44th week of 2010 patent applcation highlights part 62 |
Patent application number | Title | Published |
20100281448 | LOW-POWER FPGA CIRCUITS AND METHODS - Field Programmable Logic Arrays (FPGAs) are described which utilize multiple power supply voltages to reduce both dynamic power and leakage power without sacrificing speed or substantially increasing device area. Power reduction mechanisms are described for numerous portions of the FPGA, including logic blocks, routing circuits, connection blocks, switch blocks, configuration memory cells, and so forth. Embodiments describe circuits and methods for implementing multiple supplies as sources of V | 2010-11-04 |
20100281449 | Method For Forming Arbitrary Lithographic Wavefronts Using Standard Mask Technology - A desired set of diffracted waves using mask features whose transmissions are chosen from a set of supported values are generated. A representation of the mask as a set of polygonal elements is created. Constraints which require that the ratio of the spatial frequencies in the representation take on the amplitude ratios of the desired set of diffracted waves are defined. An optimization algorithm is used to adjust the transmission discontinuities at the edges of the polygons to substantial equality with the discontinuity values allowed by the set of supported transmissions while maintaining the constraints. | 2010-11-04 |
20100281450 | METHOD AND SYSTEM FOR MAPPING A BOOLEAN LOGIC NETWORK TO A LIMITED SET OF APPLICATION-DOMAIN SPECIFIC LOGIC CELLS - A method and system is described for mapping a system-level description of an integrated system directly to a technology-specific set of logic cells that are comprised primarily of large complex cells (bricks). The invention is based on applying aggressive Boolean operations that would be of impractical runtime complexity for a large library, but are applicable for the targeted brick libraries which typically contain a small number of complex cells, along with a much smaller number of simple cells. This invention is modular such that it can be applied in the context of incremental netlist optimization as well as optimization during physical synthesis. | 2010-11-04 |
20100281451 | Designing an ASIC Based on Execution of a Software Program on a Processing System - System and method for developing an ASIC. A software program may be stored which includes program instructions which implement a function. The software program may be executed on a processing system at a desired system speed and may be validated based on the execution. A first hardware description of at least a portion of the processing system may be stored and may specify implementation of at least a portion of the processing system. A second hardware description may be generated that corresponds to a first portion of the first hardware description. The second hardware description may specify a dedicated hardware implementation of a first portion of the software program executing on the processing system. Generation of the second hardware description may be performed one or more times to fully specify the ASIC. An ASIC may be created which implements the function of the software program. | 2010-11-04 |
20100281452 | LAYOUT DESIGN METHOD, LAYOUT DESIGN PROGRAM, AND LAYOUT DESIGN APPARATUS - It is desired to make it possible to generate a layout whose chip area is small for a semiconductor integrated circuit having a plurality of power supply systems in an internal circuit region. Power supply line of a first power supply is generated in an internal circuit region. Each of primitive cells is generated so that it is connected to the power supply line. It is checked whether or not the timing of a signal supplied to each of the primitive cells from the power supply line of the first power supply satisfies a prescribed criterion. A line for supplying a second potential generated by a second power supply to replace a first potential generated by the first power supply is generated for at least one power supply separation object cell being at least one of the primitive cells after it is checked that the prescribed criterion is satisfied. | 2010-11-04 |
20100281453 | SYSTEM AND METHOD FOR INCLUDING PROTECTIVE VOLTAGE SWITCHABLE DIELECTRIC MATERIAL IN THE DESIGN OR SIMULATION OF SUBSTRATE DEVICES - A substrate device is designed by identifying one or more criteria for handling of a transient electrical event on the substrate device. The one or more criteria may be based at least in part on an input provided from a designer. From the one or more criteria, one or more characteristics may be determined for integrating VSD material as a layer within or on at least a portion of the substrate device. The layer of VSD material may be positioned to protect one or more components of the substrate from the transient electrical condition. | 2010-11-04 |
20100281454 | SYSTEM AND METHOD FOR INCLUDING PROTECTIVE VOLTAGE SWITCHABLE DIELECTRIC MATERIAL IN THE DESIGN OR SIMULATION OF SUBSTRATE DEVICES - A substrate device is designed by identifying one or more criteria for handling of a transient electrical event on the substrate device. The one or more criteria may be based at least in part on an input provided from a designer. From the one or more criteria, one or more characteristics may be determined for integrating VSD material as a layer within or on at least a portion of the substrate device. The layer of VSD material may be positioned to protect one or more components of the substrate from the transient electrical condition. | 2010-11-04 |
20100281455 | DETERMINING SYSTEM LEVEL DEPENDENCIES - Techniques for co-relating at least one of a functional design and at least one implementation artifact of a solution with at least one infrastructure component of a target deployment environment for the solution are provided. The techniques include obtaining at least one of a functional design and at least one implementation artifact of a solution, obtaining at least one infrastructure component of a target deployment environment for the solution, and co-relating at least one of a functional design and at least one implementation artifact of a solution with at least one infrastructure component of a target deployment environment for the solution, wherein co-relating comprises discovering at least one system level dependency among the at least one of a functional design and at least one implementation artifact and the at least one infrastructure component. | 2010-11-04 |
20100281456 | SYSTEM AND METHOD FOR APPLICATION PROCESS AUTOMATION OVER A COMPUTER NETWORK - A system and a method for automated process management of software in a computer network having a plurality of computers, including for deployment. The automated process management optionally and preferably includes modeling the software application according to one or more requirements of the computer network. The modeling also preferably includes operational modeling. This modeling bridges the gap between development and operation teams. The automated process management is preferably controlled at a management server via a console, such that one or more users may more preferably adjust the process management or at least optionally view progress of any actions within the automated process performance. Such management server preferably enables the software product to be deployed, managed, verified, monitored and tracked from a single location. More preferably, the system and method provide management reports, for generating deployment and/or other automated process management reports for the technical (software professional and/or deployment professional) and management level. | 2010-11-04 |
20100281457 | AUTOMATING INTERACTIONS WITH SOFTWARE USER INTERFACES - A method and apparatus applies an action to a software application by determining a target object for the input action. The determination of the target object is performed by identifying the target object through socially identifying object information relative to a reference object. Then, the input action is applied to the target object. | 2010-11-04 |
20100281458 | APPLICATION MODIFICATION FRAMEWORK - Methods and apparatus for an application modification framework used in an integrated technology platform are shown, which allows hot deployment of modifications, including a modification component, a hot deployment component, and a package manager component. The framework provides various editors to allow a developer of the base application or a custom client application to edit files and features associated with the application. Managers are provided to control each of the editors and for maintenance of historical information to allow auditing and modification monitoring. Hot deployment controls the ability of the user to implement modifications and changes, wherein changes are identified as to origin and purpose, allowing smart debug to identify if error(s) occurred during custom modification, base modification or otherwise. | 2010-11-04 |
20100281459 | SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR FERTILIZING MACHINE-EXECUTABLE CODE - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable storage media for obfuscating code, such as instructions and data structures. Also disclosed are tangible computer-readable media containing obfuscated code. In one aspect, a preprocessing tool (i.e. before compilation) identifies in a source program code a routine for replacement. The tool can be a software program running on a computer or an embedded device. The tool then selects a function equivalent to the identified routine from a pool of functions to replace the identified routine. A compiler can then compile computer instructions based on the source program code utilizing the selected function in place of the identified routine. In another aspect, the tool replaces data structures with fertilized data structures. These approaches can be applied to various portions of source program code based on various factors. A software developer can flexibly configure how and where to fertilize the source code. | 2010-11-04 |
20100281460 | Whitebox Trace Fuzzing - Disclosed is a process to generate and execute relevant, non-redundant test cases starting with an execution trace. An execution trace may be collected. A sequence of actions and the data involved in the actions may then be extracted from the execution trace and persisted separately from one another. Code for a non-deterministic program (“NDP”) may be generated, comprising the sequence of actions but without determining the data. A systematic program analysis of the NDP may be made, exploring possible execution paths and beginning from the path exercised by the persisted data. A new test case may be generated which fixes particular test inputs for the NDP. | 2010-11-04 |
20100281461 | AUTOMATIC CONFIGURATION OF PROJECT SYSTEM FROM PROJECT CAPABILITIES - A project system is automatically configured from project capabilities determined from an instance of a build system by a project capabilities analyzer. A flexible configuration based build system defines the consuming project system. Results of an evaluated project file are used to define the overall capabilities of the build system. The capabilities are used to dynamically load and assemble the project system code. Changes in the project capabilities due to a reevaluation of a result of a build can then redefine and reassemble the project system code. Hence project system configuration is data-driven rather than user-defined and utilizes a flexible, configuration based build system to define the consuming project system. | 2010-11-04 |
20100281462 | SYSTEMS AND METHODS FOR GENERATING SOURCE CODE FOR WORKFLOW PLATFORM - Various embodiments of the present invention provide systems and methods for enabling design, generation, and execution of real-time workflows. Such embodiments provide a graphical designer including a plurality of shapes representing the various objects of a workflow that are used to model the workflow. In addition, various embodiments of the graphical designer provide shapes to model aspects of the workflow not found in previous graphical designers. Various embodiments also provide a code generator that converts the representation of the workflow into executable code for multiple target languages. Various embodiments also provide a workflow engine based on a Petri net model responsible for executing the workflow and for delegating tasks to be performed for the workflow to an operating system. In various embodiments, the workflow engine further includes a platform abstraction layer that provides a transition layer from the Petri net language to the operating system language. | 2010-11-04 |
20100281463 | XML based scripting framework, and methods of providing automated interactions with remote systems - A method of creating an XML based framework to perform automated forecasting includes sending a file from a local host computer to a remote computer, receiving a file at the local host computer from the remote computer, installing the received file on the local host computer, and executing commands on the local host computer and the remote computer. Executing a command on the remote computer includes reading a run file and a host definition file. A framework for interacting between the local host computer and the remote computer is determined based on types of XML tags, the XML tags including at least one of a start of a tag, end of a tag, and text between the start of a tag and the end of a tag. Computer program products for creating an XML based framework to perform automated forecasting are also described. | 2010-11-04 |
20100281464 | ASPECT-ORIENTED PARALLEL PROGRAMMING LANGUAGE EXTENSIONS - Techniques for using one or more aspect-oriented parallelism primitives to implement one or more aspects of a program in parallel are provided. The techniques include using one or more aspect-oriented parallelism primitives to implement one or more aspects of a program in parallel, wherein implementing the one or more aspects of a program in parallel comprises implementing the one or more aspects of a program in parallel on a multi-core processor. | 2010-11-04 |
20100281465 | LOAD-CHECKING ATOMIC SECTION - A compiled program has an advanced-load instruction and a load-checking atomic section. The load-checking atomic section follows the advanced-load instruction in the compiled program. The advanced-load instruction, when executed, loads a value from a shared memory address. The load-checking atomic section includes a check instruction for checking the validity of the shared memory address. | 2010-11-04 |
20100281466 | PROCESS FOR VERIFYING COMPUTER CODES AND CORRESPONDING VERIFICATION SYSTEM - A process for detecting errors in computer code in C/C++ language in a computer, which comprises the operations of:—making available in said computer a source computer program (P) containing computer codes in C/C++ language; compiling (Z) said source computer program (P) to obtain an executable program (E); and—executing ( | 2010-11-04 |
20100281467 | METHOD AND APPARATUS FOR AUTOMATIC SOFTWARE TESTING - System and method for automated testing of computer software, especially for business process (enterprise) computer software applications. The present system generates scripts for testing software in an automated manner. Business process testing scripts, for instance for functional automated software testing, are thereby converted by an adapter to other types of testing scripts, for instance for testing performance or security or application monitoring. | 2010-11-04 |
20100281468 | METHOD AND SYSTEM FOR MONITORING EXECUTION PERFORMANCE OF SOFTWARE PROGRAM PRODUCT - A method, computer program product and system for monitoring execution behavior of a program product in a data processing system include development of a trace tool having trace strings written in a human language and provided with data fields for diagnostic information relevant to executable portions of the program product. Identifiers of the trace tool, trace strings, and data fields and components of the diagnostic information are encoded using a coded binary language. After monitoring execution of the program product, a trace report of the trace tool is translated for an intended recipient from the coded binary language into the human language, whereas an unauthorized access to the contents of the trace record is restricted. The encoding or decoding operations are performed using databases containing the respective identifiers and components of the diagnostic information in the coded binary language and the human language. | 2010-11-04 |
20100281469 | SYMBOLIC PREDICTIVE ANALYSIS FOR CONCURRENT PROGRAMS - A symbolic predictive analysis method for finding assertion violations and atomicity violations in concurrent programs is shown that derives a concurrent trace program (CTP) for a program under a given test. A logic formula is then generated based on a concurrent static single assignment (CSSA) representation of the CTP, including at least one assertion property or atomicity violation. The satisfiability of the formula is then determined, such that the outcome of the determination indicates an assertion/atomicity violation. | 2010-11-04 |
20100281470 | METHOD FOR GENERATING INTERPRETABLE CODE FOR STORAGE IN A DEVICE HAVING LIMITED STORAGE - In some embodiments of the present invention, files are generated from .java files or .class files or .jar files. The generated files are directly linkable and interpretable by a Java Virtual Machine. The generated files may be stored in a directly addressable memory of a device. References between .class files may appear in the generated files as hard offsets or symbolic references. The generated files may be grouped so that cross-references between generated files in the same group appear as hard offsets. | 2010-11-04 |
20100281471 | METHODS AND APPARATUSES FOR COMPILER-CREATING HELPER THREADS FOR MULTI-THREADING - Methods and apparatuses for compiler-created helper thread for multi-threading are described herein. In one embodiment, exemplary process includes identifying a region of a main thread that likely has one or more delinquent loads, the one or more delinquent loads representing loads which likely suffer cache misses during an execution of the main thread, analyzing the region for one or more helper threads with respect to the main thread, and generating code for the one or more helper threads, the one or more helper threads being speculatively executed in parallel with the main thread to perform one or more tasks for the region of the main thread. Other methods and apparatuses are also described. | 2010-11-04 |
20100281472 | SYSTEM AND METHOD FOR MANAGEMENT OF MUTATING APPLICATIONS - A method for adapting a provisioned content of an application program on a mobile device, the content of the application being partitioned into a set of addressable logical modules, the method comprising the steps of provisioning a first group of logical modules selected from the set of logical modules to provide provisioned content on the device, monitoring execution path information of the provisioned content during execution on the device, evaluating the execution path information to adapt the provisioned content by one or more of adding logical modules to the first group from the set of logical modules, removing logical modules from the first group of logical modules or suspending logical modules from the first group of logical modules, to form a second group of logical modules, revising the first group of logical modules to correspond to the second group of logical modules to provide a revised content; and adapting the provisioned content of the application on the terminal to correspond to the revised content, during execution on the device. | 2010-11-04 |
20100281473 | AUTOMATED SOFTWARE DEPLOYMENT TRIGGERED BY STATE DIFFERENCES IN DISTRIBUTED SYSTEMS - An automated arrangement for deploying software updates to a distributed system based on state differences is provided in which a manifest defines a target snapshot of the desired state of the system after it is updated. A snapshot of the current distributed system state is taken and a state difference between the current state and the target state is calculated. A rule-based engine applies pre-defined rules to generate a sequence of actions that when performed will bring the distributed system to the target state. Accordingly, rather than have to focus on how to change the distributed system, software developers and system administrators may instead specify the target distributed system state in the manifest and the present automated deployment arrangement will perform the required actions to deploy the updates and achieve the desired state. | 2010-11-04 |
20100281474 | FIRMWARE UPDATING - Updating firmware of remote devices is useful to administrators of such devices. Various embodiments provide for activating a process on a plurality of remote devices to update the firmware of each respective remote device. By monitoring the process for indications of when each respective remote device is ready for a subsequent event, the process of updating the firmware can be automated. Additional embodiments include verifying that each remote device has been updated as expected. | 2010-11-04 |
20100281475 | SYSTEM AND METHOD FOR MOBILE SMARTPHONE APPLICATION DEVELOPMENT AND DELIVERY - Various embodiments of the disclosed invention include a design and development interface for mobile smartphone applications; the generation and delivery of content customized to the smartphone application execution platform; and the support of update functionality within the mobile applications. In one embodiment, a development environment provides templates via a website interface to easily create and design a smartphone application. This design interface can also be used to create updates for deployed smartphone applications. Within the mobile application, the application content is provided by XML data sets and non-textual data (such as images), and displayed within a set of modifiable containers. These containers and the data displayed within the containers may be updated and modified, enabling full customization of the application and its displayed content. | 2010-11-04 |
20100281476 | Image forming apparatus and image forming system - Provided is an image forming apparatus which makes input of an initial setting value of driver software such as a printer driver easier and capable of preventing erroneous input. A MFP is connected through a network to an administrator PC in which driver software is installed, and controlled by the driver software. The MFP includes an initial setting value input portion for inputting an initial setting value of the driver software and a setting value table that stores a setting value of an image forming function included in the MFP. The initial setting value input portion sets the setting value stored in the setting value table on an initial setting value input screen of the driver software as the initial setting value of the driver software so that a user can change the initial setting value set on the initial setting value input screen. | 2010-11-04 |
20100281477 | VM HOST RESPONDING TO INITIATION OF A PAGE SWAP BY TRANSFERRING PAGES FROM HOST-BUT-NON-GUEST-ADDRESSABLE RAM TO HOST-AND-GUEST-ADDRESSABLE RAM - A virtual-machine host responds to a guest operating system's initiation of a page swap by transferring a page from host-but-non-guest-addressable RAM to host-and-guest addressable RAM. | 2010-11-04 |
20100281478 | MULTIPHASE VIRTUAL MACHINE HOST CAPACITY PLANNING - A virtual machine distribution system is described herein that uses a multiphase approach that provides a fast layout of virtual machines on physical computers followed by at least one verification phase that verifies that the layout is correct. During the fast layout phase, the system uses a dimension-aware vector bin-packing algorithm to determine an initial fit of virtual machines to physical hardware based on rescaled resource utilizations calculated against hardware models. During the verification phase, the system uses a virtualization model to check the recommended fit of virtual machine guests to physical hosts created during the fast layout phase to ensure that the distribution will not over-utilize any host given the overhead associated with virtualization. The system modifies the layout to eliminate any identified overutilization. Thus, the virtual machine distribution system provides the advantages of a fast, automated layout planning process with the robustness of slower, exhaustive processes. | 2010-11-04 |
20100281479 | Systems and Methods for Input/Output Isolation - Systems and methods for providing virtual stacks are described. A kernel driver is installed and loaded. Then, a virtual stack is created, the virtual stack having a virtual file system, a virtual physical disk, and one or more virtual mounted volume devices. The virtual file system is configured to mimic characteristics of a host file system. The virtual physical disk is configured for providing an interface of a memory storage device to which the virtual file system device binds. The one or more virtual mounted volume devices are configured for allowing the one or more virtual processes to access data in stored memory through the virtual stack. | 2010-11-04 |
20100281480 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DECOMPOSING A SAMPLING TASK INTO A PLURALITY OF JOBS - A system, method, and computer program product are provided for decomposing a sampling task into a plurality of jobs. In operation, a sampling task is identified. Additionally, the sampling task is decomposed into a plurality of jobs. Further, each of the plurality of jobs are processed in parallel. Still yet, each of the plurality of jobs are allowed to terminate independently of the other plurality of jobs. | 2010-11-04 |
20100281481 | APPARATUS AND METHOD FOR PROVIDING A USER INTERFACE WITHIN A COMPUTING DEVICE - A user interface for simultaneously representing tasks and notifications in a computing device. The user interface presents the tasks as reduced size representations of the output of the corresponding tasks which are continually updated. The user interface allows a user to bring a selected task to the foreground or to close the task, both by interacting with the representations of the tasks. The user interface further associates notifications with corresponding tasks by superimposing an icon of the notification on the representation of the corresponding task. The user interface orders and arranges the task representations and icons of the notifications according to certain layout rules. | 2010-11-04 |
20100281482 | APPLICATION EFFICIENCY ENGINE - A system and a method are provided. Performance and capacity statistics, with respect to an application executing on one or more VMs, may be accessed and collected. The collected performance and capacity statistics may be analyzed to determine an improved hardware profile for efficiently executing the application on a VM. VMs with a virtual hardware configuration matching the improved hardware profile may be scheduled and deployed to execute the application. Performance and capacity statistics, with respect to the VMs, may be periodically analyzed to determine whether a threshold condition has occurred. When the threshold condition has been determined to have occurred, performance and capacity statistics, with respect to VMs having different configurations corresponding to different hardware profiles, may be automatically analyzed to determine an updated improved hardware profile. VMs for executing the application may be redeployed with virtual hardware configurations matching the updated improved profile. | 2010-11-04 |
20100281483 | PROGRAMMABLE SCHEDULING CO-PROCESSOR - A scheduling co-processor for scheduling the execution of threads on a processor is disclosed. In certain embodiments, the scheduling co-processor includes one or more engines (such as lookup tables) that are programmable with a Petri-net representation of a thread scheduling algorithm. The scheduling co-processor may further include a token list to store tokens associated with the Petri-net; an enabled-thread list to indicate which threads are enabled for execution in response to particular tokens being present in the token list; and a ready-thread list to indicate which threads from the enabled-thread list are ready for execution when data and/or space availability conditions associated with the threads are satisfied. | 2010-11-04 |
20100281484 | SHARED JOB SCHEDULING IN ELECTRONIC NOTEBOOK - Architecture that synchronizes a job to shared notebook eliminating the need for user intervention and guaranteeing that only one instance of the notebook client performs the task. A job tracking component creates and maintains tracking information of jobs processed against shared notebook information. A scheduling component synchronizes a new job against the shared notebook information based on the tracking information. The tracking information can be a file or cells stored at a root level of a hierarchical data collection that represents the electronic notebook. The file includes properties related to a job that has been processed. The properties are updated as new jobs are processed. Job scheduling includes whole file updates and/or incremental updates to the shared notebook information. | 2010-11-04 |
20100281485 | Method For Changing Over A System Having Multiple Execution Units - A system having multiple execution units and a method for its changeover are provided. The system having multiple execution units has at least two execution units, and may be changed over between a performance operating mode, in which the execution units execute different programs, and a comparison operating mode, in which the execution units execute the same program. The system has a scheduler, which is called by an execution unit to ascertain the next program to be executed. The remaining execution units are prompted to also call the scheduler if the program ascertained by the first called scheduler is to be executed in a comparison operating mode. A changeover unit changes over the system having multiple execution units from the performance operating mode into the comparison operating mode if the program to be executed ascertained by the last called scheduler is to be executed in the comparison operating mode, this ascertained program to be executed being executed as the program having the highest priority by all execution units after the changeover of the system into the comparison operating mode. | 2010-11-04 |
20100281486 | Enhanced scheduling, priority handling and multiplexing method and system - System and method for enhancing scheduling/priority handling and multiplexing on transmitting data of different logical channels includes a receiver and a processor. The receiver receives a payload unit. The processor processes payload unit and enhances scheduling/priority handling and multiplex from different logical channels. The processor calculates data that can be transmitted with available resource for each logical channel, prioritizes the logical channels with decreasing priority order, performs first round resource allocation without partition, prioritizes logical channels with remaining data that is not performed with first round resource allocation with strict decreasing priority order, and performs second round resource allocation with partition. As such, scheduling/priority handling and the multiplexing in a multiple carrier system will be carried out so as to increase the efficiency of resource allocation. | 2010-11-04 |
20100281487 | SYSTEMS AND METHODS FOR MOBILITY SERVER ADMINISTRATION - An administration server of an administration service assigns attributes to objects by a plug-in of the administration service. The plug-in implements a method of a functionality set and the method is callable by the administration service to perform the assigning. Additionally or alternatively, the administration server triggers a reconciliation event by changing the assignment of an attribute of the users that comprise objects of plug-ins; determines a scope of the users and which objects are affected by changing the assignment; and reconciles conflicting assignments. Additionally or alternatively, the administration server adds tasks by the plug-ins to a job created by the plug-ins with the tasks performing the assigning; and removes tasks from the job to optimize it. | 2010-11-04 |
20100281488 | DETECTING NON-REDUNDANT COMPONENT DEPENDENCIES IN WEB SERVICE INVOCATIONS - Relationships between components in an application and the services they provide are identified, including redundant caller-callee sequences. Specific components of interest are instrumented to obtain data when they execute. Data structures are created which identify the components and their dependencies on one other. To avoid excessive overhead costs, redundant dependencies are identified. A dependency data structure can be provided for each unique dependency. When repeated instances of a dependency are detected, the associated dependency data structure can be augmented with correlation data of the repeated instances, such as transaction identifiers and sequence identifiers. Sequence identifiers identify an order in which a component is called. A flag can be used to force the creation of a new dependency data structure, and a calling component's name can be used instead of a sequence identifier. Agents report the dependency data structures to a manager to provide graph data in a user interface. | 2010-11-04 |
20100281489 | Method and system for dynamically parallelizing application program - Provided is a method and system for dynamically parallelizing an application program. Specifically, provided is a method and system having multi-core control that may verify a number of available threads according to an application program and dynamically parallelize data based on the verified number of available threads. The method and system for dynamically parallelizing the application program may divide a data block to be processed according to the application program based on a relevant data characteristic and dynamically map the threads to division blocks, and thereby enhance a system performance. | 2010-11-04 |
20100281490 | GENERATING TRANSACTION MESSAGE - Systems methods and computer programs are disclosed that enable generating transaction messages. In one embodiment, the method comprises: generating a transaction message using a first computing device, the transaction message comprising: compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and a transaction identification that identifies an executing program within the first computing device to execute the transaction; and sending the transaction message over an input/output device connected to the first computing device for processing on a second computing device. | 2010-11-04 |
20100281491 | PUBLISHER FLOW CONTROL AND BOUNDED GUARANTEED DELIVERY FOR MESSAGE QUEUES - Techniques for managing messages in computer systems are provided. In one embodiment, in response to a publisher attempting to enqueue a message in a queue, a determination is made whether a condition is satisfied. The condition is based on the current usage of the queue by the publisher. Based on whether the condition is satisfied, a decision is made whether to enqueue the message in the queue. The decision whether to enqueue the message may comprise restricting the publisher from enqueueing any more messages in the queue until the same or a different condition is satisfied. | 2010-11-04 |
20100281492 | Slim Optical Disk Drive - The invention provides a jam-proof device of a slot-in optical disk drive. In the jam-proof device, a contact pin protrudes from one end of the loading bar, the other end of the loading bar is pivoted with a pivot on a first side of the casing, and a block protrudes adjacent to the pivot. One end of the unloading bar is pivoted on a second side of the casing opposite to the first side, and a reception end is formed at the other end of the unloading bar to extend to a center of the casing. A distance between the block and the reception end at a default position is shorter than a diameter of an 8-cm disc to prevent the disc from entering the slot-in optical disk drive. | 2010-11-04 |
20100281493 | SLIM OPTICAL DISK DRIVE - The invention is to provide a slim optical disk drive, which includes several braces extended from two edges of an upper cover. Each brace extends two fixing parts with a buckle hole from the center and the bottom. The upper and lower surface of each guide of a guide unit is concaved to form position recesses with a wedge. The guide places between two fixing parts, the fixing part and engages in the position recess, and the wedge is inserted into the buckle hole. A tray covered a base plate on bottom is supported by two bars sliding in two guides. | 2010-11-04 |
20100281494 | SLOT-IN OPTICAL DISK DRIVE - A slot-in optical disk drive includes a power unit to drive a sliding component to rotate a loading bar, so as to process loading procedure of the slot-in optical disk drive. A base covers on a main board disposed on a rear side of a casing of the slot-in optical disk drive. A first linking bar is pivoted to a center of the base. An end of the first linking bar is driven by the sliding component, and a haul slot is for driving a right positioning bar. The other end of the first linking bar is pivoted to a second linking bar of the base. The second linking bar is for driving the unloading bar pivoted to the base. The end of the unloading bar is close to a lateral side of the casing, so as to keep away from a breach on the base. | 2010-11-04 |
20100281495 | PROTECTION DEVICE OF SLOT-IN OPTICAL DISK DRIVE - A protection device of a slot-in optical disk drive is provided. The protection device is disposed between two linking parts of the slot-in optical disk drive. One of the two linking parts is formed with a slot, and the other one of the two linking parts is connected to an upper end of a guide pin. A lower end of the guide pin protrudes and is inserted into the slot, and a portion of the guide pin corresponding to a side of the slot is formed with a notch. As the notch engages with the slot, the situation that the guide pin slides out of the slot can be avoided. | 2010-11-04 |
20100281496 | Program Subscription Method and System - A system for accessing video content or audio content over the internet comprising a server linked to the internet and storing the video content or audio content; a nominated terminal device of a subscriber to access the video content or audio content; and a graphical interface enabling the subscriber to select available programs from the audio or video content for viewing or listening on the nominated terminal device. The selection of programs is transmitted over the internet to the server and the server transmits the selected programs or links to the selected programs to the nominated terminal device for access by the subscriber for a predetermined period of time. | 2010-11-04 |
20100281497 | APPARATUS, METHOD, AND PROGRAM FOR PROCESSING INFORMATION - An information processing apparatus includes: importance calculation means configured to calculate an experience importance degree of content for a user based the basis of a relationship among a reaction analysis result obtained by performing predetermined analysis on a reaction (attitude) of the user to the content at the time when the user experiences the content, an environment analysis result obtained by performing predetermined analysis on an external environment of the user at the time when the user experiences the content, a signal analysis result obtained by performing predetermined analysis on a video signal or voice signal of the content, and a language analysis result obtained by performing predetermined language analysis on language information described about the content; and determination means configured to, if the experience importance degree of the content calculated by the importance calculation means is high, determine the content as recommendation content to be recommended to the user. | 2010-11-04 |
20100281498 | INFORMATION PROVIDING DEVICE, INFORMATION DISPLAY DEVICE, INFORMATION PROVIDING SYSTEM, CONTROL METHOD, CONTROL PROGRAM AND STORAGE MEDIUM - A digital television ( | 2010-11-04 |
20100281499 | ITERATIVE, MAXIMALLY PROBABLE, BATCH-MODE COMMERCIAL DETECTION FOR AUDIOVISUAL CONTENT - Identification of starting and ending times of commercial breaks and commercials within those commercial breaks found in audiovisual content is disclosed. A solution to a “batch optimization” problem is used in which commercial locations within a set of audiovisual content are detected as a group by choosing a set of commercial locations which optimizes a cost function which can include considerations of, for example, 1) one or more cues, 2) relative locations of commercials within the audiovisual content, and/or 3) probability models based on statistics obtained regarding characteristics of typical commercial and commercial breaks. Optimization can be done over the total set of commercial location decisions, rather than on a per-commercial basis. Additionally, the cost function can be iteratively evaluated and many more types of cues and combinations of cues can be used in detection of commercials. | 2010-11-04 |
20100281500 | AV DEVICE AND UI DISPLAY METHOD - To solve the problems that it is necessary to perform an overlapped operation even if final viewing is to be decided while a plurality of contents included in a specified list of UI are compared (selected for a plurality of times) and that extra operation burden is given to a user in conventional technology. An AV device for giving priority to the list of a viewing source device to which the content outputted at present belongs and displaying it in UI at the time of receiving a list request of the content from the user is provided. | 2010-11-04 |
20100281501 | SYSTEM AND METHOD FOR DELIVERING SERVICE GUIDE INFORMATION - A system and method for providing Electronic Service Guide (ESG) information to one or more terminals. Sliding time windows are used in a hierarchical fashion in order to prioritize file delivery sessions. In this arrangement, file delivery sessions representing a first interval of the hierarchy are extended to cover a longer interval whenever the interval becomes obsolete, i.e., when the end point of the interval becomes a point in the past before the current time. The end point of the first interval is extended beyond the current time by creating one or more subsequent intervals in the hierarchy. When a session is dropped, a new session is introduced at the end of the hierarchy. Various embodiments also provide a mechanism by which bandwidth can be allocated so that more bandwidth is provided to desired portions of the ESG. | 2010-11-04 |
20100281502 | METHOD OF ACQUIRING PROGRAM GUIDE INFORMATION, PROGRAM GUIDE METHOD APPROPRIATE FOR THE SAME, AND PROGRAM GUIDE APPARATUS - A method and apparatus of acquiring program guide information for a digital television receiver. There is provided a digital television signal receiver, including: a tuner to receive a digital television transport stream (TS) which includes audio, video, and program information; an extractor to extract the program information from the received TS; a storage to store the extracted program information; a processor to access the storage to generate a channel list based on the stored program information stored in the storage, where the channel list comprises at least one channel number and the at least one channel number comprises at least one main channel number; and a user interface to allow a user to navigate the channel list to search a channel number, wherein if the at least one main channel number has a corresponding sub-channel number, the sub-channel number can be listed after the at least one main channel number. | 2010-11-04 |
20100281503 | System and Method for Recording a Multi-Part Performance on an Internet Protocol Television Network - An Internet protocol television (IPTV) system includes a server operable to send a performance guide and a time code over the IPTV system to two or more clients. The server receives a performance from each of the clients over the IPTV system, combines the performances into an overall performance, and sends the overall performance over the IPTV system to the clients. | 2010-11-04 |
20100281504 | AUTO-ZAPPING PROGRAMME FOR A DECODER FOR IDENTIFICATION OF A SELECTED TV EVENT USING DVB TECHNOLOGY AND MPEG ENCODING - The invention is of use to all television viewers who would like to watch a TV event in the near future, who fear missing said event due to forgetfulness or distraction when zapping through other programmes. By automatically zapping, the decoder places said TV event in the field of view of the viewer who has to do nothing. The aim of the invention is to provide a new DVB table with a supplementary service to those already on offer. This table is to inform the decoder of the beginning of each TV event on each channel which may be viewed using the same, whilst remaining tuned to one channel, such as to be able to compare the identity thereof with the event selected by the viewer at a previous moment with the goal of watching the same. At the start of a TV event, if the identity thereof is not recognised by the decoder the event is ignored. On the other hand where the event is recognised using the above comparison, the decoder starts the zapping to the channel broadcasting the event in an automatic manner. The viewer thus has no longer to fear missing the TV events he likes to watch, the task being left to the decoder such as a secretary manages the appointments of the boss. | 2010-11-04 |
20100281505 | INFORMATION PROCESSING DEVICE AND EDITING METHOD - An information processing device includes: a storage unit configured to store one or a plurality of content playlists; a virtual playlist generating unit configured to generate a virtual playlist of the content and stored in the storage unit in a manner correlated with the content; a reception unit configured to receive user instructions; an editing unit configured to, in the event of receiving editing instructions as to the content, subject the virtual playlist to editing processing following the editing instructions; and a title display control unit configured to, in the event of receiving a title display instruction for displaying the title of the content on a predetermined display unit, displaying the title of the content based on the virtual playlist which has been subjected to the editing processing by the editing unit. | 2010-11-04 |
20100281506 | PROGRAM SHORTCUTS - Techniques are described that allow DVR users to create program shortcuts to different types of media content from content providers. A program shortcut comprises a reference to another media content. A user may generate a shortcut so that the user may easily find and return to media content without performing a new search. In addition, techniques may be used to automatically generate program shortcuts for a user based at least in part to user-indicated preferences or actions. Shortcuts may be generated to media content that is related to a preferred genre or media type specified by a user. Shortcuts may also be generated to content that is determined to be similar to content that is often viewed or recorded by the user. | 2010-11-04 |
20100281507 | Platform for Personal Media Broadcaster based on XML and Method for Setting up IP Automatically - The present invention provides a platform for an XML-based personal media broadcaster, in which TV programs, which are multimedia, are provided to allow a viewer to view a program desired by him or her at a desired time and at a desired place by compositely implementing an open service architecture, a time-shift function and a place-shift function, thus enabling the platform for a personal media broadcaster to be implemented. The present invention includes an XML module ( | 2010-11-04 |
20100281508 | Internet Protocol (IP) to Video-on-Demand (VOD) Gateway - A media server is hosted in a service provider's network so that media content can be stored from or rendered to a private network such as a Digital Living Network Alliance network. Media content may be stored by accessing the media server or by downloading the media content to the media server. Support of set top boxes interacting with voice-on-demand (VOD) controllers and computers interacting with IP-based video content servers are integrated through the media server. Consequently, VOD assets can be played on IP-based devices and IP-based content can be played on set top boxes. A gateway function converts IP-based content to a VOD asset, and renders the VOD asset to a set top box while mapping digital rights management information for the VOD asset. Conversely, the gateway function may convert a VOD asset to IP-based content that can be played on an IP-based device. | 2010-11-04 |
20100281509 | Prefix caching assisted quality of service aware peer-to-peer video on-demand - A multimedia-on-demand peer-to-peer device acting as a receiving peer includes a local cache memory device adapted to store a multimedia prefix. Local storage of the multimedia prefix allows rapid commencement of playback of the requested multimedia program without substantially loading the streaming capacity of an associated server device. The storage of multimedia prefixes in local cache memory of the receiving peer device can take place during periods of relatively low network loading so as to optimize network and server scheduling. Included is a method and apparatus for performing admission control in a peer-to-peer multimedia-on-demand system. The admission control system determines if there is sufficient system capacity to support a new request from a peer-to-peer device acting as a client in light of the presence of stored multimedia prefixes at the peer-to-peer device acting as a receiving peer device, among other factors. | 2010-11-04 |
20100281510 | Method for Broadcasting or Receiving Digital Video Services, Corresponding Devices - The invention concerns a method for broadcasting digital video services including a step of transmitting digital video broadcasting services in radio frames addresses to at least one terminal having a standby mode and a sleep mode. In order that the terminal may stay in standby mode to receive data the modified content of the radio frames, at least a part of the radio frames comprises information representative of a change in the content of the radio frames. The invention also concerns a reception method implemented in the terminal as well as the corresponding devices. | 2010-11-04 |
20100281511 | Multimedia System and Associated Control Method - A multimedia system and associated control method is provided. The multimedia system includes a remote control, a display device and a multimedia signal generator. A control method of the multimedia system includes steps of transmitting a remote control signal to the display device by the remote control, transmitting a local control signal associated with the remote control signal to the multimedia signal generator, generating an operation command by the multimedia signal generator in response to the local control signal, and executing the operation command by the multimedia signal generator. | 2010-11-04 |
20100281512 | DYNAMIC COMMUNITY GENERATOR - Embodiments of the invention are directed to systems, methods, and computer program products configured to determine communities within an organization dynamically based on the distribution of entitlements within the organization. | 2010-11-04 |
20100281513 | DYNAMIC ENTITLEMENT MANAGER - Embodiments of the invention are directed to systems, methods, and computer program products configured to calculate an indicator of the likelihood that an entitlement exists in a first community relative to a second community. The calculated indicator is then used to determine the appropriateness of entitlements within the first community or after a transfer of a person from the first community to the second. | 2010-11-04 |
20100281514 | SYSTEM FOR MANAGING IDENTITY WITH PRIVACY POLICY USING NUMBER AND METHOD THEREOF - The present invention includes a request module that creates a user information request message and a communication module that transmits the user information request message to an attribute provider server, wherein the user information request message includes a privacy policy that represents at least one term of use subjects, use purposes, and use periods using a grade. With the present invention, the representation of the privacy policy can be simplified and the comparison of policies can be conveniently processed. | 2010-11-04 |
20100281515 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING COMMUNICATION IN AN INTEROPERABILITY NETWORK - Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data. | 2010-11-04 |
20100281516 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR NETWORK AUTHORIZATION - Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data. | 2010-11-04 |
20100281517 | System, Apparatus, Program, and Method for Authentication - According to an aspect of the invention, a management of each authentication subprocess assures the each authentication subprocess, and assurance contents can be verified by verification side, so that trustworthiness of the whole authentication process can be improved. An authentication system includes authentication entity devices which separately execute authentication subprocesses P | 2010-11-04 |
20100281518 | SYSTEM AND METHOD FOR SEPARATING CONTROL OF A NETWORK INTERFACE DEVICE - A system and method for separating control of a network interface device. A portion of a network interface device (NID) is partitioned for utilization by a user. Permissions are established for management of the partitioned portion of the NID. The permissions including permissions that deny a service provider access to the partitioned portion. Access is granted for the service provider to manage the partitioned portion of the NID. Activities performed by the service provider in the partitioned portion of the NID are logged in response to granting access to the service provider and the permissions denying the service provider access. | 2010-11-04 |
20100281519 | PROACTIVE AUTHENTICATION - A system for proactively authenticating includes a server having media independent access functions including media independent authentication functions that authenticates other entities attached via an interface to an end of a link specific to a media. A plurality of heterogeneous networks each having media specific access functions including authentication functions corresponding to the other entities attached via the interface to the end of the link specific to the media and mobile devices connected to the plurality of heterogeneous networks, and the server having predefined media independent handover protocols and media independent handover identities based on the media independent functions related to handover, in which the server authenticates candidate access networks prior to the handover of the mobile devices from serving access networks to the candidate access networks each of which belonging to the plurality of heterogeneous access networks having the link specific to the media. | 2010-11-04 |
20100281520 | ATTRIBUTE INFORMATION AUTHENTICATION APPARATUS, ATTRIBUTE INFORMATION AUTHENTICATION METHOD, AND STORAGE MEDIUM FOR STORING COMPUTER PROGRAM - A present server transmits to a second user terminal attribute information authentication request information for requesting authentication of attribute information registered by a first user when a predetermined request is received from a first user terminal. Also, the server registers authenticated information in association with the attribute information of the first user when the authentication information, which indicates that the attribute information registered by the first user has been authenticated, has been received. When a request is made to view the attribute information of the first user, the existence of the authenticated information is determined, and if the authenticated information is registered, attribute authentication display information is generated and transmitted so as to be visually and identifiably displayed on the user terminal to indicate that authenticated information exists. | 2010-11-04 |
20100281521 | AUTHENTICATION SYSTEM, AUTHENTICATION DEVICE AND RECORDING MEDIUM - An authentication system includes node devices, wherein a first node device transmits the authentication information thereof to a second node device, the second node device selects third node devices that are requested to verify the validity of the received authentication information, and transmits the authentication information to each of the selected third node devices, the third node device records verification information that is used to verify the validity of the authentication information of the first node device, verifies the validity of the authentication information on the basis of the authentication information and verification information, and transmits the result information to the second node device, and the second node device further derives weighted values indicating the reliability of the each verification of the third node devices and authenticates the first node device on the basis of the each result information and the each weighted value received from the third node devices. | 2010-11-04 |
20100281522 | ACCESS RIGHT MANAGING SYSTEM, ACCESS RIGHT MANAGING METHOD, AND ACCESS RIGHT MANAGING PROGRAM - An authentication device includes a user authentication certificate generation unit that issues to another device user authentication information on which information about a user is recorded; and a right transfer certificate/token generation unit that issues right transfer information and a token corresponding to the right transfer information to another device on the basis of information about a user to whom the right is transferred and a condition under which the right is transferred. A service proxy access device includes a token request unit that requests the issuing of the right transfer information and the token in order to access another device; and a user proxy access unit that accesses another service using the token. The service providing device includes a user authentication certificate request unit that acquires user authentication information from the authentication device using the token. | 2010-11-04 |
20100281523 | METHOD AND SYSTEM FOR NEGOTIATING NETWORK SERVICE - A method, system, terminal, and server for negotiating a network service are provided, which belong to the field of network access technology. The method includes: an AAA server for providing basic access (AAAn server) receives a network access identifier (NAI) from a terminal during an authentication process, where the NAI contains service identifier information of a service requested by the terminal. The AAAn server performs identity authentication on the terminal according to the NAI and information associated with the terminal stored in a database of the AAAn server. The AAAn server judges whether the terminal can obtain the requested service according to the service identifier information of the service requested by the terminal contained in the NAI after the terminal successfully passes the identity authentication. The system includes a terminal and an AAAn server. The technical solutions can simplify the negotiation process, and facilitate the network management and operation. | 2010-11-04 |
20100281524 | Authentication Method Without Credential Duplication for Users Belonging to Different Organizations - The present invention relates to a method for allowing a user to access the Internet. A user sends an Internet access request through a first Organization's gateway and supplies to the latter some credentials for his/her authentication with a second Organization. The credentials provided contain at least one piece of information about the second Organization. The first Organization contacts the second Organization for the purpose of authenticating the user and granting him/her access to the Internet. The second Organization then gives the user the authorization to access the Internet. According to the invention, upon the access request the gateway redirects the user to a web page of the second Organization, where the user supplies to the second Organization, through the web page, further authentication credentials required for his/her identification. | 2010-11-04 |
20100281525 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, TERMINAL AND MANAGEMENT DEVICE - A communication system includes a plurality of terminals and a management device that manages a plurality of networks. A first terminal, which is connected to a first network to which the management device is also connected, transmits a connection request for connecting to a second network to the management device. Upon receiving the connection request, the management device determines a predetermined topology from among a plurality of topologies that can be formed when the first terminal connects to the second network. The first terminal receives network configuration information indicating the predetermined topology from the management device. The first terminal transmits the network configuration information to a plurality of terminals participating in the second network. The second network is recreated accordingly. | 2010-11-04 |
20100281526 | Methods and Devices for Pattern-Based User Authentication - Methods, devices, and systems are presented that facilitate pattern-based user authentication. In a first embodiment, a user may request registration from an authentication server. The authentication server may provide at least one image to the user, wherein the image may comprise a matrix of cells. The user may choose a sequence of cells in the matrix as his or her secret, and may provide a userid and this secret to the authentication server. The authentication server may then validate and store the userid and/or secret. After this registration step, the user may request authentication from the authentication server. The authentication server may provide another image of a matrix of cells to the user. The user may then enter a sequence of symbols associated the sequence of cells that comprise his or her secret. The authentication server may compare the entered sequence of cells to the sequence of cells represented by the stored secret. If the two sequences match, then the user may be authenticated. | 2010-11-04 |
20100281527 | MONITORING NETWORK TRAFFIC BY USING A MONITOR DEVICE - A solution is provided for associating network traffic traversing on a networked environment according to a selected category item, such as a user name or other network entity identity-related information, by using a monitor device. The solution includes: obtaining user information from the directory service by obtaining at least one set of user object attributes from the directory service; identifying at least one authentication exchange packet from packets traversing on the networked environment; extracting a user ID and a network address from the authentication exchange packet; filtering or selecting packets traversing on the network environment that each have a network address equivalent to the extracted network address; and associating packets that were selected with user information having a name attribute equivalent to the extracted user ID. | 2010-11-04 |
20100281528 | METHODS AND SYSTEMS FOR GENERATING AND DELIVERING AN INTERACTIVE APPLICATION DELIVERY STORE - A system for updating and delivering an interactive application delivery store, where the system includes a client computer, a server and an application delivery store executing on the server, the client computer communicating with the server over a communicative connection. A user accesses the application delivery store using the client computer, and subscribes to an application not included in a user profile of the user using the application delivery store. In response to subscribing to the application, the application delivery store verifies user permissions of the user and determines whether the user is permitted to subscribe to the application. Upon determining the user can subscribe to the application, the application delivery store updates the user profile with the application and transmits a stub application to the client computer. The stub application represents the application subscribed to by the user in that the stub application includes a portion of the application. | 2010-11-04 |
20100281529 | SYSTEMS AND METHODS FOR PROVIDING CHANGE OF ADDRESS SERVICES OVER A NETWORK - This disclosure describes systems and methods for collecting and processing change of address data and providing change of address services to a customer using a computer network. The address data can include a physical address, an electronic address, or both. The systems and methods may also provide additional services to the customer to assist in changing addresses. | 2010-11-04 |
20100281530 | AUTHENTICATION ARRANGEMENT - A method, a proxy, a device, a system, and a computer program product for enabling authentication is provided. Authentication is enabled by receiving by a proxy a security token from an authentication provider, the security token including authentication information, receiving by the proxy an authentication request directed to the authentication provider or to the proxy, determining by the proxy whether the authentication information corresponds to the authentication request, and in case the authentication information corresponds to the authentication request, providing by the proxy the security token as a response to the authentication request. | 2010-11-04 |
20100281531 | MOBILE SERVER WITH MULTIPLE SERVICE CONNECTIONS - A method of communicating between a mobile communications device and a plurality of services that are used by the mobile communications device. The method includes establishing, through a firewall and a wireless network, a first communications session between the mobile communications device and a mobile server located in an enterprise network with which the mobile communications device is associated; and establishing, concurrent with the first communications session at least one further communications session between the mobile server and a service, the at least one further communications session being established by the mobile server as a session proxy for the mobile communications device. | 2010-11-04 |
20100281532 | FIREWALL INCLUDING LOCAL BUS - A gateway for screening packets transferred over a network. The gateway includes a plurality of network interfaces, a memory and a memory controller. Each network interface receives and forwards messages from a network through the gateway. The memory temporarily stores packets received from a network. The memory controller couples each of the network interfaces and is configured to coordinate the transfer of received packets to and from the memory using a memory bus. The gateway includes a firewall engine couples to the memory bus. The firewall engine is operable to retrieve packets from the memory and screen each packet prior to forwarding a given packet through the gateway and out an appropriate network interface. A local bus is coupled between the firewall engine and the memory providing a second path for retrieving packets from memory when the memory bus is busy. | 2010-11-04 |
20100281533 | METHOD AND APPARATUS FOR IMPLEMENTING A LAYER 3/LAYER 7 FIREWALL IN AN L2 DEVICE - Methods and apparatus for transferring packets in a packet switched communication system. A system is provided that includes an L | 2010-11-04 |
20100281534 | Network-Based Digital Media Server - A media server is hosted in a service provider's network so that media content can be stored from or rendered to a private network such as a Digital Living Network Alliance (DLNA) network. Media content may be stored directly by accessing the media server or by downloading the media content to the media server. The media server may support discovery of media content in a local DLNA network, media content fulfillment from a service provider network, and content delivery for a device on the DLNA network. The media server may further route regional traffic to the DLNA network from a media source such as a video on demand (VOD) server or an Internet media server. | 2010-11-04 |
20100281535 | Electronic message delivery with estimation approaches - Interfaces for message delivery approaches are disclosed. The interface may include pages for administering accounts for senders, pages for administering message processing systems, and pages for viewing information about senders or message processing systems. In another aspect, automatic alert mechanisms are disclosed. The alert mechanisms send a message to one or more users or machines that have been registered to receive alerts. Alerts may be triggered by any event related to a sender, a message, or a message processing system or may be triggered by any other condition or event. In another aspect, techniques for automatically disabling senders are disclosed. The automatic disabling of a sender may be triggered by any event related to a sender, a message, or a message processing system or may be triggered by any other condition or event. | 2010-11-04 |
20100281536 | PHISH PROBABILITY SCORING MODEL - In general, embodiments of the invention relate to systems, methods, and computer program products for determining the probability that a given website is conducting or is related to fraudulent activity, including phishing activity. More particularly, embodiments of the invention relate to automatically monitoring and scoring URLs for fraudulent activity by parsing keywords, combinations of keywords, and other relevant data from an input communication, such as an email, and analyzing the data obtained against a database containing a plurality of grading factors. | 2010-11-04 |
20100281537 | SECURE MULTI-PRINCIPAL WEB BROWSER - A web browser operating system using a browser kernel places principals having different origins in separate principal instances, where each separate principal instance executes in a separate protection domain. Principal origin may be determined using the combination of protocol, domain name, and port. The browser kernel mediates communications between principal instances, and between the principal instances and the operating system. Within each principal instance, a browser runtime executes as a restricted operating system process (ROSP), while any plugins are executed as a separate ROSP. Renderings from each browser runtime are combined by the browser kernel for presentation to a user. | 2010-11-04 |
20100281538 | Identification of Content by Metadata - Systems and methods for identifying content in electronic messages are provided. An electronic message may include certain content. The content is detected and analyzed to identify any metadata. The metadata may include a numerical signature characterizing the content. A thumbprint is generated based on the numerical signature. The thumbprint may then be compared to thumbprints of previously received messages. The comparison allows for classification of the electronic message as spam or not spam. | 2010-11-04 |
20100281539 | DETECTING MALICIOUS NETWORK SOFTWARE AGENTS - This disclosure describes techniques for determining whether a network session originates from an automated software agent. In one example, a network device, such as a router, includes a network interface to receive packets of a network session, a bot detection module to calculate a plurality of scores for network session data based on a plurality of metrics, wherein each of the metrics corresponds to a characteristic of a network session originated by an automated software agent, to produce an aggregate score from an aggregate of the plurality of scores, and to determine that the network session is originated by an automated software agent when the aggregate score exceeds a threshold, and an attack detection module to perform a programmed response when the network session is determined to be originated by an automated software agent. Each score represents a likelihood that the network session is originated by an automated software agent. | 2010-11-04 |
20100281540 | DETECTION OF CODE EXECUTION EXPLOITS - Various embodiments include a method of detecting shell code in an arbitrary file comprising determining where one or more candidate areas exist within an arbitrary file, searching at least one nearby area surrounding each of the one or more candidate areas within the arbitrary file for an instruction candidate, and calculating for any such instruction candidate a statistical probability based on a disassembly of instructions starting at a found offset for the instruction candidate that the disassembled instructions are shellcode. | 2010-11-04 |
20100281541 | Systems and Methods for Correlating and Distributing Intrusion Alert Information Among Collaborating Computer Systems - Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads. | 2010-11-04 |
20100281542 | Systems and Methods for Correlating and Distributing Intrusion Alert Information Among Collaborating Computer Systems - Systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads. | 2010-11-04 |
20100281543 | Systems and Methods for Sensitive Data Remediation - Systems and methods for sensitive data remediation include calculating a Probability of Loss of data on a given computer based on measures of control, integrity, and potential avenues of exploitation of the given computer, determining an Impact of Loss of the data on the given computer based on a type, volume, and nature of the data, and correlating the Probability of Loss with the Impact of Loss to generate a risk score for the given computer that can be compared to other computers in the network. The computers with higher risk scores can then be subjected to data remediation activity. | 2010-11-04 |
20100281544 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED RECORDING OF MEDIA CONTENT ON A MACINTOSH OPERATING SYSTEM - A method for preventing unauthorized recording of media content on a Macintosh operating system. The present method registers a compliance mechanism on a client system having the Macintosh operating system operating thereon. The compliance mechanism comprises a framework for validating the compliance mechanism on the client system, and a multimedia component opened by the framework. The present method uses the multimedia component for decrypting the media content on the client system. The present method also prevents decryption of the media content on the client system having the Macintosh operating system operating thereon if a portion of the compliance mechanism is invalidated. | 2010-11-04 |
20100281545 | Using Embedded Data with File Sharing - Peer-to-peer file sharing is increasing in popularity on the Internet, faster than any product known in history. Although file-sharing can enable massive piracy, it has many advantages for distribution of information including scalability. Alternatively, file-sharing can be sabotaged with falsified files and used to distribute viruses. To this end, a solution that maintains the scalability of file-sharing and promotes reliability is proposed. The solution involves embedding data within the file or content and using the data to identify the content, demonstrate its completeness and lack of viruses, and verify the file can be shared. The embedded data can be checked when the file is registered with the database for sharing, and before or while the file is being uploaded and/or downloaded. Ideally, the embedded data is added at the time of creation for the file. The embedded data may include a watermark and be linked to other copy management systems, such as those proposed in DVD and SDMI. Finally, the embedded data can be used to enable purchases of files that owners do not have rights to share. | 2010-11-04 |
20100281546 | DATA LOSS AND THEFT PROTECTION METHOD - Files stored on a non-removable storage device of a computer system are susceptible to being deleted and to theft. The present invention ensures that vital data files are not lost and that removable storage devices are not used to steal data. | 2010-11-04 |
20100281547 | Selecting animals for desired genotypic or potential phenotypic properties - Described are methods to select animals, such as mammals, particularly domestic animals, breeding animals or animals destined for slaughter, for having desired genotypic or potential phenotypic properties, in particular, related to muscle mass and/or fat deposition lean meat, lean back fat, sow prolificacy and/or sow longevity. Provided is a method for selecting an animal having desired genotypic or potential phenotypic properties comprising testing the animal, a parent of the animal or its progeny for the presence of a nucleic acid modification affecting the activity of an evolutionary conserved CpG island, located in intron 3 of an IGF2 gene and/or for the presence of a nucleic acid modification affecting binding of a nuclear factor to an IGF2 gene. | 2010-11-04 |