processor is in communication with the first and second processors. The second processor is effective to receive a request from a requesting entity about a region of interest and interrogate a first sensor regarding the request. The second processor is further effective to receive first information from the first sensor and send the request through the cross domain processor to the first processor. The first processor is effective to interrogate a second sensor regarding the request and receive second information from the second sensor. The first processor is further effective to filter the second information based on the first and second classification levels to produce filtered information and send the filtered information through the cross domain processor to the second processor. The second processor is further effective to integrate the first information and the filtered information to produce integrated information and send the integrated information to the requesting entity. | 2011-01-27 |
20110023133 | GRID LICENSING SERVER AND FAULT TOLERANT GRID SYSTEM AND METHOD OF USE - A system and method for managing licensed and non-licensed resources in a grid network is provided. A license server receives and processes requests for a license and determines whether a license is available and, if necessary, causes a new configuration to be created on a server for satisfying the request. A new grid node may also be created and configured to be added to the grid for creating additional capacity for grid processing. The configuration may be performed at a time prior to an actual need by the grid, perhaps due to a faulted node, and quickly brought on-line with a simple configuration update. The new grid node may also have a virtual IP address reassigned to quickly redirect processing from the faulted node to the newly configured node. Also, an external resource dispatcher may add new resources such as storage or processing capacity to the grid and may coordinate the new resources with the license server. | 2011-01-27 |
20110023134 | NETWORK BASED CASUALTY LOSS PREVENTION SYSTEM - A method and apparatus for retrieving lost or stolen network devices. The network devices may be configured with loss prevention logic that may be enabled during initial setup of the network device. The loss prevention logic may detect predefined events that occur at the network device and generate messages to a server upon detecting the predefined events. The messages may include a location, for example, an IP address of the network device, which may enable authorities to locate and retrieve lost or stolen network devices. Once enabled, the loss prevention may be disabled by a predefined message received from the server. | 2011-01-27 |
20110023135 | USE OF A NEW GENE CODING FOR A NEW MEMBER OF THE MCM2-8 FAMILY IN PHARMACEUTICAL COMPOSITIONS - The use of the human or animal MCM9 gene, or parts of the gene, or transcripts thereof, or antisense nucleic acids able to hybridize with part of the gene or transcripts, or silencing RNA derived from parts of the transcripts and able to repress the MCM9 gene, or proteins or peptidic fragments translated from the transcripts, or antibodies directed against the proteins or peptidic fragments, for the preparation of a pharmaceutical composition for the treatment of a human or animal pathology linked to a dysfunction of the expression of the MCM9 gene, or of human or animal cancers. | 2011-01-27 |
20110023136 | F1B-TMIR Plasmid Vector and Transgenic Mouse - A trifusion reporter plasmid is described that comprises a plasmid operably coupled to a mammalian FGF1B promoter that is operably coupled to a bioluminescence gene fused to a fluorescence gene fused to a nuclear medical imaging gene. The new reporter allows in vivo or ex vivo detection of gene expression in three different ways, in addition to traditional in vitro detection methods. Transgenic animals containing this new trifusion reporter and uses of same are described. | 2011-01-27 |
20110023137 | FUSION PROTEIN COMPRISING A CASPASE DOMAIN AND A NUCLEAR HORMONE RECEPTOR BINDING DOMAIN AND METHODS AND USES THEREOF - The present invention relates to a fusion protein comprising a Caspase domain or a functionally active variant thereof and a ligand binding domain of a nuclear hormone receptor, a nucleic acid coding for the fusion protein, a vector or cell comprising the nucleic acid, a method of producing the fusion protein, a non-human transgenic animal containing the nucleic acid, the use of the fusion protein for ligand-mediated induction of apoptosis of a cell, or for studying the function of a cell, tissue and/or organ or the use of a transgenic organism for studying the function of a cell at various developmental stages or as a disease model, a method for inducing apoptosis of a cell expressing a fusion protein or for identifying a ligand, or a medicament comprising a fusion protein, the nucleic acid, the vector or the cell, particularly for the treatment of cancer or for or after transplantation, particularly as safety mechanism. | 2011-01-27 |
20110023138 | MAMMALIAN ARTIFICIAL CHROMOSOME VECTOR COMPRISING HUMAN CYTOCHROME P450 GENE (CLUSTER) AND NON-HUMAN MAMMALIAN ANIMAL RETAINING THE SAME - This invention relates to a mammalian artificial chromosome vector, which retains a human chromosome 7 fragment comprising human cytochrome P450 genes and is transmittable to progeny, wherein the human chromosome 7 fragment retains a region of approximately 1 Mb±500 Kb in size comprising at least a human CYP3A gene cluster, which region is located between chromosome markers AC004922 and AC073842, and to a non-human mammalian animal retaining the vector. | 2011-01-27 |
20110023139 | GENOMIC EDITING OF GENES INVOLVED IN CARDIOVASCULAR DISEASE - The present invention provides genetically modified animals and cells comprising edited chromosomal involved in cardiovascular disease. In particular, the animals or cells are generated using a zinc finger nuclease-mediated editing process. The invention also provides zinc finger nucleases that target chromosomal sequences involved in cardiovascular disease and the nucleic acids encoding said zinc finger nucleases. Also provided are methods of using the genetically modified animals or cells disclosed herein to screen agents for toxicity and other effects. | 2011-01-27 |
20110023140 | RABBIT GENOME EDITING WITH ZINC FINGER NUCLEASES - The present invention provides a genetically modified rabbit or cell comprising at least one edited chromosomal sequence. In particular, the chromosomal sequence is edited using a zinc finger nuclease-mediated editing process. The disclosure also provides zinc finger nucleases that target specific chromosomal sequences in the rabbit genome. | 2011-01-27 |
20110023141 | GENOMIC EDITING OF GENES INVOLVED WITH PARKINSON'S DISEASE - The present invention provides genetically modified animals and cells comprising edited chromosomal sequences encoding proteins associated with Parkinson's disease. In particular, the animals or cells are generated using a zinc finger nuclease-mediated editing process. Also provided are methods of using the genetically modified animals or cells disclosed herein to study PD development and screen agents for assessing their effect on progression or symptoms of PD. | 2011-01-27 |
20110023142 | Genetically Modified Rat Models for Cytokine-Cytokine Signaling Pathways - The present invention relates to the engineering of animal cells, preferably mammalian, more preferably rat, that are deficient due to the disruption of gene(s) or gene product(s) resulting in cytokine-cytokine mediated autoimmune and inflammatory disease. In another aspect, the invention relates to genetically modified rats, as well as the descendants and ancestors of such animals, which are animal models of human autoimmune and inflammatory disease and methods of their use. Specifically, the invention pertains to a genetically altered rat, or a rat cell in culture, that is defective in at least one of two alleles of a cytokine gene such as the Faslg gene, the Fas gene, etc. In one embodiment, the cytokine gene is the Faslg gene. In another embodiment, the cytokine gene is one of several known cytokine genes, such as Fas, IFNγ, TNF-α, IL-2, IL-10, and IL-12. The inactivation of at least one of these cytokine alleles results in an animal with a higher susceptibility to cytokine-cytokine mediated autoimmune and inflammatory disease induction. In one embodiment, the genetically altered animal is a rat of this type and is able to serve as a useful model for cytokine-cytokine mediated autoimmune and inflammatory disease and as a test animal for autoimmune and other studies. | 2011-01-27 |