42nd week of 2008 patent applcation highlights part 61 |
Patent application number | Title | Published |
20080256546 | Method for Allocating Programs - In one embodiment, a method for allocating programs to resources suited to operating conditions thereof comprises generating composition management information for a plurality of resources based on management information relating to performance and capacity of each of the resources. The composition management information includes identification information for the resources used by a plurality of programs. The method further comprises searching for and locating the composition management information of a resource identified by the identification information for each of the programs, based on the composition management information of the resources, and generating program information which associates composition management information of each of the programs with the composition management information of the located resource; and outputting information indicating that a resource abnormality has occurred with one of the programs, in cases where the composition management information of the resource which is associated with the program in the program information corresponds to one or more rules for detecting a resource abnormality in the program. | 2008-10-16 |
20080256547 | Method and System For Managing a Common Resource In a Computing System - The invention, in one embodiment, provides a method for acquiring and releasing a lock over a common resource in a computing system. After a lock has been acquired over a common resource. A determination ( | 2008-10-16 |
20080256548 | Method for the Interoperation of Virtual Organizations - A cooperative data stream processing system is provided that utilizes a plurality of independent, autonomous and possibly heterogeneous sites in a cooperative arrangement to process user-defined job requests over dynamic, continuous streams of data. A method is provided to organize the distributed sites into a plurality of virtual organizations that can be further combined and virtualized into virtualized virtual organizations. These virtualized virtual organizations can also include additional distributed sites and existing virtualized virtual organizations and all members of a given virtualized virtual organization can share data and processing resources in order to process jobs on either a task-based or goal-based allocation mechanism. The virtualized virtual organization is created dynamically using ad-hoc collaborations among the members and is arranged in either a federated or cooperative architecture. Collaborations between members is either tightly-coupled or loosely coupled. Flexible management of resources is provided with resources being provided under exclusive control or based on best-effort access. | 2008-10-16 |
20080256549 | System and Method of Planning for Cooperative Information Processing - A cooperative data stream processing system is provided that utilizes a plurality of independent, autonomous and possibly heterogeneous sites in a cooperative arrangement to execute jobs derived from user-define inquires over dynamic, continuous streams of data. A method is provided for cooperative planning for the execution of the jobs across the distributed plurality of sites. An identification of the resources available for sharing from each one of the plurality of sites is communicated to one or more planners disposed on the distributed sites. These planners use the resource information to generate planning domains in which the jobs can be processed. Upon receipt of an inquiry at one of the sites, the inquiry is communicated to one of the planners that uses the planning domain to create at least one distributed plan for the inquiry. Processing of the inquiry is conducted in accordance with the distributed plan. Planning can take advantage of the structure of virtual organizations including cooperative and federated virtual organizations. The distributed plans can make use of the resources within a single virtual organization or across multiple organizations. | 2008-10-16 |
20080256550 | Parallel processing system by OS for single processor - The present invention relates to a parallel processing system by an OS for single processor capable of operating an OS for single processor and an existing application on a multiprocessor and achieving parallel processing by a multiprocessor with respect to the application, wherein the multiprocessor are logically divided into two groups, i.e., a first processor side and a second processor side, and units of work that are parallelizable within the application operating on the processors on the first processor side are controlled as new units of work on the processors on the second processor side. | 2008-10-16 |
20080256551 | System and Method For Storing State Information - A method for storing state information, the method includes storing, at a first circuit, state information representative of a state of a second circuit while the second circuit enters a low power mode; characterized by receiving an indication that a task switching from a first task to a second task should occur; storing a state information representative of a state of the second circuit, at the first circuit; receiving an indication that the first task should be resumed; and writing the stored state information from the first circuit to the second circuit. A system includes a first circuit and a second circuit, whereas the first circuit is connected to the second circuit and is adapted to store state information representative of a state of a second circuit; characterized by including a controller adapted to control a storage of the state information if at least a portion of the second circuit is powered down or if the second circuit is associated with a task switching operation. | 2008-10-16 |
20080256552 | SYSTEM AND METHOD FOR A CICS APPLICATION USING A SAME PROGRAM ON A LOCAL SYSTEM AND A REMOTE SYSTEM - A system and method implemented in a Customer Information Control System (CICS) Application configured to process information residing on remote systems and display such information on a local system, using a same program residing on both the remote system(s) and the local system. The method includes, for example, sending programming functions of a local system with a request for information to a remote system. The method further includes processing the programming functions of the local system with the request for information on the remote system to obtain updated information from the remote system. The updated information is sent to the local system for display. | 2008-10-16 |
20080256553 | Dynamic Subscription and Message Routing on a Topic between Publishing Nodes and Subscribing Nodes - A system for dynamic message routing on a topic between publishing nodes and subscribing nodes includes a plurality of message queues, at least one topic/node table, a subscribing module, a publishing module, and other modules to send messages between one or more publisher and one or more subscribers. These modules are coupled together by a bus in a plurality of nodes and provide for the dynamic message routing on a topic between publishing nodes and subscribing nodes. The message queues store messages at each node for delivery to subscribers local to that node. The topic/node table lists which clients subscribe to which topics, and is used by the other modules to ensure proper distribution of messages. The subscribing module is use to establish a subscription to a topic for that node. The publishing module is used to identify subscribers to a topic and transmit messages to subscribers dynamically. The other modules include various devices to optimize message communication in a publish/subscribe architecture operating on a distributed computing system. The present invention also includes a number of novel methods including: a method for publishing a message on a topic, a method for forwarding a message on a topic, a method for subscribing to messages on a topic, a method for automatically removing subscribers, a method for direct publishing of messages, and methods for optimizing message transmission between nodes. | 2008-10-16 |
20080256554 | METHOD AND MODULES FOR GENERATING CLIENT-SERVER APPLICATIONS - A multi-model-view-controller (MMVC) design pattern for generating client-server applications, which overcomes the disadvantages of the MVC design pattern. In an application generated according to the MMVC design pattern initial data is provided by the server model via the controller to the client model. Subsequent data is requested from the server model by the controller and passed to the client model. The initial and subsequent data are fetched according to predetermined rules. The predetermined rules can be based on personal details of the user, such as identity or role, on the server or client computing platforms, on the application, or other factors. | 2008-10-16 |
20080256555 | DEVELOPING CONTROLS FOR OUTLOOK ADD-INS - The forms hosting system allows a developer to design custom Outlook form regions containing standard and custom managed controls using popular development tools. The forms hosting system provides a runtime wrapper that appears to Outlook as a normal ActiveX control. When Outlook invokes the runtime wrapper control, the runtime wrapper control loads the managed controls defined by the developer. The runtime wrapper control translates messages received from Outlook into messages understood by the managed controls. | 2008-10-16 |
20080256556 | Method for Controlling the Interface of a Plurality of Types of Radiocommunication Terminals by Defining Abstract Events, Corresponding Computer Programs, Signal and Terminal - A method is provided for controlling the interface of a plurality of types of radiocommunications terminals. The method includes defining a set of abstract events, each of which correspond to a predefined interface-independent generic and functional interaction, such as for a given type of terminal, associating concrete events available and/or executable on the terminal to at least certain abstract events in such a way that it makes it possible to develop an application independently of the interface specificities of each type of terminal and to homogeneously carry out all applications developed with the aid of abstract events on a given terminal. | 2008-10-16 |
20080256557 | Proactive Prevention of Service Level Degradation during Maintenance in a Clustered Computing Environment - A clustered computing environment with application staging, including a plurality of application instances running on at least one computer and operating in a clustered computing environment, and a stage manager operative to manage the transition of any of the application instances between a front stage assignment and a back stage assignment, where any of the application instances that are assigned as front stage application instances service requests, and where any of the application instances that are assigned as back stage application instances ceases to service requests and performs at least one maintenance task. | 2008-10-16 |
20080256558 | AMBIENT SOFTWARE INTEGRATION SYSTEM - A software extension that monitors a hardware-level or operating system-level representation of the visual state of a running computer application. The software extension processes the time-sequence of visual information extracted to approximate some of the internal, non-graphical application data structures and program state. The software transforms, refines, or augments the data acquired with acquired personal data or network data to form derived data. The derived data then is presented to the user to create a new application feature. This presentation may be displayed alongside the application or operating system's existing graphical user interface. | 2008-10-16 |
20080256559 | ONLINE DELETION OF DEVICES - An I/O adapter is installed in a slot in a computer system. Online deletion of the I/O adapter is achieved by a three step process, in which a device driver that controls the adapter first attempts to quiesce the adapter, the slot is then powered off, if it is possible to do so, and finally, if the quiesce operation was successful or the slot is powered off, the driver completes the delete operation by unmapping buffers and cleaning up datastructures associated with the device driver. | 2008-10-16 |
20080256560 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR INTERACTING WITH SERVICES THROUGH A NATIVE USER INTERFACE IN A SOA ENVIRONMENT - A solution ( | 2008-10-16 |
20080256561 | Web service platform for keyword technologies - The present web service platform includes a set of application program interfaces (APIs) and a framework for adding services that correspond to the APIs. The web service platform may also support a stored procedure (sproc) that allows combining results from two or more services before transmitting results to an application. The services relate to keyword technologies. | 2008-10-16 |
20080256562 | System and Method for Accessing Files in a Physical Data Storage - Accessing files in a physical data storage. The system may include an application programming interface (API) layer, the API layer including an API which extends the class Java.io.file to include methods for file access requests. The system may further comprise at least one internal layer, the internal layer configured to transform a file access request into a database call. Finally, the system may include a storage layer with a database, the database being configured to access the physical storage in response to the database call. | 2008-10-16 |
20080256563 | SYSTEMS AND METHODS FOR USING A LODESTONE IN APPLICATION WINDOWS TO INSERT MEDIA CONTENT - Lightweight application components are provided which can be displayed in a number of unaffiliated application windows and allow a user to insert media content into the application windows. In some embodiments, the present invention may comprise a lodestone application which allows a user to insert media files and/or links to media files in e-mails, instant messages, and other communications. In one embodiment, a method for displaying a lodestone includes: receiving, via an operating system, a window event; determining the window event indicates activation of an application window; determining the application window corresponds to an application window for which a lodestone is configured; identifying, in response to the determinations, display configuration information for the lodestone, the display configuration information corresponding to the application window; and displaying, according to the display configuration information, the lodestone in the application window. | 2008-10-16 |
20080256564 | Application Compatibility Using a Hybrid Environment - A hybrid environment may be used for addressing application compatibility between a host operating system and one or more application(s) optimized to run on a different (“guest”) version of the host operating system. A thunking wrapper consisting of a native thunking layer, a service thunking layer, and a subsystem thunking layer provides translation between the guest application and the host operating system for a seamless interface. Multiple thunking wrappers may be included to support application compatibility between multiple guest operating systems and the host operating system. | 2008-10-16 |
20080256565 | DISC TRANSPORT AND METHOD OF DISC REMOVAL - An apparatus for disc publishing comprising a disc transport movable along a first slide member, the disc transport including: an engagement mechanism for selective engagement of at least one disc, a print assembly for printing to the at least one disc, the print assembly including one or more print heads movable along a second slide member; and a print tray adapted to receive the at least one disc from the disc transport; a recording device for recording to the at least one disc, the recording device including a recording tray adapted to receive and record to the at least one disc from the disc transport; a disc supply receptacle adapted to receive one or more discs, the disc supply receptacle being positioned below and in alignment along an engagement axis with the engagement mechanism for selective engagement of the at least one disc; and a control unit adapted to control the functions of the disc publishing device; wherein the disc transport and the one or more prints heads are adapted to move independent of each other wherein the print tray and the recording tray have an open position that is in alignment along the engagement axis for selective engagement of the at least one disc by the engagement mechanism. | 2008-10-16 |
20080256566 | Dual-Path Optical Recording Media and an Apparatus for Accessing Thereof - A dual-path optical recording medium and an apparatus for accessing such are disclosed. The dual-path optical recording medium includes a substrate, an intermediate recording layer, a holographic recording layer and a dichronic mirror layer. The intermediate recording layer is a rewritable data storage layer with a relatively low storage capacity. The holographic recording layer is a write-once data storage layer with a relatively high storage capacity. The dichronic mirror layer is located between the holographic recording layer and the intermediate recording layer. The apparatus for accessing the dual-path optical recording medium includes a first light module capable of generating a first laser light, and a second light module capable of generating a second laser light. | 2008-10-16 |
20080256567 | SYSTEM AND METHOD FOR PROVIDING PACKAGED PROGRAMMING TO ELECTRONIC MEDIA PLAYERS - The present invention relates to providing packaged programming for use on electronic media players. In particular the present invention relates to providing entertainment programming packaged together with advertising, in downloadable form, for use on electronic media players. The service may be supported by subscription fees, by advertising fees, are a combination thereof. The service provider, in turn, uses a portion of the moneys generated for operating expenses and profit, as well as to pay pre-negotiated royalty fees to the copyright owners of the aforementioned programming. | 2008-10-16 |
20080256568 | Advertisement Airing Audit System and Associated Methods - The system provides an Internet-based site accessible by customers and broadcasters for tracking the airing of their advertisements. The system includes a software package for creating a database of all events occurring on a broadcast station, which may comprise, for example, a radio or television station, although these are not intended as limitations. The software package receives a recording of a station's output, which contains metadata on each broadcast element that includes time, date, and content information. As the broadcast proceeds, the start and stop time of each element are stored in a table in the database. This database can then be subsequently queried via the website by a customer or media personnel to ascertain that the spot has aired as intended. | 2008-10-16 |
20080256569 | System and method for video transmission scheduling - A systems and methods for video transmission scheduling are provided. A method of video transmission scheduling may include selecting a first video transmission event associated with first content to be blacked out based on a first geographic access restriction. The method may also include selecting a second video transmission event associated with second content to be blacked out based on a second geographic access restriction. The method may further include linking the first video transmission event to the second transmission event to control a blackout of the second content based at least partially on a trigger related to the first content. | 2008-10-16 |
20080256570 | Method and apparatus for blocking video-on-demand and pay-per-view channels that disappear and reappear - A method of blocking a channel that disappears and reappears includes determining whether the channel that reappeared is designated as blocked by a parental control setting that was retained when the channel disappeared, and blocking the channel if the channel is designated as blocked by the parental control setting. | 2008-10-16 |
20080256571 | METHOD AND SYSTEM FOR PROCESSING WIRELESS DIGITAL MULTIMEDIA - A transmit digital processing system for wireless transmission of HDMI and/or DVI data using an FPGA. The FPGA converts the data into two data streams and includes a front end component multiplexing video data with control data. A complementary receive FPGA is also disclosed. | 2008-10-16 |
20080256572 | ADVERTISEMENT SUPPORTED VIDEO DOWNLOAD - System and method for facilitating advertisements within viewed content. The advertisements may be banner advertisements or other advertisement. The advertisements may be included in such a manner that if a user skips or otherwise fast forwards through the advertisements, the user if force to skip through at least a portion of the viewed content. | 2008-10-16 |
20080256573 | Method and device for displaying a message on a screen of a television - The present invention provides a method for displaying a message on a screen of a television including the steps of displaying a television picture on the screen; displaying the message in a message region of the screen, wherein the television picture is at least partly visible within the message region; and blurring the television picture in the message region. | 2008-10-16 |
20080256574 | DATA REPRODUCING APPARATUS AND DATA REPRODUCING METHOD - The present invention relates to a data reproducing apparatus and a data reproducing method. The data reproducing apparatus and the data reproducing method receive data using a file transfer channel and assist a user reproduce the data at a desired time. The present invention includes at least one of receiving data transferred through a file transfer channel of a broadcasting network, storing the data, reproducing the data at a time desired by a user, i.e. according to selection through a menu or a list, and reproducing the data while displaying a broadcast, and reproducing the data while switching a channel. | 2008-10-16 |
20080256575 | PROGRAM GUIDE DATA MANAGEMENT FOR MEDIA CONTENT ACCESS SYSTEMS AND METHODS - An exemplary system includes a data loader and a data slicer. The data loader is configured to receive and process raw program guide data, and to store the processed program guide data in a data store, the processing including generating a unique program identifier for each program represented in the raw program guide data. The data slicer is configured to generate a program guide data configuration from the processed program guide data, the program guide data configuration including program guide data organized into a plurality of data structures based on categories of the program guide data. The plurality of data structures includes at least one channel data structure, at least one schedule data structure, at least one detailed program information data structure, and indices for use as references between different ones of the data structures. | 2008-10-16 |
20080256576 | Method and Apparatus for Detecting Content Item Boundaries - The invention relates to a method of identifying a boundary ( | 2008-10-16 |
20080256577 | Display device, display program storage medium, and display method - A display device includes: a data acquisition section which acquires plural data with which dates and/or times are associated; and a date and/or time acquisition section which acquires dates and/or times associated with the plurality of data. The display device further includes: a data classification section which classifies the plural data to plural groups which belong to plural time regions which do not overlap with each other, based on the length of intervals between the dates and/or times acquired by the date and/or time acquisition section; and a display section which classifies plural icons which show the plural data to the groups and displays the plural icons. | 2008-10-16 |
20080256578 | Information processing device, method, and program - An information processing device includes: extraction means for extracting, from program information, a category feature word being a keyword representing a category feature; identification means for identifying a channel by category based on the category feature word extracted from the program information for a program to be broadcast on the channel; and display control means for exercising control over the channel to be displayed after category classification. | 2008-10-16 |
20080256579 | Assisted User Control in Recommenders - A method and arrangement for modifying settings of a television program recommender ( | 2008-10-16 |
20080256580 | CONTENT DOWNLOADING METHOD AND APPARATUS USED BY MOBILE DEVICE - A content downloading method and apparatus of a mobile device employing an Internet protocol television (IPTV) are provided. The content downloading method and apparatus allow an IPTV to provide a mobile device with content information received from a service provider, allow a user to input content desired to be downloaded to the mobile device, and allow a user to download the content to the mobile device from the service provider via the IPTV, thereby quickly and easily downloading desired content to the mobile device without a complicated process of browsing and copying the content. | 2008-10-16 |
20080256581 | Apparatus and Method for Interactive Multimedia Service in Access Network - A system and method for providing an interactive multimedia service to a user in an access network are provided. The system includes a multimedia service providing server and a user terminal. The multimedia service providing server creates multimedia information requested by a user terminal, processes the created multimedia information, and manages a corresponding communication channel to allow a predetermined user terminal to receive the processed multimedia information. The user terminal transmits inputted user multimedia information to the multimedia service providing server through the access network and receives the multimedia information transmitted from the multimedia service providing server through the access network. | 2008-10-16 |
20080256582 | Method For Viewing the Content of a Dvb-H Type Digital Television Signal - The invention relates to a method of visualizing the content of a DVB digital TV signal comprising a plurality of transport streams in which each TS packet is identified by a packet identifier (PID) corresponding to a respective program or service, the method being characterized in that it implements a display in the form of a two-dimensional graph in which the first dimension represents time and the second bit rate, showing successive bars of graphics symbols stacked parallel to the second dimension, each bar representing a stack of said graphics symbols in which each symbol represents a TS packet, each graphics symbol being distinguished as a function of the stream to which the packet belongs. The method orders the packets of each bar so as to group packets together by stream. | 2008-10-16 |
20080256583 | METHOD AND SYSTEM FOR SHARING VIDEO OVER A NETWORK - A user can create a video segment or employ an existing video segment, and then share it over a computer network. The user provides an indication that one or more particular video segments are to be shared over the network. The video segment(s) is/are then automatically assessed and determined to be compatible with streaming video, or not. If the video segment(s) is/are not compatible with streaming video, it/they are converted to a compatible format automatically. An identifier for the video segment is automatically created and the segment and the identifier are automatically uploaded to a host computer over the network such as the Internet. The video segment and the identifier (optionally with other identifying material such as an identity of the sender, an access authorization for the video, a number of accesses permitted, and a duration for the availability of the video) can be stored at the direction of the host computer. A viewer can be sent an identifier of the video, and can request that the video be served as a streaming video to the viewer's computer. Alternatively, the viewer can be sent a location of the video such as a URL, can be served the video as an embedded portion of a Web page, or can be served the video as a consequence of being sent a link in an e-mail or as an e-mail greeting card. | 2008-10-16 |
20080256584 | Method and System of Transporting Multimedia Signals - A method and system of transporting multimedia signals from a source | 2008-10-16 |
20080256585 | System for broadcasting multimedia data - A system for broadcasting multimedia data is provided for improving an on-site feeling and comprises: a multimedia data supplier, which divides a multimedia datum into a plurality of packets for output, wherein the packet at least comprises a multimedia signal and a specific signal; a set-top box, which has a receiver, a first output and a second output, the receiver is connected to the multimedia data supplier for receiving the packets, the packets are transferred to the multimedia signal and the specific signal after the set-top box decoding the packets, the multimedia signal is output by the first output and the specific signal is output by the second output; a multimedia broadcasting device, which is connected to the first output and broadcasts the multimedia signal; and a specific executing device, which is connected to the second output and executes the specific defined by the specific signal. | 2008-10-16 |
20080256586 | Interactive Television Using Supplementary Information and a Backward Channel Via a Mobile Radio Communication System - The invention can advantageously be applied to voting, wherein invitations for voting which influence the current program on the television set TV are transmitted to the mobile radio device MS, to quiz events, wherein the user is afforded the possibility of entering his answers to questions posed into the mobile radio device MS, to spontaneous purchases or TV commerce, wherein the user can order articles that are promoted or presented during the current program, to messaging, wherein the possibility of sending specific contents is afforded, e.g. “send this clip to a friend”, to communities, wherein e.g. a chat is made available with respect to a broadcast, and to gaming, e.g. in the context of a prize game, relating directly to a current program. What is advantageous with regard to purchases or orders is, in particular, that an unambiguous identification or authentication of the user is ensured by means of the mobile radio communication network NET_UMTS. | 2008-10-16 |
20080256587 | Wireless Transmitter, Wireless Television System, and Controlling Method Thereof - Provided are a wireless television system and a wireless transmitter, capable of automatically turning off a light-emitting unit installed in the wireless transmitter depending on a power state of the wireless transmitter and the wireless television system. The wireless television system includes: a wireless transmitter for relaying a video signal received from the outside; a wireless television for receiving the video signal from the wireless transmitter and displaying an image corresponding to the received composite video signal; a light-emitting unit installed in at least one of the wireless transmitter and the wireless television, and displaying one of a power state and a signal transmission/reception state from one of the wireless transmitter and the wireless television; and a light-emission control unit for controlling the light-emitting unit to emit light when both power of the wireless transmitter and power the wireless television are turned on. | 2008-10-16 |
20080256588 | Integrated digital broadcasting receiver system - An audiovisual processing system comprises a signal receiving circuit and a host device. The signal receiving circuit comprises a tuner and a demodulator. The tuner generates a tuned signal based on a radio frequency signal. The demodulator generates a digital signal based on the tuned signal, generates a frequency down-converted signal based on the digital signal, generates an audio processing signal based on the frequency down-converted signal in an audio processing mode, generates a demodulated video signal based on the frequency down-converted signal in a video processing mode, generates an output signal based on the audio processing signal in the audio processing mode, and generates the output signal based on the demodulated video signal in the video processing mode. The host device receives the output signal, and generates a demodulated audio signal based on the output signal in the audio processing mode. | 2008-10-16 |
20080256589 | Reproduction controlling method and receiving apparatus - A method of controlling reproduction for a stream containing video data and/or audio data is disclosed. A mute process is performed for a decoded output of the stream. A first decode process is performed to decode a partial region of the stream from a beginning thereof and obtain attribute information from the stream. Parameters with which the stream is reproduced are set on a basis of the attribute information. The mute process is stopped after the parameters have been set. A second decode process is performed to decode the stream from the beginning thereof. | 2008-10-16 |
20080256590 | Portable Control Device for Controlling Playback Streams in Distributed System - A distributed content rendering system has a distributed communication structure ( | 2008-10-16 |
20080256591 | Virtual webcam and method thereof - A virtual webcam applied in a computer includes a user interface application module for exchanging information between a computer and a user, so that a user can set parameter and format of a video signal source, select a special effect for a video signal, and select an output parameter and a format of a virtual webcam; a data processing module for processing special effects for the video signals transmitted from different signal sources and transmitting the video signals to the virtual webcam driver module; and a virtual webcam driver module for outputting the video signals according to the output format of a general webcam, so as to enable the outputted video signals to be used by a chatting tool and then shared by an opposite party over the Internet through the chatting tool. | 2008-10-16 |
20080256592 | Managing Digital Rights for Multiple Assets in an Envelope - Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of these assets may be assigned a policy that may be different than the policy assigned to the first asset. This envelope, or a collection of envelopes, may then be provided to a content-consuming device to consume the assets in accordance with each asset's specified policy. | 2008-10-16 |
20080256593 | Policy-Management Infrastructure - Described herein are one or more implementations of a policy-management infrastructure that provides a universal policy-based solution across a spectrum of scenarios in a computing environment. At least one implementation of the policy-management infrastructure defines how policy-based data is structured or layered relative towards the data in other layers. Furthermore, a described implementation provides a mechanism for determining “overlap” and “conflicts” in policies. | 2008-10-16 |
20080256594 | Method and apparatus for managing digital identities through a single interface - Method and apparatus for managing digital identities through a single interface is described. One aspect of the invention relates to managing digital identities related to a user. An identity policy of an entity is obtained. At least one relevant digital identity is selected from the digital identities. Each relevant digital identity includes information required by the identity policy. A selected digital identity is obtained from the relevant digital identity or identities. A representation of the selected digital identity is provided to the entity that complies with the identity policy. | 2008-10-16 |
20080256595 | METHOD AND DEVICE FOR VERIFYING THE SECURITY OF A COMPUTING PLATFORM - Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties. | 2008-10-16 |
20080256596 | SYSTEM AND METHOD FOR MARKETING IN A DEVICE DEPENDENT RIGHTS PROTECTION FRAMEWORK - A system and method for marketing in a device dependent rights protection framework where digital property is protected through the binding of at least one unique client device identifier with the digital property in the creation of a protected content file. Decryption at a client device would be based on a comparison of the unique client device identifier that is extracted from the protected content file with a unique client device identifier of the device that is seeking to access the digital property. If such a comparison indicates that access is unauthorized, marketing information is provided based on information extracted from the protected content file. | 2008-10-16 |
20080256597 | MEDIA AUTHENTICATION VIA PHYSICAL ATTRIBUTES OF A MEDIUM - An optical disc is authenticated by measuring physical attributes of the disc. A challenge is presented to the drive comprising the disc. The challenge includes locations on the disc to be used for authentication. The locations are determined each time the disc is to be authenticated. No restriction is placed on the locations on the medium, and no restriction is placed on the number of locations. Locations on the disc are accessed and an answer to the challenge is calculated in accordance with a physical attribute pertaining to the locations. The answer can include an angle between the locations, the physical separation between the locations, an amount of time elapsed between detection of the locations, an amount of time taken to read data between written between the locations, or a number of rotations occurring between detection of the locations. The answer is analyzed to determine the validity of the disc. | 2008-10-16 |
20080256598 | SYSTEM AND METHOD FOR AUTHENTICATING A POWERED DEVICE ATTACHED TO A POWER SOURCING EQUIPMENT FOR POWER PROVISIONING - A system and method for authenticating a powered device attached to a power sourcing equipment for power provisioning such as power over Ethernet (PoE) enabled device communicating with a PoE enabled switch. Powered devices such as computing devices, security cameras, VoIP phones, wireless access points, or the like, can be detected by a PoE switch upon connection. Power applied to the powered device is restricted until information received from the powered device is authenticated. | 2008-10-16 |
20080256599 | APPARATUS AND METHOD FOR PROTECTING SYSTEM IN VIRTUALIZED ENVIRONMENT - Provided is an apparatus and method for protecting a system in a virtualized environment. The apparatus includes a domain unit including a plurality of domains, each having one or more device drivers; a system resource unit forming hardware of the system; a direct memory access (DMA) driver; and a control unit including an access control module which controls the access of the domain unit to the system resource unit in the virtualized environment. | 2008-10-16 |
20080256600 | Device, System and Method for Determining Authenticity of an Item - This invention relates to physical uncloneable function (PUF) devices for determining authenticity of an item, systems for determining authenticity of a physical item, and methods for determining authenticity of an item. A PUF pattern of the PUF device is damaged when using the item for the first time. | 2008-10-16 |
20080256601 | Strategies for Controlling Use of a Resource that is Shared Between Trusted and Untrusted Environments - A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation. | 2008-10-16 |
20080256602 | Filtering Communications Between Users Of A Shared Network - Methods, systems, and products are provided for filtering communications between users of a shared network. Embodiments include receiving a communication from a sender for delivery to a recipient; retrieving a receipt policy for the recipient; retrieving a profile for the sender; determining whether the sender's profile complies with the receipt policy for the recipient; delivering the communication to the recipient if the sender's profile complies with the receipt policy for the recipient; and blocking the communication if the sender's profile does not comply with the receipt policy for the recipient. | 2008-10-16 |
20080256603 | Method and system for securing a commercial grid network - A method for securing a commercial grid network involves receiving a lease request from a client to lease a computing resource selected from multiple computing resources in the commercial grid network, mapping a unique identifier of the client to a security label selected from multiple unmapped security labels to obtain a client-label mapping based on the lease request, mapping a unique identifier of the computing resource to the security label to obtain a resource-label mapping based on the lease request, storing the client-label mapping and the resource-label mapping in a security label repository to obtain stored security label mappings, and authenticating, by the commercial grid network, an access request from the client to the computing resource using the stored security label mappings. | 2008-10-16 |
20080256604 | System for Managing Proprietary Data - A content distribution system ( | 2008-10-16 |
20080256605 | Localized authorization system in IP networks - The invention provides a method for bootstrapping a local authorizer of a non-public access network. The local authorizer is arranged for granting access for a client device to the non-public access network. Therefore, the local authorizer includes a credentials database, which is used in authentication and authorization of the client device during access to services or resources of the non-public network. A secret knowledge of the client device is used for generating at least one set of credentials. The bootstrapping method includes the step of uploading the at least one set of credentials to the credentials database of the local authorizer. This upload is performed by the client device at least at first access of the client device to the non-public network. Then the credentials in the credentials database are used for authentication and authorization of the client device during access to the non-public access network. | 2008-10-16 |
20080256606 | Method and Apparatus for Privilege Management - A computer implemented method, apparatus, and computer program product for managing privileges on a data processing system. The process initiates a privilege monitor. All other entities in the data processing system are prevented from assigning privileges. The privilege monitor is the only entity authorized to assign privileges. The process monitors for requests for privileges. In response to detecting a request from a user for a privilege, the process selectively assigns the privilege to the user through the privilege monitor. | 2008-10-16 |
20080256607 | Extensible and programmable multi-tenant service architecture - An extensible, multi-tenant software-as-a-service business application platform is provided for hosting multiple organizations. Organization services are provided by virtual or physical servers with dedicated data stores assembled in scalable groups. Distributed interaction between components of the scalable groups may enable extensibility and reliability, while changes in locations of organization services are provided to the client(s) for seamless continuation of the client's access to the services. Customizable and dynamic APIs for accessing each organization's data and applications isolated from the others and pluggable third party authentication services may also be integrated into the platform. | 2008-10-16 |
20080256608 | Linking Between Internet Subscription Websites - A method and system for managing delivery of a web resource to a user on a web server. The method determines the identity of the user on the web server and retrieves the web resource from the web server. The method scans the web resource to identify links, such as hypertext links, in the web resource that refer to a target web resource. For each link, the method determines whether access is allowed or denied by the user to the target web resource. The method creates a copy of the web resource and deactivates each link in the copy of the web resource if access is denied by the user to the target web resource referred to by the link. The method then delivers the copy of the web resource to the user on the web server. | 2008-10-16 |
20080256609 | Multiple User Credentials - A login shell and file/directory access checking supporting multiple user credentials are provided. The login shell receives user input from a particular user including login information for a plurality of user accounts for that particular user. The login shell authenticates the plurality of user accounts using the login information and retrieves a plurality of user credentials corresponding to the plurality of user accounts. This plurality of user credentials forms a multi-user credential. In response to a request for access to a file, the access rights to the file for the user are verified by verifying the access rights of the multi-user credential. | 2008-10-16 |
20080256610 | SYSTEM AND METHOD FOR DYNAMIC ROLE ASSOCIATION - A pluggable architecture allows security and business logic plugins to be inserted into a security service hosted by a server, and to control access to one or more secured resources on that server, on another server within the security domain, or between security domains. The security service may act as a focal point for security enforcement, and access rights determination, and information used or determined within one login process can flow transparently and automatically to other login processes. Entitlements denote what a particular user may or may not do with a particular resource, in a particular context. Entitlements reflect not only the technical aspects of the secure environment (the permit or deny concept), but can be used to represent the business logic or functionality required by the server provider. In this way entitlements bridge the gap between a simple security platform, and a complex business policy platform. | 2008-10-16 |
20080256611 | METHOD AND APPARATUS FOR RESOURCE LOCATOR IDENTIFIER REWRITE - A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client. | 2008-10-16 |
20080256612 | Method and system for stateless validation - A method of validating parameters of a request from a Web client to a Web application. The validation rules are sent to a Web client, together with a response to a Web client. The parameters in a response are updated by the Web client. The updated parameters are sent in a subsequent request to the Web client, along with the validation rules. The updated parameters are validated using the validation rules in the request, thus achieving stateless validation. The validation rules are preferably digitally signed. | 2008-10-16 |
20080256613 | Voice print identification portal - Systems and methods providing for secure voice print authentication over a network are disclosed herein. During an enrollment stage, a client's voice is recorded and characteristics of the recording are used to create and store a voice print. When an enrolled client seeks access to secure information over a network, a sample voice recording is created. The sample voice recording is compared to at least one voice print. If a match is found, the client is authenticated and granted access to secure information. | 2008-10-16 |
20080256614 | NETWORK TERMINAL MANAGEMENT APPARATUS, METHOD AND PROGRAM - A network terminal management apparatus is able to manage terminals using a simple method, without the user feeling that convenience in terms of operability has been compromised. This network terminal management apparatus generates a list table of target tasks in which user terminal information is included, and sends the information of the list table to the user terminal. This enables the user to select desired target tasks from the displayed list table and enjoy services even with a multi-function processor having low operability. | 2008-10-16 |
20080256615 | Method and apparatus for file sharing between a group of user devices with separately sent crucial portions and non-crucial portions - A communication system | 2008-10-16 |
20080256616 | UNIFIED AUTHENTICATION FOR WEB METHOD PLATFORMS - An authentication mechanism is provided for a web method platform that allows homogeneous access for different types of clients according to a bootstrapping procedure utilized to establish the session. Different clients can be assigned different levels of trust based in part on the bootstrapping procedure and/or information provided during the procedure. The bootstrapping procedure can produce a token that is used by the clients in subsequent requests to provide previous authentication or state information to the platform. The token can comprise a shared secret used to ensure integrity of communications in some cases, and the token can be opaque to the client. Tokens can expire and require a client to re-bootstrap to provide higher levels of authentication protection, and tokens can be shared among a plurality of application servers to facilitate effective handling of requests in a farmed environment. | 2008-10-16 |
20080256617 | Centralized Identity Verification and/or Password Validation - Described is a system and method for validating a user's login information. A provider (e.g. a provider of goods and/or services) receives a login request from a customer that includes a token value. The provider passes the token value to a centralized identity verifier with which the customer is registered. The centralized identity verifier tests the token value and returns a notice of the results of the test to the provider. | 2008-10-16 |
20080256618 | METHOD TO APPLY NETWORK ENCRYPTION TO FIREWALL DECISIONS - A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information. | 2008-10-16 |
20080256619 | Detection of adversaries through collection and correlation of assessments - An automated arrangement for detecting adversaries is provided in which assessments of detected adversaries are reported to a reputation service from security devices, such as unified threat management systems in deployed customer networks. By using actual deployed networks, the number of available sensors can be very large to increase the scope of the adversary detection, while still observing real attacks and threats including those that are targeted to small sets of customers. The reputation service performs a number of correlations and validations on the received assessments to then return a reputation back to the security device in the enterprise network that can be used for blocking adversaries, but only when multiple, distinct sources report the same adversary in their assessments to thus ensure that the reputation is accurate and reliable. | 2008-10-16 |
20080256620 | Default Internet Traffic and Transparent Passthrough - A method for routing packets sent from a user to the internet is provided for systems in which the user is connected to a private network. The method includes: extracting a source network address from the packet; using said source network address to retrieve a user profile for the user; examining said user profile to determine whether to route the packet through the private network or to route the packet directly to the Internet; and routing said packet according to said profile. This allows a user or network provider to choose whether to route packets destined for the Internet directly to the Internet rather than through the private network, thus preventing excessive network traffic on the private network. | 2008-10-16 |
20080256621 | SYSTEM AND APPARATUS FOR TRANSFERRING DATA BETWEEN COMMUNICATION ELEMENTS - A system and apparatus for transferring data between communication elements is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller element to receive data from a web server to update one or more entries of an identity module coupled to the controller element. The data can be retrieved by the web server from a second communication device. Additional embodiments are disclosed. | 2008-10-16 |
20080256622 | Reduction of false positive reputations through collection of overrides from customer deployments - An automated arrangement for reducing the occurrence and/or minimizing the impact of false positives by a reputation service is provided in which overrides for a reputation of an adversary are reported to a reputation service from security devices, such as unified threat management systems, deployed in enterprise or consumer networks. An override is typically performed by an administrator at a customer network to allow the security device to accept traffic from, or send traffic to a given IP address or URL. Such connectivity is allowed—even if such objects have a blacklisted reputation provided by a reputation service—in cases where the administrator recognizes that the blacklisted reputation is a false positive. The reputation service uses the reported overrides to adjust the fidelity (i.e., a confidence level) of that object's reputation, and then provides an updated reputation, which reflects the fidelity adjustment, to all the security devices that use the reputation service. | 2008-10-16 |
20080256623 | Method and system for protecting a computer system from denial-of-service attacks and other deleterious resource-draining phenomena related to communications - Embodiments of the present invention include a variety of different integrated, multi-tiered methods and systems for preventing various types of attacks on computer systems, including denial-of-service attacks and SYN-flood attacks. Components of these integrated methods and systems include probabilistic packet droppers, packet-rate throttles, resource controls, automated firewalls, and efficient connection-state-information storage in memory resources and connection-state-information distribution in order to prevent draining of sufficient communications-related resources within a computer system to seriously degrade or disable electronics communications components within the computer system. | 2008-10-16 |
20080256624 | SYSTEMS AND METHOD FOR DISTRIBUTED NETWORK PROTECTION - Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit through which an entity, such as law enforcement, can communicate with an entity attempting an unauthorized access attempt unbeknownst to the entity attempting the unauthorized access attempt. This allows, for example, the detection and identification of the entity attempting the unauthorized access attempt. | 2008-10-16 |
20080256625 | System and Method for Enhanced Layer of Security to Protect a File System from Malicious Programs - A system and method for providing an enhanced layer of security to protect the file system from malicious programs are provided. An additional layer of security for protecting data and to minimize successful attacks by malicious programs is provided. This additional layer uses the feature of code signing to verify that the code is from a source which the code claims to be from, and also that the code has not been tampered with by a malicious party. The file system provides a feature by which certificates are mapped to portions of a file system, e.g., files/directories, such that only programs that are certified by those certificates are able to read/modify those portions of the file system. | 2008-10-16 |
20080256626 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND STORAGE MEDIUM - An information processing apparatus includes a user authentication unit that authenticates a user in a condition where an authentication medium used for authenticating the user is inserted, the authentication medium storing personal identification information of the user, a private key, and a software program for using the private key and including a processor for running the software program, to thereby establish a verified state in which the user is allowed to use the apparatus, a data processor that performs data processing including private key processing, a processing completion detector that detects completion of the private key processing performed by the data processor, and a verification state changing unit that changes, the verified state of the user having been established as a result of authenticating the user to a user unverified state based on detection of the completion of the private key processing in the processing completion detector. | 2008-10-16 |
20080256627 | COPYRIGHTS WITH POST-PAYMENTS FOR P2P FILE SHARING - In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: determining one or more aspects of an unauthorized copy of electronic content accessible to or through a user device; and conducting a transaction between the user device and a legitimizing party to legitimize the electronic content in view of the determined aspect(s). The electronic content may be unsecured copyrighted content. | 2008-10-16 |
20080256628 | Security Objects Controlling Access To Resources - Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device. | 2008-10-16 |
20080256629 | Management Apparatus, System, and Method for Protecting a Memory Storage Card - A management apparatus, system, and method for protecting a memory storage card are provided. The management apparatus comprises an access unit and a check unit. The access unit is configured to read a first security message, and a second security message of the memory storage card. The check unit is configured to check the first and second security messages to generate a check result. The management apparatus makes the memory storage card available according to the check result and efficiently prevents the memory storage card from theft. | 2008-10-16 |
20080256630 | IMAGE FORMING APPARATUS, CONTROL METHOD OF IMAGE FORMING APPARATUS, PROGRAM, AND STORAGE MEDIUM - An image forming apparatus for executing a processing flow including a plurality of steps, includes a determination unit which determines whether or not a processing flow to be executed includes an instruction required step that requires an instruction of a user, a selection unit which selects, when the processing flow to be executed includes the instruction required step, a notification destination of information required to display an operation window for accepting the instruction of the user, a notification control unit which notifies the notification destination selected by the selection unit of the operation window, and an execution unit which executes processing of the instruction required step according to instruction contents input via the operation window. | 2008-10-16 |
20080256631 | RENEWABLE INTEGRITY ROOTED SYSTEM - A method of validating software is disclosed. The method may include receiving, at a first function, a first hash and a first version. The first function may validate a second function according to the first hash and first version. The second function may receive a second hash and a second version, and the second function may validate a third function according to the second hash and second version. The first version and first hash may be stored within the first function, for example. The first version and first hash may be stored within a manifest, for example. | 2008-10-16 |
20080256632 | APPARATUS AND METHOD FOR DETECTION OF A DENIAL OF SERVICE ATTACK ON AN INTERNET SERVER - An apparatus and method to detect a denial of service attack on an internet server by a hacker or malevolent software while effectively distinguishing an attack from a spike in demand by legitimate users of the server. In preferred embodiments, the kernel's TCP implementation is modified to hold back sending a reset (RST) to terminate the connection and to make an entry into a dead connection list when a connection attempt is dropped off of an overflowing accept queue. The entries are removed from the dead connection list when they become stale or an ACK is received corresponding to the entry. Additional TCP kernel parameters include a monitor enable to turn on or off the DoS monitor, a monitor threshold to determine when to send an alarm, and a stale time that is a timeout value to determine when to remove entries from the dead connection list. | 2008-10-16 |
20080256633 | Method and Apparatus for Determination of the Non-Replicative Behavior of a Malicious Program - Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity. The result of the analysis can also be used for informing a user of an anti-virus system of the non-replicative changes made to the environment. | 2008-10-16 |
20080256634 | TARGET DATA DETECTION IN A STREAMING ENVIRONMENT - In embodiments of the present invention improved capabilities are described for a data stream scanner. The present invention may provide for a data portion received in association with a data stream, and the data portion may be analyzed to make an assessment. An identity pool may then be selected from a universe of identities based on the assessment, and identities from the identity pool may be selected in a scanning process to analyze the data stream. Further, an unmatched identity may remove the identity from the pool upon finding that the unmatched identity does not match data in the data stream. | 2008-10-16 |
20080256635 | Method and System for Detecting Malware Using a Secure Operating System Mode - The present disclosure is directed to a method and system for detecting malware using a secure operating system mode. In accordance with a particular embodiment of the present disclosure a file is received. The file is stored in a secure directory. At least one operation is prevented on the file. A secure operating system mode is started to detect whether the file comprises malware. | 2008-10-16 |
20080256636 | Method and System for Detecting Malware Using a Remote Server - The present disclosure is directed to a method and system for detecting malware using a remote server. In accordance with a particular embodiment of the present disclosure a hash value for a file is generated. The hash value is transmitted to a remote server. A notification is received from the remote server indicating whether the file comprises malware. At least one operation on the file is prevented if the notification indicates the file comprises malware. | 2008-10-16 |
20080256637 | Computer System and Security Reinforcing Method Thereof - The present invention provides a computer system for carrying out security reinforcing and a security reinforcing method. The computer system comprises hardware, a BIOS, and a virtual machine monitor, and has at least one servo operating system and at least one user operating system running thereon, wherein, the servo operating system comprises a security reinforcing proxy module, and the user operating system comprises a security reinforcing module. With the present invention, it is possible to prevent the security reinforcing performance from being tampered by the frangibility of the user operating system, and to avoid hacker attacks which cannot be avoided in case of regular or manual security reinforcing, and also to ensure better secure defense of the computer system and the security of the downloaded security reinforcing files own. | 2008-10-16 |
20080256638 | SYSTEM AND METHOD FOR PROVIDING NETWORK PENETRATION TESTING - A system and method for providing network penetration testing from an end-user computer is provided. The method includes the step of determining at least one of a version of a Web browser of a target computer, contact information associated with an end-user that uses the target computer, and applications running on the target computer. The method also includes the steps of determining exploits that are associated with the running applications and that can be used to compromise the target computer, and launching the exploits to compromise the target computer. Network penetration testing may also be provided by performing the steps of determining an operating system of a target computer, selecting one of a group of modules to use in detecting services of the target computer, and detecting the services of the target computer. | 2008-10-16 |
20080256639 | Verification Method, Information Processing Device, Recording Medium, Verification System, Certification Program, and Verification Program - A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Hence, if virtual machine is implemented maliciously, a program operating thereon can be made to operate maliciously instead of operating legitimately. | 2008-10-16 |
20080256640 | PLAYBACK APPARATUS AND PLAYBACK METHOD - According to one embodiment, a playback apparatus includes a data read-out unit which reads out digital content from a storage medium, a copy control information update process unit which executes, if a second copy control information is defined in a file stored in the storage medium, a process of replacing a first copy control information which is embedded in the digital content that is read out of the storage medium, with the second copy control information, and a copy restriction process unit which analyzes the digital content that is output from the copy control information update process unit and executes a copy restriction process for restricting copy of the digital content, in accordance with one of the first copy control information and the second copy control information, which is embedded in the digital content. | 2008-10-16 |
20080256641 | MOBILE UNIT PARENTAL CONTROL - Parents can desire to limit content viewable upon a mobile device and a universal integrated circuit card can be programmed to limit viewing upon the mobile device. A user completes a service request form that includes an allowable view threshold for content upon the mobile device. The request can transfer to a service provider, sometimes via a base station. A subscription manager can forward the threshold back to the mobile device and the mobile device can program the threshold upon secure storage. When content is received, it can be compared against the threshold and a determination can be made on if the content is allowable to view in light of the threshold. | 2008-10-16 |
20080256642 | Anti-Interrogation For Portable Device - A portable consumer device is disclosed. One or more contact regions in the portable consumer device may be provided on the contactless portable consumer device. The user may be required to place a finger on the one or more contact regions while holding the portable consumer device proximate to the interrogation device to enable it to be interrogated. The user's fingers may be used to electrically bridge an open portion of a circuit so as to enable operation of the portable consumer device. | 2008-10-16 |
20080256643 | MULTIPLE ENTITY AUTHORIZATION MODEL - An authorization framework is provided that protects data records in a platform, such as a service-based platform, by requiring multiple level entities to be authorized with respect to the data records. For example, the data records can have an associated owner user that can grant access to other users with respect to the data. Additionally, however, the user can also grant access to certain applications that access the platform such that the data records can be initially closed for a user requiring the user to explicitly grant desired access to applications and/or users. In this regard, applications can be forbidden from accessing the data, even on behalf of the user, unless expressly authorized to do so by the user. Thus, the user can make informed decisions regarding who is to have access to its data. | 2008-10-16 |
20080256644 | Real-time detail information display method of digital rights management contents and portable terminal using the same - A real-time detail information display method of digital rights management (DRM) contents and a portable terminal for practicing that downloads digital rights management (DRM) content information from a server, in real-time. The portable terminal extracts address information of the DRM contents indicated on the display, accesses the server based on the extracted address information, and receives the DRM content information from the server and displays it on the display. | 2008-10-16 |
20080256645 | Digital rights management method and digital rights management-enabled portable device - A DRM method and DRM-enabled portable device for controlling playback of DRM content on the basis of content usage log is disclosed. A digital rights management method for a portable device of the present invention includes playing a content item recording, when an abnormal playback stop event is detected, a stop time point in a playback session of the content item on a usage log and controlling a next playback of the content item with reference to the recorded stop time point. The DRM method and DRM-enabled portable device of the present invention further manages the licenses issued for the DRM content stored in the portable device by updating the licenses even when the DRM content are abnormally closed during its playback session. | 2008-10-16 |