24th week of 2011 patent applcation highlights part 74 |
Patent application number | Title | Published |
20110145824 | SYSTEM AND METHOD FOR CONTROLLING CENTRAL PROCESSING UNIT POWER WITH REDUCED FREQUENCY OSCILLATIONS - A method of dynamically controlling power within a central processing unit is disclosed and may include entering an idle state, reviewing a previous busy cycle immediately prior to the idle state, and based on the previous busy cycle determining a CPU frequency for a next busy cycle. | 2011-06-16 |
20110145825 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM CONFIGURED TO STORE COMMAND EXECUTION DETERMINATION PROGRAM, AND COMMAND EXECUTION DETERMINATION METHOD - An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a command determination unit that determines whether an entered command is a target of a command execution determination where it is determined that whether a command is executable based on whether the entered command is invoked by a user command or a system command, and determines whether the entered command is executable with reference to the command execution right information stored in the memory when the entered command is determined as the target of the command execution determination. | 2011-06-16 |
20110145826 | MECHANISM FOR PARTITIONING PROGRAM TREES INTO ENVIRONMENTS - Partitioning continuation based runtime programs. Embodiments may include differentiating activities of a continuation based runtime program between public children activities and implementation children activities. The continuation based runtime program is partitioned into visibility spaces. The visibility spaces have boundaries based on implementation children activities. The continuation based runtime program is partially processes at a visibility space granularity. | 2011-06-16 |
20110145827 | MAINTAINING A COUNT FOR LOCK-FREE LINKED LIST STRUCTURES - The present invention extends to methods, systems, and computer program products for maintaining a count for lock-free stack access. A numeric value representative of the total count of nodes in a linked list is maintained at the head node for the linked list. Commands for pushing and popping nodes appropriately update the total count at a new head node when nodes are added to and removed from the linked list. Thus, determining the count of nodes in a linked list is an order 1 (or O(1)) operation, and remains constant even when the size of a linked list changes | 2011-06-16 |
20110145828 | STREAM DATA PROCESSING APPARATUS AND METHOD - A stream data processing apparatus creates a plurality of partition data on the basis of stream data, and distributes the partition data to a plurality of computers. Specifically, the stream data processing apparatus acquires from the stream data a data element group that is configured in the number of data elements based on the processing capability of the partition data destination computer, and decides an auxiliary data part of this data element group based on a predetermined value. The stream data processing apparatus creates partition data that include the acquired data element group and END data. The data element group is configured from the auxiliary data part and a result usage data part. | 2011-06-16 |
20110145829 | PERFORMANCE COUNTER INHERITANCE - A system for providing performance counter inheritance includes an operating system that receives a request of a first application to monitor performance of a second application, the request identifying an event to monitor during the execution of a task associated with the second application. The operating system causes a task counter corresponding to the event to be activated, and automatically activates a child task counter for each child task upon receiving a notification that execution of a corresponding child task is starting. Further, the operating system adds a value of each child task counter to a value of the task counter to determine a total counter value for the task, and provides the total counter value of the task to the first application. | 2011-06-16 |
20110145830 | JOB ASSIGNMENT APPARATUS, JOB ASSIGNMENT PROGRAM, AND JOB ASSIGNMENT METHOD - A job assignment apparatus includes: a correlation calculation unit to calculate a correlation between an execution time used for processing a program that depends on a computer resource operating at the start of an execution request job and an execution time used for processing a predetermined amount of data in the execution request job which operates immediately after completion of an operation of the program; a resource identification unit to identify the computer resource on which the execution request job depends on the basis of the correlation calculated by the correlation calculation unit; and a job assignment unit to assign the execution request job to one of execution servers connected to the job assignment apparatus so as to exclude simultaneous execution of a job that depends on the same computer resource as the computer resource identified by the resource identification unit and the execution request job. | 2011-06-16 |
20110145831 | MULTI-PROCESSOR SYSTEM, MANAGEMENT APPARATUS FOR MULTI-PROCESSOR SYSTEM AND COMPUTER-READABLE RECORDING MEDIUM IN OR ON WHICH MULTI-PROCESSOR SYSTEM MANAGEMENT PROGRAM IS RECORDED - The invention achieves optimization of partition division by implementing resource distribution with a characteristic of a system into consideration so that the processing performance of the entire system is enhanced. To this end, a system management section in the invention calculates an optimum distribution of a plurality of resources to partitions based on distance information regarding the distance between a plurality of resources and data movement frequencies between the plural resources. The plural resources are distributed to the plural partitions through a plurality of partition management sections so that the optimum distribution state may be established. | 2011-06-16 |
20110145832 | TECHNIQUES FOR ALLOCATING COMPUTING RESOURCES TO APPLICATIONS IN AN EMBEDDED SYSTEM - Techniques for allocating computing resources to tasks include receiving first data and second data. The first data indicates a limit for unblocked execution by a processor of a set of at least one task that includes instructions for the processor. The second data indicates a maximum use of the processor by the set. It is determined whether a particular set of at least one task has exceeded the limit for unblocked execution based on the first data. If it is determined that the particular set has exceeded the limit, then execution of the particular set by the processor is blocked for a yield time interval based on the second data. These techniques can guarantee that no time-critical tasks of an embedded system on a specific-purpose device are starved for processor time by tasks of foreign applications also executed by the processor. | 2011-06-16 |
20110145833 | Multiple Mode Mobile Device - In one or more embodiments, one or more methods and/or systems described can perform displaying, on a handheld device, multiple icons associated with multiple segments; receiving first user input indicating a first segment of the multiple segments; executing a first virtual machine associated with the first segment on the handheld device; executing a first application on the first virtual machine; receiving second user input indicating a second segment of the multiple segments; executing a second virtual machine associated with the second segment on the handheld device; and executing a second application on the second virtual machine. In one or more embodiments, one or more methods and/or systems described can further perform before executing the second virtual machine, receiving authentication information and determining that the user is authenticated. In one or more embodiments, the authentication information can include at least one of a user name, a password, and/or biometric information. | 2011-06-16 |
20110145834 | CODE EXECUTION UTILIZING SINGLE OR MULTIPLE THREADS - A program is executed utilizing a main hardware thread. During execution, an instruction specifies to execute a portion utilizing a worker hardware thread. If a processor state indicator is set to multi-threaded, the specified portion is executed utilizing the worker hardware thread. However, if the processor state indicator is set to single-threaded, the specified portion is executed utilizing the main hardware thread as a subroutine. The main hardware thread may pass parameter data to the worker hardware thread by copying the parameter data register or memory location for the main hardware thread to an equivalent parameter data register or memory location for the worker hardware thread. Similarly, the worker hardware thread may pass return values to the main hardware thread by copying a return value register or memory location for the worker hardware thread to an equivalent return value register or memory location for the main hardware thread. | 2011-06-16 |
20110145835 | Lockless Queues - A method for passing data from a first processing thread to a second processing thread, wherein the first processing thread produces data to be processed by the second processing thread. The data from the first processing thread may be inserted into objects that in turn are inserted into a queue ob objects to be processed by the second thread. The queue may be a circular array, wherein the array includes a pointer to a head and a pointer to a tail, wherein only the first processing thread modifies the tail pointer and only the second processing thread modifies the head pointer. | 2011-06-16 |
20110145836 | Cloud Computing Monitoring and Management System - A cloud computing monitoring system has an alert capturing system and a message transfer system that provides performance tracking and alert management to a local monitoring system. The alert capturing system may operate as part of a managed code framework and may capture and route alerts that may be transmitted to an operating system, as well as application exceptions and debugging information. A message queuing system may transmit the alerts to a local monitoring system, which may have a connector that subscribes to the cloud system's message queuing system. | 2011-06-16 |
20110145837 | Filtering Broadcast Recipients In A Multiprocessing Environment - Systems and methods of filtering broadcast recipients in a multiprocessing environment are disclosed. An exemplary method may include receiving a message generated in the multiprocessing environment at a management agent. The method may also include determining which components in the multiprocessing environment already received the message. The method may also include forwarding the message to only those components in the multiprocessing environment which did not already receive the message. | 2011-06-16 |
20110145838 | PROFILING THE SYSTEM PROVIDING PERFORMANCE STATISTICS IN REAL TIME - A system for providing performance statistics of applications in real time includes a first application that obtains current performance data of at least one second application in real time, utilizes the current performance data to determine a list of functions and the number of events occurred during the execution of each function, presents the resulting data to a user, and periodically refreshes the presented data using up-to-date performance data of the second application. | 2011-06-16 |
20110145839 | ABSTRACT DATABASE QUERY - A tangible computer-readable medium encoded with an executable set of instructions for accessing a database with a terminal is provided. A detecting code segment detects connection properties of the database. A determining code segment automatically determines, based on the connection properties of the database and from a plurality of database connectivity drivers stored in a memory, one of the plurality of database connectivity drivers that enables communication with the database. A loading code segment loads the one of the plurality of database connectivity drivers on the terminal to enable the terminal to communicate with the database. | 2011-06-16 |
20110145840 | METHOD AND DEVICE FOR PERMITTING SECURE USE OF PROGRAM MODULES - Method and an electronic device for permitting use of program modules for an application program. The method comprises acquiring data content including at least one program module and identifying means associated with the program module. The electronic device includes identifying data for identifying a plurality of program interface modules. The method further comprises determining whether the identifying means is at least partly associated with the identifying data. | 2011-06-16 |
20110145841 | SYSTEM AND METHOD FOR GENERATING PAGES OF CONTENT - Systems and methods for generating pages of content using API requests are described. Users can create web pages that are a collection of references to API queries. An example includes doors which are web pages that are portals to realms of content. Users can create doors by associating API references to a variety of previously created content assets which are called by the front-end to render the door when web users visit the door. The tool includes user interface elements that make creating and saving the API references easy. For example, pickers are provided for selecting API references to individual assets, query makers are provided for formulating previewing, merging and normalizing references to dynamic API searches, overriding functionality is provided for manually grooming the asset references returned by dynamic API searches or individual asset references, and the like. | 2011-06-16 |
20110145842 | Systems, Methods and Computer Readable Media for Routing Requests from an Application - Methods, systems, and computer-readable media for distributing requests from an application are provided. According to one aspect, a computer-implemented method for routing requests from an application includes receiving an application programming interface (API) request from an application running on a device. An optimal route for forwarding the API request is determined based on information associated with the API request, and upon determining the optimal route, the API request is forwarded based on the optimal route. | 2011-06-16 |
20110145843 | IMAGE FORMING APPARATUS, FUNCTION ADDING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - An image forming apparatus includes an application platform including at least one interface having an implementation that is blank, and an applying part configured to apply at least one additional program, capable of being dynamically added to another program, to the interface. | 2011-06-16 |
20110145844 | SYSTEMS AND METHODS FOR FACILITATING CALL REQUEST AGGREGATION OVER A NETWORK - In accordance with one or more embodiments of the present disclosure, a method for facilitating electronic commerce over a network includes identifying input dependencies for a call request based on information passed with the call request, identifying state dependencies for the call request based on information passed with the call request, parallelizing calls from the call request based on at least one of the identified input dependencies and the identified state dependencies, developing a service execution map by grouping calls in an execution order including parallelized calls, and processing the service execution map by executing grouped calls in the execution order including parallelized calls. | 2011-06-16 |
20110145845 | DISK DEVICE - A disk device, wherein a disk clamp unit is further thinned. The disk device is provided with a spindle motor ( | 2011-06-16 |
20110145846 | SYSTEM AND METHOD FOR PROVIDING PERSONAL BROADCASTING HOME SHOPPING SERVICE USING MOBILE IPTV SERVICE - A personal broadcasting home shopping providing system is linked with a seller terminal capable of photographing a moving picture and one or more viewer terminals capable of receiving a broadcasting signal, which each is provided with a communication function. At this time, the service control server establishes a personal broadcasting home shopping channel in accordance with a request from the seller terminal and sets a reception target of the personal broadcasting home shopping channel. A relay server receives a real-time moving picture of a sold product photographed by the seller terminal from the seller terminal through a mobile communication network and transmits the received real-time moving picture to one or more viewer terminals included in reception target information set by the service control server. | 2011-06-16 |
20110145847 | METHOD OF AND SYSTEM FOR PRESENTING ENRICHED VIDEO VIEWING ANALYTICS - A method of and system for presenting enriched video viewing analytics is presented. A method of presenting enriched statistical and analytical information includes receiving a catalog of a plurality of content items. Each content item has associated metacontent characterizing the content item. The method also includes receiving and storing operations of a user for interacting with one or more of the content items. The method further includes determining use and/or viewing statistics for, for example, the content items, metacontent associated with the content items, the numbers and types of devices viewing the content items, subscriber information, household information, and/or viewer demographic information for past and present time periods. The method also, optionally, includes estimating the likelihood of future user interaction operations. | 2011-06-16 |
20110145848 | DISTRIBUTED CONTRIBUTION OF DISPARATE INTERACTIVE ELEMENTS - Mechanisms are provided for collecting user response information corresponding to a request transmitted as a part of unidirectional media broadcast. Mobile devices used to display media broadcast containing the request, such a survey, are also configured to send information using other communication networks, such as cellular networks. Mobile devices collect users' responses to the request and send information corresponding to these responses to a response processing server. The response processing server in turn processes the information, generate a report, and transmit this report to the broadcasting service. These reports may be used for a variety of purposes. In one example, reports are used to update broadcasted content such that mobile device user can view results of their responses as a part of the updated broadcast. | 2011-06-16 |
20110145849 | VIEWER-PERSONALIZED BROADCAST AND DATA CHANNEL CONTENT DELIVERY SYSTEM AND METHOD - Data is transmitted by or collected from individual receivers of broadcast content on a particularized basis. The broadcast content is transmitted without regard to selection of a particular content stream by any one or more receivers. The receiver data is analyzed, and may be analyzed in conjunction with other information such as details on broadcast content streams made during certain times, and selections of broadcast streams by particular receivers. System configuration changes and targeted content may then be transmitted by a bidirectional data exchange medium to the individualized receivers based upon the analysis. | 2011-06-16 |
20110145850 | DUAL CHANNEL AUDIENCE CUSTOMIZED BROADCAST DELIVERY SYSTEM AND METHOD - The broadcast of content over a unidirectional broadcast channel is adjusted by analysis of data received from receivers of the content via a bidirectional data exchange channel. The broadcast may be altered in signal, signal strength, signal direction, encoding, and so forth. The receivers may communicate the data over any suitable network, such as the Internet. The data may include past, current and planned selections of content, as well as geographic and demographic information, when available. | 2011-06-16 |
20110145851 | CHANNEL CONTROL APPARATUS AND METHOD OF PRE-JOINING CHANNELS USING THE SAME - A channel control apparatus for an Internet protocol television (IPTV) broadcasting service, which selects and pre-joins channels based on data regarding a channel zapping pattern of a user, thereby effectively reducing channel zapping time, and a method of pre-joining channels using the channel control apparatus are provided. The channel control apparatus comprises: a pattern information collection unit configured to collect data regarding a channel zapping pattern of a user for a cycle of a previously set period; a bandwidth management unit configured to set a pre-joining bandwidth, which is an allowable bandwidth for channels to be pre-joined, based on the collected data; a channel selection unit configured to select channels to be pre-joined according to channel preference of a user; and a channel pre-join unit configured to pre-join the channels selected by the channel selection unit within the set pre-joining bandwidth. | 2011-06-16 |
20110145852 | APPARATUS FOR CONTROLLING INTERNET PROTOCOL TELEVISION SERVICES AND METHOD FOR PROVIDING INTERNET PROTOCOL TELEVISION SERVICES USING THE SAME - An apparatus and method for controlling Internet Protocol television (IPTV) service is provided. The IPTV service controlling apparatus includes a service control unit and a display information providing unit. The service control unit is configured to conduct a user authentication based on user information of an Internet Protocol television (IPTV) terminal, create Electric Program Guide (EPG) information according to a request for EGP information made by an authorized user, transport the created EPG information to the display information providing unit and provide the IPTV terminal with an IPTV service that is requested using the EPG information by the user. The display information providing unit processes the EPG information to correspond to an environment of the IPTV terminal based on information about the IPTV terminal and provides the IPTV terminal with the processed EPG information. | 2011-06-16 |
20110145853 | System and Method for Selectively Receiving Required Satellite Television Channels - A system includes a video-on-demand server and an authentication server. The video-on-demand server is configured to provide video-on-demand content through a broadband connection to a set-top box device. The authentication server is in communication with the video-on-demand server. The authentication server is configured to receive a request to allow access to a video-on-demand package that includes the video-on-demand content, to determine if a user is currently authorized to constantly receive a broadcast package that includes a plurality of broadcast channels related to the video-on-demand content, and to authorize a broadcast channel in the broadcast package when not currently authorized to receive the broadcast package. | 2011-06-16 |
20110145854 | SYSTEMS AND METHODS FOR DIGITAL PROGRAM INSERTION WITHIN SCRAMBLED CONTENT - Systems and methods for digital program insertion. Entitlement control messages (ECMs) may be sent over an out-of-band communication channel to a client device such that the ECMs are received proximate in time to splice points where, e.g., advertising is inserted into a scrambled program or when the scrambled program is to resume at the end of the ad or program insertion. The ECMs may be communicated over the out-of-band channel having a timing such that the client device can process the ECMs, extract a control word and begin descrambling of the scrambled program to provide near seamless splices. In some implementations, out-of-band bandwidth is conserved as the ECMs are sent a splice time, rather than continuously. | 2011-06-16 |
20110145855 | CONTENT PROCESSING APPARATUS, REPRODUCING APPARATUS, CONTENT PROCESSING SYSTEM AND RECORDING MEDIUM - Provided herein is a disc player having a read-out unit, a network connector, and a controller. The read-out unit reads out from an optical disc recorded with a main content and CM insertion information as information on an insertion of a Advertisement in the main content thereon. The network connector acquires the advertisement from an external apparatus based on CM insertion information. The controller controls to insert the acquired Advertisement in the main content. | 2011-06-16 |
20110145856 | CONTROLLING AD DELIVERY FOR VIDEO ON-DEMAND - Various embodiments related to delivery of advertising content for video on-demand are disclosed. One example embodiment comprises receiving a set of VOD metadata including a first configuration of ad avails to be included in a VOD content item. The first configuration specifies a first set of locations of ad avails and a size of each ad avail in the first configuration. The method further includes comparing the VOD metadata to a set of one or more policy rules specifying a second configuration of ad avails to be included in the VOD content item, the second configuration of ad avails specifying a second set of locations of ad avails and a size of each ad avail in the second configuration. The method further includes determining a number of advertisements to be included in the VOD content item based upon a result of the comparing and obtaining an ad decision. | 2011-06-16 |
20110145857 | SCALABLE ADVERTISING SYSTEM FOR DYNAMICALLY INSERTING ADVERTISEMENTS - An advertising client device for inserting an advertisement into a live video programming stream is provided. One embodiment of the advertising client device comprises a match engine executed on a processor of the advertising client device. The match engine is configured to receive a programming stream from a media server upon tuning to the programming stream, to send an advertising decision request, after a predetermined delay time after tuning to the programming stream, to an advertising decision server for one or more advertising decisions for a predetermined programming time block, to receive an advertising decision response from the advertising decision server, to insert an advertisement into the programming stream based on a match between an in-band marker included in the programming stream and the advertising decision response, and to send the programming stream including the advertisement to a display for viewing. | 2011-06-16 |
20110145858 | System And Method For Delivering Content To Mobile Devices - A system for generating an optimized video including in-stream events for video content and advertising content selected at the time of playback. The system includes a manifest generating module configured to retrieve video content from a content repository for listing in a content manifest in response to a received request from a mobile device, the content manifest including at least one advertisement insertion point. The system further includes an advertising event correlation module configured to retrieve one or more advertisements based on a correlation between advertisement properties and playback properties and an advertisement serving module configured to provide the retrieved one or more advertisement for insertion into the at least one advertisement event insertion point. | 2011-06-16 |
20110145859 | SYSTEM AND METHOD FOR DETACHABLE MEDIA DEVICES AND CONTENT - Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for detachable media playback. The system can detach individual channels of a media presentation from a first device and transfer them to nearby devices. The method causes a computing device to play media content having multiple channels to a user on a first device, identify a set of media playback devices nearby to the first device, identify playback capabilities and a status for each of the set of nearby devices, match a channel of the media content with at least one of the set of media playback devices and the identified playback capabilities and the status of the set of media playback devices, and transfer the matched channel to the at least one of the set of media playback devices. A central server can transfer the matched channel to other media playback devices. | 2011-06-16 |
20110145860 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM - There is provided an information processing apparatus which includes an acquisition unit acquiring an instruction for selecting content information and related information, a search unit searching for plural pieces of the content information or related information which are related to at least a part of the selected content information or the selected related information, an image data generation unit generating first image data in which the content information is arranged using axes of two attributes of the content information, and second image data in which the content information or the related information is arranged using axes of one or two attributes of the content information or the related information in different directions from the two axes of the first image data, and a display control unit controlling a display screen to transparently overlay and display the first image data and the second image data. | 2011-06-16 |
20110145861 | APPARATUS AND METHOD OF CONTROLLING BROADCAST SERVICES - Provided is the broadcast service controlling apparatus and method. The broadcast service controlling method may perform grouping, into a broadcast group, broadcast services having the same transmission feature, may control scheduling information associated with the broadcast services included in the broadcast group and thus, may dynamically perform scheduling with respect to broadcast services. | 2011-06-16 |
20110145862 | APPARATUS AND METHOD FOR PROVIDING PREVIEW CHANNEL GUIDE INFORMATION IN DIGITAL BROADCAST NETWORK - An apparatus for providing preview channel guide information in a digital broadcast network includes: an encoding server for encoding respective broadcast program channel sources stored in multiple broadcast program databases; a broadcast control server for providing the respective encoded broadcast programs received from the encoding server by request from a mobile communication terminal; an electronic program guide (EPG) providing server for obtaining EPG information from a broadcast station; and a preview generation server for extracting preview layers from the respective encoded broadcast programs and combining the extracted preview layers with the EPG information provided from the EPG providing server to generate a preview channel, wherein the preview channel includes the combinations of the preview layers and the EPG information as sub-preview channels. | 2011-06-16 |
20110145863 | PUSHING A GRAPHICAL USER INTERFACE TO A REMOTE DEVICE WITH DISPLAY RULES PROVIDED BY THE REMOTE DEVICE - A graphical user interface (“GUI”) can be presented on a remote control accessory device that has user input and display devices. The GUI can be defined and managed by a portable media device that is controlled using the GUI. The portable media device can provide the accessory with a GUI image to be displayed. The accessory can send information to the portable media device indicative of a user operation of an input device in response to the displayed image. The portable media device can process this input to identify the action requested by the user and take the appropriate action, which can include updating the GUI image provided to the accessory. | 2011-06-16 |
20110145864 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2011-06-16 |
20110145865 | PERSONAL CHANNEL PREFERENCES FOR MULTIMEDIA PROGRAMS - A method and system for enabling Internet-protocol television (IPTV) users to maintain personal channel lists is configured to receive user input via an access network. The access network may comprise portions of an IPTV network, a public network, an Internet network, and/or a wireless network. A request from an IPTV user may be received for accessing/creating a personal channel list specific to the IPTV user. Input from the IPTV user may further be received to add IPTV channel identifiers to the personal channel list. IPTV user input may then be received to perform operations for maintaining the personal channel list. The IPTV user may optionally specify a security element for restricting access to the personal channel list. | 2011-06-16 |
20110145866 | METHOD AND APPARATUS FOR SELECTING VIDEO CHANNEL, VIDEO DEVICE AND TV DEVICE - A method and apparatus for selecting video channel, a video device and a TV device are provided according to the embodiments of the present invention, wherein the state signal is obtained in said method for selecting video channel, wherein, the state signal is used for representing a video interface type of a accessed video deivce; and the video channel is selected according to the video interface type. The video channel selection and the upgrade of product of video devices such as DVD are realized through the solutions above. | 2011-06-16 |
20110145867 | METHOD FOR PROVIDING WIDGET ACCORDING TO BROADCAST SERVICE INFORMATION AND BROADCAST RECEIVING APPARATUS USING THE SAME - A method for providing widgets according to broadcast service information and a broadcast receiving apparatus using the same, are provided. The widget-providing method receives and outputs a broadcast, which is selected by a user, and displays one of a plurality of widget groups based on the acquired information of the selected broadcast. Accordingly, users can have and use widget groups related to information on the user-selected broadcast. | 2011-06-16 |
20110145868 | Sharing Media in a Communication Network - A method and apparatus for providing shared media data in a communication network. A Video Content Call Server (VCC-S) receives a request message from a calling party requesting a video content call with a called party. The message includes information identifying the called party, and information identifying the video content. The VCC-S establishes a video content call between the calling party and the VCC-S, and a video content call between the called party and the VCC-S. The same video content is sent at substantially the same time from the VCC-S to both the calling party and the called party. | 2011-06-16 |
20110145869 | Channel Change Via An Alternate Multimedia Content Delivery System - Methods and systems are disclosed to perform a channel change via an alternate multimedia content delivery system. A particular method includes detecting a request to perform a channel change at a customer premise equipment (CPE) device. The method also includes sending the request to a server of a primary multimedia content delivery system that supports delivery of content to the CPE device. The method further includes receiving a bandwidth limitation message from the server. The method includes generating a notification for display at a display device coupled to the CPE device. The notification prompts a user with respect to delivery of content over one or more alternate multimedia content delivery systems in response to the requested channel change. | 2011-06-16 |
20110145870 | Limited Chain Relay With Virtual Peer for Multimedia Distribution - A method includes at a first customer premises equipment (CPE) device coupled to a multimedia distribution network, generating a first request for multimedia content. The method also includes sending the first request to a network node of the multimedia distribution network. The method further includes receiving the multimedia content from a virtual peer located at the network node and storing the multimedia content at the first CPE device. The method also includes receiving a message via the multimedia distribution network, the message indicating a transmission of a second request for the multimedia content by a second customer premises equipment (CPE) device. The method further includes transmitting at least a portion of the stored multimedia content to the second CPE device. | 2011-06-16 |
20110145871 | SYSTEM AND METHOD OF PROVIDING EFFICIENT VIDEO-ON-DEMAND SERVICE USING UNICAST/MULTICAST IN INTERNET PROTOCOL NETWORK - A system and method for providing an efficient video-on-demand (VoD) service using unicast/multicast in an Internet Protocol (IP) network are provided. A VoD service system includes a multicast efficiency factor (MEF) checking unit to check an MEF in content in response to a request for the content from a client, and a content transmission unit to multicast or unicast the content over a network depending on the checked MEF. Here, the MEF includes an indicator of efficiency for multicast transmission relative to unicast transmission of the content. | 2011-06-16 |
20110145872 | SET-TOP BOX FOR WIDEBAND IP TELEPHONY SERVICE AND METHOD FOR PROVIDING WIDEBAND IP TELEPHONY SERVICE USING SET-TOP BOX - An Internet Set-Top Box (ISTB) and a method of providing wideband IP telephony services using the ISTB are provided, which are capable of implementing wideband voice communication services using a wideband voice codec, controlling a Real-Time Transport Protocol (RTP) packet payload to process a variety of wideband speech frame payloads, and providing high-quality wideband IP telephony services by controlling a jitter buffer to maintain conference call synchronization. | 2011-06-16 |
20110145873 | Method and System for Analyzing Cable Television Signal Leak Information - A method involves identifying a leak location in a cable television system using a detection system, calculating a distance between the leak location and a plurality of shapes or points contained in map data to identify the nearest shape or point, and providing a piece of information corresponding to the nearest shape or point. The piece of information may be a street address or a device. | 2011-06-16 |
20110145874 | APPARATUS AND METHOD FOR MANAGING VOICE COMMUNICATIONS - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to receive a call request from a set top box that is remote from the server where the call request identifies a telephone number that is presented from video content presented by the set top box where the telephone number is detected based on a combination of image pattern recognition and speech recognition and where the telephone number is associated with a marketing entity, establish a voice communication with a first telephone device associated with the set top box, and establish the voice communication with a second telephone device associated with the telephone number and the marketing entity if the first telephone device accepts the voice communication. Other embodiments are disclosed. | 2011-06-16 |
20110145875 | MOBILE SET-TOP BOX AND METHOD FOR PROVIDING INTERNET PROTOCOL TELEVISION SERVICE USING THE SAME - Provided is a mobile set-top box. In the mobile set-top box, a demultiplexer processor separates first metadata from a transport stream corresponding to a broadcasting stream of which a destination is the mobile set-top box, and separates second metadata being transmitted via another channel, among a plurality of transport streams. A metadata processor unifies the first metadata and the second metadata and the image data transcoder processor transcodes image data included in the transport stream of the broadcasting stream into image data decodable by a user terminal. The metadata unified by the metadata processor and the transcoded image data are multiplexed by the multiplexer and then are transmitted to the user terminal. The mobile set-top box provides an Internet protocol television (IPTV) service to portable terminals of passengers boarding in a moving transportation means such as a bus, a train, and a ship. | 2011-06-16 |
20110145876 | APPARATUS FOR PURCHASE AND DELIVERY OF ENTITLEMENT, METHOD THEREOF, AND SETTOP BOX IN IPTV BROADCAST SYSTEM - Disclosed is an apparatus for purchase and delivery of entitlement in an IPTV broadcast system according to an embodiment of the present invention that includes: an entitlement purchase environment provider providing a charged broadcast contents list to the purchaser so that the purchaser can select delivery target contents and providing an IPTV broadcasting service subscriber list to the purchaser so that the purchaser can select one or more entitlement delivery target subscribers to which the entitlement for the delivery target contents is delivered; an entitlement generator receiving information on the delivery target contents from the entitlement purchase environment provider, and then generating the entitlement for corresponding broadcast contents; and an entitlement transmitter delivering the entitlement for the delivery target contents to IPTV settop boxes of the entitlement delivery target subscribers on the basis of information on the entitlement delivery target subscribers. | 2011-06-16 |
20110145877 | DATA RATE THROTTLING IN AN INTERNAL PACKET-BASED INTERFACE - Methods and systems for transmitting video pixel data from a transmitter component, such as a controller, to a receiver within a monitor are described. Video data is received at a transmitter at an incoming pixel rate based on a pixel clock. The data is transmitted to the receiver at a link symbol clock rate and is drained from the receiver at the pixel clock rate, which is regenerated by the receiver using the link symbol clock frequency, an M video value, and an N video value. The M video value (Mvid) is determined by the transmitter based on the incoming pixel rate and the N video value (Nvid) may be constant. An accumulator is used within the transmitter to ensure that the transmitter and receiver create a balanced system. | 2011-06-16 |
20110145878 | VIDEO DECOMPOSITION AND RECOMPOSITION - Techniques are described for a server to decompose a source video data stream to generate a plurality of video data streams. The video data streams may be combinable with one another. In particular, the frames of each plurality of video data streams may be combinable with the frames of the other plurality of video data streams. The plurality of video data streams may be available for download by a client device. The client device may combine and recompose two or more of the plurality of video data streams for presentment. In particular, the client device may combine frames from two or more of the plurality of video data streams to generate combined frames for presentment. | 2011-06-16 |
20110145879 | DECOMPOSED MULTI-STREAM (DMS) TECHNIQUES FOR VIDEO DISPLAY SYSTEMS - This disclosure describes techniques that can improve the generation of a decomposed multi-stream (DMS) by a host device of a video display system and the display of a DMS by a client device of the video display system. The techniques may apply different frame rates to different streams within a DMS, and the frame rates may depend on the content. For example, one stream within a DMS may comprise a sequence of full-motion video information, which may be rendered at a relatively high frame rate. However, another stream within the DMS may be associated with a background of the display, various graphic user interface control windows or elements, or a display window that includes non-video content (such as e-mail or a document). The second stream in the DMS may be rendered at a much slower frame rate than that used for the sequence of full-motion video information. | 2011-06-16 |
20110145880 | USER EDITABLE METADATA FOR INTERACTIVE TELEVISION PROGRAMS - Television programming may be annotated with metadata and the metadata may be shared among subscribers. A set-top box may receive, from a server, metadata relating to a television program, the metadata having been created by users of other set-top boxes and at least some elements of the metadata including information describing portions of the television program to which the metadata is relevant. The set-top box may present the metadata during portions of the television program at which the metadata is relevant. | 2011-06-16 |
20110145881 | INTERACTIVE VIDEO SYSTEM - An interactive video system is provided that is capable of combining streaming televised events with video conferencing technology to create a social television experience. A first user is able to connect via a webcam and microphone to a server that combines the webcam video and sound from the microphone with a streaming video that could be a televised event. The combined webcam video, microphone sound, and streaming video is then broadcast to the first user and other users such that the users are capable of viewing the streaming video with the live conferencing video and sound from the first user. This procedure may be repeated such that a plurality of users may video conference live on top of the streaming video. | 2011-06-16 |
20110145882 | MULTI-CHANNEL DIGITAL TV TRANSMISSION SYSTEM AND METHOD - A multi-channel digital TV transmission system and method are provided. In the multi-channel digital TV transmission system and method, a single auxiliary transmitter may be configured to be switched with respect to a plurality of main transmitters and thus, it is possible to provide a broadcasting service without interruption even when an fault occurs in a main transmitter among the plurality of main transmitters, to reduce costs of a multi-channel digital TV transmission system, and to ensure a wide facility space. | 2011-06-16 |
20110145883 | TELEVISION RECEIVER AND METHOD - A television receiver, comprises an optical character recognizer to identify text in a received video image and a hypertext link generator to generate a hypertext link responsive to respective identified text, wherein the television receiver is operable to form a connection to a network in accordance with the hypertext link, in which the hypertext link has a default target that comprises as an argument at least part of the content of the respective identified text, and the default target is selected according to the context of the received video image. | 2011-06-16 |
20110145884 | Policy Needs Assessment - Methods, computer readable media, and apparatuses for policy development and management are presented. One or more policy needs may be identified, and a score for each policy need may be determined The score for each policy need may be determined based on audit issue closure date information, legal compliance information, and regulatory impact information. Based on the determined scores, development of one or more policy needs may be prioritized. | 2011-06-16 |
20110145885 | Policy Adherence And Compliance Model - Methods, computer readable media, and apparatuses for policy development and management are presented. Input corresponding to an implemented policy may be received. An adherence rating for the implemented policy may be determined based on a measured level of compliance with at least one guiding principle. An effectiveness rating for the implemented policy may be determined based on a determined level of responsiveness. Subsequently, a report may be generated. | 2011-06-16 |
20110145886 | METHODS AND SYSTEMS FOR ALLOCATING A USB DEVICE TO A TRUSTED VIRTUAL MACHINE OR A NON-TRUSTED VIRTUAL MACHINE - The methods and systems described herein provide for allocating a universal serial bus (USB) device to one of a trusted virtual machine and a non-trusted virtual machine. A control program receives data indicating a USB port on the computing machine received a USB device and identifies at least one attribute of the USB device. The control program selects, based on application of a policy to the identified at least one device attribute, one of a trusted virtual machine and a non-trusted virtual machine executing. The control program grants, to the virtual machine selected by the control program, access to the USB device. | 2011-06-16 |
20110145887 | System and Method of Selectively Applying Security Measures to Data Services - Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service. | 2011-06-16 |
20110145888 | ELECTRONIC MONITORING SYSTEM AND METHOD - An electronic monitoring system located in a second service area when an electronic monitoring target has moved from a first service area having a first authority to the second service area having a second authority starts electronic monitoring for the electronic monitoring target that has moved into the second service area, configures a temporary electronic monitoring authority based on the first authority and the second authority, and executes the electronic monitoring on the electronic monitoring target in the second service area according to the configured temporary electronic monitoring authority. | 2011-06-16 |
20110145889 | SYSTEM AND METHOD FOR VERIFYING DELIVERY AND INTEGRITY OF ELECTRONIC MESSAGES - In order to provide third party verification of the content and delivery of an electronic message such as an e-snail, a server receives the e-mail intended to be sent or forwarded to a specified addressee, and “tags” the message to indicate that it is “registered” with the provider of the service. The server then establishes a direct telnet connection with the addressee's Mail User Agent (MUA), and transmits the tagged email to the addressee's MUA, as well as to the MUA's of any other addressees. After receiving responses from the receiving MUA's that the message was successfully received, the server then creates and forwards to the message originator an electronic receipt. The receipt includes one or more, and preferably all of, the following: the original message including any original attachments; a delivery success/failure table listing which addressee's MUA's successfully received the message and at what time, and for which MUA's there was a delivery failure; and a digital signature corresponding to the message and attachments. By receiving the receipt at a later date and verifying that the digital signature matches the message and related information, the operators of the system can provide independent third party verification that the receipt is a genuine product of their system and that the information pertaining to content and delivery of the message is accurate, without the need to archive either the original message or the receipt. | 2011-06-16 |
20110145890 | ACCESS METHOD SUITABLE FOR WIRELESS PERSONAL AREA NETWORK - The embodiments of the invention disclose an access method suitable for wireless personal area network (WPAN). After the coordinator broadcasts the beacon frame, according to the beacon frame, the equipment identifies the authentication demand and the authentication mode required by the coordinator to the equipment. If the coordinator has no authentication demand to the equipment, the equipment and the coordinator carry out the association processes directly; otherwise, based on a selected authentication mode and the corresponding authentication mechanism negotiation information, the equipment sends the authentication access request to the coordinator; then based on the authentication mode selected by the equipment, the coordinator carries out the processes of authentication and session key negotiation with the equipment; finally, the coordinator sends the authentication access response to the equipment, when the authentication state in the authentication access response is success, the equipment carries out the association processes with the coordinator. The processes of authentication and the session key negotiation can be based on primitive control, and also can be based on port control. If the equipment is associated with the coordinator successfully, the coordinator distributes a network address to the equipment, and therefore the equipment can communicate with the coordinator normally. The invention solves the technical problems of lower security and lower efficiency in the existing WPAN access methods. | 2011-06-16 |
20110145891 | Securing Asynchronous Client Server Transactions - A method, system, and computer usable program product for securing asynchronous client server transactions are provided in the illustrative embodiments. A request including an application identifier and a version of a second application is received at a first application. A service identifier is generated if a session with the second application is valid. A registry is generated at the first application. A catalog is generated based on the registry and the service identifier and the catalog are sent to the second application. A sub-request including the service identifier is received as part of an asynchronous client server transaction. Validity of the sub-request is determined by determining whether the service identifier has expired, whether the sub-request requests a service that is permissible according to the catalog, whether the service identifier is used in conjunction with the second application, or a combination thereof. If the sub-request is valid, the service is provided. | 2011-06-16 |
20110145892 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN ELECTRONIC MESSAGE RECIPIENT - A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic communications media such as e-mail and instant messaging. | 2011-06-16 |
20110145893 | WEB RESOURCE REQUEST PROCESSING - Improved approaches for providing secure remote access to email resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to email on a mail server within a private network through a common access point. The solution provided by the improved approaches allow not only native access to email resources but also robust authentication approaches. | 2011-06-16 |
20110145894 | PERSONAL SECURITY MANAGER FOR UBIQUITOUS PATIENT MONITORING - The present invention relates to a system and corresponding method for a secure end-to-end patient healthcare system which includes wireless medical sensors adapted to be attached to a patient's body and in communication with each other forming a body sensor network within a wireless medical sensor network including one or more body sensor networks; λ-secure keying means incorporated into each wireless medical sensor for enabling secure communications between the wireless medical sensors, and a personal security manager within the body sensor network and in communication with the wireless medical sensors within the body sensor network, the personal security manager providing secure communications with backend services and providing security relationships within the body sensor network by means of the λ-secure keying means, wherein the λ-secure keying means are such that a coalition of no more than λ compromised wireless medical sensors conceals a pairwise key between any two non-compromised wireless medical sensors and provides protection against node compromise until λ+1 wireless medical sensors have been compromised. | 2011-06-16 |
20110145895 | COMMUNICATION SYSTEM - A communication network ( | 2011-06-16 |
20110145896 | DOMAIN SPANNING APPLICATIONS - Managing and accessing media items, including: a plurality of domains configured to provide access to media items; a plurality of clients associated with the plurality domains, and providing a pathway for accessing the media items; and a spanning application configured to track and aggregate accessible media items from the plurality of domains based on authentication and registration information and associated rights of the plurality of clients and the plurality of domains, wherein the spanning application enables accessing of the media items across the plurality of domains. | 2011-06-16 |
20110145897 | UBIQUITOUS WEBTOKEN - A first device receives, from a second device, a first request to set up an account, where the first request includes a shared key and information associated with the second device, where the shared key is calculated based on a private key, of a private key/public key pair, and information regarding an identity selection, from user identity information, associated with a user of the second device; and store the shared key in a memory. The first device receives, from the second device, a second request to log in to the account, where the second request includes a first webtoken and information associated with the second device, where the first webtoken is calculated based on the shared key and a first time interval; retrieves the shared key; generates a second webtoken based on the shared key and a second time interval; performs an authentication operation by comparing the first webtoken and the second webtoken; and permits the second device to access the account when the first webtoken matches the second webtoken. | 2011-06-16 |
20110145898 | CONTROLLING ACCESS OF A CLIENT SYSTEM TO AN ACCESS PROTECTED REMOTE RESOURCE - The present invention provides a security module for Web application, especially a portal application, using a rewriter proxy. The security module ensures that the rewritten URIs are appended by an authentication identifier for determining whether the rewritten URI has not been changed. Preferably, the authentication identifier can be generated by applying a secure hash algorithm and/or secret key to the original URIs of the remote resource or the entire rewritten URIs. When a client activates those URIs, a request is sent to the rewriter proxy. Before a connection to the access protected remote resource is established, the security module validates whether the URIs contained in the user client request have been changed by the user. | 2011-06-16 |
20110145899 | Single Action Authentication via Mobile Devices - A method for authenticating a user includes receiving a user identification, confirming the user identification, sending a request to the user to perform a single action on a communication device, creating a session to receive the single action from the communication device, receiving an identifier from the communication device, using the identifier to verify that the user has the communication device, and authenticating the user based on the confirmed user information and the verification that the user has the communication device. The identification can include a username and a password or can be a one time password. | 2011-06-16 |
20110145900 | DELEGATING AUTHENTICATION USING A CHALLENGE/RESPONSE PROTOCOL - A method for delegating authentication using a challenge/response protocol is provided. The method may initiate with a challenge/response sequence between a client application and a server application to authenticate the client application. Then the server application authenticates to a second server application using the credentials associated with the client application by acting as a conduit between the client application and the second server application. | 2011-06-16 |
20110145901 | SYSTEMS AND METHODS FOR AUTHENTICATING A SERVER BY COMBINING IMAGE RECOGNITION WITH CODES - A system and method is provided for authenticating a first device to a second device. This involves providing images to the second device, receiving an indication of selected ones of the images as authenticating images, and identifying an authenticating code associated with the second device. This also involves receiving a transaction request from the second device, the first device providing a display page to the second device, the display page including the authenticating images at locations identified by the authenticating code. | 2011-06-16 |
20110145902 | SYSTEM AND METHOD FOR PROVIDING SEAMLESS ON-DEMAND APPLICATION SERVICE USING DPI IN COMMUNICATION NETWORKS - Provided is a system and method of providing a seamless on-demand service using a Deep Packet Inspection (DPI) function. A system for providing an on-demand service may include: a switch to recognize a signature of media, and to convert a resolution of media based on information associated with a resolution of media included in the recognized signature, a terminal resolution of a terminal held by a user, and a user requirement; an authentication management server to perform a terminal authentication or a user authentication; and a policy control server to set a path based on a terminal function, a media characteristic, and the user requirement. | 2011-06-16 |
20110145903 | UNIFIED USER LOGIN FOR CO-LOCATION FACILITIES - A logical customer organization model is applied to group the individual agreements into separate logical customer organizations, wherein the groupings can be region based groupings, organization groupings and departmental groupings. Unified login identification (ID) model is applied to enable a first user to login to a portal using a first login ID to access a first asset in a first asset group according to a first logical customer organization. The unified login ID model enables the first user to use the same first login ID to access a second asset in the first asset group according to the first logical customer organization. The unified login ID model also enables the first user to login to the portal using a second login ID to access one or more assets in a second asset group according to a second logical customer organization. Each of the first and second logical customer organization may be associated with one or more asset groups and one or more user groups. | 2011-06-16 |
20110145904 | ENTERPRISE BIOMETRIC AUTHENTICATION SYSTEM FOR A WINDOWS BIOMETRIC FRAMEWORK - An enterprise biometric authentication system for use with a network of client computing devices, each client computing device executing Windows® 7 operating system with Windows® Biometric Framework components including a client biometric service and a client engine adapter, comprises a client engine wrapper and a server subsystem further including a server database, a server storage adapter, a server engine adapter, and a server component. The client engine wrapper resides on a client computing device and is operable to intercept requests from the client biometric service to the client engine adapter and to transmit the requests. The server storage adapter may store and retrieve biometric templates from the server database. The server engine adapter may generate and compare biometric templates. The server component may receive the requests from the client engine wrapper, forward the requests to the server engine adapter, and transmit results of the requests to the client engine wrapper. | 2011-06-16 |
20110145905 | APPARATUS AND METHOD FOR MANAGING WEB BASED SERVICE ACCOUNT - Provided is a method and apparatus for managing a web based service account. The web based service account management apparatus may select, from among web based service accounts, an account undesired to be exposed to others, and may display an account set with a hiding indication only when a user authenticated through a user authentication process desires to read the account. | 2011-06-16 |
20110145906 | INFORMATION PROCESSING APPARATUS CAPABLE OF OPERATING IN ADMINISTRATOR MODE, CONTROL METHOD THEREOF AND RECORDING MEDIUM - An information processing apparatus includes an executing unit executing information processing, a control unit controlling an operation of the executing unit, a storage unit for storing specific information for executing an administrator mode and a communication unit for communicating with a smart card. When information matching the PIN code stored in the smart card and information matching the information stored in said storage unit are received, the control unit executes the administrator mode. | 2011-06-16 |
20110145907 | E-MAIL BASED USER AUTHENTICATION - E-mail based user authentication is described herein. A user can access resources of a service provider by submitting only an e-mail address to which the user has access. The service provider generates an authentication ticket corresponding to the user's login request, and transmits the authentication ticket to the e-mail service provider indicated by the submitted e-mail address. The e-mail service provider processes the authentication ticket, and enables either approval or denial of the authentication ticket, whether by explicit user action or by automated processing. | 2011-06-16 |
20110145908 | System and Method for Data and Request Filtering - Data and data requests of users of applications are filtered using a client-resident agent. A user profile may contain data pertaining to restrictions on content the user is permitted to view or types of requests the user is permitted to make. within one or more applications. Data in the user profile may be used to grant or deny access to applications, filter particular content from the user's view, or filter particular data requests made by the user. | 2011-06-16 |
20110145909 | Interface Logic For A Multi-Core System-On-A-Chip (SoC) - In one embodiment, the present invention includes a system-on-a-chip (SoC) with first and second cores, interface logic coupled to the cores, chipset logic coupled to the interface logic, and a virtual firewall logic coupled between the chipset logic and the second core. The interface logic may include a firewall logic, a bus logic, and a test logic, and the chipset logic may include a memory controller to provide for communication with a memory coupled to the SoC. In some system implementations, both during test operations and functional operations, the second core can be disabled during normal operation to provide for a single core SoC, enabling greater flexibility of use of the SoC in many different implementations. Other embodiments are described and claimed. | 2011-06-16 |
20110145910 | PORT TAPPING FOR SECURE ACCESS - Secure access in a computing environment is provided. One implementation involves a client generating a sequence for tapping server ports, and the client identifying itself to the server by tapping the server ports based on the sequence. The server verifies if the tapping sequence is correct. If the tapping sequence is correct, access is provided from the client to the server. | 2011-06-16 |
20110145911 | Network-Based Security Services for Managed Internet Service - Data traffic is routed from a customer edge (CE) router to an Ethernet services router via a generic routing encapsulation (GRE) tunnel. Upon routing the data traffic from the CE router to the Ethernet services router, the data traffic is routed from the Ethernet services router to an aggregation switch. Upon routing the data traffic from the Ethernet services router to the aggregation switch, the data traffic is routed from the aggregation switch to a service switch through a security module, the security module configured to filter the data traffic. The filtered data traffic is routed from the service switch to the Ethernet services router. Upon routing the filtered data traffic from the service switch to the Ethernet services router, the filtered data traffic is routed from the Ethernet services router to a provider edge (PE) router. | 2011-06-16 |
20110145912 | MEDIA ACCESS CONTROL ADDRESS TRANSLATION IN VIRTUALIZED ENVIRONMENTS - Some embodiments provide a method that transmits network packets through a network security device. The method receives receiving a request to send a network packet from a first computing device to a second computing device over a network that includes the network security device. The network packet includes a first network interface identifier for identifying the first computing device on the network and a second network interface identifier for identifying the second computing device on the network. The method identifies third and fourth network interface identifiers that cause the network packet to be transmitted through the network security device when the network packet is transmitted using the third and fourth network interface identifiers. The method transmits the network packet over the network through the network security device using the third and fourth network interface identifiers. The method transmits the network packet to the second computing device using the first and second network interface identifiers. | 2011-06-16 |
20110145913 | Project Management - Methods, systems, and computer program products for project management. A method embodiment for project management includes accepting a designation of disparate enterprise data from disparate sources in an enterprise system as plan data for a project. The disparate enterprise data is governed by business rules in the enterprise system. The method also includes dynamically aggregating the plan data from the disparate data sources; presenting the aggregated plan data in a project management interface; accepting a manipulation of a portion of the aggregated plan data; enforcing business rules on the aggregated plan data in the project management interface; and committing the manipulated aggregated plan data back to the datasources. | 2011-06-16 |
20110145914 | MOTHERBOARD AND METHOD FOR MANAGING USE OF COMPUTER - A system and method for managing use of a computer determines if a first system time of the computer is in one of the preset available time segments when the computer is powered on, and logs into the operating system of the computer if the first system time is in one of the available time segments. The system and method further determines if a second system time is in one of preset unavailable time segments if a time interval elapses after logging into the operating system, and shuts down the power of the computer if the second system time is in one of the unavailable time segments. | 2011-06-16 |
20110145915 | METHOD FOR MANAGING AUTHENTICATION PROCEDURES FOR A USER - A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application. | 2011-06-16 |
20110145916 | METHODS AND SYSTEMS FOR PREVENTING ACCESS TO DISPLAY GRAPHICS GENERATED BY A TRUSTED VIRTUAL MACHINE - The methods and systems described herein provide for preventing a non-trusted virtual machine from reading the graphical output of a trusted virtual machine. A graphics manager receives a request from a trusted virtual machine to render graphical data using a graphics processing unit. The graphics manager assigns, to the trusted virtual machine, a secure section of a memory of the graphics processing unit. The graphics manager renders graphics from the trusted virtual machine graphical data to the secure section of the graphics processing unit memory. The graphics manager receives a request from a non-trusted virtual machine to read graphics rendered from the trusted virtual machine graphical data and stored in the secure section of the graphics processing unit memory, and prevents the non-trusted virtual machine from reading the trusted virtual machine rendered graphics stored in the secure section of the graphics processing unit memory. | 2011-06-16 |
20110145917 | METHOD AND SYSTEM FOR FACILITATING MEMORY AND APPLICATION MANAGEMENT ON A SECURED TOKEN - A system for facilitating memory and application management on a smartcard the system includes a client having a number of applications and a smartcard having specification logic allowing file structures and security and access conditions to be defined using a set of common commands. Each application has a corresponding group of data on the smartcard. An applet instance is created for each application and corresponding group of application data. At the time of instantiation, the specification logic allows an application to specify the file structure and/or to specify security and access conditions for its group of data. An application can utilize passcode and credential management so that a single passcode is used to access the smartcard regardless of whether the application utilizes the common commands to specify a file structure. | 2011-06-16 |
20110145918 | SENSITIVE DATA TRACKING USING DYNAMIC TAINT ANALYSIS - A system and method for tracking sensitive data uses dynamic taint analysis to track sensitive data as the data flows through a target application running on a computer system. In general, the system and method for tracking sensitive data marks data as tainted when the data input to the target application is indicated as sensitive. The system and method may then track the propagation of the tainted data as the data is read from and written to memory by the target application to detect if the tainted data is output from the application (e.g., leaked). Dynamic binary translation may be used to provide binary instrumentation of the target application for dynamic taint analysis to track propagation of the tainted data at the instruction level and/or the function level. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment. | 2011-06-16 |
20110145919 | METHOD AND APPARATUS FOR ENSURING CONSISTENT SYSTEM CONFIGURATION IN SECURE APPLICATIONS - In exemplary embodiments, methods and apparatuses for securing electronic devices against tampering or unauthorized modifications are presented herein. One or more system locks may be installed in the system at a location between two or more subsystems along a communications path. Each system lock may be associated with a particular subsystem. The system locks may monitor the state of the system, including transactions targeting associated subsystems, and the transactions and/or state of the system may be compared to known valid transactions and states. If the requested transaction or enacted system state differs from a known acceptable transaction or state, a notification may be generated and countermeasures may be enacted. In some embodiments, the system locks may be located in a system bus on an electronic device to ensure that software executed on the electronic device remains free of tampering. | 2011-06-16 |
20110145920 | SYSTEM AND METHOD FOR ADVERSE MOBILE APPLICATION IDENTIFICATION - A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the potential to cause an adverse effect on a mobile device or a network the mobile device may connect to. A mobile device may monitor behavioral data, apply a model to the data, and transmit a disposition to the server. The server may aggregate behavioral data or disposition information from multiple devices. The server may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, the server may enact corrective actions, such as generating device or network configuration data. | 2011-06-16 |
20110145921 | OBFUSCATED MALWARE DETECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obfuscated malware. In one aspect, a method includes executing from a binary executable a call instruction and a plurality of instruction subsequent to a target of the call instruction, determining if the value identified by the stack pointer of the call stack is equal to a default value stored in the call stack prior to emulation, determining if there is a non-obfuscation signal resulting from the execution of the call instructions and the plurality of instructions, and if the value identified by the stack pointer is the default value and there is no obfuscation signal, identifying the call instruction as a possibly obfuscated call instruction; Additionally, the method includes determining that if the number of call instructions identified as possibly obfuscated call instructions exceeds a threshold number, identifying the binary executable as an obfuscated executable. | 2011-06-16 |
20110145922 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MITIGATING EMAIL ADDRESS HARVEST ATTACKS BY POSITIVELY ACKNOWLEDGING EMAIL TO INVALID EMAIL ADDRESSES - A method of detecting and responding to an email address harvest attack at an Internet Service Provider (ISP) email system includes counting a number of failed email address look-ups during a single Simple Mail Transfer Protocol (SMTP) session associated with an originating Internet Protocol (IP) address and responding to the originating IP address with a positive acknowledgement that an otherwise invalid email address exists when the count of the number of failed email address look-ups exceeds a threshold. | 2011-06-16 |
20110145923 | COMPUTER HAVING SPECIAL PURPOSE SUBSYSTEMS AND CYBER-TERROR AND VIRUS IMMUNITY AND PROTECTION FEATURES - A method or system for supporting a computer systems self repair, including the computer executed steps for booting from a first boot device, and booting from a second boot device in response to a signal indicating a need for repair. While booted from the second boot device the computer system is capable of repairing software on the first boot device. The signal may effect a logical or physical switch. Repairing software may be performed in part by copying, template, backup or archive software from a device other than the first boot device. Repairing software may be performed automatically without direction by a user or according to preset preferences. Computer architecture having special purpose subsystems that provides cyber-terror and virus immunity and protection features. | 2011-06-16 |