41st week of 2008 patent applcation highlights part 57 |
Patent application number | Title | Published |
20080250405 | Parallel installation - Installation of multiple servers with interdependencies is done in parallel steps, with each server advancing in sequence with other servers. When a second server is dependent on a first server during the installation process, the first server may finish a task and send a message to the second server to attempt an installation step that depends on the first server. If a problem occurs, the second server may revert to a configuration state before the attempted step and the first server may reattempt the installation step on which the second server depends. | 2008-10-09 |
20080250406 | Virtual Machine Support for Metered Computer Usage - A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring | 2008-10-09 |
20080250407 | Network group name for virtual machines - Virtual machine (VM) management using a group name. By associating VM registration information with a group name, all VMs running off a single physical machine image can be managed (e.g., blocked or unblocked) simultaneously. A service component captures registration information (e.g., IP address-VM name pair) between a virtual machine and a name server. The IP address-VM name pair is recorded (or stored) in the name server database. Based on the VM pair, a record component generates a group name, and stores the VM pair in association with the group name in the name server database. Blocking of the group name then blocks all VMs associated with the group name. Moreover, queries against the group name will then expose all operational VMs for that host. Updates to the group name record can be made based on registration and deregistration of VMs for a given host machine. | 2008-10-09 |
20080250408 | PEER TO PEER SHARING OF FUNCTIONALITY OF MOBILE DEVICES - Systems and methodologies for sharing functionality among mobile devices in a peer to peer manner are described herein. A mobile device can include a plurality of functional components that can each perform respective functionality. Examples of the functionalities can include transceiver communications, processing, power, memory, input and output for the mobile device. Further, the mobile device can include a sharing component that enables sharing a particular third party functional component to replace or supplement operation of a corresponding functional component of the mobile device. The third party functional component, for instance, can be made available for sharing by at least one of a disparate mobile device or a stand alone functional component. Moreover, a host component can allow a disparate mobile device to use an available one or more of the plurality of functional components of the mobile device. | 2008-10-09 |
20080250409 | Information processing system and computer readable recording medium storing an information processing program - A unit: (a) sets event largest possible values used for limitation of the number of tasks and/or the size of areas in a buffer; (b) generates a task without reaching the event largest possible values when receiving an event, and reserves an area in the buffer for the task; (c) determines whether another event has been received before process of the task is completed; (d) deletes the task and releases the area if another new event has not been received; (e1) if it has been received and both the number of tasks and the size of the areas do not reach the event largest possible values, generates a new task and reserves another area in the buffer; and (e2) if it has been received and any of them reaches any of the event largest possible values, reuses the task and the area for the new event. | 2008-10-09 |
20080250410 | METHOD FOR CONSOLIDATED LAUNCHING OF MULTIPLE TASKS - A general purpose mechanism is provided for consolidating the launching of multiple tasks, wherein a task is launched when an associated software component is run or executed. In one embodiment, launch descriptions of individual tasks and composition parameters are respectively read, wherein the parameters indicate relationships between the launchings of different tasks, such as launch order. A composite launch description is constructed, by selectively processing the individual launch descriptions and composition parameters, and the tasks are launched according to the composite launch description. In a further embodiment, multiple individual launch descriptions are delivered to a tool, each launch description being usable to launch a corresponding component to perform a corresponding task. The tool includes a set of launch relationships that specify the relationship between launchings of different components. The tool generates a single composite launch description that defines launching of the components in accordance with the launch relationships. | 2008-10-09 |
20080250411 | RULE BASED ENGINE FOR VALIDATING FINANCIAL TRANSACTIONS - A method and system for checking whether customer orders for transactions of financial instruments conform to business logic rules. Executable rule files are created and stored in a repository. New executable rule files can be created by scripting the new business logic rules in a script file which is converted into a corresponding source code file written in a computer programming language. The source code file is compiled to create an individual executable rule file. A rule selection repository contains identification of groups of selected executable rule files. The invention determines the category of the customer order and reads, from the rule selection repository, a group of executable rule files that correspond to the identified category of the customer order. The selected executable rule files are executed to check the conformance of the customer order. Execution results are stored in a status repository for subsequent retrieval and analysis. | 2008-10-09 |
20080250412 | Cooperative process-wide synchronization - One embodiment relates to a computer-implemented method of concurrently performing a process-wide operation in a multi-threaded process being executed on a computer system so as to result in more efficient performance of the computer system. A plurality of threads of the process concurrently participate in the process-wide operation. Finishing steps of the process-wide operation are performed by a last thread participating in the process-wide operation, regardless of whether the last thread is an initiator thread or a target thread. Other embodiments, aspects, and features are also disclosed. | 2008-10-09 |
20080250413 | Method and Apparatus for Managing Tasks - The method of managing a task provided by the present invention includes the steps of decomposing said task into at least two sub-tasks; assigning said at least two sub-tasks to at least two function modules, so that said at least two function modules respectively complete said at least two sub-tasks, wherein said at least two function modules respectively belong to at least two different equipments. By means of the present invention, a virtual equipment can be constructed more flexibly to complete specific tasks, thus not only the resources of the equipments can be made use of more effectively, but also the user's requirements at different situations can be met. | 2008-10-09 |
20080250414 | Dynamically Partitioning Processing Across A Plurality of Heterogeneous Processors - A program is into at least two object files: one object file for each of the supported processor environments. During compilation, code characteristics, such as data locality, computational intensity, and data parallelism, are analyzed and recorded in the object file. During run time, the code characteristics are combined with runtime considerations, such as the current load on the processors and the size of the data being processed, to arrive at an overall value. The overall value is then used to determine which of the processors will be assigned the task. The values are assigned based on the characteristics of the various processors. For example, if one processor is better at handling intensive computations against large streams of data, programs that are highly computationally intensive and process large quantities of data are weighted in favor of that processor. The corresponding object is then loaded and executed on the assigned processor. | 2008-10-09 |
20080250415 | Priority based throttling for power/performance Quality of Service - A method and apparatus for throttling power and/or performance of processing elements based on a priority of software entities is herein described. Priority aware power management logic receives priority levels of software entities and modifies operating points of processing elements associated with the software entities accordingly. Therefore, in a power savings mode, processing elements executing low priority applications/tasks are reduced to a lower operating point, i.e. lower voltage, lower frequency, throttled instruction issue, throttled memory accesses, and/or less access to shared resources. In addition, utilization logic potentially trackes utilization of a resource per priority level, which allows the power manager to determine operating points based on the effect of each priority level on each other from the perspective of the resources themselves. Moreover, a software entity itself may assign operating points, which the power manager enforces. | 2008-10-09 |
20080250416 | Linking of Scheduling Systems for Appointments at Multiple Facilities - Scheduling systems for scheduling appointments on multiple sites need to be linked, if such systems use different databases. The activity to be performed by the performing site during the appointment may be given by a requesting code, specific for the requesting site. If the activity can be performed at the requesting site, i.e. the requesting site and the performing site are identical, then this “requesting code” may define that one or more resources are required for performing the scheduled appointment at the requesting site. The availability of these resources can be fetched from one or more databases coupled to the requesting site. If the performing site is different from the requesting site, the requesting code used at the performing site for the activity may be different from the requesting code used at the requesting site, and different resources may be requested by the performing site. The availability of these different resources may be stored in one or more databases, different from the databases for resources at the requesting site. In the latter case, both the requesting site and the performing site keep records of the scheduled appointment e.g. in a respective database. If a person, for whom the appointment is made, is known at the requesting or performing site or both, person occupation checking may be done at either site or both. | 2008-10-09 |
20080250417 | Application Management Support System and Method - A first information resource denoting which logical volume is allocated to which application program is prepared in a management computer. The management computer either regularly or irregularly acquires from the storage system information as to which logical volumes were updated at what times, registers same in a second information resource, references the first and second information resources, acquires update management information, which is information denoting which logical volume is updated at what time, and the application program to which this logical volume is allocated, and sends this update management information to a host computer. The host computer, based on the update management information from the management computer, displays which logical volume has been updated at what time, and which application program is allocated to this logical volume. | 2008-10-09 |
20080250418 | HEALTH CARE ADMINISTRATION SYSTEM - Embodiments of the present invention provide systems and methods for managing an event in a health care organization, the method comprising standardizing, during a design phase, a workflow associated with an event; and executing, during an executing phase, the workflow to complete a procedure associated with the event. Other embodiments may be described and claimed. | 2008-10-09 |
20080250419 | METHOD AND SYSTEM FOR MANAGING RESOURCE CONNECTIONS - Methods and system for managing resource connections are described. In one embodiment, a user request associated with a centralized resource may be received. Availability of a connection to the centralized resource may be determined. A stagger delay for connection creation may be determined. The stagger delay may define a delay for creation of a new connection. The new connection to the centralized resource may be created based on the determining of whether the connection to the centralized resource is available and the delay interval. The new connection may be utilized to process the user request. | 2008-10-09 |
20080250420 | Jobstream Planner Considering Network Contention & Resource Availability - Disclosed is a computer-implemented planning process that aids a system administrator in the task of creating a job schedule. The process treats enterprise computing resources as a grid of resources, which provides greater flexibility in assigning resources to jobs. During the planning process, an administrator or other user, or software, builds a job-dependency tree. Jobs are then ranked according to priority, pickiness, and network centricity Difficult and problematic jobs then are assigned resources and scheduled first, with less difficult jobs assigned resources and scheduled afterwards. The resources assigned to the most problematic jobs then are changed iteratively to determine if the plan improves. This iterative approach not only increases the efficiency of the original job schedule, but also allows the planning process to react and adapt to new, ad-hoc jobs, as well as unexpected interruptions in resource availability. | 2008-10-09 |
20080250421 | Data Processing System And Method - A method of forming a cluster from a plurality of potential clusters that share a common node, the method comprising determining a criticality factor of each potential cluster by combining criticality factors of the nodes of each potential cluster; and forming the cluster from the potential cluster with the highest criticality factor. | 2008-10-09 |
20080250422 | EXECUTING MULTIPLE THREADS IN A PROCESSOR - Provided are a method, system, and program for executing multiple threads in a processor. Credits are set for a plurality of threads executed by the processor. The processor alternates among executing the threads having available credit. The processor decrements the credit for one of the threads in response to executing the thread and initiates an operation to reassign credits to the threads in response to depleting all the thread credits. | 2008-10-09 |
20080250423 | METHOD AND APPARATUS FOR PLANNING AIR REFUELING FOR AIRCRAFT - A method, apparatus, and computer usable program code for planning refueling. In one advantageous embodiment, the apparatus includes an air refueling plug-in application capable of calculating air refueling routes for a formation of aircraft and a plurality of plug-in applications. A framework capable of providing framework services to the air refueling plug-in application and the plurality of plug-in applications is present. The apparatus also includes a first interface for the air refueling plug-in application and the plurality of plug-in applications to receive the framework services from the framework. The apparatus also has a second interface for the air refueling plug-in application and plurality of plug-in applications to provide services from one plug-in application to another plug-in application. The first interface and the second interface are independent of the air refueling plug-in application and plurality of plug-in applications. | 2008-10-09 |
20080250424 | Seamless Window Implementation for Windows Presentation Foundation based Applications - Described are systems and methods for implementing seamless window support for applications, such as applications based on Windows® Presentation Foundation (WPF). Seamless support for WPF applications can be implemented by remoting information associated with structural representation of the applications from a remote server to a remote client. The structural representation may be replicated at the client in accordance with the structural information. The replicated structural representation is utilized to render visual content associated with the application by local rendering mechanisms at the client. | 2008-10-09 |
20080250425 | SYSTEMS AND METHODS FOR INTERFACING MULTIPLE TYPES OF OBJECT IDENTIFIERS AND OBJECT IDENTIFIER READERS TO MULTIPLE TYPES OF APPLICATIONS - A method for interfacing an object identifier reader to at least one application is disclosed. The method may include receiving object identifier data from the object identifier reader. The object identifier data may include information and formatting characters. The method may then involve identifying the information in the object identifier data. At least one application may then be identified to receive the information. Finally, the information may be sent to the at least one application. | 2008-10-09 |
20080250426 | SYSTEMS AND METHODS FOR INTERFACING MULTIPLE TYPES OF OBJECT IDENTIFIERS AND OBJECT IDENTIFIER READERS TO MULTIPLE TYPES OF APPLICATIONS - A method for interfacing an object identifier reader to at least one application is disclosed. The method may include receiving object identifier data from the object identifier reader. The object identifier data may include information and formatting characters. The method may then involve identifying the information in the object identifier data. At least one application may then be identified to receive the information. Finally, the information may be sent to the at least one application. | 2008-10-09 |
20080250427 | APPARATUS AND METHOD FOR GENERATING VERIFICATION SPECIFICATION OF VERIFICATION TARGET PROGRAM, AND COMPUTER READABLE MEDIUM - There is provided with an apparatus which generates a verification specification for verifying a verification target program including functions operating one or more object, including: a first input unit configured to input a first specification describing a first finite state machine which defines transitions among plural states due to occurrences of events; a second input unit configured to input a second specification describing for a first object type, correspondence between functions operating an object having the first object type and the events in the first finite state machine; and a verification specification generation unit configured to generate a verification specification for verifying the verification target program by synthesizing the first and second specifications, the verification specification describing a second finite state machine which defines the transitions among states of the object having the first object type due to calls of the functions operating the object having the first object type. | 2008-10-09 |
20080250428 | Configuration of devices within an instrument - A controller for an instrument includes a control program, an object that interfaces between the control program and the device, and a discovery process. The control program is used by the controller to provide software control of a device within the instrument. The object contains control information about the device so that the control information does not need to be known by the control program. The control information is needed to control the device. The discovery process, upon discovery that the device is within the instrument, obtains the control information from data storage within the instrument and instantiates the object. | 2008-10-09 |
20080250429 | Application-specific mapping of input device elements - A method for carrying out application-specific mapping of input device elements (for example, human input device buttons). The method includes, from an application matching program, determining, for an application program, whether a control element event (for example, a mouse button click event) needs to carry out an action that is specific to the application program, or to perform its default action. The application matching program is configured to execute independently of the application program. A computing system that is capable of carrying out the above method is also provided. | 2008-10-09 |
20080250430 | METHOD AND CORRESPONDING APPARATUS FOR CREATION OF PRINT DRIVERS IN A NETWORK - Disclosed are methods of creating drivers for use in a network, the network including computers and devices, and corresponding apparatus and computer-readable medium. The methods include providing a platform, the platform including: 1) a plurality of selectable communication components, each communication component relating to a type of network communication associated with a type of device; 2) a plurality of selectable PDL components, each PDL component relating to a type of PDL associated with a type of device; 3) a user interface component, the user interface component having plurality of selectable user interface elements; 4) a plurality of selectable workflow components, each workflow component relating to a type of workflow to be associated with a device; and 5) a plurality of selectable vertical feature components; determining a type of the device for which the driver is to be created, the device being on the network; and based on the determined type of the device, selecting and activating one of the communication components, one of the PDL components, the user interface component, and one of the workflow components, and instantiating each of the selected components, thereby creating a driver suitable for the determined type of device on the network. | 2008-10-09 |
20080250431 | SYSTEM AND METHOD FOR DISPLAYING MEDIA FILES IN A MEDIA APPLICATION FOR A PORTABLE MEDIA DEVICE - A method is provided for use with a media application running on a wireless device. The method displays to a user a listing of media files available in a memory of the wireless device. The method comprises the steps of: determining locations in the memory to search for the available media files; the locations including all memory devices of the wireless device suitable for storing the media flies except for one or more predetermined folders contained in the memory, searching the determined locations for files to include in the listing of available media files; locating files not yet included in the listing of available media files; determining if the located files meet criteria of the search and identifying located files that meet the criteria of the search as suitable media files, and displaying a menu including the suitable media files. | 2008-10-09 |
20080250432 | OBJECT-ORIENTED OPERATING SYSTEM - An apparatus for enabling an object-oriented application to access in an object-oriented manner a procedural operating system having a native procedural interface is disclosed. The apparatus includes a computer and a memory component in the computer. A code library is stored in the memory component. The code library includes computer program logic implementing an object-oriented class library. The object-oriented class library comprises related object-oriented classes for enabling the application to access in an object-oriented manner services provided by the operating system. The object-oriented classes include methods for accessing the operating system services using procedural function calls compatible with the native procedural interface of the operating system. The computer processes object-oriented statements contained in the application and defined by the class library by executing methods from the class library corresponding to the object-oriented statements. | 2008-10-09 |
20080250433 | OBJECT-ORIENTED OPERATING SYSTEM - An apparatus for enabling an object-oriented application to access in an object-oriented manner a procedural operating system having a native procedural interface is disclosed. The apparatus includes a computer and a memory component in the computer. A code library is stored in the memory component. The code library includes computer program logic implementing an object-oriented class library. The object-oriented class library comprises related object-oriented classes for enabling the application to access in an object-oriented manner services provided by the operating system. The object-oriented classes include methods for accessing the operating system services using procedural function calls compatible with the native procedural interface of the operating system. The computer processes object-oriented statements contained in the application and defined by the class library by executing methods from the class library corresponding to the object-oriented statements. | 2008-10-09 |
20080250434 | CICS BMS (BASIC MESSAGE SERVICE) METAMODEL - A system for processing a transaction on an end user application and an application server. The system initiates the transaction on the end user application in a first language (such as a markup language) with a first application program (such as a Web browser). The system transmits the transaction to the server and converts the transaction from the first language of the first end user application to a language running on the application server. The system processes the transaction on the application server, transmits the transaction from the application server back to the end user application, and converts the transaction from the language running on the application server to the language of the end user application. | 2008-10-09 |
20080250435 | Optical disk apparatus - An optical disk apparatus is disclosed which includes a first printed circuit board, on which a first circuit pattern is formed; a rotor, on which an optical disk may be placed, and which is electrically connected with the first circuit pattern; a second printed circuit board, which is stacked adjacent to the rotor on a surface of the first printed circuit board, and on which a second circuit pattern is formed; a sensor unit, which is mounted on the second printed circuit board in electrical connection with the second circuit pattern, and which is configured to sense a rotation of the optical disk; and a support plate, which supports the first printed circuit board and the rotor. In this optical disk apparatus, a separate printed circuit board can be utilized to support the sensor unit, whereby manufacturing costs can be reduced and working efficiency can be improved. | 2008-10-09 |
20080250436 | Medium transporting unit and medium processing apparatus - A holding mechanism is operable to hold a top medium from a plurality of plate-shaped media accommodated in a stacker in a stacked manner. A transport arm supports the holding mechanism. The transport arm is provided with a separation mechanism operable to separate a second medium positioned just below the top medium which is held by the holding mechanism. | 2008-10-09 |
20080250437 | Medium transporting unit and medium processing apparatus - A holding mechanism is operable to hold a top medium from a plurality of plate-shaped media accommodated in a stacker in a stacked manner. A transport arm supports the holding mechanism. When the lift mechanism lifts down the transport arm, one of a first elastic pressing force and a second elastic pressing force greater than the first elastic pressing force is selectively applied from the holding mechanism to an upper surface of the top medium. | 2008-10-09 |
20080250438 | Emergency ejection device for a slot-in optical drive - An emergency ejection device in a slot-in optical drive includes a panel with a hole. A sliding part disposes a pushing block on the path which passes through the hole into the slot-in optical drive. A guiding groove is disposed between the hole and the pushing block. The sliding part links to a loading/unloading mechanism and a rack on the sliding part engages one end of a gear set. The gear set includes a plurality of gears engaging each other one by one for transporting the power. A worm gear with a lead angle larger than the self-lock critical angle, i.e. arctan (μ/cos B), engages the other end of the gear set. A stick can put into the hole to push the pushing block backward to move the sliding part for ejecting a disc. | 2008-10-09 |
20080250439 | OPTICAL PICKUP APPARATUS - An optical pickup apparatus comprising: a housing configured to include an optical component including a laser diode emitting a laser beam, the housing being made of metal; and a heatsink configured to dissipate heat generated from the laser diode, the heatsink being made of metal different from the metal of the housing; the heatsink being fixed to the housing with one screw and adhesive. | 2008-10-09 |
20080250440 | Medium holding unit and medium processing apparatus - A holding portion includes at least three pressing members which are operable to press an inner peripheral of a hole formed on the medium. The pressing members are movable between first positions where the pressing members do not come in contact with the inner peripheral and second positions where the pressing members come in contact with and press the inner peripheral. Each of the pressing members is adapted to interlockingly move with each other when moving toward the first positions and to press the inner peripheral independently from the other members when positioning the second positions. | 2008-10-09 |
20080250441 | Messaging for communications systems - Interactive televised programs rely heavily on audience feedback via Short Message Service (SMS) provided by mobile/cellular network. On a polling prompt which opens a clocked “polling window”, a TV viewer enters his/her feedback message into a mobile/cell phone for transmission over a communications network such as GSM (Global System for Mobile Communications) or CDMA (Code Division Multiple Access). Especially in a residential setting, for an IP (Internet Protocol)-enabled TV or STB (Set-Top Box), message entry can be facilitated by messaging capability from a hand-held control device for the TV or the STB. | 2008-10-09 |
20080250442 | TELEVISION RECEPTION CONTROL SYSTEM - In a television reception control system, a master reception device receives and plays back broadcast data from a cable television network, and communicates with a slave reception device via an in-home network. The slave reception device receives and plays back the broadcast data from the cable television network, and communicates with the master reception device via the in-home network, and when no connection with the master reception device is established for a predetermined period of time, the slave reception device is suspended from receiving the broadcast data. | 2008-10-09 |
20080250443 | System and method for providing communication services - Systems and methods for providing communication services are provided. A method of providing communication services may include provisioning at least one first communication service at a network interface unit (NIU) associated with a premises. The at least one first communication service may be associated with a placeholder account. The method also includes receiving, via the at least one first communication service, a request to activate at least one second communication service. The method also includes automatically activating the at least one second communication service. | 2008-10-09 |
20080250444 | Method For Processing Conditional Access Contents By A User Unit - A method allows a broadcasted conditional access content accessible at the time of transmission to be also accessible at a later time thanks to intermediate storage on a hard disk of a user unit. The processing method includes the steps of receiving at the user unit a data stream encrypted by at least one control word, at least one control message stream containing the control words, forming an index file, each index comprising an identifier of a control message formed by the extraction of data associated to the control messages and an identifier of the part of the content to which the control message is applied; and, at the time of the deferred processing of the content, extracting at least one part of the control messages and resynchronizing the content with the control messages by the use of the index file, the identifier of the control message allowing the selection of the current control message from a set of control messages at the time of the exploitation of the content identified by the identifier of the part of the content related to this control message. | 2008-10-09 |
20080250445 | TELEVISION ADVERTISING - Television advertisements and associated advertisement parameters are received from advertisers. The television advertisements are automatically selected for airing during an advertisement availability based on the associated advertisement parameters. Data related to the selected television advertisements are provided to a television provider to facilitate airing of the selected television advertisements during the advertisement availability. Reporting data related to television advertisement airings and impressions are received from the television provider. | 2008-10-09 |
20080250446 | ADVERTISEMENT FRONT END - Advertising parameters and associated television advertisements are received from advertisers. The television advertisements can be designated as pending approval. An automated approval process and a television provider approval process can be utilized to approve or disapprove of the television advertisements pending approval. Approved television advertisements can be provided to the television provider, e.g., by a download process over a network. | 2008-10-09 |
20080250447 | Log Processing - Set top box logs are received from a television provider and processed to identify channel tunes and channel tune times. The channel tunes and channel tune times of the log data can be compared to expected air times of television advertisements on channels, and an impression values, e.g., projected viewers, can be generated for each television advertisement. | 2008-10-09 |
20080250448 | Log Processing - Set top box logs are received from a television provider and processed to compensate for broadcast latency and generate normalized log data, e.g., log data that are indexed to a relative time. Channel tunes and the channel tune times of the normalized log data can be compared to expected air times of television advertisements on channels, and an impression values, e.g., projected viewers, can be generated for each television advertisement. | 2008-10-09 |
20080250449 | Method of dynamic product placement in prerecorded audio and video - A method of dynamic product placement in prerecorded video or audio is disclosed. The method requires a means to decide when product placement should occur in the video or audio, a way to determine the content of a product placement advertisement in a section of video or audio, and software or hardware to alter sections of the video or audio data such that the new data includes new product placement. A preferred embodiment maintains the integrity of the original recording, allows for the product placement in the current playing of the content to appear different than what appeared in the original recording, and allows for product placement to change at different points in time. | 2008-10-09 |
20080250450 | SYSTEMS AND METHODS FOR TARGETED ADVERTISING - Methods of generating recommendations may include obtaining social network data from one or more network resources. Word relationships may be created between selected words in the social network data to produce relationship data. Advertisement or other asset recommendations may be generated for a target user by analyzing browse information of the target user to identify one or more words. Other words in the relationship data may be identified that are related to the words in the target user's browse information. One or more advertisements may be identified having at least one keyword that corresponds to the other words. At least a portion of these advertisements may be selected from a data repository to provide to the target user. | 2008-10-09 |
20080250451 | APPARATUS AND METHOD FOR SEARCHING TV PROGRAM - A TV program searching apparatus includes: an image receiving unit that receives an image having additional information from an external device; an additional information reading unit that reads the additional information from the image received from the image receiving unit; and a TV program searching unit that searches for a TV program related to the additional information using the additional information read by the additional information reading unit. | 2008-10-09 |
20080250452 | Content-Related Information Acquisition Device, Content-Related Information Acquisition Method, and Content-Related Information Acquisition Program - Information relating to content such as a broadcast program is collected from a wide range of sources. Upon input of content-identifying information, which is information specifying content, a content-affiliated information acquisition unit ( | 2008-10-09 |
20080250453 | Log Processing - Reporting data related to content processing devices, e.g., television devices, are processed to identify channel tunes and corresponding tune times of the content processing devices. Automatically generated channel tunes based on the corresponding tune times are identified. Content items that are aired during a time period defined by the corresponding tune times can be adjusted. | 2008-10-09 |
20080250454 | INFORMATION TRANSMITTING APPARATUS AND METHOD, INFORMATION RECEIVING APPARATUS AND METHOD, PROVIDER, AND BROADCASTING SYSTEM - MPEG video encoders and MPEG audio encoders encode video signals and audio signals, respectively. An SI/EPG data generator generates program information. A transport stream multiplexer multiplexes the program information with video data and audio data. A system controller controls the data output rates of the encoding operations and the multiplexing ratio. | 2008-10-09 |
20080250455 | PROGRAM INFORMATION RETRIEVAL SYSTEM, BROADCAST RECEIVING APPARATUS, PROGRAM INFORMATION RETRIEVAL APPARATUS, PROGRAM INFORMATION RETRIEVAL METHOD, AND COMPUTER PROGRAM - A program information retrieval system in which a broadcast receiving terminal and a resolver server are connected through a communication network includes a local storing unit that stores a program information, a taste-information acquiring unit that acquires taste information of a user, a program-information requesting unit that requests the resolver server to provide program information, and a program-information receiving unit that receives the program information transmitted from the resolver server. The resolver server includes a master storing unit that stores the program information, a program-information-request receiving unit that receives a request for program information based on the taste information from the broadcast receiving terminal, a program-information extracting unit that extracts program information matching the taste information from the master storing unit using the identifier, and a transmitting unit that transmits the program information extracted from the master storing unit to the broadcast receiving terminal. | 2008-10-09 |
20080250456 | Method and Apparatus for Optimizing Bandwith in Broadcast/Multicast Video Systems - An upstream distribution point of a video distribution system adjusts programming to replace content that is not selected. In particular, an upstream distribution point of a cable broadcast system receives tuning data representing the currently tuned, or selected, program from one or more set-top boxes via Internet Group Management Protocol (IGMP) signaling. The up-stream distribution point collects the tuning data from the one, or more, set-top boxes and replaces at least one of those programs not selected with alternative programming or content. | 2008-10-09 |
20080250457 | RECORDING CONTROL APPARATUS AND CONTROL METHOD THEREOF - A recording control apparatus for controlling execution of recording in a recording apparatus, comprising, a channel selection acceptance unit configured to accept a channel selection from a user, a display controller to control a display unit to display program data which is selected among received program data via broadcast signal and is corresponding to the accepted channel selection, an obtaining unit configured to obtain reserve-recording information to be executed, and a determination unit configured to determine whether or not the program displayed on the display unit corresponds to a program according to the reserve-recording information, wherein when the determination unit determines that the program displayed on the display unit corresponds to a program according to the reserve-recording information, the display controller controls the display unit to display a query screen to inquire of the user whether to erase recorded data corresponding to the reserve-recording information in the recording apparatus. | 2008-10-09 |
20080250458 | Media exchange for handheld wireless receivers and other media user devices - A system and methods of providing a globally accessible media exchange, whereby media creators, media rights holders, and agents can offer media and media rights to a world-wide market. Media users and publishers can find and preview the media that they need or want and purchase media ownership or license media rights through the media exchange. The media exchange can store digital graphics, audio, and video. The media exchange can also manage the transfer of media and media rights for physical media. In some embodiments, the media exchange can establish a dynamic fair market value based on matching asking prices and bids. Some embodiments could be limited to a single media type such as just audio media. A handheld, wireless video receiver that receives compressed video, decompresses the compressed video, displays the decompressed video. The receiver is part of a system comprising methods, medium, and handheld, wireless devices that compress, transmit, decompress and display digital video images. Real time wireless videoconferences connect multiple handheld video devices. The receiver can alter various setting including but not limited to the format for the compression, image size, frame rate, brightness and contrast. A zoom control can be used select a portion of interest of video being transmitted or being played back. The receiver may also have a touch sensitive display screen providing controls for video display and mobile telephone operation. | 2008-10-09 |
20080250459 | Handheld wireless video receiver - A handheld, wireless video receiver that receives compressed video, decompresses the compressed video, displays the decompressed video. The receiver is part of a system comprising methods, medium, and handheld, wireless devices which compress, enhance, encode, transmit, decompress and display digital video images in real time. Real time wireless videoconferences connect multiple handheld video devices. Real time compression is achieved by sub-sampling each frame of a video signal, filtering the pixel values, and encoding. Real time transmission is achieved due to high levels of effective compression. Real time decompression is achieved by decoding and decompressing the encoded data to display high quality images. The receiver can alter various setting including but not limited to the format for the compression, image size, frame rate, brightness and contrast. A zoom control can be used select a portion of interest of video being transmitted or being played back. The receiver may also have a touch sensitive display screen providing controls for video display and mobile telephone operation. | 2008-10-09 |
20080250460 | Receiver architectures utilizing coarse analog tuning and associated methods - Receiver architectures and associated methods are disclosed that provide initial analog coarse tuning of desired channels within a received signal spectrum, such as a set-top box signal spectrum for satellite communications. These architectures provide significant advantages over prior direct down-conversion (DDC) architectures and low intermediate-frequency (IF) architectures, particularly where two tuners are desired on the same integrated circuit. Rather than using a low-IF frequency or directly converting the desired channel frequency to DC, initial coarse tuning provided by analog coarse tuning circuitry allows for a conversion to a frequency range around DC. This coarse tuning circuitry can be implemented, for example, using a large-step local oscillator (LO) that provides a coarse tune analog mixing signal. Once mixed down, the desired channel may then be fine-tuned through digital processing, such as through the use of a wide-band analog-to-digital converter (ADC) or a narrow-band tunable bandpass ADC. | 2008-10-09 |
20080250461 | MULTIMEDIA DATA TRANSMITTING APPARATUS AND MULTIMEDIA DATA RECEIVING APPARATUS - To provide, in a multimedia content server which stores multimedia data and transmits the stored multimedia data to a terminal, a technique which allows the terminal to properly detect and process version up of section data even when random access for trick play, and the like, is performed. Upon receiving a data transmission request from a multimedia data receiving apparatus, a multimedia data transmitting apparatus transmits the requested multimedia data and notifies data necessary for obtaining an update-point of section data included in the multimedia data or a URI which enables the obtaining of the data, to the multimedia data receiving apparatus. | 2008-10-09 |
20080250462 | Apparatus and system for connecting one electronic portable device to at least one other electronic device - The present invention relates to apparatus for connecting a multimedia portable electronic device capable of storing and playing and/or recording video in digital form, to at least one other electronic device. The apparatus further includes at least one wireless communications interface and means for implementing at least one function involving all or some of the hardware and/or programmable resources incorporated in or attached to the apparatus. | 2008-10-09 |
20080250463 | DIGITAL BROADCAST RECEIVER - A digital broadcasting receiver is equipped with: either at least one lookup table of positive and negative weighted BER factors each assigned to one of predetermined classes of BER of a receivable broadcast signal or a function for deriving said weighted BER factors; at least one counter adapted to classify measured values of BER of the broadcast signal received, obtain BER factors assigned to the measured values, and add up said weighted BER factors as BER is measured at regular time intervals; and control means for controlling said switching means based on the count of said counter, thereby generating proper switching timing for switching broadcast layers in response to the varying reception status of the broadcast signal. As a result, in switching the layers to be presented, frequent switching of the layers can be suppressed while preventing disturbances in video and audio caused by reception errors. The receiver can easily manage holding time for holding the current layer as it is prior to a switching. | 2008-10-09 |
20080250464 | System for Providing Multimedia Content to Customers and Method Thereof - Disclosed are a system and a method for providing multimedia content to customers at a vendor location. A control server and a plurality of patron devices are provided at the vendor location. The control server receives the multimedia content from at least one multimedia content source. Each patron device of the plurality of patron devices communicates with the control server over a communication network for receiving the multimedia content from the control server. The each patron device displays the multimedia content received from the control server for providing the multimedia content to a customer. The each patron device is configured to receive customer input and communicate multimedia content information to the control server based on the customer input. The control server may provide the multimedia content to the each patron device based on the multimedia content information received from the each patron device. | 2008-10-09 |
20080250465 | Method and System for the Efficient Management of Video on Demand Service - The present invention relates to a VOD service operating method and system for providing VOD service through interchange of VOD contents between a VOD server and a set-top box. In accordance with the present invention, a plurality of VOD contents are at least categorized as a first mode and a second mode. The VOD contents included in the first mode store beforehand basic information necessary for selecting the VOD contents in the set-top box by PUSH of the VOD server and provide the stored basic information on a display under the management of the VOD management application when the first mode is activated. Further, the VOD contents included in the second mode transfer a request signal of basic information necessary for selecting the VOD contents from the VOD server to the set-top box according to a user's request. They then display in real time the basic information transferred to the set-top box on a display under the management of the VOD management application. According to the present invention, it becomes possible to reduce the user's waiting time required for selecting the VOD contents and the burden upon the network load so as to provide the VOD service in an efficient manner, | 2008-10-09 |
20080250466 | METHOD, SYSTEM AND APPARATUS FOR VIDEO SHARING - A method for video sharing, which realizes video sharing between an originating UE and a terminating UE when the terminating UE is not IMS core network registered. The method includes the following steps: an originating UE sends a video sharing request containing a URI of callee to an application server; the application server determines that the terminating UE of the callee is not IMS core network registered and notifies the terminating UE to register; the terminating UE activates a GPRS connection and registers with the IMS core network; the originating UE and the registered terminating UE set up a sharing session via the application server; the originating UE and the terminating UE share video information. A system and apparatus for practicing this method is also disclosed. | 2008-10-09 |
20080250467 | METHOD OF PROCESSING BROADCASTING SERVICE INFORMATION AND HYBRID TV USING THE SAME - A method of processing broadcasting service information and a hybrid TV using the same are provided. The hybrid TV receives SD&S information by determining whether broadcasting service information on whether one or more broadcasting providers concurrently provide IPTV broadcasting services in one-to-one correspondence with legacy broadcasting services, which are substitutable for each other, is included in a packet received from an IP network and discarding the received packet, when it is determined that broadcasting service information is not included in the received packet. | 2008-10-09 |
20080250468 | System and method for scheduling presentation of future video event data - A method is disclosed for presenting video data comprising receiving at a first end user device, displayable video data for advertising a future video event; scanning the displayable video data for scheduling data associated with the future video event; and queuing the future video event for presenting data for the future video event based on the scheduling data. A system is disclosed for performing the method. A data structure is disclosed for containing data embedded in a computer readable medium for providing a functional and structural interrelationship between a processor, the data structure and data stored in the data structure. | 2008-10-09 |
20080250469 | Synchronized transmission of audio and video data from a computer to a client via an interface - A method for controlling data transmission between a computer and a video client via an interface, the method comprising: the computer polling the interface a first time to determine the size of the buffer on the interface; receiving a first buffer size value from the interface; sending a plurality of frames of video and audio data to the buffer on the interface such that a delay period exists between the sending of each frame; the computer polling the interface a second time to determine buffer size after the frames are sent to the interface; receiving a second buffer size value from the interface; and modifying the amount of time between the transmission of frames. | 2008-10-09 |
20080250470 | System for Video Reproduction in Different Resolutions - A device for reproducing video data signals receives encoded video data signals; and has a processing unit for decoding the encoded video data signals into the video data signals. The encoded video data signals comprises a base stream of signals ( | 2008-10-09 |
20080250471 | PARENTAL CONTROL USING SOCIAL METRICS SYSTEM AND METHOD - A parent defines friend rules for on-line association with their child. Upon a request of an on-line stranger to be a new friend of the child, stranger information about the on-line stranger is retrieved and compared to the friend rules to determine whether the stranger is allowed, blocked or restricted from being a friend with the child. Accordingly, the parent only has to use a minimal amount of time in establishing the friend rules to protect the parent's child from on-line strangers. | 2008-10-09 |
20080250472 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND COMPUTER READABLE MEDIUM - An information processing system includes: an information processing apparatus includes: an acceptance unit that accepts selection of a function and a start command of processing relating to the selected function; a determination unit that determines element processing executed to provide the selected function; and a request unit that makes an execution permission request of the element processing determined in association with the selected function before the start command of processing relating to the selected function is accepted; and a permission management apparatus that accepts the execution permission request of processing from the information processing apparatus, determines whether or not the execution is permitted, and informs the information processing apparatus of the determination result. | 2008-10-09 |
20080250473 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR CONFIGURING FIREWALLS - A solution (A1-A16) is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system includes a set of security applications (such as firewalls), which are adapted to control communications of the entities. A corresponding method starts with the step of determining a target configuration of the security applications for allowing execution of the software product on the entities. A software package (or more), being adapted to enforce the software product and the target configuration, is then built (A11). The method continues by distributing (A12-A16) the software package in the system, so as to cause the application of the software package for enforcing the software product on each entity and the target configuration of each security application. | 2008-10-09 |
20080250474 | Collaborative Email With Delegable Authorities - Writing a collaborative email document with hierarchical authorities including establishing a collaborative email document on an administrator's computer, identifying one or more signatories for the document, identifying one or more collaborators who are authorized to view and edit the document, providing to the collaborators copies of the document for viewing and editing, where the collaborators' copies reside on collaborators' computers, updating the copies of the document on collaborators' computers with revisions from the collaborators, and sending the collaborative email document from the administrator's computer to addressees when the document bears valid digital signatures from all signatories. Typical embodiments also include providing at least one user authority to delegate signature authority, establishing a hierarchy of delegation authority for signatures, establishing at least one authority delegation policy including at least one rule for automated delegation of signature authority among signatories and delegating signature authority from at least one signatory to another. | 2008-10-09 |
20080250475 | AUTOMATICALLY CHANGING THE APPEARANCE OF A SOFTPHONE BASED ON A USER PROFILE - A software phone (“softphone”) application enables a user to make a phone call from a computing device user Voice over Internet Protocol (VoIP). While the functionality of the softphone remains the same, its appearance is defined by a skin that can be changed. A server stores a profile for users of the softphone. Based on the user profile, the server selects a skin and pushes the skin to the user's softphone, thereby changing the appearance of the softphone. The skin can include advertisement and can include several layers that can be displayed simultaneously. Some of the layers are static, and some of the layers are animated. | 2008-10-09 |
20080250476 | Method and Apparatus to Enable a Securely Provisioned Computing Environment - A form of removable memory, such as a universal serial bus (USB) flash device, may enable a subscription-based computing system from any PC. The device may include an execution unit including a processor, a private memory including an encrypted application, a computing system interface, a cryptographic unit including a secure storage with a number of metering units, and a computer-readable medium. The computer-readable medium may include instructions for routing messages and data from the execution unit through the computing system interface to a connected computing system. Further, encrypted application data may be routed through the cryptographic unit to the execution unit to thereby transform the encrypted application into executable data for use by the computing system. Also, the device may decrement a number of metering units stored at the device during execution of the encrypted application by the computer. | 2008-10-09 |
20080250477 | SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION SERVICES - A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are returned to the customer server, which grants access only if both first and second factor authentication succeeds. | 2008-10-09 |
20080250478 | Wireless Public Network Access - Public access to a network is provided through wireless access points, which may simultaneously support secured network access; in preferred embodiments, the access points are routers (such as “WiFi” routers). Accordingly, a router is configured with a public access profile (or profiles), which may be selectively enabled or disabled. When enabled, the router sends out an identifier that can be used to associate a client device with a public (i.e., unauthenticated) access path through the router to a network. The router also sends out a conventional identifier that can be used to associate another client device with a secured (i.e., authenticated) access path through the router, where the public and secured access paths are usable simultaneously by clients of the router. | 2008-10-09 |
20080250479 | WORKFLOW EXECUTING APPARATUS AND CONTROL METHOD OF THE APPARATUS AND PROGRAM THEREOF - A workflow executing apparatus that executes processing in accordance with a workflow, the apparatus comprising: a workflow information storage section that stores workflow information describing the workflow; a transmission control section that transmits an e-mail during the process of the workflow to a user that requested that workflow, in accordance with the stored workflow information; and a workflow execution section that adds identification information of e-mails transmitted prior to the e-mail transmitted by the transmission control section to the stated e-mail and sends the e-mail. | 2008-10-09 |
20080250480 | METHOD AND SYSTEM FOR AN ELECTRONIC BANK SAFE DEPOSIT BOX - A system and method for providing secure electronic storage in a plurality of electronic safes which each include a plurality of electronic compartments. The owner of each electronic safe can generate new compartments and determine who has access to each of the compartments in their electronic safe. | 2008-10-09 |
20080250481 | Secure Web-Based User Authentication - Techniques for authenticating a user are described. In one implementation, a user requests access to protected information or resources by providing a user name and a password to a web server that controls access to the information or resources. If the user name and password match a known user profile, the web server retrieves a user identifier (e.g., a personal identification number) and constructs a translation table around the user identifier. The translation table includes the values that constitute the user identifier, random representations of each value, visual images that represent each value, and random image names for each visual image. The information in the translation table is then used to generate a user interface that allows the user to enter his or her user identifier via the user's computing device without exposing the actual user identifier values to the computing device. | 2008-10-09 |
20080250482 | Network invitation arrangement and method - Method and arrangement for enabling communications between an entity operating a network including a first user, and a second user includes sending a message from the first user to the entity informing the entity of identification information of the second user interested in joining the network, sending from the entity to the first user a key to allow the second user to communicate with the entity, providing a message from the first user directly to the second user containing the key, sending a message from the second user to the entity using the key, determining whether the key sent by the second user corresponds to the key provided by the entity to the first user, and if so enabling communications between the second user and the entity. The ability of the first user to obtain a key to enable the second user to join the network is time-limited. | 2008-10-09 |
20080250483 | Method and System for Authenticating Products Using Serial Numbers and Passwords Over Communication Network - The present invention relates to a method and system for authenticating products using serial numbers and passwords over a network, which can determine whether the products are genuine based on the serial numbers, which are attached to the respective products, and the passwords, which can be viewed at the time of unsealing the products. When the present invention is used, authentication for a product is performed according to whether the serial number and password of the product match and whether a request for the authentication of the serial number has been made, and thus a reliable authentication system can be provided. Furthermore, one or more passwords for the product are sealed in or attached to the product, so that, if the password is not known, an imitation is distinguished as not being a genuine product, therefore an effective authentication system can be provided. | 2008-10-09 |
20080250484 | SYSTEM AND METHOD FOR CONTENT FILTERING - The system for content filtering includes at least one content server that stores content. The system also includes at least one client computer configured to transmit a request for the content to the at least one content server. The request contains an address of the content server and a port number associated with such a request for the content. A gateway is coupled to the at least one client computer. The gateway is configured to receive and renumber the request with a new rarely used port number associated with a filter privilege of a user of the at least one client computer. The system also includes a content filtering server, configured to block restricted content based on the filter privilege. Finally, a switch is coupled to the gateway, the content filtering server, and the content server. The switch is configured to listen for the request on the rarely used port number and to redirect the request to the content filtering server. | 2008-10-09 |
20080250485 | Guest Dongle and Method of Connecting Guest Apparatuses to Wireless Home Networks - The invention relates to a dongle ( | 2008-10-09 |
20080250486 | DESIGN STRUCTURE FOR LOCAL BLADE SERVER SECURITY - A design structure embodied in a machine readable storage medium for designing, manufacturing, and/or testing a design for a local blade server security is provided. The design structure includes a system capable of extracting authentication information for a local user from a USB keydrive inserted in the chassis of the blade server; comparing the extracted authentication information with predetermined authentication credentials; and granting access to one or more resources on the blade server if the extracted authentication information matches the predetermined authentication credentials; and denying access to one or more resources on the blade server if the extracted authentication information does not match the predetermined authentication credentials. | 2008-10-09 |
20080250487 | Systems For Firewall Protection Of Mass Storage Devices - The present invention discloses a URD including: a non-volatile storage memory having program code, wherein said program code is configured to enable a network protocol for communicating with a host system; and a controller for controlling operations performed on said storage memory. Preferably, the storage memory includes flash memory. A URD including: a host system having a firewall; and a URD having a non-volatile storage memory, wherein said storage memory includes program code, and wherein said program code is configured to enable a network protocol, said URD operationally connected to said host system; wherein said firewall is configured to provide security measures related to said URD. Preferably, the firewall is a software firewall or a hardware firewall. | 2008-10-09 |
20080250488 | Methods For Firewall Protection Of Mass-Storage Devices - The present invention discloses methods for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to provide security measures related to the URD. Preferably, the firewall is a software firewall or a hardware firewall. A method for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to restrict access of at least one application to the URD. Preferably, the firewall is a software firewall or a hardware firewall. | 2008-10-09 |
20080250489 | Systems For Firewall Protection Of Mass Storage Devices - The present invention discloses a URD including: a non-volatile storage memory having program code, wherein said program code is configured to enable a network protocol for communicating with a host system; and a controller for controlling operations performed on said storage memory. Preferably, the storage memory includes flash memory. A URD including: a host system having a firewall; and a URD having a nonvolatile storage memory, wherein said storage memory includes program code, and wherein said program code is configured to enable a network protocol, said URD operationally connected to said host system; wherein said firewall is configured to provide security measures related to said URD. Preferably, the firewall is a software firewall or a hardware firewall. | 2008-10-09 |
20080250490 | Authenticated session replication - Apparatus, systems, and methods may operate to receive, at an authentication agent in a first local area network (LAN), a virtual proxy authentication identification from a virtual proxy serving as a single point of trust for a second LAN across a wide area network. The virtual proxy authentication identification may be included in a modified session message originated within the second LAN. As a result, the apparatus, systems, and methods can operate to transmit content associated with the modified session message to a first plurality of individual proxy modules in the first LAN. Additional apparatus, systems, and methods are disclosed. | 2008-10-09 |
20080250491 | METHOD OF TRANSMITTING INFORMATION EFFECTIVELY IN SERVER/CLIENT NETWORK AND SERVER AND CLIENT APPARATUSES USING THE SAME - A method for transmitting information effectively in a server/client network system is provided, the network system including a client placed behind a firewall and a server that provides the client with a predetermined service. The method includes the client generating a hole packet which is for making a hole in the firewall to allow a packet to pass through the firewall from the server, the hole being maintained for a certain period of time, and transmitting the hole packet to the firewall; and transmitting a packet from the server to the client through the hole made by the hole packet. | 2008-10-09 |
20080250492 | STRUCTURE AND IMPLEMENTATION OF UNIVERSAL VIRTUAL PRIVATE NETWORKS - A Universal Virtual Private Network (VPN) apparatus, and method and system for using universal VPNs. The Universal VPNs include a first Internet Protocol (IP) switch connected to a second IP switch by a public telecommunications medium. Each IP switch has an interswitch port and access ports to which hosts are directly connected. A virtual private line services (VPLS) packet received by the first IP switch from a source host directly connected to an access port of the first IP switch is routed by the first IP switch to destination hosts of a universal VPN attached to access ports of the first and second IP switches via respective transmission paths that use a VPLS transmission protocol throughout each respective transmission path. The VPLS packet includes a header appended to an IP frame including a packet payload including a first message, the header including a VPN label identifying the universal VPN. | 2008-10-09 |
20080250493 | Method, System and Computer Program for Automating Configuration of Software Applications - A solution ( | 2008-10-09 |
20080250494 | Image processing apparatus - An image processing apparatus is provided that is capable of displaying a customize screen without input operation to the own machine. An image processing apparatus (MFP) is communicatably connected to an information processing apparatus (PC) and includes a displaying portion. The MFP acquires user information related to a login user logging in to the PC, authenticates based on the acquired user information whether the login user is a usage permitted user permitted to use the MFP, and displays a customized screen corresponding to the login user on the displaying portion of the MFP when it is authenticated that the login user is the usage permitted user. | 2008-10-09 |
20080250495 | AUTHENTICATION PROCESSING APPARATUS, AUTHENTICATION PROCESSING METHOD, RECORDING MEDIUM STORING AUTHENTICATION PROCESSING PROGRAM, RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM AND INFORMATION PROCESSING SYSTEM - An authentication processing apparatus, which includes: an authentication processing section that performs authentication using an authentication method selected from authentication methods provided; a storage section that stores authentication information indicating whether or not the authentication succeeds; a determination section that, when an operation on electronic information associated to one or more authentication methods is performed, determines whether the operation on the electronic information is permitted or not, on the basis of the one or more authentication methods associated to the electronic information and the stored authentication information; and an authentication request section that, when the determination section determines that the operation on the electronic information is not permitted, detects from among the one or more authentication methods associated to the electronic information an authentication methods for which it is not indicated in the authentication information that an authentication succeeds, and requests the authentication using the detected authentication method. | 2008-10-09 |
20080250496 | Frame Relay Device - A frame relay device includes a table where an entry containing a combination of an MAC address and an IP address is registered to be used in the frame relay processing of a local device. Moreover, the frame relay device includes judgment means for searching the table by the transmission origin MAC address and the transmission origin IP address contained in the frame received and judging whether the combination of the transmission origin addresses is registered as a relay object in the layer | 2008-10-09 |
20080250497 | STATISTICAL METHOD AND SYSTEM FOR NETWORK ANOMALY DETECTION - An anomaly detection method and system determine network status by monitoring network activity. A statistics based profile for said network over a period is generated to analyze potentially anomalous network activity to determine if said network activity is anomalous by comparing current activity against the profile. Using the profile as a reference, the anomaly detection system and process estimate and prioritize potentially anomalous network activity based on the probability that the behavior is anomalous. The level of severity that the anomaly detection process uses to determine if an alarm is needed is based on comparing user-adjustable thresholds to the current probability. If the threshold has been breached, the user is alerted, subject to other quality checks. After a reporting cycle concludes, the anomaly detection system and process recompiles the statistics based profile to take into account the information observed in the previous reporting cycle. | 2008-10-09 |
20080250498 | Method, Device a Program for Detecting an Unauthorised Connection to Access Points - This method of detecting address spoofing in a wireless network, comprising the steps of obtaining frames comprising an address of a device having sent the frame and a timestamp representative of the time of sending of the frame by said device; of analyzing the timestamps included in the frames having one and the same sending device address; and of detecting a spoofing of said address according to the analysis of said timestamps. | 2008-10-09 |
20080250499 | Method and Apparatus for Reducing Buffer Overflow Exploits by Computer Viruses - Buffer overflow exploits in a computer are reduced by encoding linkage information associated with a subroutine, following a call to the subroutine from an application executing on the computer. The encoded linkage information is stored at a first address in a run-time stack in a memory of the computer. Upon exit from the subroutine, the value stored at the first address in the run-time stack is retrieved and decoded to obtain decoded linkage information. Execution of the application continues in accordance with the decoded linkage information. Subroutine data written to the stack is not encoded. | 2008-10-09 |
20080250500 | Man-In-The-Middle Attack Detection in Wireless Networks - Detection of a man-in-the-middle attack. In particular implementations, a method includes detecting a first event comprising notification of an invalid wireless management frame operable to cause a termination of a connection between a wireless client and a wireless access point, wherein the notification is based on a failed verification of a management integrity code (MIC) appended to the wireless management frame. The method also includes detecting a second event involving notification of either an authentication failure associated with the wireless client or a connection between the wireless client and a rogue access point. The method also includes performing one or more actions upon detection of the first event and the second event within a threshold period of time of each other. | 2008-10-09 |
20080250501 | Method for Monitoring Managed Device - A method for monitoring the managed devices comprises that the manage center preserves the integrality list in advance, which includes the system integrality values of the managed devices and the corresponding relations of the managed devices and the system integrality values of themselves, and the managed device gathers the current system integrality value of itself and saves it when it starts; the managed device sends the information including the current system integrality value to the manage center after receiving the monitor command from the manage center; the manage center determines whether the received current system integrality value of the managed device coincides with the integrality value of the managed device saved by itself according to the received information and said integrality list, and implements the alert process when they do not coincide with each other. The manage center can know whether the managed device is believable currently so that the manage center can determine whether the unknown attack to the managed device exists or not according to the present invention. | 2008-10-09 |
20080250502 | Software Checking - A method of checking the integrity of a software component comprises: selecting a checking algorithm | 2008-10-09 |
20080250503 | METHOD AND SYSTEM FOR FILTERING COMMUNICATION - An e-mail relay provides message filtering services to an e-mail network. The e-mail relay monitors incoming communication and intercepts e-mail messages. The e-mail relay compares attributes of the messages to data derived from SPAM messages, which are stored in a SPAM database. The e-mail relay restricts the delivery of messages based on the comparison such as by restricting the delivery of messages having attributes close to those of SPAM messages from the SPAM database. The SPAM database is constructed by responding to user or administrator indications as to whether received messages are SPAM messages. | 2008-10-09 |
20080250504 | DIGITAL RIGHTS MANAGEMENT METHOD AND APPARATUS - A digital rights management (DRM) method and apparatus are provided. The DRM method includes transmitting a rights object request message; receiving a rights object response message based on a Universal Plug and Play (UPnP) contents directory service; and acquiring a rights object using the rights object response message. Another DRM method includes receiving a rights object request message; and transmitting a rights object response message based on a Universal Plug and Play (UPnP) contents directory service. The DRM apparatus includes a transmitting unit which transmits a rights object request message to a media server of a DRM domain; a receiving unit which receives a rights object response message based on a Universal Plug and Play (UPnP) contents directory service from the media server; and a playback unit which plays back a contents object on a basis of a rights object acquired using the rights object response message. | 2008-10-09 |