35th week of 2012 patent applcation highlights part 58 |
Patent application number | Title | Published |
20120222036 | IMAGE FORMING APPARATUS - An MFP is provided with a main CPU for controlling operation of the MFP according an operating condition set to the MFP, a job management table for sequentially registering input jobs by priority, and a job execution control portion for determining whether or not to permit execution of the job according to the order of registration from a job with high priority that is registered in the job management table. The job execution control portion calculates, based on a job condition of a job intended for permission determination, utilization of the CPU associated with execution of the job, then restricts an operating condition of the MFP in a case where the calculated CPU utilization exceeds a predetermined value, and permits execution of the job according to the restricted operating condition in a case where the CPU utilization when the operating condition is restricted becomes the predetermined value or lower. | 2012-08-30 |
20120222037 | DYNAMIC REPROVISIONING OF RESOURCES TO SOFTWARE OFFERINGS - The disclosed embodiments provide a system that facilitates the maintenance and execution of a software offering. During operation, the system obtains a policy change associated with a service definition of the software offering. Next, the system updates one or more requirements associated with the software offering based on the policy change. Finally, the system uses the updated requirements to dynamically reprovision one or more resources for use by the software offering during execution of the software offering. | 2012-08-30 |
20120222038 | TASK DEFINITION FOR SPECIFYING RESOURCE REQUIREMENTS - Task definitions are used by a task scheduler and prioritizer to allocate task operations to a plurality of processing units. The task definition is an electronic record that specifies resources needed by, and other characteristics of, a task to be executed. Resources include types of processing nodes desired to execute the task, needed amount or rate of processing cycles, amount of memory capacity, number of registers, input/output ports, buffer sizes, etc. Characteristics of a task in clued maximum latency time, frequency of execution of a task, communication ports, and other characteristics. An examplary task definition language and syntax is described that uses constructs including order of attempted scheduling operations, percentage or amount of resources desired by different operations, handling of multiple executable images or modules, overlays, port aliases and other features. | 2012-08-30 |
20120222039 | Resource Data Management - A set of data structures defines resource relationships and locations for a set of resources to form defined resource relationships and defined locations for the set of resources. A receiver obtains, from an unsecure device, replaceable unit data and characterization data for a current resource in the set of resources. A writer merges obtained replaceable unit data for a current resource with obtained characterization data for the current resource for each resource of the set of resources to form a set of data files. | 2012-08-30 |
20120222040 | RESOURCE MANAGEMENT SYSTEM, RESOURCE INFORMATION PROVIDING METHOD AND PROGRAM - [Object] To provide a resource management system capable of stably providing most recently updated resource information at a high speed. | 2012-08-30 |
20120222041 | TECHNIQUES FOR CLOUD BURSTING - Techniques for automated and controlled cloud migration or bursting are provided. A schema for a first cloud in a first cloud processing environment is used to evaluate metrics against thresholds defined in the schema. When a threshold is reached other metrics for other clouds in second cloud processing environments are evaluated and a second cloud processing environment is selected. Next, a second cloud is cloned in the selected second cloud processing environment for the first cloud and traffic associated with the first cloud is automatically migrated to the cloned second cloud. | 2012-08-30 |
20120222042 | MANAGEMENT OF HETEROGENEOUS WORKLOADS - Systems and methods for managing a system of heterogeneous workloads are provided. Work that enters the system is separated into a plurality of heterogeneous workloads. A plurality of high-level quality of service goals is gathered. At least one of the plurality of high-level quality of service goals corresponds to each of the plurality of heterogeneous workloads. A plurality of control functions are determined that are provided by virtualizations on one or more containers in which one or more of the plurality of heterogeneous workloads run. An expected utility of a plurality of settings of at least one of the plurality of control functions is determined in response to the plurality of high-level quality of service goals. At least one of the plurality of control functions is exercised in response to the expected utility to effect changes in the behavior of the system. | 2012-08-30 |
20120222043 | Process Scheduling Using Scheduling Graph to Minimize Managed Elements - A process scheduler may use a scheduling graph to determine which processes, threads, or other execution elements of a program may be scheduled. Those execution elements that have not been invoked or may be waiting for input may not be considered for scheduling. A scheduler may operate by scheduling a current set of execution elements and attempting to schedule a number of generations linked to the currently executing elements. As new elements are added to the scheduled list of execution elements, the list may grow. When the scheduling graph indicates that an execution element will no longer be executed, the execution element may be removed from consideration by a scheduler. In some embodiments, a secondary scan of all available execution elements may be performed on a periodic basis. | 2012-08-30 |
20120222044 | METHOD AND SYSTEM FOR POLLING NETWORK CONTROLLERS - Improving the performance of multitasking processors are provided. For example, a subset of M processors within a Symmetric Multi-Processing System (SMP) with N processors is dedicated for a specific task. The M (M>0) of the N processors are dedicate to a task, thus, leaving (N−M) processors for running normal operating system (OS). The processors dedicated to the task may have their interrupt mechanism disabled to avoid interrupt handler switching overhead. Therefore, these processors run in an independent context and can communicate with the normal OS and cooperation with the normal OS to achieve higher network performance. | 2012-08-30 |
20120222045 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE STORAGE MEDIUM HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM - Application process means executes a predetermined application program. Communication process means performs a predetermined data communication process with another communication target. Communication stop determination means determines whether or not to stop the data communication process performed by the communication process means, on the basis of an instruction from the application process means. When it is determined by the communication stop determination means to stop the data communication process, the data communication process is stopped. | 2012-08-30 |
20120222046 | DATA SHARING BETWEEN APPLICATIONS WHERE ONLY ONE APPLICATION KNOWS THE BUSINESS PURPOSE OF THE DATA - An approach for sharing data between a calling application and a callee application is presented. A callee application receives a request for processing data owned and stored by the calling application in a data table. The callee application receives a document to which containers that include data elements from the data table are attached in a predefined order. The callee application identifies element types corresponding to the containers based on a mapping interface table. The callee application unloads data elements from the containers into a data store via the predefined order and associates the data elements with the corresponding element types. The callee application processes the data according to the request. The processing includes applying a business rule to a data element based on the business rule being associated with an element type of the data element. Only the callee application has knowledge of the applied business rule. | 2012-08-30 |
20120222047 | Monitoring a Software System Using an Interpretation Rule of an Ontology - Monitoring a software system based on a service oriented architecture (SOA). The method may involve system components communicating with each other via sending messages. The method may include receiving a monitoring message by a monitoring component where the monitoring message may be sent from a system component of the software system. The method may further include providing an ontology including at least one interpretation rule for the message by the monitoring component. The method may also include reacting of the monitoring component in accordance with the at least one interpretation rule. | 2012-08-30 |
20120222048 | CENTRALIZED AUDIT AND ERROR HANDLING - Audit objects generated by applications executing on one or more computers are received in a central queue. Each audit object is generated responsive to a transaction occurrence in the execution of an application. Each audit object includes detailed information about the transaction occurrence, including information identifying the application and the transaction that occurred. Each audit object in the central queue is transformed from a format used by the application into a common format for audit processing with respect to all of the applications. At least some of the formats used by the applications are different. Each transformed audit object is placed into a record in a central database for the respective application by populating the detailed information about the transaction occurrence from each transformed audit object into fields of the record in the database for the respective application. | 2012-08-30 |
20120222049 | REGISTRATION IN A DE-COUPLED ENVIRONMENT - A method, system and computer program product for registration in a de-coupled environment or system may include providing an identity of a spawned component to a manager. The method, system and computer program product may also include taking a predetermined action in response to the spawned component failing to report its status to the manager after a preset time period. | 2012-08-30 |
20120222050 | USAGE COLLECTION AND ANALYTICS PLATFORM APPARATUSES, METHODS AND SYSTEMS - The USAGE COLLECTION AND ANALYTICS PLATFORM APPARATUSES, METHODS AND SYSTEMS (“UCAP”) transform content seed selections and recommendations via UCAP components such as discovery and social influence into events and discovery of other contents for users and revenue for right-holders. In one embodiment, the UCAP may detect a plurality of universally resolvable media content (“URMC”) events initiated at a client and obtain URMC event identifying information for each detected URMC event. In one implementation, the UCAP may determine if each detected URMC event is reportable based on the URMC event identifying information and may determine a reporting category for each reportable URMC event based on the URMC event identifying information. The UCAP may record each reportable URMC event and the associated reporting category in an event log in the client and initiating reporting of the logged URMC event identifying information. | 2012-08-30 |
20120222051 | SHARED RESOURCE ACCESS VERIFICATION - Shared resource access verification techniques are described. In one or more implementations, one or more hooks are applied to one or more application programming interfaces (APIs), by a computing device, that involve access of threads in a single process to one or more shared resources. Information is stored, by the computing device, that describes the access and identifies respective threads that were involved in the access. | 2012-08-30 |
20120222052 | PEER-TO-PEER TRANSCENDENT MEMORY - Various arrangements for utilizing memory of a remote computer system are presented. Two computer systems may allocate a portion of RAM accessible to a memory-access API. A first set of data from the first portion of the first memory of a first computer system may be determined to be moved to memory of another computer system. The first set of data from the first portion of the first memory may be transmitted for storage in the second portion of the second memory of a second computer system. Using the second memory-access API, the set of data may be stored in the second portion of the second memory. Using the first memory-access API, the set of data from the first portion of the first memory may be deleted. | 2012-08-30 |
20120222053 | Screen Locking Method and Mobile Terminal - The present invention discloses a screen locking method and a mobile terminal, wherein the screen locking method comprises the steps that: a mobile terminal enters into a screen locked state; an interface identifier (ID) of an application interface of an application service set in the mobile terminal is obtained; the application interface indicated by the interface ID is called as a screen locked interface. By the invention, the requirements of a user for the richness and diversity of screen locked interface is satisfied, the availability and friendliness of the mobile terminal device in terms of the screen locked interface is improved and the user experience is improved. | 2012-08-30 |
20120222054 | SYSTEM AND METHOD FOR SECURELY TRANSMITTING DATA USING VIDEO VALIDATION - Secure transmission of electronic information is provided between two parties. Included is a first data communication session between a first computing device and a second computing device, wherein the first data communication session is via a first communication protocol. Further, first information is transmitted via the first communication protocol that is received via the first communication protocol. During the first communication session, a second data communication session is provided between the first computing device and the second computing device. The second communication session is via a second communication protocol, which is more secure than the first communication protocol. Second information is transmitted via the second communication protocol that is received via the second communication protocol. The second information relates at least partially to the first information. Moreover, the second communication session appears to a user of the first computing device to be the first communication session. | 2012-08-30 |
20120222055 | Billing with QR Codes - Disclosure is directed to receiving billing information at a television receiver and communicating that billing information to a user's mobile device. The television receiver may create a two-dimensional barcode with billing information and output the two-dimensional barcode for display on a display device. Once displayed on the display device, the two-dimensional barcode may be scanned into a mobile device where the billing information may be used to allow a user to view billing information and/or submit payment information through the mobile device. | 2012-08-30 |
20120222056 | PERSONAL MEDIA CHANNEL APPARATUS AND METHODS - Network content delivery apparatus and methods based on content compiled from various sources and particularly selected for a given user. In one embodiment, the network comprises a cable television network, and the content sources include DVR, broadcast, nPVR, and VOD. The user-targeted content is assembled into a playlist, and displayed as a continuous stream on a virtual channel particular to that user. User interfaces accessible through the virtual channel present various functional options, including the selection or exploration of content having similarity or prescribed relationships to other content, and the ability to order purchasable content. An improved electronic program guide is also disclosed which allows a user to start over, record, view, receive information on, “catch up”, and rate content. Apparatus for remote access and configuration of the playlist and virtual channel functions, as well as a business rules “engine” implementing operational or business goals, are also disclosed. | 2012-08-30 |
20120222057 | VISUALIZATION OF AFFECT RESPONSES TO VIDEOS - Analysis of mental states is provided to enable data analysis pertaining to videos. A video is embedded within a web-enabled interface which enables collecting mental state data. This web-enabled interface is then distributed and information on mental states is collected. Data is captured from viewers of the video where the data includes facial information and/or physiological data. Facial and physiological information may be gathered for a group of viewers. In some embodiments, demographics information is collected and used as a criterion for visualization of affect responses to videos. | 2012-08-30 |
20120222058 | VIDEO RECOMMENDATION BASED ON AFFECT - Analysis of mental states is provided to enable data analysis pertaining to video recommendation based on affect. Video response may be evaluated based on viewing and sampling various videos. Data is captured for viewers of a video where the data includes facial information and/or physiological data. Facial and physiological information may be gathered for a group of viewers. In some embodiments, demographics information is collected and used as a criterion for visualization of affect responses to videos. In some embodiments, data captured from an individual viewer or group of viewers is used to rank videos. | 2012-08-30 |
20120222059 | METHOD AND SYSTEM FOR PROVIDING INFORMATION USING A SUPPLEMENTARY DEVICE - A method and system for providing access to information via a supplementary device is provided. User access to primary information via a primary device is monitored. Key information related to the primary content is obtained by extracting and analyzing metadata sources for the primary information. Then, supplementary information related to the primary information is obtained based on the key information. The supplementary information is provided for user access via the supplementary device. | 2012-08-30 |
20120222060 | APPARATUS AND METHOD FOR MANAGING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to present media content, and provide access to related media content based upon access information, where the related media content is determined based upon monitoring of the media content, where the related media content is retrieved based on a query of a plurality of sources over the internet for ancillary information, and where the access information is associated with each of the plurality of sources and the ancillary information is at least one among a video blog, a pod cast or a website. Other embodiments are disclosed. | 2012-08-30 |
20120222061 | AUTOMATIC MEDIA ASSET UPDATE OVER AN ONLINE SOCIAL NETWORK - In response to a request for media, a determination is made whether a user should receive the requested media. When the user has the proper content privilege, a content manager will authorize the delivery of such content. Otherwise, alternative content is delivered to the user based on the content privileges. | 2012-08-30 |
20120222062 | PARENTAL CONTROLS IN A MEDIA NETWORK - Access to media content is restricted. A message may be sent to a remote computer requesting access to the media content, wherein the message is based at least in part on user input. A response to the message may be received from the remote computer. It may be determined whether to provide access to the media content based on the response. | 2012-08-30 |
20120222063 | Dynamic Content Packaging - To be accessed on different media players, requested content must be delivered in a format that is supported by the requesting device. A dynamic content packager for encrypting and packaging requested content for different requesting devices at the time of consumption is disclosed. | 2012-08-30 |
20120222064 | INTEGRATION OF AN INTERACTIVE ADVERTISING UNIT CONTAINING A FULLY FUNCTIONAL VIRTUAL OBJECT AND DIGITAL MEDIA CONTENT - Described are methods and apparatuses for dynamic integration and presentation of advertising content and media content. A server computing device receives a request for media content from a remote computing device. The server computing device provides, in response to the request, an interactive advertising unit which includes a first content layer with the requested media content and a media player, a second content layer with the advertising content, wherein the advertising content includes a virtual representation of an advertised product, and an integration module which displays the requested media content in the media player, displays the advertising content in the second content layer, wherein the virtual representation provides at least a portion of the functionality provided by the advertised product on which the virtual representation is based, and receives input associated with the functionality provided by the virtual representation from the remote computing device. | 2012-08-30 |
20120222065 | PRE-LOADING FOLLOW-UP CONTENT - Follow-up content items are determined for being played out when the current play-out of a content item has ended or is scheduled to end. The follow-up content items are determined, based on one or more bibliographic or semantic attributes of the item being played out and, on additional parameters such as the available bandwidth and the required data transfer rate. During the playing out of the content item, at least the first portions of the follow-up content items are retrieved and buffered in a buffer local to the equipment. Upon the playing-out of the content item being halted, the playing-out of the follow-up content items can be started right away from the buffer. | 2012-08-30 |
20120222066 | CHANNEL NAVIGATION - Systems and methods may include providing, to a user device, first content corresponding to a first channel of a plurality of channels; receiving, from the user device or a device associated with the user device, selection of a second channel, of the plurality of channels, when advertising content is present in the first content; providing, to the user device and responsive to the selection, second content corresponding to the second channel; identifying a conclusion of the advertising content; and generating a notification indicative of the conclusion of the advertising content. | 2012-08-30 |
20120222067 | Method for Enhancing Digital Video Recorder Television Advertising Viewership - A method for enhancing digital video recorder television advertising viewership provides a method wherein the first or last number of seconds of a commercial break are carefully authored to provide a “teaser” to entice the viewer to watch multiple commercials during the commercial break instead of skipping the commercial break using the fast forward or jump functions of the DVR. A bookending function displays an advertisement before and/or after a program that has been recorded on the DVR's storage device is played to the viewer. The viewer selects a recorded program from the DVR's storage device to playback. Before the program is played back, an advertisement is retrieved from the storage device and is displayed before the program is run. Another advertisement is retrieved and then played after the program is over. | 2012-08-30 |
20120222068 | METHOD AND SYSTEM OF MEDIA PROGRAMMING TO PROVIDE AN INTEGRATED ENTERTAINMENT EXPERIENCE - Embodiments of the present invention are described in which a plurality of mediums are selectively programmed with media content to provide an integrated entertainment experience to consumers. The content that is provided on different mediums is synchronized to provide different events, perspectives or experiences associated with a common storyline. Additional embodiments of the present invention are described in which commercial sponsorship of a program is provided within a storyline, such that sponsors are identified for purposes of brand recognition, or products and services from the sponsor are advertised/marketed or otherwise made directly available for purchase by consumers through synchronized programming of media content among a plurality of mediums. | 2012-08-30 |
20120222069 | ADVANCED USER INTERFACE AND CONTROL PARADIGM FOR MULTIPLE SERVICE OPERATOR EXTENDED FUNCTIONALITY OFFERS - Methods and systems for presenting information regarding multiple categories of content are provided. In addition, methods and systems that suggest activities by a user in relation to content and determined affinity for content in relation to user contacts are provided. A user interface application is provided that operates to display status and/or historical information regarding content, suggested activities, and suggested contacts. The user can interact with the interface to access detailed information and to act on suggestions. | 2012-08-30 |
20120222070 | System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data - A method for problem detection related to received data includes monitoring data to detect a first problem and a second problem related to the data. The first problem may be related to a first data type and the second problem may be related to a second data type. The first data type and the second data type may be distinct from each other. The method includes determining a first remedial action in response to detecting the first problem and a second remedial action in response to detecting the second problem. The method includes determining a priority order for the first remedial action and the second remedial action. | 2012-08-30 |
20120222071 | Facilitating Placeshifting Using Matrix Code - A method for providing a user of a target device with placeshifted content. The method includes detecting, utilizing the target device, a matrix code associated with an audio/visual program. Data encoded in the matrix code includes program identifying information and elapsed time information with respect to the program. The method further includes generating, utilizing the target device, a request for the program based at least in part on the encoded data. The method also includes transmitting, utilizing the target device, the program request across a network. | 2012-08-30 |
20120222072 | DELIVERY OF FEEDBACK INFORMATION TO SCHEDULING SERVICE TO DETERMINE OPTIMUM BROADCAST TIMES BASED UPON CLIENT PLATFORM TUNER CONTENTION - Delivery of feedback information to a scheduling service to determine optimum broadcast times based upon client platform tuner contention is described. A usage pattern of an electronic media device is recorded. The usage pattern is communicated to a scheduling server. Media content is received during a time period selected by the scheduling server based upon the usage pattern. | 2012-08-30 |
20120222073 | System and Method to Send Information Identifying Recommended Media Content Items - A method includes receiving information identifying at least one recommended media content item at a computing device. The information is received from a sender device. The at least one recommended media content item is selected from an electronic program guide and an address associated with the computing device is selected via a graphical user interface at the sender device. The method includes receiving a user selection of at least one item of media content from the at least one recommended media content item. The method includes automatically scheduling recording of the at least one item of media content at a media recorder device when the at least one item of media content is a scheduled program. The method also includes automatically placing the at least one item of media content in an on demand queue when the at least one item of media content includes on demand media content. | 2012-08-30 |
20120222074 | METHODS AND SYSTEMS FOR PROVIDING ELECTRONIC PROGRAM GUIDE DATA - Methods and systems for providing and displaying electronic program guide (EPG) data. Generalized program objects are generated based on EPG data. The generalized program objects are transmitted to set-top boxes for displaying in an EPG menu. When a user navigates the EPG menu to select a program, a query is transmitted to a query server, which returns additional information regarding the selected program in a response. The additional information may be used in an order confirmation dialog displayed to the user. | 2012-08-30 |
20120222075 | METHOD, TERMINAL, AND SERVER FOR IMPLEMENTING FAST PLAYOUT - A method for implementing fast playout is provided, which comprises: receiving a fast playout request sent by a client, where the fast playout request comprises a Uniform Resource Locator (URL) corresponding to content of a media file with a specified multiple of regular playout rate by the client, and the specified multiple of regular playout rate is determined by the client according to obtained media presentation description; and obtaining a content segment corresponding to the media file with the specified multiple of regular playout rate according to the URL, and sending a fast playout response to the client, where the fast playout response comprises the content segment corresponding to the media file with the specified multiple of regular playout rate. Therefore, fast online playing is implemented, and user experience is improved at the same time. | 2012-08-30 |
20120222076 | METHOD AND APPARATUS FOR CHANGING RECEIVED STREAMING CONTENT CHANNELS - An apparatus and method is disclosed in which a buffer receives a first content stream carrying a content channel signal. The first content stream carries the content channel signal at a rate substantially greater than the streaming content playout rate, for initially loading the buffer. The buffer switches its reception of the content channel signal from the first content stream to a second content stream. The second content stream is at a rate substantially the same as the streaming content playout rate. Generally, this switch occurs when some predefined threshold of the content channel signal is buffered. | 2012-08-30 |
20120222077 | SYSTEM AND METHOD FOR LOCATING AND CAPTURING DESIRED MEDIA CONTENT FROM MEDIA BROADCASTS - A media agent that monitors multiple broadcast transmissions and a method for the same. The media agent establishes connections with broadcast transmissions and then identifies characteristics of the media content contained within the broadcast transmission. The association between the identified characteristic of the media content and the connected broadcast transmission is maintained to allow the information gathered from the broadcast transmission to be used meaningfully. | 2012-08-30 |
20120222078 | METHOD AND APPARATUS FOR CHANGING RECEIVED STREAMING CONTENT CHANNELS - An apparatus and method is disclosed in which a buffer receives a first content stream carrying a content channel signal. The first content stream carries the content channel signal at a rate substantially greater than the streaming content playout rate, for initially loading the buffer. The buffer switches its reception of the content channel signal from the first content stream to a second content stream. The second content stream is at a rate substantially the same as the streaming content playout rate. Generally, this switch occurs when some predefined threshold of the content channel signal is buffered. | 2012-08-30 |
20120222079 | INFORMATION PROCESING APPARATUS, BROADCAST RECEIVING APPARATUS AND INFORMATION PROCESSING METHOD - According to one embodiment, an information processing apparatus includes a first receiver, a second receiver, an extractor and a display module. The first receiver is configured to receive first program information for a plurality of programs from a first external apparatus connected via a network. The second receiver is configured to receive a channel identifier of a first program from a second external apparatus. The extraction module is configured to extract, from the first program information, second program information for a single program associated with a channel indicated by the channel identifier, and a time point. The display module is configured to display information that is based on the second program information. | 2012-08-30 |
20120222080 | INFORMATION COMMUNICATION SYSTEM, INFORMATION COMMUNICATION METHOD, INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM - An information communication system of an overlay network includes: a first apparatus requesting the content; a second apparatus storing the content; and a third apparatus including: a first reception unit receiving a retrieval message transmitted from the first apparatus, the retrieval message including content identification information and location information; a storage unit storing the apparatus identification information of the second apparatus and the content identification information of the content stored in the second apparatus; and a transmission unit transmitting the apparatus identification information. The second apparatus includes: a second reception unit receiving the apparatus identification information from the third apparatus; and a control unit allowing the first apparatus to acquire the content stored in the second apparatus if the apparatus identification information received by the second reception unit matches the apparatus identification information of the second apparatus, | 2012-08-30 |
20120222081 | Set Top Box Health and Configuration - Disclosure is directed to determining a condition of the television receiver and communicating information regarding that condition to end-points that are external to the television receiver. The television receiver may create a two-dimensional barcode with information regarding the receiver condition and output the two-dimensional barcode for display on a display device. Once displayed on the display device, the two-dimensional barcode may be scanned into a mobile device where the information regarding the receiver condition may be stored, processed and/or forwarded to another location or device. | 2012-08-30 |
20120222082 | Low Noise Amplifier and Method of Input Impedance Control for Terrestrial and Cable Modes - A low noise amplifier (LNA) for use in a receiver circuit includes an adjustable impedance network including an input for receiving a radio frequency signal, a plurality of control inputs, and an output. The LNA further includes a controller coupled to the plurality of control inputs and configured to control an impedance of the adjustable impedance network. The controller controls the adjustable impedance network to provide a relatively low impedance in a terrestrial mode and to provide a relatively high impedance in a cable mode. | 2012-08-30 |
20120222083 | METHOD AND APPARATUS FOR ENFORCING DATA PRIVACY - An approach for maintaining user privacy information is described. A privacy management platform determines a request, from one or more applications, for access to local data associated with a device. The platform then determines and processes one or more privacy profile objects associated with the local data to determine one or more privacy policies associated with the local data, the device, or a combination thereof. Enforcement of the one or more privacy policies is then caused for granting access to the local data. | 2012-08-30 |
20120222084 | Virtual Securty Zones for Data Processing Environments - A method, apparatus, and computer program product for providing security and network isolation for service instances comprising data processing resources provided as a service by a provider of data processing resources. Individual service instances may be associated as members of one or more security zones. The security zones comprise security policies that define access of each service instance that is a member of a security zone. | 2012-08-30 |
20120222085 | METHOD AND SYSTEM FOR TRUSTED CONTEXTUAL COMMUNICATIONS - A method, system and apparatus for allowing media context sensitive SIP signaling exchange and call establishment while denying or challenging any other session description protocol extension dialogs which might not be desired by a user. User client media policy preferences are defined, the user media policy preferences establishing the parameters for evaluating a media session request received by a user client. The user client media policy preferences are provided to a policy enforcement point device, the policy enforcement point device evaluating the media session request received by the user client and applying the user client media policy preferences to the media session request. A user client portal is utilized to gain access to a media policy database, the media policy database providing storage for user client media policy preferences. | 2012-08-30 |
20120222086 | SYSTEM AND METHOD FOR DYNAMIC SECURITY PROVISIONING OF COMPUTING RESOURCES - The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system and method for dynamically provisioning and de-provisioning computing resources based on multi-dimensional decision criteria. By employing specialized computing components configured to assess an asset and requester of an asset, a provisioning engine is able to transform the input from the computing components into a specific configuration of computing resource provisioning and security controls. According to the rules and policies applying to a security domain, the provisioning engine may dynamically allocate computing resources in a manner that is both safe and efficient for the asset. | 2012-08-30 |
20120222087 | APPLICATION BASED INTRUSION DETECTION - Intrusion detection is performed by communicating an initialization request from an intrusion detection system enabled application to an intrusion module to begin intrusion detection. Also, a request is communicated to a policy transfer agent to provide an intrusion detection system policy specifically configured for the application. The application identifies where in the application code the intrusion detection system policy is to be checked against an incoming or outgoing communication. Information obtained by the application program is selectively evaluated against information in the intrusion detection system policy. A conditional response is made based upon information in the intrusion detection system policy if an intrusion associated with the application program is detected. | 2012-08-30 |
20120222088 | Method and Apparatus for Implementing Communication of Stand-Alone Software - The present disclosure discloses a method and apparatus for implementing communication of stand-alone software applications. In one aspect, a method for implementing communication of stand-along software applications comprises: establishing an instant communication connection between a first user device and a second user device by a first instant communication client on the first user device and a second instant communication client on the second user device, the first user device and the second user device being remote from each other; and communicating, by a first stand-alone software application on the first user device, with a second stand-alone software application on the second user device via the instant communication connection. | 2012-08-30 |
20120222089 | NETWORK TOPOLOGY AIDED BY SMART AGENT DOWNLOAD - A system, method, and apparatus for a network topology aided by a smart agent download are disclosed. The method involves authenticating, with at least one authenticator device, at least one claimant. The method further involves transmitting, by at least one transmission source, the smart agent download to at least one receiving source associated with at least one claimant. In one or more embodiments, at least one transmission source is employed in a Lower Earth Orbiting (LEO) Iridium satellite. Also, the method involves receiving, by at least one receiving source, the smart agent download. In addition, the method involves executing, by at least one processor, the smart agent download. Further, the method involves monitoring, by the smart agent download, network behavior. The monitoring of network behavior includes monitoring the users on the network, monitoring data passing through the network, and monitoring the quantity of data passing through the network. | 2012-08-30 |
20120222090 | METHOD OF COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTRUSION ATTEMPT DETECTION SYSTEM - A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user. | 2012-08-30 |
20120222091 | METHODS AND APPARATUS FOR USE IN A GENERIC BOOTSTRAPPING ARCHITECTURE - According to an aspect of the present invention there is provided a method of obtaining authentication information for use in a Generic Bootstrapping Architecture, GBA, employed in a network with one or more GBA-capable subscriber registers and one or more GBA-incapable subscriber registers. The method involves a selection function for determining whether the authentication information of a subscriber is stored at a GBA-capable subscriber register or at a GBA-incapable subscriber register, and an inter working function for translating between the Diameter messages of the Zh interface and the MAP messages of the Zh′ interface. | 2012-08-30 |
20120222092 | CONTROLLING ACCESS TO MEDIA FOR AN ELECTRONIC DEVICE - An electronic device for controlling access to media is described. The electronic device includes a processor and instructions stored in memory. The electronic device obtains media information and determines remaining battery power. The electronic device also determines whether to restrict access to the media based on the media information and the remaining battery power. The electronic device restricts access to the media if it is determined to restrict access and presents the media on the electronic device if it is determined not to restrict access. | 2012-08-30 |
20120222093 | PARTIAL AUTHENTICATION FOR ACCESS TO INCREMENTAL DATA - Embodiments of the invention relate to partial authentication to access incremental information. An aspect of the invention concerns a method of authorizing access to information that comprises providing an initial segment of a password wherein the password includes password segments each associated with an incremental portion of the information. In response to the initial password segment satisfying an expected value, the method may authorize access to the information portion associated with the initial password segment. The method may authorize access to other information portions associated with subsequent segments of the password in response to the subsequent password segments satisfying respectively expected values. | 2012-08-30 |
20120222094 | METHOD AND ARRANGEMENT FOR ENABLING THE USE OF A CONSUMABLE UNIT - In a method for enabling the use of a consumable unit in a consumption device of a consumption arrangement, a first item of authorization information assigned to the consumable unit is transmitted from the consumption arrangement to a remote data center. The data center implements a first verification of the first item of authorization information and, as a function of this verification, a second item of authorization information assigned to the consumable unit is generated. The second item of authorization information is transmitted to the consumption arrangement, which implements a second verification of the second item of authorization information, dependent on which use of the consumable unit in the consumption device is enabled. The outcome of either the first or second verification is also used for an accounting for use of the consumable unit when, the first verification indicates that the consumable unit was previously unused. | 2012-08-30 |
20120222095 | INFORMATION COMMUNICATION SYSTEM, INFORMATION COMMUNICATION METHOD, NODE APPARATUS AND RECORDING MEDIUM - A node apparatus of an information communication system in which a content is distributed and stored by an overlay network configured by a plurality of node apparatuses and which has a center server that manages the content to be submitted to the overlay network, the node apparatus includes: a first creation unit configured to create meta-information that is used in submitting the content to the overlay network; a transmission unit configured to transmit the meta-information created by the first creation unit to the center server; a first reception unit configured to receive the meta-information and an electronic signature verifying the meta-information, which is determined to be proper by the center server, from the center server, and a permission unit configured to permit the meta-information received by the first reception unit to be acquired on the overlay network. | 2012-08-30 |
20120222096 | OPEN MARKET CONTENT DISTRIBUTION - A content distribution system for one or more user devices, including: an open market coordinator (OMC) configured to manage a user domain, wherein the one or more user devices are members of the user domain and have access to content associated with the user domain, and wherein an individual user device has access according to predetermined privileges, the access being valid while the individual user device is a member of the user domain and has an active status with the user domain; and a plurality of domain service providers (DSPs) in communication with the OMC, wherein the DSPs are configured to enforce the predetermined privileges applied to the one or more user devices, and wherein the OMC is configured to support the enforcement of the predetermined privileges among the DSPs. | 2012-08-30 |
20120222097 | SYSTEM AND METHOD FOR USER CLASSIFICATION AND STATISTICS IN TELECOMMUNICATION NETWORK - The embodiments herein relate to user data management in a telecommunications network and, more particularly, to classifying users in a telecommunications network and subsequently leveraging the classification and augmented statistical information. The system uses intelligent modeling techniques & machine learning algorithms to classify users. It also groups users by statistical analysis of this classification. The system is able to provide secure, authenticated and authorized access to this classification, statistical grouping and other augmented information about users to an external agent in real-time. This enables service personalization and personalized service recommendations. System allows external agents to define certain classification criteria for users in the form of models, which are pluggable in nature, to derive multiple user classification schemes. The system is also able to handle extremely large volumes of user data in the order of terabytes by scaling horizontally on inexpensive commodity hardware. | 2012-08-30 |
20120222098 | WIRELESS ESTABLISHMENT OF IDENTITY VIA BI-DIRECTIONAL RFID - A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure. | 2012-08-30 |
20120222099 | MULTIFACTOR AUTHENTICATION SERVICE - A multifactor authentication (MFA) enforcement server provides multifactor authentication services to users and existing services. During registration, the MFA enforcement server changes a user's password on an existing service to a password unknown to the user. During normal usage when the user accesses the existing service through the MFA enforcement server, the MFA enforcement server enforces a multifactor authentication enforcement policy. | 2012-08-30 |
20120222100 | ADVANCED CAPTCHA USING INTEGRATED IMAGES - An embodiment of the invention is a CAPTCHA program to determine if a user of a computer is a human or a computer program. The program sends to the computer an image and a portion of the image for display. The program receives from the user an indication of where the portion is located within the image. The portion, as displayed, may be altered in various ways. In response to the user properly indicating the location, the program determines that the user of the computer is a human. In response to the user not properly indicating the location, the program determines that the user of the computer is a computer program. In response to determining that the user of the computer is a human, the program grants the user access to information (database, application, program). In response to determining that the user is a computer program, the program denies access. | 2012-08-30 |
20120222101 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, SERVER DEVICE, AND METHOD - An information processing system including an information processing device connected to a first communication network, a terminal device connected to the first communication network, and a server device connected to a second communication network. The server device includes a receiving unit, a first request unit, and a providing unit. The receiving unit receives an instruction from the terminal device to provide the information processing device with a predetermined service. The first request unit presents a test to the information processing device to authenticate whether or not the information processing device is being operated by a human. The providing unit provides the information processing device with the service in accordance with the instruction. The terminal device includes an instruction unit and a response unit. The instruction unit sends the instruction to the server device. The response unit makes a response to the test on behalf of the information processing device. | 2012-08-30 |
20120222102 | AUTHENTICATION USING MOBILE DEVICES - Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image. | 2012-08-30 |
20120222103 | ACCESS CONTROL METHOD, AND ASSOCIATED LOCK DEVICE AND ADMINISTRATION SERVER - An access control method is disclosed in which a lock device provides conditional access to a protected environment by short-range wireless communication with a key device having a key device identifier (KD_ID). In the method, the lock device requests the key device to provide a challenge response to a challenge generated by the lock device based on a challenge code kept by the lock device. The lock device receives the challenge response from the key device. The challenge response is generated by a remote administration server and is based on the key device identifier of the key device. The generated response is sent to the key device and forwarded from the key device to the lock device. The lock device then verifies the received challenge response based on the challenge code and on the key device identifier of the key device. | 2012-08-30 |
20120222104 | METHOD AND APPARATUS FOR PROVIDING SINGLE SIGN-ON FOR COMPUTATION CLOSURES - An approach is provided for providing single sign-on for computation closures. A single sign-on management platform determines to create a single sign-on computation closure in response to an initiation of a single sign-on authentication session. The single sign-on management platform also determines one or more computation entities that are to execute at least one other computation closure under the single sign-on authentication session. The single sign-on management platform further causes, at least in part, a transfer of the single sign-on computation closure to the one or more computation entities. | 2012-08-30 |
20120222105 | SYSTEM AND METHOD FOR ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST - Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords. | 2012-08-30 |
20120222106 | Automated Hybrid Connections Between Multiple Environments In A Data Center - A multi-tenant data center environment includes a dedicated domain having at least one dedicated server associated with a client and a cloud domain having at least one cloud server associated with the client. The cloud server may have a public interface to a public network and a private interface to a private network. In turn, a network device is coupled between the dedicated domain and the public network, and is further coupled to the cloud server via the private network. A controller of the data center may be used to determine presence of the cloud server, and configure the network device to allow certain traffic to pass directly to the dedicated domain, while preventing other traffic from this direct path, based on access controls of the network device. | 2012-08-30 |
20120222107 | METHOD AND APPARATUS FOR PROVIDING PROXY-BASED ACCESS CONTROLS - An approach is provided for proxy-based access controls. A proxy platform causes, at least in part, designation of at least one monitoring client of a proxy server. The proxy platform receives an input for associating one or more accessing clients with the at least one monitoring client. The at least one monitoring client manages access to one or more resources of the proxy server by the one or more accessing clients. | 2012-08-30 |
20120222108 | SYSTEM AND METHOD FOR AUTOMATICALLY INITIATING AND DYNAMICALLY ESTABLISHING SECURE INTERNET CONNECTIONS BETWEEN A FIRE-WALLED SERVER AND A FIRE-WALLED CLIENT - A system and method for automatically and dynamically initiating and establishing secure connections between a Server and a Client using a session control server (SCS). Both the Server and the Client are connected to an untrusted network (such as the Internet) through a Network Address Translator or Translation (NAT) router or a firewall. The SCS, independently trusted by both the Server and the Client, brokers the required connection parameters to establish a secure connection between the Server and the Client. The system and method does not require any user configuration on the Client and eliminates the need for the Server to accept explicit connection requests or packets from the Client, thereby allowing the Server firewall to always remain closed to all inbound traffic. | 2012-08-30 |
20120222109 | PROVIDING A DECLARATION OF SECURITY REQUIREMENTS TO A SECURITY PROGRAM TO USE TO CONTROL APPLICATION OPERATIONS - Provided are a computer program product, system, and method for providing a declaration of security requirements to a security program to use to control application operations. The application communicates to the security program a declaration of security requirements indicating application actions designated to be performed with respect to resources in the computer system. The application is executed to perform application operations in response to communicating the declaration of security requirements to the security program. During the execution of the application, the actions are performed with respect to the resources at the computer system indicated in the declaration of security requirements. | 2012-08-30 |
20120222110 | DATA LEAKAGE PROTECTION IN CLOUD APPLICATIONS - A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content. | 2012-08-30 |
20120222111 | CLASSIFYING A MESSAGE BASED ON FRAUD INDICATORS - Systems, methods, and media for classifying messages are disclosed. A plurality of fraud indicators are identified in the message. A signature of the message is generated. The generated signature of the message is compared to a stored signature. The stored signature is based on a statistical analysis of fraud indicators in a second message associated with the stored signature. A determination as to whether the message is fraudulent is made based on the comparison. The message is processed based on the determination that the message is a fraudulent message. | 2012-08-30 |
20120222112 | INFORMATION TECHNOLOGY GOVERNANCE AND CONTROLS METHODS AND APPARATUSES - Embodiments of the present invention provide methods and systems for automated change audit of an enterprise's IT infrastructure, including independent detection of changes, reconciliation of detected changes and independent reporting, to effectuate a triad of controls on managing changes within the IT infrastructure, preventive controls, detective controls and corrective controls. | 2012-08-30 |
20120222113 | Logical Partition Media Access Control Impostor Detector - Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device. | 2012-08-30 |
20120222114 | METHOD AND APPARATUS FOR NETWORK FILTERING AND FIREWALL PROTECTION ON A SECURE PARTITION - A management virtual machine on a virtualization technology enabled platform includes a means for providing a firewall and deep packet inspection. An isolated secure partition is provided to host the management application and network packet filtering and firewall functions to provide a secure and trusted platform for manageability applications. A protected component in the operating system in a user partition moves network traffic to the secure partition for inspection and filtering. | 2012-08-30 |
20120222115 | USING A DECLARATION OF SECURITY REQUIREMENTS TO DETERMINE WHETHER TO PERMIT APPLICATION OPERATIONS - Provided are a computer program product, system, and method for using a declaration of security requirements to determine whether to permit application operations. A declaration of security requirements indicates actions the application designates to perform with respect to resources in a computer system, wherein a plurality of the indicated actions are indicated for at least two operation modes of the application. A detection is made of whether the application is requesting to perform a requested action with respect to a requested resource in the computer system. A determination is made of a current operation mode of the application comprising one of the at least two operation modes in response to detecting that the application is requesting the requested action. A determination is made as to whether the declaration of security requirements indicates the requested action with the current operation mode. The requested action with respect to the requested resource is allowed to proceed in response to determining that the declaration of security requirements indicates the requested action with respect to the requested resource as indicated with the current operation mode. | 2012-08-30 |
20120222116 | SYSTEM AND METHOD FOR DETECTING WEB BROWSER ATTACKS - A method and system for detecting a heap corruption exploit of a web browser is described. The method comprises installing or injecting a detection module into the web browser. Next, the detection module patches or hooks all calls to the detection module in order to identify calls indicating a heap corruption exploit. The identified calls are then analyzed to determine whether a heap corruption exploit is occurring. | 2012-08-30 |
20120222117 | METHOD AND SYSTEM FOR PREVENTING TRANSMISSION OF MALICIOUS CONTENTS - A method and a system for preventing transmission of malicious contents are provided. The method includes intercepting at a network gateway device of a server network a digital communication being sent from the server network to an external network; searching the digital communication for a malicious transmission schema that can be used to cause a malicious transmission on a recipient of the digital communication; and taking an action to hinder the transmission of malicious contents if a malicious transmission schema is found. | 2012-08-30 |
20120222118 | TIERED OBJECT-RELATED TRUST DECISIONS - Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object. | 2012-08-30 |
20120222119 | ACTIVE COMPUTER SYSTEM DEFENSE TECHNOLOGY - Active computer system defense techniques can include sending disruptive communications to attackers, where the disruptive communications include random data elements which could potentially interfere with the operation of an attacking system. Such computer system defense techniques can also be augmented to automatically optimize the disruptive communications sent to the attackers. | 2012-08-30 |
20120222120 | MALWARE DETECTION METHOD AND MOBILE TERMINAL REALIZING THE SAME - A malware detection method and a mobile terminal realizing the same are provided. The method monitors execution of applications on the mobile terminal, notifies a user of perceived malicious behavior and guides handling of a detected malicious application. The malware detection method includes extracting, when a platform Application Programming Interface (API) is called by an application, an action of the application from the platform API, determining, when the extracted action is a preset trigger action, whether the application is a malware program by comparing the extracted action with a malware pattern file, and outputting, when the application is a malware program, an alert message. | 2012-08-30 |
20120222121 | Systems and Methods for Detecting Malicious PDF Network Content - Systems and methods for detecting malicious PDF network content are provided herein. According to some embodiments, the methods may include at least the steps of examining received PDF network content to determine if one or more suspicious characteristics indicative of malicious network content are included in the PDF network content, providing PDF network content determined to include at least one suspicious characteristic to one or more virtual machines, and analyzing responses received from the one or more virtual machines to verify the inclusion of malicious network content in the PDF network content determined to include at least one suspicious characteristic. | 2012-08-30 |
20120222122 | Mechanism for Generating Vulnerability Reports Based on Application Binary Interface/Application Programming Interface Usage - A method for generating vulnerability reports based on application binary interface/application programming interface usage may include extracting a binary file and a security report relating to a software program, the security report having a vulnerability list of pending vulnerabilities relating to the software program, and detecting, from the binary file, interface usage details associated with interfaces and shared libraries used by the software program. The interfaces include application binary interfaces (ABIs). The method may further include matching the interface usage details with the pending vulnerability of the vulnerability list, and generating a vulnerability report based on matching. | 2012-08-30 |
20120222123 | Detection of Vulnerabilities in Computer Systems - Systems, methods, and apparatus, including computer program products, for detecting a presence of at least one vulnerability in an application. The method is provided that includes modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyzing the stored event indicators; detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and reporting the presence of at least one vulnerability. | 2012-08-30 |
20120222124 | SYSTEM AND METHOD FOR FACILITATING UNLOCKING A DEVICE CONNECTED LOCALLY TO A CLIENT - Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various aspects of the subject technology. In one aspect, a system includes a proxy configured to receive, at the client, at least one string descriptor request from the server over a network, where the at least one string descriptor request is associated with switching an interface of the device from a first interface type to a second interface type. The system further includes a stub driver configured to receive the at least one string descriptor request from the proxy, and to direct the at least one string descriptor request to the device. | 2012-08-30 |
20120222125 | THRESHOLD REPORTING PLATFORM APPARATUSES, METHODS AND SYSTEMS - The THRESHOLD REPORTING PLATFORM APPARATUSES, METHODS AND SYSTEMS (“TRP”) transform content seed selections and recommendations via TRP components such as discovery and social influence into events and discovery of other contents for users and revenue for right-holders. The TRP detects user initiation of a universally resolvable media content (“URMC”) event in a client and obtains the URMC event identifying information. The TRP may record the URMC event identifying information in association with the event in an event log in the client. The TRM may obtain reporting frequency preference setting, at least one URMC user activity upload rule, and may determine activation of a URMC upload threshold trigger by evaluating the URMC user activity upload rule. The TRP may initiate reporting of the logged URMC event identifying information based on the trigger activation and update the client upon successful acknowledgement of said reporting by a server. | 2012-08-30 |
20120222126 | CHECKING DESTINATION EMAIL ADDRESSES AGAINST HISTORICAL ADDRESS INFORMATION - An email, which includes a header and historical information, is created. The header comprises a destination email address, which comprises a name of an addressed recipient of the email and a domain name of the destination email address. The historical information in the email comprises an approved address for a previously exchanged email with the addressed recipient. The first approved address is compared to a corresponding portion of the first destination email address. In response to the corresponding portion of the first destination email address being different from the first approved address as stored in the storage unit, a warning is outputted. The warning comprises both the approved address, and an unapproved address list that comprises the first destination email address. | 2012-08-30 |
20120222127 | AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT - A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method includes loading the authenticated script code into a trusted computer application and storing a snapshot of the digital document in the trusted computer application. Before the authenticated script code is executed, the snapshot of the digital document is compared with the document to verify if the digital document is still authentic. After executing the authenticated script code, the snapshot of the digital document is replaced with an up-to-date copy reflecting eventual changes made to the digital document by the executed script code. The digital document can then at any time be compared with the most recent snapshot to verify if it is authentic. | 2012-08-30 |
20120222128 | DISTRIBUTION OF CONTENT DOCUMENT WITH SECURITY, CUSTOMIZATION AND SCALABILITY - A computer-implemented system and method to distribute a content document with security, customization, and scalability is provided. One or more servers provides a customizable content document associated with a first entity, enables a second entity to specify content to be included for users associated with the entity in the customizable content document, and delivers the customized content document incorporating the specified content in a secure manner to users associated with the second entity. | 2012-08-30 |
20120222129 | SYSTEM AND METHOD FOR SECURE MOBILE APPLICATION DOWNLOAD - Methods and systems for downloading applications to a mobile communicator and for protecting access to stored mobile applications are disclosed. | 2012-08-30 |
20120222130 | APPARATUS AND METHOD FOR GUARANTEEING INTEGRITY OF REAL-TIME VEHICLE DATA AND VEHICLE BLACK BOX SYSTEM USING THE SAME - A vehicle black box technique guarantees the integrity of vehicle data stored in a black box in real time by forming input data streams as block data and performing a signature using a signing key and nested hashing. Each vehicle black box includes a reliable unique signing key supporting a non-repudiation function. An error correction function is provided by a unique algorithm for generating integrity verification data even when an error occurs from the vehicle data. | 2012-08-30 |
20120222131 | RADIO-FREQUENCY COMMUNICATION CONTROLLED BY A MICROCIRCUIT - The invention relates to a method for the radio-frequency communication of data, in which the receiving of and/or access to said data is controlled by control means, including an electronic microcircuit, on the basis of access rights. The transmitted data includes time information, and the access rights are controlled on the basis of said time information. The invention also relates to a device for controlling access rights as well as to a radio-frequency receiving device including same. | 2012-08-30 |
20120222132 | Permissions Based on Behavioral Patterns - Users may choose to have their behavior analyzed in order to infer default sharing permission settings for documents and other information maintained in one or more computer systems. This may increase information security for the users and streamline implementation of privacy and/or sharing permissions. The default sharing permissions are implemented by a computer system as soft permissions that may be used to determine which documents are to be shared with which recipients. The soft permissions may address sharing situations for which a user has not expressly indicated his or her sharing rules. The soft permissions may change over time in response to changing user behavior and/or the soft permissions may be revised in light of user feedback. | 2012-08-30 |
20120222133 | SHARED CONTENT MANAGEMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS - The CONTENT DISCOVERY AND DELIVERY PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SCMP”) transform content seed selections and recommendations via SCMP components such as discovery and social influence into events and discovery of other contents for users and revenue for right-holders. In one embodiment, the SCMP may obtain from a first universally resolvable media content service user a request to share the user's universally resolvable media content collection and a selection of at least one second universally resolvable user. The SCMP may configure the first user's media content collection for shared access with the second user and may provide the second user access to the shared media content collection. | 2012-08-30 |
20120222134 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths. | 2012-08-30 |
20120222135 | ADVANCED USER INTERFACE AND CONTROL PARADIGM INCLUDING DIGITAL RIGHTS MANAGEMENT FEATURES FOR MULTIPLE SERVICE OPERATOR EXTENDED FUNCTIONALITY OFFERS - Methods and systems for presenting information regarding multiple categories of content are provided. In addition, methods and systems that suggest activities by a user in relation to content and determined affinity for content in relation to user contacts are provided. A user interface application is provided that operates to display status and/or historical information regarding content, suggested activities, and suggested contacts. The user can interact with the interface to access detailed information and to act on suggestions. In addition the user can interact with the interface to share content to other users, including users participating in real time communication sessions. | 2012-08-30 |