30th week of 2009 patent applcation highlights part 47 |
Patent application number | Title | Published |
20090187897 | COMPILING METHOD AND COMPILING PROGRAM - The compiling method and compiling program which can delete a redundantly generated function, regardless of whether or not a class object is generated and whether or not calling is performed is a compiling method for converting an input program written in an object-oriented language and having at least one class into an object program, and which includes: a virtual inheritance analyzing step of analyzing whether or not each class in the input program is defined by virtual inheritance; a special function consolidating step of generating a code which consolidates at least one of plural constructors and plural destructors of the class, in the case where, as a result of the analysis in the virtual inheritance analyzing step, the class is not defined by virtual inheritance; and a generating step of generating an object program including the code generated in the special function consolidating step. | 2009-07-23 |
20090187898 | METHOD FOR SECURELY UPDATING AN AUTORUN PROGRAM AND PORTABLE ELECTRONIC ENTITY EXECUTING IT - The method for updating an autorun program of a portable electronic entity includes:
| 2009-07-23 |
20090187899 | METHOD FOR INTELLIGENT PATCH SCHEDULING USING HISTORIC AVERAGES OF VIRTUAL I/O UTILIZATION AND PREDICTIVE MODELING - A method for intelligent patch scheduling for a virtual (I/O) server is provided. Virtual I/O performance indicators of a virtual I/O server are monitored. The performance indicators are stored in a database. Historic averages of the performance indicators are maintained in the database. Patches to be applied to a client partition of the virtual I/O server are received. A reboot window is received for the client partition and is an allowed time frame for rebooting to apply the patches. Future virtual I/O utilization is predicted by running predictive modeling utilizing the historic averages of the performance indicators, and based on the predictive modeling, a specific time within the allowed time frame is determined for rebooting the client partition of the virtual I/O server to apply the patches. The virtual I/O server is rebooted to apply the patches to the client partition at the specific time within the reboot window. | 2009-07-23 |
20090187900 | INFORMATION PROCESSING APPARATUS, SYSTEM, METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a storage unit configured to store a list which makes the version of software correspond to mapping information, a first determination unit configured to, when updating the version of the software, determine by referring to the list, whether mapping information corresponding to a version before update is different from that corresponding to a version after update, a recognition unit configured to, when the first determination unit determines that these pieces of mapping information are different from each other, recognize a different mapping information item as information to be backed up, and an update unit configured to update the version of the software when the first determination unit determines that these pieces of mapping information coincide with each other. | 2009-07-23 |
20090187901 | Communication System, Communication Device, and Management Server Device - A communication system includes: a communication device configured to operate various functions using software programs stored in a software storage unit; a management server device configured to send an updating software program corresponding to one of the software programs; an operation information obtaining unit configured to obtain operation information of the software programs in the communication device; a determination unit configured to determine a software program that needs updating among the software programs based on the operation information obtained by the operation information obtaining unit; and an updating unit configured to replace the software program that is stored in the software storage unit and determined by the determination unit to need updating with the updating software program. | 2009-07-23 |
20090187902 | Caching Binary Translations for Virtual Machine Guest - In one embodiment, a method comprises in response to an intercept of a first instruction in a guest that is controlled by a virtual machine monitor (VMM), updating first tracking data corresponding to the first instruction in an intercept tracking table; determining, from the first tracking data, that a translation of the first instruction into a first routine is to be performed; and caching the first routine to be executed in response to a subsequent intercept of the first instruction, wherein the first routine is formed from instructions defined in a same instruction set architecture as the first instruction. In some embodiments, a routine for an intercepted instruction that is within a merge window of the first instruction in a guest may be merged into the same routine with the first instruction. | 2009-07-23 |
20090187903 | VIRTUAL MULTIPROCESSOR SYSTEM - A virtual multiprocessor system which does not require a memory apparatus for debugging includes: a physical processor, storage units for storing status information indicating respective statuses of logic processors, a dispatch unit which assigns one of the logic processors by switching the logic processors with respect to a physical processor, and an interrupt unit which suspends the processing currently executed by a current logic processor among the logic processors by issuing a debug interrupt request to the current logic processor; in the virtual multiprocessor system, the dispatch unit stores status information corresponding to the current logic processor into one of the storage units in response to the debug interrupt request issued to the current logic processor that is assigned to the physical processor. | 2009-07-23 |
20090187904 | Redirection Table for Virtual Machine Guest - In one embodiment, a processor comprises a redirect unit configured to detect a match of an instruction pointer (IP) in an IP redirect table, the IP corresponding to a guest instruction that the processor has intercepted, wherein the guest is executed under control of a virtual machine monitor (VMM), and wherein the redirect unit is configured to redirect instruction fetching by the processor to a routine identified in the IP redirect table instead of exiting to the VMM in response to the intercept of the guest instruction. | 2009-07-23 |
20090187905 | METHOD AND APPARATUS FOR WORKFLOW EXECUTION - A method of executing a workflow in a computer includes representing a main workflow of at least one computer as a series of steps which are linked to define the workflow, the steps being grouped in at least two groups. The method includes representing a transition workflow as at least one transition step, the transition step not being linked to the steps of the main workflow and defining a rule for executing the transition workflow based on transitions between steps of different groups. The method includes executing in at least one computer the steps of the main workflow in an order defined by the links. The method includes evaluating the rule to determine whether the rule applies when, during the executing, a step from one of the groups is followed by a step from another of the groups and executing in at least one computer the steps of the transition workflow when the rule applies. | 2009-07-23 |
20090187906 | SEMI-ORDERED TRANSACTIONS - Embodiments of the present invention provide a system that facilitates transactional execution in a processor. The system starts by executing program code for a thread in a processor. Upon detecting a predetermined indicator, the system starts a transaction for a section of the program code for the thread. When starting the transaction, the system executes a checkpoint instruction. If the checkpoint instruction is a WEAK_CHECKPOINT instruction, the system executes a semi-ordered transaction. During the semi-ordered transaction, the system preserves code atomicity but not memory atomicity. Otherwise, the system executes a regular transaction. During the regular transaction, the system preserves both code atomicity and memory atomicity. | 2009-07-23 |
20090187907 | RECORDING MEDIUM IN WHICH DISTRIBUTED PROCESSING PROGRAM IS STORED, DISTRIBUTED PROCESSING APPARATUS, AND DISTRIBUTED PROCESSING METHOD - A master calculator assigns a series of processing groups to a communicable worker calculator. The master receives information about an execution time and a waiting time from the worker calculator for the series of processing groups. The computer acquires the time elapsed between transmitting the processing group transmitted to the worker calculator and receiving the execution result of the processing group from the worker calculator. The master calculates the communication time required for communication with the worker calculator on the basis of the information received and the elapsed time acquired. The master calculates the number of processings to be assigned to the worker calculator on the basis of the communication time calculated. The master generates a processing group to be assigned to the worker calculator on the basis of the number of processings calculated, and transmits the processing group generated to the worker calculator. | 2009-07-23 |
20090187908 | OPTIMIZED METHODOLOGY FOR DISPOSITIONING MISSED SCHEDULED TASKS - The present invention provides for a method and system for the disposition of tasks which failed to run during their originally scheduled time. The determination of whether to run missed or delayed tasks is based on calculated ratios rather than on fixed window sizes. A Lateness Ratio is calculated to determine if the time elapsed between the missed task and the scheduled run time is small enough to still allow a late task to run. A Closeness Ratio is calculated to determine if the next available run time for the missed task is close enough to the next scheduled execution of the task that the missed task will be run in place of the upcoming scheduled task. Each ratio is compared to a user defined ratio limit, so if the calculated ratio does not exceed the limit, then the missed task is executed at the first available opportunity. | 2009-07-23 |
20090187909 | SHARED RESOURCE BASED THREAD SCHEDULING WITH AFFINITY AND/OR SELECTABLE CRITERIA - Threads may be scheduled to be executed by one or more cores depending upon whether it is more desirable to minimize power or to maximize performance. If minimum power is desired, threads may be schedule so that the active devices are most shared; this will minimize the number of active devices at the expense of performance. On the other hand, if maximum performance is desired, threads may be scheduled so that active devices are least shared. As a result, threads will have more active devices to themselves, resulting in greater performance at the expense of additional power consumption. Thread affinity with a core may also be taken into consideration when scheduling threads in order to improve the power consumption and/or performance of an apparatus. | 2009-07-23 |
20090187910 | METHOD AND SYSTEM FOR AUTOMATED SCHEDULE CONTROL - A method for automated schedule control is disclosed. When a schedule appointment process is performed, an open services gateway initiative framework of an electronic device performs an automatic schedule control operation, detecting whether an execution for a schedule is required. If required, it is determined whether the schedule is an update operation. If so, a start or stop operation for a bundle corresponding to the schedule is performed. If not, the electronic device connects to a remote database at a preset time to determine whether a new manifest for the bundle corresponding to the schedule is detected. If detected, the new manifest is retrieved from the remote database and the bundle is accordingly updated thereto. | 2009-07-23 |
20090187911 | Computer device with reserved memory for priority applications - A computer device comprises a processor, a memory, and an operating system kernel. The kernel comprises instructions for managing the execution of processes and for allocating memory to such processes. The device is able to execute stored applications that can be broken down into processes. The device comprises a special instruction sequence able to create an inactive process with reservation of a certain quantity of memory, and an application launcher, arranged in such a manner as to remove the inactive process, thus freeing up the reserved memory, which is followed consecutively by commanding the launch of at least one particular application. The memory reserved beforehand is thus made quickly available for execution of the particular application. | 2009-07-23 |
20090187912 | Method and apparatus for migrating task in multi-processor system - A method and apparatus for migrating a task in a multi-processor system. The method includes examining whether a second process has been allocated to a second processor, the second process having a same instruction to execute as a first process and having different data to process in response to the instruction from the first process, the instruction being to execute the task; selecting a method of migrating the first process or a method of migrating a thread included in the first process based on the examining and migrating the task from a first processor to the second processor using the selected method. Therefore, cost and power required for task migration can be minimized. Consequently, power consumption can be maintained in a low-power environment, such as an embedded system, which, in turn, optimizes the performance of the multi-processor system and prevents physical damage to the circuit of the multi-processor system. | 2009-07-23 |
20090187913 | ORDERING MULTIPLE RESOURCES - A method of ordering multiple resources in a transaction comprising receiving a transaction for a plurality of resources; determining, for each resource, the work embodied by the transaction; ordering the resources according to the determination of the work; committing the transaction; and invoking the resources in the selected order. The step of ordering the resources may comprise specifying the resource to be invoked last. Alternatively, or additionally, the step of ordering the resources may also comprise specifying that each resource carrying out read-only work is to be invoked first. | 2009-07-23 |
20090187914 | SYSTEM AND METHOD FOR LOAD SHEDDING IN DATA MINING AND KNOWLEDGE DISCOVERY FROM STREAM DATA - Load shedding schemes for mining data streams. A scoring function is used to rank the importance of stream elements, and those elements with high importance are investigated. In the context of not knowing the exact feature values of a data stream, the use of a Markov model is proposed herein for predicting the feature distribution of a data stream. Based on the predicted feature distribution, one can make classification decisions to maximize the expected benefits. In addition, there is proposed herein the employment of a quality of decision (QoD) metric to measure the level of uncertainty in decisions and to guide load shedding. A load shedding scheme such as presented herein assigns available resources to multiple data streams to maximize the quality of classification decisions. Furthermore, such a load shedding scheme is able to learn and adapt to changing data characteristics in the data streams. | 2009-07-23 |
20090187915 | SCHEDULING THREADS ON PROCESSORS - A device, system, and method are directed towards managing threads and components in computer system with one or more processing units. A processor group has an associated hierarchical structure containing nodes that may correspond to processing units, hardware components, or abstractions. The processor group hierarchy may be used to assign one or more threads to one or more processing units, by traversing the hierarchy based on various factors. The factor may include load balancing, affinity, sharing of components, loads, capacities, or other characteristics of components or threads. A processor group hierarchy may be used in conjunction with a designated processor set. | 2009-07-23 |
20090187916 | TASK SWITCHING WITH STATE PRESERVATION FOR PROGRAMS RUNNING ON AN ELECTRONIC DEVICE - A method and system providing switching between a plurality of installed programs in a computer system. Embodiments include a jump function comprising the steps: (1) determining a jump program that is to be the next program to be run, possibly from a plurality of possible choices; (2) creating input data far the jump program based on data in the current program; (3) storing the program state of the currently running program into a context packet and saving the context packet to memory; (4) releasing temporary memory that is used by the program, so as to allow other programs to use the memory; (5) calling the jump program with the created input data as input and terminating the currently running program. | 2009-07-23 |
20090187917 | TRANSFER OF DATA FROM TRANSACTIONAL DATA SOURCES TO PARTITIONED DATABASES IN RESTARTABLE ENVIRONMENTS - Method, system, and computer program product for transferring data from transactional data sources to partitioned databases are provided. One or more messages from a transactional data source are read. Each message includes one or more records to be inserted into a database comprising a plurality of partitions. One of the partitions of the database in which the one or more records of each message are to be inserted is then identified. A transaction is initiated to insert the one or more records of each message into the one partition and to delete the one or more messages from the transactional data source. The transaction is committed only when insertion of the one or more records of each message into the one partition and deletion of the one or more messages from the transactional data source succeed. | 2009-07-23 |
20090187918 | METHODS AND APPARATUS FOR SECURING FRAMES FROM OTHER FRAMES - A method includes placing an accent in a frame, and only letting frames with the same accent communicate with each other. This accenting is removed using an accent key immediately prior to a compilation operation. The accenting can be performed by performing an XOR operation on a data stream using a key. In one exemplary non-limiting embodiment a computing system is provided. The computing system includes a memory, and a processor coupled to the memory, the processor configured to introduce domain specificity to at least one of a script and an HTML object name. In another exemplary non-limiting embodiment, means are provided for introducing domain specificity to at least one of a script and an HTML object name and means are provided for removing the introduced domain specificity prior to a compiling operation. | 2009-07-23 |
20090187919 | SERVICE ORIENTED ARCHITECTURE-BASED SCIM PLATFORM - Service Capability Interaction Manager (SCIM)-type functionality is provided at a horizontal service layer in an Service Oriented Architecture (SOA)-based approach. SCIM composition is provided at multiple levels, including the level of composition where servlets have full access to the context information of the service layer. SCIM composition also occurs at the level of an application dispatching messages to multiple applications/services for processing the messages. The functionality at the service layer also can be programmed using policies, such that routing decisions can be made dynamically as the result of processing conditions and actions. An incoming message can result in a Web service being triggered that in turn triggers a BPEL or SOA workflow, the workflow calling multiple operations to process the message as a result of a routing table or header, environmental and contextual information at the service level, and other information such as user preference or presence information. | 2009-07-23 |
20090187920 | Configurable Message Pipelines - In accordance with certain aspects of configurable message pipelines, a service allows one or more applications running on a system to communicate with one or more other systems. The service includes a port having a send pipeline to allow the one or more applications to send messages to the one or more other systems and/or a receive pipeline to allow the one or more applications to receive messages from the one or more other systems. Each of the send pipeline and the receive pipeline is configurable by the one or more applications to include functionality desired by the one or more applications. | 2009-07-23 |
20090187921 | METHOD FOR PROVIDING STAND-IN OBJECTS - A method for providing stand-in objects, where relationships among objects are automatically resolved in an object oriented relational database model without the necessity of retrieving data from the database until it is needed. A “fault” class is defined, as well as fault objects whose data haven t yet been fetched from the database. An object that's created for the destination of a relationship whenever an object that includes the relationship is fetched from the database. When an object is fetched that has relationships, fault objects are created to “stand-in” for the destination objects of those relationships. Fault objects transform themselves into the actual enterprise objects—and fetch their data—the first time they're accessed. Subsequently, messages sent to the target objects are responded to by the objects themselves. | 2009-07-23 |
20090187922 | SYSTEM AND METHOD FOR TIME TRACKING - A method for tracking time, including obtaining a plurality of tasks; identify a first open event and a first close event associated with a first file; identifying a start idle event and an end idle event associated with the first file after identifying the first open event; generating a first open event time stamp for the first open event, a first close event time stamp for the first close event, a start idle event time stamp for the start idle event, and an end idle event time stamp for the end idle event; mapping the first file to a first task of the plurality of tasks; and presenting a report including the first task, the first open event time stamp, the first close event time stamp, the start idle event time stamp, and the end idle event time stamp. | 2009-07-23 |
20090187923 | DISTRIBUTING EVENT PROCESSING IN EVENT RELATIONSHIP NETWORKS - A computer implemented method, system, and computer usable program code for distributing event processing are provided in the illustrative embodiments. An analysis is performed of the event information flowing from one event relationship network subnet to another event relationship network subnet in an event relationship network. Strength of a relationship between the first and the second event relationship network subnets is determined based on the analysis. A distribution of the event processing in the event relationship network is recommended based on the strength of the relationship. | 2009-07-23 |
20090187924 | Resolving SAS timing issues for long-distance SAS extender - This invention extends the distance at which a SAS extender can function. The distance is increased a large amount over the traditional 10 meters. As a result timers will not go off before the response can make a trip back. This is accomplished by emulating as a SAS expander, using SAS AIP's (Arbitration In Progress), and using a lookup table to determine which SAS events must be responded to immediately and which ones to be passed on to the remote link. | 2009-07-23 |
20090187925 | Driver that efficiently regulates current in a plurality of LED strings - A light-emitting diode (LED) driver according to the present invention consists of a voltage pre-regulator and multiple linear current regulators with an adaptively-controlled drive voltage. In this LED driver, the efficiency maximization is achieved by eliminating the sensing of the voltage drops across the linear regulators, i.e., by removing the external voltage feedback for the adjustment of the output voltage of the pre-regulator. In the LED driver of the present invention, the self-adjustment of drive voltage is achieved by relying on a relatively strong dependence between the gate-to-source and drain-to-source voltages of a current-regulating transistor, e.g., a MOSFET, operating in the linear region. The driver powers all LEDs in a string with a constant current and provides consistent illumination and optimum operating efficiency at low cost over a wide range of input/output voltage and temperature. | 2009-07-23 |
20090187926 | METHOD AND SYSTEM FOR PROVIDING A DATA EXCHANGE SERVICE PROVIDER INTERFACE - A computer program product comprises a computer useable medium. The computer useable medium has a computer readable program such that when the computer readable medium is executed on a computer, the computer is caused to provide a data interface between an adapter component and one or more application interface components for a runtime application. Further, the computer is caused to establish a cursor that iterates over a plurality of data objects within a data set of the runtime application. In addition, the computer is caused to establish an accessor that provides access to a data element of the data object. The computer is also caused to provide the cursor and the accessor to the adapter component so that the adapter component accesses data through the one or more application interface components of the runtime application. | 2009-07-23 |
20090187927 | Method for invoking UOML instructions - Embodiments of the present invention disclose a method for encapsulating Unstructured Operation Markup Language (UOML) into an Application Programming Interface (API), including: mapping an object of an UOML operation to a data type of a programming language, mapping the UOML operation to an API function prototype in the programming language, wherein an attribute or sub element of the UOML operation is mapped to a parameter of the API function prototype; wherein, when an API function is invoked, the API function issues a corresponding UOML operation instruction to a docbase management system according to the mapping relations; after an operation defined by the UOML operation instruction is executed by the docbase management system, the return result from the docbase management system is converted into a data type of the programming language by the API function. In this way, API functions in different programming languages, which correspond to the UOML, can be implemented, and the application developers of the programming languages may invoke suitable API functions directly to implement applications on the docbase management system, thus the development efficiency can be improved. | 2009-07-23 |
20090187928 | Primary Application Advertising Layer - The present invention relates to a method that allows master web applications integrated into web slave applications to advertise products or services overcoming limitations related to the reduced advertising space available in the master application. The method also allows users to avoid disruption problems when working simultaneously with master and slave applications. | 2009-07-23 |
20090187929 | Remote monitoring and management ordering system for an information technology remote services management environment - An apparatus for providing remote services to an integrated information technology environment. The apparatus comprises a remote management platform. The remote management platform comprises a service delivery platform which comprises a plug in module. The plug in module is configurable to comprise a plurality of service functions. The plug in module enables some or all of the plurality of service functions to be selectively enabled. | 2009-07-23 |
20090187930 | DISK APPARATUS - A disk apparatus includes a chassis, a disk tray and a tray panel unit. The tray panel unit includes a panel main body and a spring body. The spring body has a coil part, a pair of end attachment parts and a middle attachment part. An axial direction of the coil part is aligned with a width direction of the tray panel unit. The pair of end attachment parts extends from both axial ends of the coil part, respectively. The end attachment parts are fixedly coupled to one of the panel main body and a front end part of the disk tray. The middle attachment part is provided to an axial middle portion of the coil part. The middle attachment part is fixedly coupled to the other of the panel main body and the front end part of the disk tray. | 2009-07-23 |
20090187931 | DISC APPARATUS - A disc apparatus includes a player and a holder. The player is configured for reading an optical disc, the player comprising a first latching portion. The holder is configured for holding extra optical discs, the holder comprising a second latching portion. The first latching portion and the second latching portion are capable of attaching the holder to the player cooperatively. | 2009-07-23 |
20090187932 | METHODS AND APPARATUS TO MONITOR, VERIFY, AND RATE THE PERFORMANCE OF AIRINGS OF COMMERCIALS - Methods and apparatus to monitor, verify, and rate the performance of airings of commercials are disclosed. An example method includes receiving an identification of an advertisement that was presented on a media presentation channel at a time, receiving ratings information for the media presentation channel associated with the time period, identifying a buy order for the received identification, receiving a purchased ratings value associated with the buy order, comparing the purchased ratings value to the ratings information, and displaying an indication of whether the ratings information is less than the purchased ratings value. | 2009-07-23 |
20090187933 | SYSTEM AND METHOD FOR DISTRIBUTION OF PICTURE OBJECTS - Proposed is a system ( | 2009-07-23 |
20090187934 | INTERACTIVE REVERSE CHANNEL FOR DIRECT BROADCAST SATELLITE SYSTEM - A system and method is disclosed for providing a reverse channel to enable interactive communication between a DBS subscriber and DBS service provider. The addition of an interactive return channel overcomes the problems associated with existing audience measurement systems as well as the problems associated with existing DBS signal security techniques. | 2009-07-23 |
20090187935 | Two-Way PDA, Laptop and Cell Phone Audience Response System - A two-way PDA, cell phone and laptop audience participation system providing the ability for real-time audience participation in questions and surveys and for real-time generation and display of results. A plurality of two-way wireless communication devices such as PDAs, cellphones or laptops are provided for use by participants at an event. At least one two-way wireless communication device, such as a wireless tablet, is provided for use by a presenter. Communications are between the presenter and participants are managed by a central server, wireless access points and routers. | 2009-07-23 |
20090187936 | Social broadcasting - A method of providing a broadcast is disclosed. One or more network communications is received via a network from each of a plurality of users of a broadcast provided at least in part other than via the network, each indicating a preference of the sending user with respect to a content of the broadcast. The network communications is processed to determine and update dynamically, and to provide for possible inclusion in the broadcast, a broadcast stream that reflects at least in part the network communications received from the plurality of users. | 2009-07-23 |
20090187937 | DEVICE AND METHOD FOR CONTROLLING DIGITAL BIDIRECTIONAL COMMUNICATION - An interface block ( | 2009-07-23 |
20090187938 | Service Substitution Techniques - Service substitution techniques are described. In an implementation, a substitution table is derived that specifies one or more service substitutions to be performed for content and that specifies particular geographic locations to perform at least one service substitution. One or more communications are formed to be streamed over a packet-switched network to a client that is to perform the at least one service substitution. The one or more communications include the substitution table and the content that corresponds to the at least one service substitution. | 2009-07-23 |
20090187939 | Methods and apparatus for user-based targeted content delivery - Methods and apparatus for selecting and delivering advertising or promotional content based on, e.g., the attributes of a desired demographic. In one embodiment, the invention enhances advertising or promotional penetration into a particular demographic of a network subscriber pool by correlating the advertising/promotion (and even the contextual program content) with specific users or groups of users within the pool. This approach decouples the advertising or promotion from any given program or lineup, and gives the network operator flexibility in deciding where, when, and how often to insert advertisements or promotions in order to achieve the desired result. Dynamic network architectures such as broadcast switched architectures can also be leveraged to further enhance flexibility and targeting precision. In effect, the network advertising or promotion model is made results-driven (versus program-centric). Subscriber privacy is also optionally maintained, thus ensuring that stored data is not traceable to a specific user. | 2009-07-23 |
20090187940 | VIDEO BROADCASTING METHOD, APPARATUS, AND SYSTEM - A video broadcasting method includes assigning channels to a video content based on a total number of channels usable for broadcasting the video contents and a playback time of the video content, calculating a broadcast start time interval of the channels assigned to the video content based on the playback time of the video content and number of the channels assigned to the video content setting broadcast start time per channel of the channels assigned to the video content, and broadcasting the video content at the broadcast start time set per the channel. | 2009-07-23 |
20090187941 | SYSTEM AND METHOD FOR TARGETED ADVERTISING - A computer readable medium is disclosed containing embedded computer executable instructions that when executed by a computer or router or switch are useful in performing a method for sending targeted advertising data, the computer program comprising instructions to receive a first data set at a server; instructions to duplicate the data to form N duplicated data sets; instructions to replace a source address in each of the N duplicated data sets with a different one of a number, N data source addresses; and instructions to send each of the N duplicated data sets to a different end user zone. A system and method for sending targeted advertising data are disclosed. A data structure for containing data used by the system and method is also disclosed. | 2009-07-23 |
20090187942 | RECEIVING APPARATUS - An apparatus operable with taking an allowable number of copies information into consideration. Provided is a receiving apparatus including a receiving unit configured to receive programs in a plurality of broadcast networks and data including information of the programs, a program guide preparing unit configured to prepare a program guide based on the information of the programs, and a display controlling unit configured to control a program guide prepared by the program guide preparing unit to be displayed, wherein: the display controlling unit controls information relating to copy control according to the broadcast networks to be displayed on the program guide. | 2009-07-23 |
20090187943 | PERSONALIZED MEDIA CHANNEL - A multimedia processing device (MPD) includes a relevance engine that is adapted to track a user's viewing preferences over time and to automatically determine which of the programs available in a given time slot is most probably preferred by that user. The relevance engine can then create a sequential play list, with each entry in the list corresponding to the program the user most likely wants to watch at that time. The user can thus be provided with a personalized multimedia channel (PMC) with the play list providing the program for each time slot. The user may be enabled to “tune” to the PMC like any other channel. When the user “tunes” to the PMC, the MPD will take the appropriate action to display the program selected by the PMC. | 2009-07-23 |
20090187944 | System and Method of Providing Recommendations Related to a Service System - A method of providing recommendations related to a service is disclosed and includes receiving data from a device associated with a service subscriber, the data identifying an individual. The method also includes creating a personalization profile associated with the service subscriber. The personalization profile is populated with information included in a profile of the identified individual. The method further includes providing at least one recommendation based on the personalization profile of the service subscriber. | 2009-07-23 |
20090187945 | CUSTOMIZED ELECTRONIC PROGRAMMING GUIDE - A customizable electronic programming guide (CEPG) is hosted on a residential gateway. The CEPG includes user-defined folders that may be populated with other folders (i.e., sub-folders), program identifiers, or both. Electronic programming guide data arrive at the residential gateway in a standard form and are reformatted by the residential gateway for display according to the user-defined folders and sub-folders. In some embodiments, the CEPG is accessible by multiple set-top boxes that are communicatively coupled to the residential gateway. For ease of configuration, the residential gateway may provide access to a locally-hosted configuration web page. | 2009-07-23 |
20090187946 | FAST CHANNEL SWITCHING FOR ENCRYPTED MEDIAFLO MOBILE MULTIMEDIA MULTICAST SYSTEM - Enhancing a stream layer transmission for a MediaFLO™ mobile multimedia multicast system comprising a transmitter and a receiver. Code word (CW) computations are performed on a current channel being accessed by the receiver. A favorite channel that a user is statistically mostly likely to switch to on the receiver at any particular time is anticipated. The Overhead Information Symbols (OIS) for each favorite channel is periodically monitored. The receiver remains in a sleep mode while data bursts are received from non-favorite channels, and then wakes up during data bursts of the favorite channel. The same CW computations are performed on the favorite channel as were being performed on the current channel. A cyclic redundancy check (CRC) is performed once the CW computations are performed upon selecting the favorite channel. | 2009-07-23 |
20090187947 | SYSTEM AND METHOD FOR MANAGING DISTRIBUTED MEDIA FILES - There is disclosed a media file distribution system and method. An asset management and delivery system and method for the distribution of digital files and data is provided. There are two major functions, with sub-functions within each. The system first serves as a fully automated management system for a company involved in video/file distribution, such as in video on demand (VOD) or other digital file industries. The system can ingest, prepare, schedule, transmit, track and report on any aspect of the business chain. Secondly, it also serves as a product for both content providers and recipients to be able to view, manage and run their entire content offering remotely from anywhere through the Internet. | 2009-07-23 |
20090187948 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DELIVERING A PROGRAM IN ADVANCE OF A SCHEDULED BROADCAST TIME - A scheduled broadcast time is retrieved for a program that is to be delivered in advance of the scheduled broadcast time, wherein the scheduled broadcast time is associated with a program content identifier for the program. Prior to the scheduled broadcast time, a pre-cast channel is selected on a network by selecting at least one of a currently unused channel or a dedicated pre-cast channel. Prior to the scheduled broadcast time, a signal is sent for placing a viewer program storage device into a pre-cast mode, such that viewing of the pre-cast channel is disabled. Prior to the scheduled broadcast time, the program is delivered to the viewer program storage device over the pre-cast channel, wherein the delivered program is associated with the program content identifier and a time stamp for disabling playback of the delivered program until arrival of the scheduled broadcast time. | 2009-07-23 |
20090187949 | Mapping of Network Information Between Data Link and Physical Layer - Aspects of the invention are directed to a cell-frequency-link descriptor configured to map network-specific parameters with time frequency slicing (TFS) information in a digital video broadcast system. The cell-frequency-link descriptor may include fields that provide a mapping between a cell identifier, a TFS group identifier, a bandwidth, a guard interval, a transmission mode, and a frequency. The fields may provide a mapping between cells, frequencies, TFS groups, related guard intervals, bandwidths, and transmission modes for multiple cells within the digital video broadcast system. The fields may include: a cell identifier field, a TFS-group identifier field, a bandwidth field, a guard interval field, a transmission mode field, a frequency field, a cell identifier extension field, and a transposer frequency field. | 2009-07-23 |
20090187950 | AUDIBLE MENU SYSTEM - An audible menu system associated with distribution of television content over a service provider network is disclosed. The menu system includes a speech synthesizer and screen reader. Electronic programming guide (EPG) elements are read by a screen reader and provided to a speech synthesizer for presenting audible representations of EPG elements to a user. The user may provide inputs to a remote control device to navigate an EPG that may also be presented through a graphical user interface. As a user navigates a cursor over selectable EPG elements, disclosed embodiments provide audible outputs that correspond to the selectable EPG elements. In some embodiments, users may provide customized audio inputs that are played as audio outputs during future menu navigation sessions. | 2009-07-23 |
20090187951 | SYSTEM FOR PREVENTING DUPLICATE RECORDINGS - Disclosed embodiments help prevent recording duplicate instances of multimedia programs on digital video recorders (DVRs). In response to a request to schedule the broadcast and recording of a multimedia event, a network-based scheduler pings a DVR to determine whether a duplicate instance of the requested multimedia program is stored on the DVR. In some cases, metadata associated with recorded programs on the DVR is analyzed and compared to metadata associated with the requested multimedia event. If an exact match, or a match that meets a threshold value, is determined by comparing the metadata, the scheduler may notify the user of the potential for storing the duplicate instance of the multimedia program. In some embodiments, the scheduler processes user requests to override the prevention of recording duplicates. | 2009-07-23 |
20090187952 | APPARATUS AND METHOD FOR DISPLAYING DIGITAL MULTIMEDIA BROADCASTING SERVICE - An apparatus and method for displaying a digital multimedia broadcasting (DMB) service, which is capable of always displaying a dynamic label service (DLS) of a digital audio broadcasting (DAB) signal in a ticker form in a digital multimedia broadcasting receiver. A method of displaying a digital multimedia broadcasting service includes determining whether additional data carried in a digital audio broadcasting (DAB) signal is received while any application is being executed; and displaying the executed application and the received additional data together on one screen when the additional data is received. Accordingly, since news information or traffic information can be always received in the DMB receiver even during the execution of any application, it is possible to make the DMB receiver more convenient for a user. | 2009-07-23 |
20090187953 | CONTENT DELIVERING SYSTEM, RELAYING APPARATUS, USER TERMINAL, CONTENT DELIVERING METHOD, PROGRAM, AND RECORDING MEDIUM - In the broadcast delivering service utilizing an IP network, a content delivering system is provided in which the emergency broadcast can be timely and securely delivered when the disaster or the happening is induced. The content delivering system is configured by including a relaying apparatus and a user terminal, the relaying apparatus includes a data receiving unit that receives video data and emergent data from the IP network, a first format converting unit that converts the emergent data to an OAM frame, and a priority transfer controlling unit that performs control to transfer the converted emergent data to the user terminal in preference to the video data, and the user terminal includes a priority generation controlling unit that performs control to extract the emergent data from the data from the relaying apparatus, and to generate delivery data by priority, a second format converting unit that converts the data from the relaying apparatus to an IP frame, and a data imposing unit that combines the emergent data and the video data to superimpose the emergent data on the video data, and generates the delivery data. | 2009-07-23 |
20090187954 | Button based video database interface - The described embodiments of the present invention provide a video database client application configured to execute on a wireless communication device or a device with a small display screen. The video database client application includes a user interface including user interface components designed to access video information and view videos using the wireless communication device. The video database client application includes a video player module to integrate and control a native video player within the user interface. The video database client application further includes a video database interface module adapted to retrieve videos and video information from the video database. The video database interface module functions to pre-fetch information from the video database based on anticipated user information needs. | 2009-07-23 |
20090187955 | Subscriber Controllable Bandwidth Allocation - A disclosed computer program product includes computer executable instructions, stored on a computer readable medium, for allocating bandwidth among various network provided communication services. The executable instructions include instructions to process a subscriber request to specify a bandwidth allocation, determine a multimedia bandwidth allocation indicative of bandwidth allocated to multimedia content, and generate a multimedia content request. The multimedia content request is influenced by the multimedia bandwidth allocation. In some embodiments, for example, the multimedia content request includes multimedia bandwidth information determined at least in part by the multimedia bandwidth allocation. The multimedia bandwidth information may indicate the bandwidth available for multimedia content, which may be determined from the multimedia bandwidth allocation less any bandwidth allocated to or otherwise consumed by other multimedia layers. In these embodiments, a multimedia delivery server may determine how much bandwidth to allocate to the requested multimedia content from information contained in the request itself. | 2009-07-23 |
20090187956 | METHOD AND APPARATUS FOR MERGING VOICE AND DATA FEATURES WITH INTERNET PROTOCOL TELEVISION - A method and apparatus that enable the use of a multi-service endpoint device to integrate features and functions of voice and/or data services with IPTV service through a TV console are disclosed. For example, the method connects a multi-service endpoint device (MSED) to a plurality of networks, where at least one of the plurality of networks provides a voice service, and where at least one of the plurality of networks provides an Internet Protocol Television (IPTV) service. The method then integrates the voice service with the IPTV service using the MSED. | 2009-07-23 |
20090187957 | Delivery of Media Assets Having a Multi-Part Media File Format to Media Presentation Devices - Improved techniques and systems for electronic delivery of digital media asset files to electronic devices are disclosed. In one embodiment, a media item can be stored in a multi-part media item file. The multi-part media item file for the media item can be delivered to a host device that can thereafter support a plurality of different media presentation devices that have different media presentation capabilities. The host device can distribute customized (or optimized) versions of the multi-part media item file to different media presentation devices. In one embodiment, the multi-part media item file can include at least a plurality of video streams. When the media item is to be presented by one of the media presentation devices, the media presentation device can decode the plurality of video streams from the multi-part media item file into decoded video frames and then combine the decoded video frames from the different streams for presentation of video of the media item. | 2009-07-23 |
20090187958 | METHOD AND APPARATUS FOR MANAGING VIDEO TRANSPORT - A method and apparatus for managing video transport is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to predict visibility to a viewer of packet loss impairment for communicated video content based at least in part on scene information for one or more packets of the video content. Other embodiments are disclosed. | 2009-07-23 |
20090187959 | Digital television translator with PSIP update - A digital television translator includes a digital television receiver for receiving a first digital television signal at a first frequency and generating a digital transport stream from the first digital television signal. The digital transport stream can include original Program and System Information (PSIP) data having RX channel data that is indicative of the first frequency, the first major channel number, and/or the first minor channel number. The digital television translator also includes a PSIP update module for updating the original PSIP data in the digital transport stream by replacing the RX channel data with TX channel data. The TX data is indicative of a second frequency, a second major channel number, and/or a second minor channel number. The digital television translator further includes a digital television modulator for converting the digital transport stream having the updated PSIP data into a second digital television signal at the second frequency, where the second frequency can be the same or different from the first frequency. | 2009-07-23 |
20090187960 | IPTV receiving system and data processing method - An internet protocol television (IPTV) receiving system and a method of processing data are disclosed. The IPTV receiving system according to present invention comprises a signal receiving unit for receiving an IPTV signal including respective scalable video streams for IPTV services of a plurality of layers including a base layer and at least one enhancement layer, the respective scalable video streams of the plurality of layers having different identifiers and program table information for the scalable video streams, a demodulating unit for demodulating the respective scalable video streams of the plurality of layers and the program table information of the received IPTV signal, a demultiplexer for identifying and outputting the demodulated video stream of the base layer with reference to the demodulated program table information and identifying and outputting the demodulated video stream of at least one enhancement layer, and a decoder for performing video decoding on a video stream of at least one layer identified and outputted by the demultiplexer. | 2009-07-23 |
20090187961 | METHOD AND APPARATUS FOR PROVIDING SERVICE AND METHOD AND APPARATUS FOR PERFORMING COMMUNICATION - A method and apparatus for providing an interactive service and a method and apparatus for performing communication are provided. An Open Cable Application Platform (OCAP) application may be directly executed in at least one broadcasting receiving apparatus by determining whether an application for providing the interactive service is independently executable using middleware installed in the broadcasting receiving apparatus and selectively requesting a set-top box to provide data needed for executing the application based on the determination result. | 2009-07-23 |
20090187962 | METHODS, DEVICES, AND COMPUTER PROGRAM PRODUCTS FOR POLICY-DRIVEN ADAPTIVE MULTI-FACTOR AUTHENTICATION - Embodiments of the invention include methods for providing policy-driven, adaptive, multi-factor authentication procedures. A pool of potential authentication challenges is defined. Each of the potential authentication challenges is assigned a category and a weighted difficulty level. One or more authentication challenges are selected from the pool of potential authentication challenges using one or more security policies that are based upon the assigned category and the assigned weighted difficulty level, wherein a quantity of authentication challenges is determined using the one or more security policies. One or more historical access patterns are utilized in conjunction with the selected one or more authentication challenges to authenticate a user, wherein the historical access patterns include at least one of an access time or an access location. One or more dummy challenges are used to authenticate the user. | 2009-07-23 |
20090187963 | Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability - The present invention provides a method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability and access policies. The Security Enforcement System ( | 2009-07-23 |
20090187964 | Applying Security Policies to Multiple Systems and Controlling Policy Propagation - A method and apparatus for attaching security policies to secured computing systems is provided. A security policy is attached to a parent domain. The parent domain includes a first secured computing system. The security policy is a natural language description for controlling access to the secured computing system. Upon determining that the parent domain propagates the security policy, a first generation child domain is identified. The first generation child domain includes a second secured computing system. The first generation child domain is associated with the parent domain in a hierarchical relationship. It is determined that the first generation child domain inherits the security policy based on an inheritance rule. The security policy is attached to the first generation child domain. | 2009-07-23 |
20090187965 | ELECTRONIC APPARATUS, METHOD FOR CONTROLLING FUNCTIONS OF THE APPARATUS AND SERVER - An electronic apparatus, having functions on which use limitations can be imposed, in which a variety of functions are loaded on the electronic apparatus by hardware circuitry or by computer programs. Use of a certain function(s) is limited by setting a function limiting flag to “1”, provided that an other function(s) are usable within a period of a preset number of days of possible test use. An application is made from the apparatus to a key issuing source for purchasing usable functions. The key issuing source then issues a limitation removing key. The limitation removing key may be acquired from the key issuing source by a mobile phone terminal and transmitted to the apparatus by infrared ray communication. The apparatus rewrites the function limiting flag by this limitation removing key. If the number of days of actual test use has reached the number of days of possible test use, the CPU of the apparatus does not carry out the function(s) the function limiting flag of which is “1”. | 2009-07-23 |
20090187966 | NEAR REAL-TIME MULTI-PARTY TASK AUTHORIZATION ACCESS CONTROL - A method and apparatus are used in determining authorization to perform tasks in a computer environment, and specifically requiring multiple parties to authorize a task before access is granted. The present system provides for substantially real time communication to a second party authorizer when a task owner is attempting to perform a task. | 2009-07-23 |
20090187967 | ENHANCEMENTS TO DATA-DRIVEN MEDIA MANAGEMENT WITHIN AN ELECTRONIC DEVICE - A centralized resource manager manages the routing of audio or visual information within a device, including a handheld device such as a smartphone. The resource manager evaluates data-driven policies to determine how to route audio or visual information to or from various input or output components connected to the device, including headphones, built-in speakers, microphones, bluetooth headsets, cameras, and so on. Among the data considered in the policies are connection status data, indicating if a device is connected, routing status data, indicating if a device is permitted to route information to or from a component, and grouping data, indicating logical relationships between various components. Components may be considered inherently routable, automatically routable, or optionally routable. Numerous other uses exist for such data, including providing simpler and more logical management interfaces. | 2009-07-23 |
20090187968 | SYSTEM AND METHOD FOR DYNAMIC NETWORK POLICY MANAGEMENT - A system and method that provides dynamic network policy management. The system enables a network administrator to regulate usage of network services upon initiation of and throughout network sessions. The system employs a method of identifying selectable characteristics of attached functions to establish static and dynamic policies, which policies may be amended before, during and after any session throughout the network based on the monitored detection of any of a number of specified triggering events or activities. Particular policies associated with a particular identified attached function in prior sessions may be cached or saved and employed in subsequent sessions to provide network usage permissions more rapidly in such subsequent sessions. The cached or saved policy information may also be used to identify network usage, control, and security. The system and method of the present invention provides static and dynamic policy allocation for network usage provisioning. | 2009-07-23 |
20090187969 | SYSTEM AND METHOD FOR SYNCHRONIZING SECURITY SETTINGS OF CONTROL SYSTEMS - A method for communicating data between a first and second control system (FCS and SCS). FCS ( | 2009-07-23 |
20090187970 | NETWORKING AS A SERVICE: DELIVERING NETWORK SERVICES USING REMOTE APPLIANCES CONTROLLED VIA A HOSTED, MULTI-TENANT MANAGEMENT SYSTEM - Networking as a Service (NaaS) delivers network services using remote appliances controlled by a hosted, multi-tenant management system. The system may include a heartbeating process for communication between a web-based server and appliances, in which the appliances periodically contact the management system on the server. The heartbeating process allows the appliances to maintain a completely up-to-date configuration. Furthermore, heartbeating allows for comprehensive monitoring of appliances and for software distribution. The system may also include means for authenticating appliances, without the need for pre-installed PSKs or certificates. | 2009-07-23 |
20090187971 | METHOD AND PROCESSOR FOR DELEGATED TRANSMISSION/ RECEPTION OF A SESSION INITIATION PROTOCOL, SIP, MESSAGE - A method for delegated transmission/reception of a Session Initiation Protocol, SIP, message, where delegation related header fields or header field parameters are extended in the SIP message and a SIP processor processes the message according to the extended header fields or header field parameters to implement the delegation function at the SIP layer. Accordingly, an SIP processor is provided. Because delegation is implemented at the SIP layer, the delegation mechanism is independent of services and therefore can be applied to different services. This facilitates multiplexing and uniform management of the delegation function. | 2009-07-23 |
20090187972 | METHODS AND APPARATUS OF OVER-THE-AIR PROGRAMMING OF A WIRELESS UNIT - Methods and apparatus for secure over-the-air (OTA) programming, and particularly, activation, of a wireless unit in a particular communications system. The unit stores a stored key having been generated by using a key algorithm (K-algorithm) with an identifier associated with the unit as an input to the K-algorithm. The unit may receive information such as parameters and a verification number from a communications system for the purpose of programming the unit. The verification number is generated by using an authorization algorithm (A-algorithm) having the parameters and a key as A-algorithm inputs. They key is generated by the K-algorithm having the identifier associated with the K-algorithm input. In response to the receipt of the parameters and the verification number, the wireless unit generates a trial verification number by using the A-algorithm with the parameters and the stored key as trial inputs. The unit compares the verification number to the trial verification number for a match. When finding the match, the unit uses the parameters for programming of the unit in the particular communications system. When failing to find the match, the unit fails to use the parameters for the programming. | 2009-07-23 |
20090187973 | SYSTEM AND METHOD FOR VERIFYING AN ATTRIBUTE IN RECORDS FOR PROCUREMENT APPLICATION - A system and associated method for verifying an attribute in records for a procurement application. The procurement application employs a database having a company profile record, a user profile record, and a requisition object record, among which share a company_code attribute as a target attribute that is desired to be valid. The company profile record has a validity attribute, and the requisition object record has a validity flag, to indicate validities of the value for the target attribute in respective record. A company profile configuration module configures the company profile record. A user profile verification module prohibits a user without a valid user profile from accessing the procurement application. A user profile cleanup program removes invalid user profile records from the database. A requisition object verification module checks out valid values for the company_code attribute from the company profile records and blocks modification to invalid requisition objects. | 2009-07-23 |
20090187974 | Push Artifact Binding For Communication In A Federated Identity System - A data processing system implements push artifact binding for communication in a federated identity system. A federated identity system in the data processing system comprises an initiator that handles a federated action by determining that a user is to be conveyed to a recipient, constructing an appropriate message request or assertion to be sent to the recipient, and sending the message as a push message over a back-channel communication pathway directed to the recipient's location. The federated identity system further comprises a recipient that handles the federated action by responding to the message by forming a Uniform Resource Locator (URL) to which the user can be directed. The initiator redirects the user to the URL specified in the recipient response. | 2009-07-23 |
20090187975 | SYSTEMS FOR AUTHENTICATING A USER'S CREDENTIALS AGAINST MULTIPLE SETS OF CREDENTIALS - Provided are systems for authenticating the identity of a user for use in a distributed computer network including multiple sets of access credentials. A user request, including the user's input credentials, is received, and then compared simultaneously to multiple sets of access credentials in order to verify the user's input credentials. When the user's input credentials are verified, the appropriate level of access authority is then determined, and proper access is granted to the user. | 2009-07-23 |
20090187976 | METHODS AND DEVICES FOR IMPROVING THE RELIABILITY OF COMMUNICATION BETWEEN AN AIRCRAFT AND A REMOTE SYSTEM - The object of the invention is methods and devices for improving the reliability of communication between an aircraft and a remote system. According to the invention, the aircraft transmits a request for verification of security to a remote system. Upon reception of the response to this request, comprising at least one indication pertaining to the security of the remote system, the aircraft analyzes this indication and decides to establish or not to establish data communication between the aircraft and the remote system. When a verification request is received, the remote system is verified and a response to the request is transmitted to the aircraft. | 2009-07-23 |
20090187977 | SERVICE VERIFYING SYSTEM, AUTHENTICATION REQUESTING TERMINAL, SERVICE UTILIZING TERMINAL, AND SERVICE PROVIDING METHOD - An object is to provide a service providing method capable of curbing rise of cost A service providing method according to the present invention is one for providing services A and B, which authenticates a user of an authentication requesting terminal in order to make service A available to the user and which determines whether service B is available to the user, in a state in which the user is authenticated about service A. When service B is determined to be available, a permission message is stored and a permission response based on the permission message for utilization of service B is transmitted to the authentication requesting terminal. Then the permission message on which a utilization request message from a service utilizing terminal is based, is verified, and, if it is in an available status, the service utilizing terminal is permitted to utilize service B. The use of the authentication result on service A obviates a need for provision of new authentication means for service B, so as to lead to reduction of cost. | 2009-07-23 |
20090187978 | SECURITY AND AUTHENTICATIONS IN PEER-TO-PEER NETWORKS - A system and method for providing access to a secured data resource to a client on a peer-to-peer network. The system includes a content management server which receives and verifies a first request for access to a secured data resource from the client. If the first request is valid, the content management server generates a second request for access to the secured data resource which comprises peer-to-peer control information and information identifying the secured data resource, and which can additionally include a signature generated using a shared key. The content management transmits the second request to the client, which then retransmits the second request to a peer-to-peer control server. The control server receives the second request and validates it. Such validations can include validating the request with the shared key. If the second request is valid, the control server transmits instructions for accessing the secured data resource back to the client. | 2009-07-23 |
20090187979 | METHOD AND APPARATUS FOR GLOBAL UNIQUE IDENTIFIER, INCLUDING ID DATABASE - An entity can request the generation of a unique identifier to serve as a common identifier for the entity immune to changes in the entities contact information. A data base entry indexed at least in part by the unique identifier can be created for housing further contact information for the entity. The unique identifier can remain a constant focal point for contacting the entity or obtaining contact information about the entity. The entity can update contact information in the data base entry and as such, the unique identifier can be used to access current contact information. | 2009-07-23 |
20090187980 | METHOD OF AUTHENTICATING, AUTHORIZING, ENCRYPTING AND DECRYPTING VIA MOBILE SERVICE - The present invention provides a method of authenticating, authorizing, encrypting and decrypting an application by utilizing a mobile secure server as the platform that can allow the subscriber to authenticate, authorize, encrypt or decrypt a document or an application through the mobile secure server. The account user can register and activate the service to have a secure banking transaction, such as online payment. A request message is submitted via an electronic device to an application server, which performs specific operations in accordance with the instruction of the request message, and sends the request message to the mobile secure server, wherein the mobile secure server will forward the request message to the account mobile telecommunication device that hosts the digital ID and certificates to be sued to authenticate, authorize, encrypt or decrypt the request message and then sends back a reply message to electronic device via the account mobile telecommunication device, application server and mobile secure server. | 2009-07-23 |
20090187981 | FILE DOWNLOADING SERVER AND METHOD - A method for downloading files from a server is provided. The method includes the steps of: receiving a registered account and a password; determining whether the current user is an authorized user of the server; reading a terminal ID of a terminal when the user is an authorized user; displaying files whose download status are to-be-downloaded status when the read terminal ID matches the corresponding terminal ID of the registered account; recording the selected files and delivering the selected files to the corresponding terminal; and updating information in relation to the files that are viewed by the registered account in the file list and updating the download status of the viewed files to the to-be-downloaded status when the read terminal ID does not match the corresponding terminal ID of the registered account, and updating the download status of the files to the downloaded status when the files are downloaded to the terminal. | 2009-07-23 |
20090187982 | Systems and methods for authenticating communications in a network medium - A system and method for sharing files securely includes server software on a first device configured to communicate with server software operating on one or more other preauthorized devices, such as a second device. The servers communicate with each other securely using cryptographic information exchanged during a preauthorization phase using a range-limited communication channel. The server on the first device obtains file information from the other preauthorized device(s) and combines the information with local file information from the first device. This combined file information is sent to client software operating on the machine, which presents the combined file information to users. | 2009-07-23 |
20090187983 | METHOD AND SYSTEM FOR DISTRIBUTED, LOCALIZED AUTHENTICATION IN THE FRAMEWORK OF 802.11 - A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime. | 2009-07-23 |
20090187984 | DATASPACE PROTECTION UTILIZING VIRTUAL PRIVATE NETWORKS ON A MULTI-NODE COMPUTER SYSTEM - A method and apparatus provide data security on a parallel computer system using virtual private networks. An access setup mechanism sets up access control data in the nodes that describes which virtual networks are protected and what applications have access to the protected private networks. When an application accesses data on a protected virtual network, a network access mechanism determines the data is protected and intercepts the data access. The network access mechanism in the kernel may also execute a rule depending on the kind of access that was attempted to the virtual network. Authorized access to the private networks can be made via a system call to the access control mechanism in the kernel. The access control mechanism enforces policy decisions on which data can be distributed through the system via an access control list or other security policies. | 2009-07-23 |
20090187985 | METHOD FOR DETERMINING RANGE OF AVAILABLE FUNCTIONS OF INFORMATION APPARATUS - According to an aspect of an embodiment, a method of controlling an information apparatus has performing authentication of a user of the information apparatus, performing authentication of an administrator of the information apparatus, determining a range of available functions of the information apparatus corresponding to successful authentication of the user and the administrator and permitting the user to utilize the range of available functions of the information apparatus. | 2009-07-23 |
20090187986 | AUTHENTICATION SERVER, AUTHENTICATION METHOD AND AUTHENTICATION PROGRAM - Upon receipt of a service use request from a client, an authentication server device reads one or more image information pieces from an image information storage storing multiple image information pieces each containing one or more known symbols, one or more dummy symbols, or both of them, and thereafter creates challenge data using the one or more read image information pieces so that one or more two-dimensional images each containing one or more of the known symbols and one or more two-dimensional images each containing one or more of the dummy symbols can be presented to the user of the client, one image at a time. Upon receipt of response data, the authentication server device judges whether or not the received response data matches the one or more known symbols contained in the challenge data, and approves the service use of the client device if the match is confirmed. | 2009-07-23 |
20090187987 | Learning framework for online applications - Learning to, and detecting spam messages using a multi-stage combination of probability calculations based on individual and aggregate training sets of previously identified messages. During a preliminary phase, classifiers are trained, lower and upper limit probabilities, and a combined probability threshold are iteratively determined using a multi-stage combination of probability calculations based on minor and major subsets of messages previously categorized as valid or spam. During a live phase, a first stage classifier uses only a particular subset, and a second stage classifier uses a master set of previously categorized messages. If a newly received message can not be categorized with certainty by the first stage classifier, and a computed first stage probability is within the previously determined lower and upper limits, first and second stage probabilities are combined. If the combined probability is greater than the previously determined combined probability threshold, the received message is marked as spam. | 2009-07-23 |
20090187988 | CROSS-NETWORK REPUTATION FOR ONLINE SERVICES - A reputation server associates feedback from previous network transactions with an account of a user in a network. A reputation score for the user is calculated based on the feedback to indicate the probability the user will abuse the network. When an online service receives a request to perform a transaction from the user, the online service performs the transaction based on the user's reputation score. Additionally, a server generates a reputation packet including the reputation score for a user for use by an online service when the user requests the online service to perform a transaction. The online service may authenticate the reputation packet with the server and, if the reputation packet is authenticated, the online service performs the transaction based on the user's reputation score. | 2009-07-23 |
20090187989 | System and method for controlling abnormal traffic based on fuzzy logic - A system for controlling abnormal traffic based on a fuzzy logic includes: an intrusion detection module for analyzing packets incoming from a network interface by means of a membership function defined based on a specific period of time, and outputting a fuzzy value representing a degree of a port scan attack; a fuzzy control module for recognizing the degree of the port scan attack based on the fuzzy value and outputting a control signal for traffic control according to the recognized degree of the port scan attack; and an intrusion blocking module for receiving the control signal and controlling the traffic with the network interface. | 2009-07-23 |
20090187990 | METHOD AND SYSTEM TO VERIFY DATA RECEIVED, AT A SERVER SYSTEM, FOR ACCESS AND/OR PUBLICATION VIA THE SERVER SYSTEM - A method and system to verify active content included within a markup language document store multiple instances of publication information (e.g., an e-commerce listing or e-mail message) in a database associated with a server system. The stored publication information includes active content (e.g., web pages that include an executable script or point to an executable script). Selected active content is retrieved from the database, and subject to a verification process. The verification process is to verify that the selected active content is not malicious. The selected active content is selectively published based on an outcome of the verification process. | 2009-07-23 |
20090187991 | TRUSTED SECURE DESKTOP - Systems and methods for simultaneously protecting software components ( | 2009-07-23 |
20090187992 | METHOD AND SYSTEM FOR CLASSIFICATION OF SOFTWARE USING CHARACTERISTICS AND COMBINATIONS OF SUCH CHARACTERISTICS - In embodiments of the present invention improved capabilities are described for the steps of identifying a functional code block that performs a particular function within executable code; transforming the functional code block into a generic code representation of its functionality by tokenizing, refactoring, or the like, the functional code block; comparing the generic code representation with a previously characterized malicious code representation; and in response to a positive correlation from the comparison, identifying the executable code as containing malicious code. | 2009-07-23 |
20090187993 | PROCESSOR HARDWARE AND SOFTWARE - A system and method for detecting the use of pirated software on a processor device ( | 2009-07-23 |
20090187994 | Method and system for protecting a virtual community visitor from unauthorized social interaction - There is provided a method of protecting a virtual community visitor from unauthorized social interaction comprising receiving a request from the virtual community visitor seeking access to a virtual community content, determining whether the virtual community content includes at least one social interaction opportunity, prompting the virtual community visitor to provide a visitor identity if the virtual community content includes at least one social interaction opportunity, associating the visitor identity with a socialization level, and utilizing the socialization level in one or more permission database to regulate social interaction. In one embodiment, a system for protecting a virtual community visitor from unauthorized social interaction comprises a virtual community content server, and a processor configured to execute instructions included in a social interaction control software to associate a socialization level with the virtual community visitor and utilize the socialization level in one or more permission database. | 2009-07-23 |
20090187995 | Technique for License management and online software license enforcement - A software protection is presented comprising software license management and online software license enforcement, wherein individual licenses are provided for regulating the use of a software product, and the software product is individualized while being downloaded from a license server, and the execution of each individualized software product is monitored in agreement with the individual license terms corresponding to the individual software download. | 2009-07-23 |
20090187996 | Ion Channel - The present invention relates to a method of identifying a molecule suitable for the treatment, prophylaxis or alleviation of pain, the method comprising determining whether a candidate molecule is an agonist or antagonist, including a opener, blocker or modulator, of Kv9.2 polypeptide, in which the Kv9.2 polypeptide comprises the amino acid sequence shown in SEQ ID NO:3 or SEQ ID NO:5, or a sequence which is at least 90% identical thereto. | 2009-07-23 |