44th week of 2011 patent applcation highlights part 61 |
Patent application number | Title | Published |
20110271248 | CONVERTING CONTROLS INTO SOURCE CODE - Aspects of the subject matter described herein relate to converting controls into source code. In aspects, a control is created via a designer. The control may include properties, code, and a visual representation. The control may be represented at least in part via a markup language. At one or more times during or after development of a software project, source code for the control may be generated, transformed, and placed into the project. This may be done, among other reasons, to simplify software development. | 2011-11-03 |
20110271249 | REMOTABLE PROJECT - Aspects of the subject matter described herein relate to remote project access. In aspects, project data for a project that is hosted on a server is provided to a client for use in a development environment of the client. A development environment may be instantiated and configured to allow a user to interact with the project as if the project existed solely on the client. Components on the client and server take care of transferring data and messages to and from the server to ensure that the user experience is seamless. | 2011-11-03 |
20110271250 | Software Development Tool - A system and method for providing a completion list associated with computer program source code and a dynamic expression. A static analysis is performed to find and aggregate one or more candidate types of the expression. The analysis may include one or more of a number of techniques, including analyzing expressions that are assigned to a program variable, following method calls, examining system or other specified assemblies, loading runtime assemblies, or making inferences based on other uses of the variable. A dynamic analysis may be performed and combined with a static analysis. A completion list may be filtered or ordered based on a configured criteria. | 2011-11-03 |
20110271251 | ACCESS CONTROL IN MODULES FOR SOFTWARE DEVELOPMENT - The disclosed embodiments provide a system that provides access control for a software program. During operation, the system identifies a member of a module to be used in the software program. Next, the system infers the visibility of the member based on the accessibility of the member. Finally, the system uses the visibility and the accessibility to provide access control during the life cycle of the software program. | 2011-11-03 |
20110271252 | DETERMINING FUNCTIONAL DESIGN/REQUIREMENTS COVERAGE OF A COMPUTER CODE - A method that includes: running a set of functional tests over a computer code; determining, for each code element of the computer code, which functional test covered it, to yield a tests-elements coverage map; associating portions of the computer code with corresponding design portions or requirements derived from a design document or a requirements document respectively, associated with the computer code, to yield a design/requirements-code tracing map; deriving, from the tests-code coverage map and the design/requirements-code tracing map, a design/requirements-tests coverage map, exhibiting coverage of the computer code by the functional tests, in terms of the design or the requirements, wherein at least one of the running, the determining, the associating, and the deriving is executed by at least one processor. | 2011-11-03 |
20110271253 | ENHANCING FUNCTIONAL TESTS COVERAGE USING TRACEABILITY AND STATIC ANALYSIS - A method that may include: building a dependencies graph representing dependencies between code elements of a computer code; associating portions of the computer code with corresponding design specifications or requirements derived from a design specifications document or a requirements document respectively which is associated with the computer code, to yield a design specifications or requirements-code tracing map; and analyzing the design specifications or requirements-code tracing map based on the dependencies graph to yield an ordered list of design specifications or requirements respectively, wherein the order is selected such that functional tests written for the computer code and addressing design specifications or requirements of a higher order, will yield a higher level of functional test coverage of the computer code in terms of design specifications or requirements. | 2011-11-03 |
20110271254 | POLYPHASIC MODULES FOR SOFTWARE DEVELOPMENT - The disclosed embodiments provide a system that facilitates the development and maintenance of a software program. This system includes a software development kit (SDK) and a runtime system for the software program. During operation, the system associates classes of the software program with module declarations for a set of modules and uses the module declarations to manage dependencies in the software program throughout the life cycle of the software program. | 2011-11-03 |
20110271255 | AUTOMATIC IDENTIFICATION OF SUBROUTINES FROM TEST SCRIPTS - A method, system, and program product for automatic identification of subroutines from test scripts is disclosed. An instruction class may be coded as a subroutine vector in a vector space model. A test script action may be coded as a test script vector in a vector space model. The test script vector may be compared to the subroutine vector. The test script vector may be identified and labeled. The test script vector may be labeled as a new test script action if the result of comparing is below a threshold value. An identifier may be associated with a new test script action. | 2011-11-03 |
20110271256 | BI-DIRECTIONAL PROBING OF SOFTWARE - Method and system are disclosed for bi-directional probing of software. The bidirectional probe is capable of transferring data to and from a software under test. This two-way transfer of data allows the variables and arguments in the software to not only be monitored, but also changed as needed. Test vectors may be developed and inserted into the software while running for testing purposes. Regression analysis may be made easier by using data from previous iterations as input for the next iterations. | 2011-11-03 |
20110271257 | DEFECT MANAGEMENT IN INTEGRATED DEVELOPMENT ENVIRONMENTS - A method for managing defects in an integrated development environment is disclosed herein. In one embodiment, such a method includes identifying one or more files associated with a defect. These one or more files may then be linked to the defect using a tag or other suitable linking mechanism. Once the files are linked to the defect, the method may allow the defect to be selected from a defect list. The files associated with the defect are optionally displayed upon selecting the defect. The method further enables an action to be selected for one or more of the files associated with the defect in the defect list. The method then automatically performs the action on the one or more files. A corresponding apparatus and computer program product are also disclosed herein. | 2011-11-03 |
20110271258 | Software Development Tool - A system and method for providing a completion list associated with computer program source code and a dynamic expression. A dynamic analysis is performed to find and aggregate one or more candidate types of the expression. During an execution of the target program, a runtime monitor tracks events that may indicate a type of program variables. The analysis may include one or more of a number of static analysis techniques, including analyzing expressions that are assigned to a program variable, following method calls, examining system or other specified assemblies, loading runtime assemblies, or making inferences based on other uses of the variable. A completion list may be filtered or ordered based on a configured criteria. | 2011-11-03 |
20110271259 | SYSTEMS AND METHODS FOR DEBUGGING APPLICATIONS USING DUAL CODE GENERATION - Systems and methods provide a debugger that debugs code using two versions of code, an optimized and a debuggable version of object code for subroutines, methods or functions. The debugger causes the appropriate version of the code to be executed depending on whether debug commands have been applied with respect to particular subroutines, methods or functions. | 2011-11-03 |
20110271260 | METHOD FOR SEPARATELY EXECUTING SOFTWARE, APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM - The present disclosure provides method, system, and computer readable medium for shared execution of software. The present disclosure relates to method, system, and computer readable recording medium for shared execution of software involving identifying the main modules of a specific software by analyzing its control flow, data flow, and modular structure through a static binary analysis and a runtime profiling, i.e. dynamic analysis, separating the modules from the main software body to store them in a secure environment of a smart card, and storing the main body in a user terminal with the identified modules removed and replaced by an interface code, whereby a co-processing the software at the user's end by the smart card in engagement with the user terminal exclusively enables an execution of the software. | 2011-11-03 |
20110271261 | MODIFIABLE HIGH-LEVEL INTERMEDIATE REPRESENTATION OF SOURCE CODE - A computer-implemented method includes compiling one or more segments of code during run-time of a process executing at one or more processors of a computer system. The compilation produces a high-level intermediate representation of the one or more segments of the code. The high-level intermediate representation is modifiable by the process, without executing the high-level intermediate representation, to generate a modified high-level intermediate representation that is executable by the process. | 2011-11-03 |
20110271262 | Method and apparatus for detecting transient faults via dynamic binary translation - A method for detecting transient fault includes translating binary code to an intermediate language code. An instruction of interest in the intermediate language code is identified. Reliability instructions are inserted in the intermediate language code to validate values from the instruction of interest. The intermediate language code is translated to binary code. Other embodiments are described and claimed. | 2011-11-03 |
20110271263 | Compiling Software For A Hierarchical Distributed Processing System - Compiling software for a hierarchical distributed processing system including providing to one or more compiling nodes software to be compiled, wherein at least a portion of the software to be compiled is to be executed by one or more other nodes; compiling, by the compiling node, the software; maintaining, by the compiling node, any compiled software to be executed on the compiling node; selecting, by the compiling node, one or more nodes in a next tier of the hierarchy of the distributed processing system in dependence upon whether any compiled software is for the selected node or the selected node's descendants; sending to the selected node only the compiled software to be executed by the selected node or selected node's descendant. | 2011-11-03 |
20110271264 | METHOD FOR THE TRANSLATION OF PROGRAMS FOR RECONFIGURABLE ARCHITECTURES - Data processing using multidimensional fields is described along with methods for advantageously using high-level language codes. | 2011-11-03 |
20110271265 | METHOD OF AUTOMATIC GENERATION OF EXECUTABLE CODE FOR MULTI-CORE PARALLEL PROCESSING - A system, method and computer program product for optimizing the process of compilation of computer program code. The compiler transforms the program code written in a variety of languages and creates additional code performing parallel processing of program tasks on target hardware architecture. The transformation of code is performed to achieve optimization of various critical parameters such as the execution speed on a multi-core or cluster target hardware architecture. | 2011-11-03 |
20110271266 | SYSTEMS, METHODS, AND APPARATUS FOR DEPLOYING APPLICATION CODE CHANGE CONFIGURATIONS FOR MULTIPLE TARGET CONTROLLERS - Certain embodiments of the invention may include systems and methods for deploying application code change configurations for multiple target controllers. According to an example embodiment of the invention, a method for is provided for updating configurations associated with one or more controllers. The method can include updating one or more library user blocks, associating corresponding user block instances with the one or more library user blocks, and modifying one or more application code configurations associated with the one or more controllers based at least in part on the association. | 2011-11-03 |
20110271267 | UPDATING ELEMENTS IN DATA STORAGE FACILITY USING PREDEFINED STATE MACHINE OVER EXTENDED TIME PERIOD - Various embodiments for updating at least one facility in a computing storage environment are provided. In one embodiment, a sequence for distributing at least one of a plurality of code packages to the at least one facility according to different states of a fixed state machine is set. The at least one of the plurality of code packages is installed in at least one staging area. The at least one of the plurality of code packages is maintained in the at least one staging area in a valid, dormant mode while the fixed state machine is stopped. Pursuant to a resumption of the fixed state machine at a subsequent time, a current code package is swapped with the at least one of the plurality of code packages in the at least one staging area to activate the at least one of the plurality of code packages. | 2011-11-03 |
20110271268 | SYSTEM AND METHOD FOR UPDATING UNIFIED EXTENSIBLE FIRMWARE INTERFACE SETTING INFORMATION - A system and method can update unified extensible firmware interface (UEFI) setting information of a computer. The method creates a system management interrupt (SMI) function based on a UEFI platform of the computer, and stores the SMI function in a SMRAM of the computer. The method further generates an access address of the SMI function when a configuration command is input from an input device, and generate a SMI handler according to the access address. Additionally, the method calls a runtime service function of the UEFI platform by executing the SMI function through the SMI handler, and executes the runtime service function to configure UEFI setting information stored in a flash memory chip and to update BIOS data stored in a CMOS chip related to the UEFI setting information. | 2011-11-03 |
20110271269 | Hardware Virtualization System - An electronic device comprising at least a motherboard ( | 2011-11-03 |
20110271270 | SYSTEM AND METHOD FOR UPGRADING KERNELS IN CLOUD COMPUTING ENVIRONMENTS - The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system. | 2011-11-03 |
20110271271 | SYSTEMS AND METHODS FOR INTERRUPTING UPGRADES OF CONTENT DISTRIBUTION SYSTEMS - A system and method for resolving upgrade conflicts in a content distribution system is disclosed. The present principles resolve upgrade conflicts by assigning a priority level to each upgrade and using these priorities to determine whether one or more already running upgrades should be interrupted in favor of a newly launched upgrade. If it is determined that the already running upgrades should not be interrupted, the new upgrade is terminated without attempting an upgrade. If it is determined that the already running upgrades should be interrupted, a signal is sent to kill the already running upgrade processes, causing the already running upgrades to safely exit. Further embodiments include ignoring kill signals at certain times during the upgrade process to ensure system stability. | 2011-11-03 |
20110271272 | APPLICATION PROGRAMMING INTERFACE FOR IDENTIFYING, DOWNLOADING AND INSTALLING APPLICABLE SOFTWARE UPDATES - An application programming interface (API) provides a set of functions for application developers to build software programs that automatically detect, download, and install desired software updates. | 2011-11-03 |
20110271273 | METHOD AND DEVICE FOR APPLICATION INSTALLATION TO MULTIPLE MEMORY COMPONENTS - A method and device for installing an application to a device are provided. The method includes: receiving, at the device, application files associated with the application, the application files including computer readable instruction files and resource files; installing, by an installation manager, the computer readable instruction files to a first memory component associated with the device; and storing the resource files on a second memory component associated with the device. | 2011-11-03 |
20110271274 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR COLLABORATIVELY INSTALLING A COMPUTER APPLICATION - According to one embodiment, a computer program product for collaboratively installing a computer application includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code including computer readable program code configured to: monitor an installation process of an application, send a remote assistance request in response to a determination that the installation process requires remote assistance, receive a response to the remote assistance request, and continue the installation process of the application using the remote assistance information. The response includes remote assistance information required for installing the application, and the remote assistance information is invisible to an installer of the application. In other embodiments, and a method for collaboratively installing a computer application includes operations for performing the above described processes, and a system includes modules for performing the above described processes. | 2011-11-03 |
20110271275 | SOFTWARE DISTRIBUTION MANAGEMENT METHOD OF COMPUTER SYSTEM AND COMPUTER SYSTEM FOR SOFTWARE DISTRIBUTION MANAGEMENT - [The present invention] improves the user-friendliness of a software distribution management system that uses representative clients. | 2011-11-03 |
20110271276 | AUTOMATED TUNING IN A VIRTUAL MACHINE COMPUTING ENVIRONMENT - Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine. | 2011-11-03 |
20110271277 | METHOD AND APPARATUS FOR A VIRTUAL SYSTEM ON CHIP - A virtual system on chip (VSoC) is an implementation of a machine that allows for sharing of underlying physical machine resources between different virtual systems. A method or corresponding apparatus of the present invention relates to a device that includes a plurality of virtual systems on chip and a configuring unit. The configuring unit is arranged to configure resources on the device for the plurality of virtual systems on chip as a function of an identification tag assigned to each virtual system on chip. | 2011-11-03 |
20110271278 | LIFE-CYCLE MANAGEMENT OF MULTI-TENANT SAAS APPLICATIONS - Embodiments of the present invention provide a method and system for managing life-cycles of a “software as a service” (SaaS) software application. In one embodiment, a method comprises installing the SaaS software application in a system landscape on a computer server, the system landscape containing at least an application server and a database (DB) server; separating system data from customer data and storing them in different databases; creating a virtual machine (VM) image for the system landscape, the VM image to include the databases containing system data and exclude the databases containing customer data; deploying the SaaS software application to one or more computer servers by loading VMs based on the VM image; when the SaaS software application need to be upgraded to a new version, preparing a new VM image with the new version of the SaaS software application and using the new VM image. | 2011-11-03 |
20110271279 | Secure Virtual Machine - An approach to securely distributing and running virtual machines is described that addresses the inherent insecurity of mobile virtual machines by authenticating a user before establishing a specialized virtualization runtime environment that includes a filesystem driver inserted into the host operating system to provide secure access to a virtual machine by authorized hypervisors only. Further described is the creation of a SecureVM package that includes the various components used to perform the operations of installation, user authentication and establishment of the specialized virtualization runtime environment. | 2011-11-03 |
20110271280 | METHOD AND APPARATUS FOR ACTIVATING A VIRTUAL MACHINE IN A VIRTUAL SOLUTION - Embodiments of the present invention relate to a method for activating virtual machines in a virtual solution, including: for each virtual machine, activating activation items in a first activation item set independently of other virtual machines; and for at least one virtual machine, activating activation items in a second activation item set in coordination with activation of activation items of at least another virtual machine. There is further provided an apparatus for activating virtual machines in a virtual solution, including: a first activator for activating, for each virtual machine, activation items in a first activation item set independently of other virtual machines; and a second activator for activating, for at least one virtual machine, activation items in a second activation item set in coordination with activation of activation items of at least another virtual machine. | 2011-11-03 |
20110271281 | REDUCING FEEDBACK LATENCY - A latency between an input and its corresponding feedback can be reduced by generating the feedback in a lower-layer software component instead of in an upper-layer software component. The lower-layer component generates the feedback based on one or more parameters associated with a given input type. The parameters were previously created based on, for example, one or more previous inputs. Generating feedback in a lower-layer component reduces the number of software layer boundaries that the input and feedback pass through, thus reducing the latency between the feedback and input. | 2011-11-03 |
20110271282 | Multi-Threaded Sort of Data Items in Spreadsheet Tables - To sort data items in a spreadsheet table, data items in the spreadsheet table are divided into a plurality of blocks. Multiple threads are used to sort the data items in the blocks. After the data items in the blocks are sorted, multiple merge threads are used to generate a final result block. The final result block contains each of the data items in the spreadsheet table. Each of the merge threads is a thread that merges two source blocks to generate a result block. Each of the source blocks is either one of the sorted blocks or one of the result blocks generated by another one of the merge threads. A sorted version of the spreadsheet table is then displayed. The data items in the sorted version of the spreadsheet table are ordered according to an order of the data items in the final result block. | 2011-11-03 |
20110271283 | ENERGY-AWARE JOB SCHEDULING FOR CLUSTER ENVIRONMENTS - A job scheduler can select a processor core operating frequency for a node in a cluster to perform a job based on energy usage and performance data. After a job request is received, an energy aware job scheduler accesses data that specifies energy usage and job performance metrics that correspond to the requested job and a plurality of processor core operating frequencies. A first of the plurality of processor core operating frequencies is selected that satisfies an energy usage criterion for performing the job based, at least in part, on the data that specifies energy usage and job performance metrics that correspond to the job. The job is assigned to be performed by a node in the cluster at the selected first of the plurality of processor core operating frequencies. | 2011-11-03 |
20110271284 | Method of Simulating, Testing, and Debugging Concurrent Software Applications - Embodiments of a method of simulating, testing, and debugging of concurrent software applications are disclosed. Software code is executed by a simulator program that takes over some functions of an operating system. The simulator program according to various embodiments is capable of controlling thread spawning, preemption, operating system calls, interprocess communications, signals. Notable advantages of the invention are its capability of testing uninstrumented user applications, independence of the high-level computer language of a user application, and machine instruction level granularity. The simulator is capable of obtaining outcomes of reproducible execution sequences, reproducing faulty behavior, and providing debugging information to a user. | 2011-11-03 |
20110271285 | MANAGING EXCLUSIVE ACCESS TO SYSTEM RESOURCES - Presented is a method of managing exclusive access to a resource. The method includes determining anticipated wait time, for a task to obtain exclusive access to a resource, and processing the task, depending on the anticipated wait time required to obtain exclusive access to the resource. | 2011-11-03 |
20110271286 | SYSTEM AND METHOD FOR APPLICATION FUNCTION CONSOLIDATION - Systems and methods that facilitate keeping or improving the current/prior level of complexity in a software package, despite enhancement package additions. To keep the current number of business functions (e.g., some software configuration or functionality), new packages may have to consolidate older ones. Consolidating business functions may include dissolving those functions into the core set of functions (e.g., those functions that are “always on”) or to merge them with other business functions (e.g., to be switched on or off as a set). Additionally, if a function is simply not used, and will never be used again, the function may be dissolved completely. Regardless, disruption to the customer should be minimized by any consolidation of functions. Systems and methods identify functions that can be automatically consolidated, and facilitate the consolidation of any remaining functions. | 2011-11-03 |
20110271287 | CONTEXT-BASED COMMUNICATION SERVICE - A method for providing a context-based service to a terminal of a communication network, includes, at a context server cooperating with the communication network: a) receiving a query from a service application suitable for implementing the context based service, the query indicating that the context server should perform an action when a query condition is fulfilled, the query condition referring to one or more attributes of derived context information indicative of a context of the terminal; b) generating a query evaluation trigger indicating that the query condition should be evaluated when the derived context information is updated; c) identifying raw context information allowing to derive the derived context information; d) generating a calculation trigger indicating that the derived context information should be calculated when an update of the raw context information is received from the terminal; e) receiving from the terminal an update of the raw context information and, according to the calculation trigger, calculating a new value of the derived context information according to the update; and f) according to the query evaluation trigger, evaluating the query condition by using the new value and, if the query condition is fulfilled, performing the action. | 2011-11-03 |
20110271288 | OBJECT REQUEST BROKER - An object request broker (ORB) for receiving an incoming message including a message header and a message body in General Inter-ORB Protocol (GIOP) type format, the ORB comprising: an external ORB element for converting the header of the incoming message to an implementation-specific format, and for providing the header in implementation-specific format with the body in GIOP type format to a distribution mechanism for identifying an appropriate target server for processing the body of the incoming message; and an internal ORB element associated with the identified target server for converting the body of the incoming message to an implementation-specific format for use by the target server to process the message. | 2011-11-03 |
20110271289 | SYSTEMS AND METHODS FOR PROVIDING A CLIENT-SIDE APPLICATION PROGRAMMING INTERFACE TO ACCESS A NETWORKED TELECOMMUNICATION RESOURCE - The present application is directed towards systems and methods for interfacing a network-agnostic application to a networked telecommunication resource. An agent executing on a client receives a request from an application in the form of an API function call and establishes a connection to a networked telecommunications resource. The agent handles network processing of the request, a response or responses, and asynchronous events, and translates them into corresponding API callbacks for use by the application. | 2011-11-03 |
20110271290 | METHOD FOR CALLING AN INSTANCE OF A FUNCTION, AND CORRESPONDING DEVICE AND COMPUTER SOFTWARE - A method is provided for calling with a processor an instance of a function present within at least a first software module and required by a second software module, referred to as a calling software module. The method further includes that the calling comprises a step of obtaining a current execution context, where the current execution context depends on at least one execution situation of the calling software module, and the current execution context comprises execution data. The method also includes that the calling step comprises a step of selecting the instance of the function, from at least two available instances, depending on the execution data of the current execution context. | 2011-11-03 |
20110271291 | OPTICAL DISC DISCRIMINATION METHOD, OPTICAL DISC TRANSPORT DEVICE, OPTICAL DISC DEVICE, OPTICAL DISC INSPECTION DEVICE, AND OPTICAL PICKUP INSPECTION DEVICE - An optical disc device compatible with optical discs of different types having different track pitches, having a light detecting means ( | 2011-11-03 |
20110271292 | CHUCKING DEVICE, MOTOR, DISK DRIVE APPARATUS AND CHUCKING DEVICE MANUFACTURING METHOD - In a chucking device, a rolling guide portion is arranged below an upper cover portion of a rotor holder and radially inwards of a cylinder portion of the rotor holder. This helps restrain the noises generated by the rolling movement of balls from propagating to the outside. Moreover, the turntable and the rolling guide portion are formed of a single resin member extending continuously through a through-hole defined in the rotor holder. | 2011-11-03 |
20110271293 | Enhanced Television Services - Back-End Core Software - A method and system to permit TV viewers to interact with program content broadcast over a subscriber network, such as cable, satellite, interne, or cellular telephone. The details of the ability for the viewer to interact is embedded as data in the program signal. The subscription provider broadcasts a visual indicator as a small icon during programming that informs the viewer that interaction is permitted. The viewer then uses a remote control to purchase products, vote on events, respond to polls, download files, request information, and request callback actions. The TV viewer uses the remote control to send information to a set-top box front-end application, and to iteratively create transactions that are batched and then sent to a back-end core application and database which then handles fulfillment. | 2011-11-03 |
20110271294 | SYSTEM AND METHOD FOR RECEIVING BROADCAST AUDIO/VIDEO WORKS AND FOR ENABLING A CONSUMER TO PURCHASE THE RECEIVED AUDIO/VDEO WORKS - A system and method for purchasing broadcast audio and/or video (audio/video) works. According to one embodiment, the system includes a data stream processor that receives a broadcast audio/video data stream and produces from the broadcast audio/video data stream a first audio/video output data stream and a second audio/video output data id stream, wherein the broadcast audio/video data stream contains information corresponding to an audio/video work and the first audio/video output stream is in a format that can be recognized and processed by conventional audio/video reproducing equipment; a storage device that stores data included in the second audio/video output data stream, wherein the data corresponds to the audio/video work; and a user interface that enables a user of the system to input to the system an indication that the user desires to purchase the audio/video work. | 2011-11-03 |
20110271295 | METHOD AND SYSTEM FOR MONITORING A DISPLAY VENUE - A method and system for monitoring a display venue are disclosed. One method involves receiving information generated by an audience in response to a request associated with content provided to the audience at a display venue, and determining at least one condition at the display venue based on the information. | 2011-11-03 |
20110271296 | AUTOMATICALLY RECONFIGURABLE MULTIMEDIA SYSTEM WITH INTERCHANGEABLE PERSONALITY ADAPTERS - A TV-set is equipped with HDMI and USB connections that allow it to display and run audio-video content from a variety of conventional consumer devices. The TV-set is further equipped to provide a secure HDMI-USB interface that will allow the transfer of licensed high definition content and Internet subscriber services. Such secure HDMI-USB interface also enables a selection of proprietary application modules to be attached. Downloadable user interface templates, much like XML style sheets, are rendered to a user interface displayed on the screen. These are associated with corresponding thumbnails and URI's that allow a user to surf through lists and catalogs of materials, and then to play them in the appropriate formats and provide the machine with a customized controller. A remote commander is simplified, yet expanded to control all the attached devices through interactions with the user interface. The functions of the remote commander's keys change depending on where the user is navigating and what device is being controlled, similar to so-called soft-keys. | 2011-11-03 |
20110271297 | SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT AND PROVIDING SUGGESTED ALTERNATIVES - There is provided a system and method for managing media content and providing suggested alternatives. More specifically, in one embodiment, there is provided a method comprising identifying at least one characteristic of a program that relates to content of the program, comparing the at least one characteristic to a control setting, and adding the program to a safe list for display on a menu screen if the at least one characteristic is deemed acceptable based on the comparison with the control setting. | 2011-11-03 |
20110271298 | DIGITAL BROADCASTING RECEIVER AND METHOD FOR CONTROLLING THE SAME - A method of processing broadcast data includes: performing RS encoding and CRC encoding on mobile service data to generate an RS frame belonging to an ensemble including a signaling information table including access information of the mobile service data and identification information for identifying a stream where keys to decrypt the mobile service data are obtained; mapping a portion of data in the RS frame to a group including known data sequences, FIC data, and TPC data, wherein the FIC data includes information for rapid mobile service acquisition, and the TPC data includes FIC version information for indicating an update of the FIC data; and transmitting a broadcast signal including the group. The group further includes data blocks. First, fourth, fifth and sixth known data sequences are inserted into third, fifth, sixth and seventh data blocks, respectively. Second and third known data sequences are inserted into a fourth data block. | 2011-11-03 |
20110271299 | METHOD AND APPARATUS FOR INSERTION OF ADVERTISING IN A LIVE VIDEO STREAM - A real time video stream production system includes: (a) an advertising insertion server receiving over a wide area network a real time video stream; and (b) an advertising controller, which receives the real time video stream from the advertising insertion server. The advertising controller has a user interface which allows an operator to cause advertising impression data available from an advertising server to be included in a modified video data stream presented to a media player client for display. | 2011-11-03 |
20110271300 | Image Receiver with Network Function, Liquid Crystal Television Set with Network Function and Settop Box with Network Function - This image receiver with a network function includes a control portion controlling a display portion to display a service menu screen at least partially displaying a plurality of network services in the order of use counts (lowest first) or the dates of use (oldest first) at least on the basis of the use counts or the dates of use of the plurality of network services used by the user. | 2011-11-03 |
20110271301 | SYSTEMS AND METHODS FOR PROVIDING VIEWER-RELATED INFORMATION ON A DISPLAY BASED UPON WIRELESS IDENTIFICATION OF A PARTICULAR VIEWER - Systems and methods are described for presenting viewer-related programming to a particular viewer. In at least one embodiment, a wireless reader is configured to receive at least one identifier when the particular viewer is in proximity to the reader. A controller is configured to receive the identifier from the wireless reader and to associate the identifier with the particular viewer, and, upon successfully associating the wireless identifier with the particular viewer, to present the viewer-related programming associated with the particular viewer via the display or other presentation device located in proximity to the wireless reader. Viewer-related programming may including placeshifted content, viewing preferences, settings or other information as desired. | 2011-11-03 |
20110271302 | CONTENT SELECTION ACCELERATION SYSTEM AND METHOD - There is provided a system and method for channel selection. An exemplary method comprises receiving a channel scan rate command signal that indicates a first channel scan rate or a second channel scan rate. The exemplary method further comprises scanning through a user interface display of a channel list at the first channel scan rate if the first channel scan rate is indicated by the channel scan rate command signal and scanning through the user interface display of the channel list at the second channel scan rate if the second channel scan rate is indicated by the channel scan rate command signal. | 2011-11-03 |
20110271303 | INFORMATION PROVIDING METHOD, CONTENT DISPLAY TERMINAL, PORTABLE TERMINAL, SERVER DEVICE, INFORMATION PROVIDING SYSTEM AND PROGRAM - A method, apparatus, and computer-readable storage medium for providing information to a user is provided. The method includes providing, on an output device, program content, generating, by a processor, descriptive data including identification information corresponding to the program content, and providing a notification to a user based on the descriptive data, the notification corresponding to the program content. | 2011-11-03 |
20110271304 | CONTENT NAVIGATION GUIDE - A program guide, such as an electronic program guide (EPG), may be used to display information regarding upcoming scheduled transmissions of content. The display may include thumbnail images for selected groups of programs, and the images may be positioned in a pseudo-random location, and moved along a randomly generated trajectory on the display. | 2011-11-03 |
20110271305 | WIRELESS TELEVISION SYSTEM - A control data transmission and reception period of, for example, 1 ms is provided for each frame of a digital broadcast signal. The digital broadcast signal is intermittently transmitted. In the intermittent transmission, the transmitting device stops the digital broadcast signal from being sent during the control data transmission and reception period. At the same time, control data is transmitted during the control data transmission and reception period. In other words, a beacon signal is sent from a transmitting device to a wireless television receiver as control data, between the intermittent transmissions of the digital broadcast signal. Having received the beacon signal, the wireless television receiver returns a request signal to the transmitting device. As a result, communication between the transmitting device and the wireless television receiver can be established. | 2011-11-03 |
20110271306 | METHODS AND APPARATUS TO PROVIDE CONTENT ON DEMAND IN CONTENT BROADCAST SYSTEMS - Methods and apparatus to provide content on demand in content broadcast systems are disclosed. An example method comprises receiving a first portion of a program via broadcast signal and receiving a second portion of the program via an Internet protocol (IP) based signal. The example method may further comprise combining the first and the second portions and at least one of store the combined first and second portions in a file or playback the combined first and second portions. | 2011-11-03 |
20110271307 | VIDEO DATA STREAM EVALUATION SYSTEMS AND METHODS - A machine-controlled method of evaluating a video data stream having multiple broadcast channels can include selecting at least two video frames for a particular channel, extracting the selected video frames from the video data stream, decoding the extracted video frames, comparing at least one of the decoded video frames to the other decoded video frame(s) or a previously stored video frame, and preparing an evaluation of the video data stream based on the comparing. | 2011-11-03 |
20110271308 | Control of Data Presentation Using a Wireless Home Entertainment Hub - A method for controlling presentation of data through a wireless home entertainment hub in a home entertainment system includes obtaining a registration for one or more source devices and for one or more sink devices. An indication is received at the wireless home entertainment hub that at least one of the source devices has become active. An instruction is transmitted to the sink devices to receive data from the at least one active source device. An indication is transmitted to at least one active source device that at least one of the sink devices is ready to receive data. | 2011-11-03 |
20110271309 | Session Life-Cycle Quality-of-Experience Orchestration for VOD Flows in Wireless Broadband Networks - A network system includes a connectivity services network (CSN), a plurality of access service network gateways, a plurality of base stations, an orchestration device, executing a lifecycle quality-of-experience model for video-on-demand flows, receiving content from the CSN, and a plurality of subscriber stations in communication with the orchestration device through a base station and/or gateway, wherein the orchestration device continuously tracks past service and usage for each of the subscriber stations and predicts future channel conditions and load to determine, periodically or when triggered by critical events, many-to-one assignments from subscriber stations to base stations and allocation of base station resources to subscriber stations assigned to it. | 2011-11-03 |
20110271310 | Mobile High-definition Studio - An HD content acquisition and distribution system includes a central distributor disposed to encode and serve HD content and a plurality of modular packaged content acquisition equipment disposed to be deployed at a live event and in at least partial communication with the central distributor. The content acquisition equipment includes recording equipment, processing equipment, transmission equipment, and communications equipment. The recording equipment includes at least one camera, digital recording device, and digital production device. The processing equipment includes audio/video processing equipment. The transmission equipment includes equipment configured to be interfaced with an existing network for content transmission to the central distributor, and a backup transmission path. The communications equipment includes VOIP equipment configured to allow communication between personnel operating the content acquisition equipment and the central distributor. | 2011-11-03 |
20110271311 | System and Method for Determining Network Relationships with Unreliable Data - A system and method for determining network relationships with unreliable data. An identifier of an addressable network element may be associated with a non-addressable network element. A first set of data is generated that associates a first identifier of each of a plurality of first addressable network elements in the network to one of a plurality of non-addressable network elements in the network to which the first addressable network elements are connected. A second data is generated that associates the first identifier of each of the plurality of the first addressable network elements to one of a plurality of second identifiers of a second addressable network element. When at least a threshold measure of the first set of first identifiers matches the second set of first identifiers, the second identifier is associated with the non-addressable network element. | 2011-11-03 |
20110271312 | PORTABLE COMPUTING SYSTEM AND PORTABLE COMPUTER FOR USE WITH SAME - A system comprises a portable device having at least one storage component, a reader for interaction with the portable device to communicate with the data storage component, a processor for providing the reader and the portable device with computing capabilities, and a link for communication to a network | 2011-11-03 |
20110271313 | Multi-Mode Modem - A modem system may include modems that have multiple upstream transmitters for transmitting signals upstream in a communication network. In some embodiments herein, one or more of those upstream transmitters may be retasked to transmit downstream signals for reception at devices within a modem's premises. The downstream signal may be modulated differently from its original modulation as received by the modem, and may be modulated in a manner that can be received by legacy components on the premises, such as analog televisions. | 2011-11-03 |
20110271314 | Web-Based Video Broadcasting System Having Multiple Channels - A video broadcast system comprising a web page having a web page address and being in communication with a host system to permit users and a content providers to access the host system. The host system is programmed to permit the content provider to register at least one channel and associate the channel with the content provider, selectively upload to the host system a video file and associate the video file with the channel, and associate a link source address with the channel, wherein the link source address is different from the web page address. The host system is further programmed to permit the content provider to determine which of the channels registered with the host system are accessible by the user accessing the host system from the link source address. | 2011-11-03 |
20110271315 | System, Method, and Computer Readable Recording Medium for Providing Two-Way Service in Digital Cable Broadcasting Environment - The present invention relates to system, method, and computer readable recording medium for providing two-way service in a digital cable broadcasting environment. One embodiment of the invention provides a system for providing a two-way service in a digital cable broadcasting environment, comprising: a ubiquitous server that generates contents to provide two-way service in a digital cable broadcasting system; a ubiquitous network manager that monitors the usage volume in a cable network and manages the transmission of the contents generated by the ubiquitous server; and a QAM system that sends the contents generated by the ubiquitous server as digital cable broadcasting signals, so that the contents can be received at a receiver terminal where a flexible browser is driven. | 2011-11-03 |
20110271316 | SET TOP BOX AND METHOD OF ESTABLISHING TV PROGRAM TABLE - A set top box (STB) for establishing a television (TV) program table, and comprises a searching module and a program establishing module. The STB searches a predetermined channel among multiple channels provided by a TV station office server to receive an extensible markup language (XML) file comprising TV program information transmitted by the TV station office server over the predetermined channel. The STB analyzes the XML file to obtain the TV program information and establishes a TV program table according to the TV program information. | 2011-11-03 |
20110271317 | Set-Top-Box Having a Built-In Master Node That Provides an External Interface for Communication and Control in a Power-Line-Based Residential Communication System - A set-top-box (STB) provides capability for monitoring and control of power usage and the ability to establish communications. A smart residential service system (SRSS) is provided that uses power line communication (PLC) technology to provide secure in-home LAN communication and also to monitor and provide remote control of connected appliances in the home. An embodiment combines the STB with a master unit (MST) that is used with PLC to meet the requirements of the central device in the SRSS. | 2011-11-03 |
20110271318 | SYNCHRONIZATION AND AUTOMATION IN AN ITV ENVIRONMENT - A synchronization mechanism embeds synchronization triggers into a television signal or stream at regular intervals. The triggers include an accurate representation of the time in which the triggers were embedded. A receiving device decodes the triggers and synchronizes its internal timer based on the triggers. In this regard, the receiving device obtains a reference time from the internal timer and computes an offset between the reference time and the trigger time. The computed offset is then applied to the reference time. With the receipt of each new trigger, the application compares the trigger time to a new reference time with the most recently computed offset value applied. If there is any variance between these two values, the application creates a new smoothed offset. | 2011-11-03 |
20110271319 | USING ENDPOINT HOST CHECKING TO CLASSIFY UNMANAGED DEVICES IN A NETWORK AND TO IMPROVE NETWORK LOCATION AWARENESS - A device receives, from a managed device, endpoint information associated with an unmanaged device connected to the managed device in a network. The device also receives unmanaged device information that partially identifies the unmanaged device, and completely identifies the unmanaged device based on the endpoint information and the unmanaged device information. | 2011-11-03 |
20110271320 | SYSTEM AND METHOD FOR PROVIDING SELECTIVE BEARER SECURITY IN A NETWORK ENVIRONMENT - An example method includes receiving a message related to a bearer or an Internet Protocol (IP) flow, the message includes an extension indicating whether an Internet Protocol security (IPsec) feature is designated for the bearer or the IP flow. The method further includes mapping a communication flow to the bearer or the IP flow, and applying the IPsec feature to the bearer or the IP flow. In other embodiments, the method can include communicating the extension to a next destination, and updating a security policy to indicate that the bearer or the IP flow is designated for the IPsec feature. In yet other embodiments, an Internet Key Exchange (IKE) is used to establish a security association for a serving gateway associated with the communication flow. The extension is provided at an IP flow level or at a bearer level such that network traffic is designated for the IPsec feature. | 2011-11-03 |
20110271321 | ACCESS CONTROL - Methods and apparatus for updating a policy store associated with a policy decision point of an access control system, the policy decision point being arranged to provide, in response to received decision requests, access control decisions in dependence on one or more policies stored in said policy store, each policy specifying a predetermined access control decision to be provided in response to a particular access request made in respect of a particular attribute or combination of attributes, the policy decision point being associated with at least one policy enforcement point arranged to implement access control in accordance with access control decisions provided by said policy decision point in response to decision requests submitted by said policy enforcement point, said policy enforcement point having associated therewith an attribute store providing data relating to attributes in respect of which access requests have previously been made via said policy enforcement point. | 2011-11-03 |
20110271322 | System and Method for Configuring Devices for Secure Operations - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices. | 2011-11-03 |
20110271323 | Image forming apparatus, authentication method, and recording medium - An image forming apparatus is configured to receive user authentication information and perform image formation based on an image formation request and is connected to an external authentication server which performs authentication based on the user authentication information. The image forming apparatus comprises an authentication querying unit that queries the external authentication server for the authentication based on the user authentication information; an authentication result receiving unit that receives a result of the authentication performed by the external authentication server; an authentication result storage unit that stores the result of the authentication received by the authentication result receiving unit; and a control unit that controls the authentication querying unit, the authentication result receiving unit, and the authentication result storage unit. When the image forming apparatus receives the user authentication information, the control unit performs the authentication based on the result of the authentication stored in the authentication result storage unit. | 2011-11-03 |
20110271324 | COMMUNICATION APPARATUS CAPABLE OF RESTRICTING DESTINATION OF TRANSMISSION BY AUTHENTICATED USER, METHOD OF CONTROLLING THE COMMUNICATION APPARATUS, AND STORAGE MEDIUM - A communication apparatus having a transmission function for transmitting data to another apparatus using a transmission protocol selected from a plurality of transmission protocols. A multifunction printer (MFP) implementing the communication apparatus authenticates a user, and acquires destination information associated with the authenticated user. The MFP permits the use of a specific transmission protocol for transmission using the acquired destination information, and restricts the use of the specific transmission protocol for transmission using other destination information. Further, the MFP permits display of destination information matching the acquired destination information, but restricts display of other destination information, among destination information stored in a hard disk in association with the specific transmission protocol. | 2011-11-03 |
20110271325 | User Configuration File for Access Control for Embedded Resources - Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content and a content ID for the multimedia content. The configuration file, the source ID and the content ID are stored locally by the online social network so that any changes to the embed codes can be made by changing the configuration file associated with the source and regenerating the embed codes. By managing multimedia content in this manner, greater control can be exercised by the online social network over the multimedia content that are featured on its user pages. | 2011-11-03 |
20110271326 | NETWORK SECURITY HTTP NEGOTIATION METHOD AND RELATED DEVICES - The present invention discloses a network security HTTP negotiation method and related devices. the method comprises: a server receiving an HTTP request message with a header field sent by a terminal, wherein the header field indicates security mechanism(s) supported by the terminal, or the security mechanism(s) supported by the terminal and indication parameter(s) which show that the terminal has been in an accessing safety state; the server parsing the HTTP request message, and sending a response message with negotiated security mechanism(s) supported by the server and priority parameter(s) thereof to the terminal according to the result of the parsing if the header field of the request message indicates the security mechanism(s) supported by the terminal; and the server receiving another HTTP request message sent by the terminal again to authenticate security mechanism(s) selected by the terminal, wherein the header field of the request message indicates the security mechanism(s) selected by the terminal according to the response message and the priority parameter(s) of the security mechanism(s). The invention expands the HTTP protocol, solves the problem that the terminal security mechanisms are difficult to be deployed, and improves the network service quality. | 2011-11-03 |
20110271327 | Authorized Application Services Via an XML Message Protocol - Disclosed are systems and methods to provide a persistent authorized server address space (ASAS). The ASAS can host components from product suites that are not able to execute in an authorized state. To host other product's components, the ASAS receives “messages” from the unauthorized product components in the form of a generic eXtensible Markup Language (XML) protocol. These messages may request product initialization/administration or performance of a function by the ASAS on behalf of the requesting product. Security constraints are also provided to ensure system and data integrity. Further, the ASAS is not tightly coupled to any requesting product so that flexibility of product update or update to the ASAS itself may not be unnecessarily constrained. | 2011-11-03 |
20110271328 | System And Method For Hosting A Social Network That Enables Granular Management Of The Privacy Of Posted Information - A system and method for hosting a social network that enables entities to particularly manage the privacy level of content posted on the social network. This may enable an entity to distribute news, congratulations, accolades, invitations, and/or other internal information within the social network to members, employees, students, investors, and/or other parties. | 2011-11-03 |
20110271329 | CROSS-NETWORK REPUTATION FOR ONLINE SERVICES - A reputation server associates feedback from previous network transactions with an account of a user in a network. A reputation score for the user is calculated based on the feedback to indicate the probability the user will abuse the network. When an online service receives a request to perform a transaction from the user, the online service performs the transaction based on the user's reputation score. Additionally, a server generates a reputation packet including the reputation score for a user for use by an online service when the user requests the online service to perform a transaction. The online service may authenticate the reputation packet with the server and, if the reputation packet is authenticated, the online service performs the transaction based on the user's reputation score. | 2011-11-03 |
20110271330 | SOLUTIONS FOR IDENTIFYING LEGAL USER EQUIPMENTS IN A COMMUNICATION NETWORK - A method for identifying legal user equipments in a communication network is provided. The method comprises: sending to a user equipment a request for an identity of the user equipment; receiving from the user equipment a response to the request, the response comprising the identity of the user equipment and an associated credential; and determining whether the user equipment is a legal one, according to a result of authentication based at least in part on the received identity and the credential. | 2011-11-03 |
20110271331 | Assignment and Distribution of Access Credentials to Mobile Communication Devices - A server storing a pool of unassigned access credentials selects an access credential from the pool, assigns it to an individual, identifies a mobile communication device associated with the individual, and pushes the access credential to the mobile communication device over a secure and authenticated channel such that the access credential is receivable by the mobile communication device. If the mobile communication device supports a proximity technology and is proximate to an access node that supports the proximity technology, the mobile communication device employs the proximity technology to present the access credential to the access node. | 2011-11-03 |
20110271332 | Participant Authentication via a Conference User Interface - Various embodiments of systems, methods, and computer programs are disclosed for authenticating a participant in an online conference via a graphical user interface. One such method comprises: determining a conference event requesting authentication of a participant by a conferencing system hosting a conference via a communication network; in response to the conference event, presenting a signature capture area to the participant in a conference interface via a graphical user interface; monitoring location coordinates of an input device in the signature capture area; converting the location coordinates into a participant electronic signature; determining that the participant electronic signature matches a stored electronic signature associated with the participant; and in response to determining the match, authenticating the participant for the conference event. | 2011-11-03 |
20110271333 | ADMISSION OF A NODE TO THE NETWORK - In at least one implementation a method includes receiving an identifier associated with a device, entering the identifier into a network controller device, inviting the device associated with the identifier to join a network, admitting the device associated with the identifier to the network, sending the device associated with the identifier a name of the network, and confirming that the device has joined the network as a device recognized by the network controller device. | 2011-11-03 |
20110271334 | METHOD, SYSTEM, AND DEVICE FOR IMPLEMENTING DEVICE ADDITION IN WI-FI DEVICE TO DEVICE NETWORK - A method, a system, and a device for implementing device addition in a Wireless Fidelity (Wi-Fi) Device to Device (D2D) network are provided, which belong to the field of communication. The method includes: receiving, by a first D2D client device, a first add request message forwarded by a D2D master device, in which the first add request message carries an identifier of a new device to be added to the D2D network; receiving a first Personal Identification Number (PIN) code of the new device; and forwarding the received first PIN code to the D2D master device, in which the first PIN code of the new device is used for implementing that the D2D master device performs Wi-Fi Protected Setup (WPS) security configuration of the new device according to the first PIN code. Therefore, in the Wi-Fi D2D network, when a new device is to be added, a PIN code of the new device inputted by a user is received by the D2D client device, and the PIN code is forwarded to the D2D master device, so that the addition of the new device through the recommendation of the D2D client device is implemented, and the work continuity of the user using the D2D master device is ensured. | 2011-11-03 |
20110271335 | SYSTEM AND METHOD FOR BINDING A SUBSCRIPTION-BASED COMPUTING SYSTEM TO AN INTERNET SERVICE - A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer. | 2011-11-03 |
20110271336 | Computer and Access Control Method in a Computer | 2011-11-03 |
20110271337 | SYSTEMS, METHODS AND COMPUTER-READABLE MEDIA FOR REGULATING REMOTE ACCESS TO A DATA NETWORK - A system, which comprises an authorization controller operable for regulating establishment of user sessions over a data network; a processing subsystem operable for monitoring the user sessions and applying a walled garden policy, wherein application of the walled garden policy respectively associates each user in a certain subset of users with a respective walled garden selected from a common plurality of walled gardens; and a database for storing, in association with each said user in the certain subset of users, a respective identifier corresponding to the respectively associated walled garden. The authorization controller is further operable for responding to receipt of an access request identifying a particular user in the certain subset of users and received from a communication endpoint by (I) consulting the database to identify the walled garden respectively associated with said particular user and (II) directing the communication endpoint to said walled garden respectively associated with said particular user. | 2011-11-03 |
20110271338 | Authentication Tokens For Use In Voice Over Internet Protocol Methods - Setup of a Voice over Internet Protocol (VoIP) call is initiated and an authentication token is received for the VoIP call that is set up, that indicates that the VoIP call is authorized. The authentication token is inserted into packets for the VoIP call. The packets, including the authentication token therein, are transmitted into an IP network. The authentication token may be placed in an IP version 6 (IPv6) flowID field. | 2011-11-03 |
20110271339 | COMPUTERS AND MICROCHIPS WITH MULTIPLE INTERNAL HARDWARE FIREWALLS - An apparatus for a network of computers is presented. A plurality of inner firewalls operate within a personal computer. The personal computer operates in a network of computers and includes at least one microprocessor and at least two memory components. The plurality of inner firewalls deny access to a first memory component of the personal computer by another computer through a network connection with the personal computer during a shared operation. The plurality of inner firewalls also allow access to a second memory component of the personal computer by the other computer through the network connection with the personal computer during the shared operation. | 2011-11-03 |
20110271340 | METHOD AND APPARATUS FOR DETECTING SPOOFED NETWORK TRAFFIC - A method and apparatus for detecting spoofed IP network traffic is presented. A mapping table is created to indicate correlations between IP address prefixes and AS numbers, based on routing information collected from a plurality of data sources. At each interface of a target network, IP address prefixes from a training traffic flow are acquired and further converted into AS numbers based on the mapping table. An EAS (Expected Autonomous System) table is populated by the AS numbers collected for each interface. The EAS table is used to determine if an operation traffic flow is allowed to enter the network. | 2011-11-03 |
20110271341 | BEHAVIORAL SIGNATURE GENERATION USING CLUSTERING - A behavioral signature for detecting malware is generated. A computer is used to collect behavior traces of malware in a malware dataset. The behavior traces describe sequential behaviors performed by the malware. The behavior traces are normalized to produce malware behavior sequences. Similar malware behavior sequences are clustered together. The malware behavior sequences in a cluster describe behaviors of a malware family. The cluster is analyzed to identify a behavior subsequence common to the cluster's malware family. A behavior signature for the malware family is generated using the behavior subsequence. A trace of new malware is normalized and aligned with an existing cluster, if possible. The behavioral signature for that cluster is generated based on the behavior sequence of the new malware and the other sequences in the cluster. | 2011-11-03 |
20110271342 | DEFENSE METHOD AND DEVICE AGAINST INTELLIGENT BOTS USING MASQUERADED VIRTUAL MACHINE INFORMATION - A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not, the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process. | 2011-11-03 |
20110271343 | APPARATUS, SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE - Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code. | 2011-11-03 |
20110271344 | ILLEGAL MODULE IDENTIFYING DEVICE, INFORMATION PROCESSING DEVICE, ILLEGAL MODULE IDENTIFYING METHOD, ILLEGAL MODULE IDENTIFYING PROGRAM, INTEGRATED CIRCUIT, ILLEGAL MODULE DISABLING SYSTEM, AND ILLEGAL MODULE DISABLING METHOD - A malicious-module identification device ( | 2011-11-03 |
20110271345 | DETECTION OF ROGUE WIRELESS DEVICES FROM DYNAMIC HOST CONTROL PROTOCOL REQUESTS - A method to determine if a rogue device is connected to a specific wired network from dynamic host control protocol (DHCP) requests on the wired network. These DHCP requests are analyzed to determine the type of device issuing the request. Once the type of device has been determined, it can be checked against a list of authorized device types. If the device issuing the DHCP request is not an authorized device type, then it can be determined that the suspect device is a rogue that is connected to the specific wired network. Additionally, even if the system of the present invention determines that it is an authorized device type, if the device is not one of the few authorized devices of this type, e.g. because its MAC address is not recognized as that of one of the authorized devices, the system can flag the suspect as a rogue. | 2011-11-03 |
20110271346 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING FUNCTIONS IN COMPUTER CODE THAT CONTROL A BEHAVIOR THEREOF WHEN EXECUTED - A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that control a behavior of the computer code when executed are statically identified. | 2011-11-03 |
20110271347 | PRE-BOOT FIRMWARE BASED VIRUS SCANNER - The present disclosure relates to allowing the utilization of a virus scanner and cleaner that operates primarily in the pre-boot phase of computer operation and, more particularly, to allowing the utilization of a virus scanner and cleaner that operates primarily during the loading of an operating system. | 2011-11-03 |