46th week of 2008 patent applcation highlights part 60 |
Patent application number | Title | Published |
20080282250 | COMPONENT INTEGRATOR - Techniques allow for communication with and management of multiple external components. A component manager communicates with one or more component adapters. Each component adapter communicates with an external component and is able to call the methods, functions, procedures, and other operations of the external component. The component manager associates these external operations with local operations, such that an application may use local operation names to invoke the external operations. Furthermore, the component manager has component definitions and operation definitions that describe the component adapters and operations, including input and output parameters and the like. The component manager is able to receive a group of data including a local operation and a list of input and output parameters and determine from the foregoing information which external operation to call and which component adapter has access to the external operation. | 2008-11-13 |
20080282251 | THREAD DE-EMPHASIS INSTRUCTION FOR MULTITHREADED PROCESSOR - A technique for scheduling execution of threads at a processor is disclosed. The technique includes executing a thread de-emphasis instruction of a thread that de-emphasizes the thread until the number of pending memory transactions, such as cache misses, associated with the thread are at or below a threshold. While the thread is de-emphasized, other threads at the processor that have a higher priority can be executed or assigned system resources. Accordingly, the likelihood of a stall in the processor is reduced. | 2008-11-13 |
20080282252 | HETEROGENEOUS RECONFIGURABLE AGENT COMPUTE ENGINE (HRACE) - A computing system ( | 2008-11-13 |
20080282253 | METHOD OF MANAGING RESOURCES WITHIN A SET OF PROCESSES - A workload management system where processes associated with a class have resource management strategies that are specific to that class is provided. The system includes more than one class, with at least one unique algorithm for executing a workload associated with each class. Each algorithm may comprise a strategy for executing a workload that is specific to that class and the algorithms of one class may be completely unrelated to the algorithms of another class. The workload management system allows workloads with different attributes to use system resources in ways that best benefit a workload, while maximizing usage of the system's resources and with minimized degradation to other workloads running concurrently. | 2008-11-13 |
20080282254 | Geographic Resiliency and Load Balancing for SIP Application Services - A mechanism for achieving resiliency and load balancing for SIP application services and, in particular, in geographic distributed sites. A method performs a distribution of SIP requests among SIP servers, where at least two sites with a load balancer in each site is configured. The method includes receiving a SIP request by a first load balancer in a first site; determining whether the SIP request should be redirected to a second site; and redirecting the SIP request to an address of a second load balancer in the second site. The invention also includes a SIP proxy including a receiving unit receiving SIP requests; a load balancing unit distributing SIP requests between SIP entities; and a health monitoring unit verifying availability of the SIP entities. The SIP proxy may further be configured with a proximity measuring unit determining a proximity to a SIP entity. | 2008-11-13 |
20080282255 | HIGHLY-AVAILABLE APPLICATION OPERATION METHOD AND SYSTEM, AND METHOD AND SYSTEM OF CHANGING APPLICATION VERSION ON LINE - By releasing a part of execution environment that contains a leaked resource, a failure is avoided while the remaining part of execution environment in a memory and the like prevents performance degradation that results from a cold cache. This invention provides a highly available application operation method for replacing a first application (App | 2008-11-13 |
20080282256 | APPARATUS FOR INTER PARTITION COMMUNICATION WITHIN A LOGICAL PARTITIONED DATA PROCESSING SYSTEM - A method and structure for inter partition communication within a logical partitioned data processing system are provided. Each partition is configured for an inter partition communication area (IPCA) allocated from partition's own system memory. Each partition's IPCA combined together forms a non-contiguous block of memory which is treated as a virtual shared resource (VSR). Access to VSR is controlled by hypervisor to maintain data security and coherency of the non-shared resources of a partition. Messages are written to and read from VSR under a specific partition's IPCA for inter partition communication. No physical shared or non-shared resources are involved during inter partition communication, hence no extra overhead on those resources, thus achieving optimized performance during inter partition communication. | 2008-11-13 |
20080282257 | Transient Fault Detection by Integrating an SRMT Code and a Non SRMT Code in a Single Application - Disclosed is a method for running a first code generated by a Software-based Redundant Multi-Threading (SRMT) compiler along with a second code generated by a normal compiler at runtime, the first code including a first function and a second function, the second code including a third function. The method comprises running the first function in a leading thread and a tailing thread ( | 2008-11-13 |
20080282258 | SHARING THE COMMON SESSION BETWEEN TWO APPLICATIONS ON THE SAME SERVER - A method of automatically sharing session data between two or more applications executing on a common server. Each application has a respective session. A copy of all session data of a first application's session is stored in a servlet context resident on the server. The stored session data is copied to a second application's session. Thereafter, the stored session data is deleted. | 2008-11-13 |
20080282259 | DECLARATIVE CONCURRENCY AND COORDINATION SCHEME FOR SOFTWARE SERVICES - A method and system are provided for declaring concurrency of the execution of one or more processes. The processes may include messages and/or methods associated with services. Messages may post to a queue in a concurrency control. Instructions are executed responsive to the posting of the messages. Any number of instructions may be executed concurrently with an underlying state. The underlying state may further be declared by an attribute. The attribute may include a service handler and may further indicate a type of concurrency control, for example, concurrent, exclusive or teardown. | 2008-11-13 |
20080282260 | DYNAMIC DISPATCH FOR CLASSES AND INTERFACES - Dynamic dispatch for classes and interfaces is encapsulated in a class-less scripting language. A plurality of mechanisms are employed to facilitate dynamic polymorphism. One or more target language constructs such as dictionary objects, prototype objects and/or derived types are utilized to capture class and interface method implementations. These constructs are subsequently referenced at runtime to invoke appropriate code. | 2008-11-13 |
20080282261 | APPLICATION MODULE FOR MANAGING INTERACTIONS OF DISTRIBUTED MODALITY COMPONENTS - A method for managing application modalities using dialogue states can include the step of asserting a set of activation conditions associated with a dialogue state of an application. Each of the activation conditions can be linked to at least one programmatic action, wherein different programmatic actions can be executed by different modality components. The application conditions can be monitored. An application event can be detected resulting in an associated application condition being run. At least one programmatic action linked to the application condition can be responsively initiated. | 2008-11-13 |
20080282262 | AUTOMATIC AND CONFIGURABLE LOADING OF LOOSELY COUPLED SERVICE ORIENTED SOFTWARE COMPONENTS - An apparatus and method provide for providing services using an attribute. In one example, the attribute may hide complexity of an underlying infrastructure and may call methods in the infrastructure to locate partner services. Any number of partner services may include a policy in which a pre-existing instance of a partner service may be used to perform desired services. Alternatively, an instance of a service may be created. In another example, a manifest in a partner list entry may be used for identifying a set of services at a node. | 2008-11-13 |
20080282263 | Virtual Event Interface to Support Platform-Wide Performance Optimization - A performance analyzer analyzes occurrences of virtual events generated by platform components. A user may define and select the virtual events to be analyzed. The performance analyzer comprises a virtual event provider manager and a plurality of virtual event provider drivers, Each of the virtual event provider drivers is associated with one of the platform components to provide a definition for the virtual events supported by the associated platform component. During a registration process, the virtual event provider manager queries the virtual event provider drivers about the supported virtual events, and provides, the results to the interrupt vector table. Thus, when a selected virtual event occurs, the processor execution may be interrupted and the interrupted instruction may be stored for analysis. | 2008-11-13 |
20080282264 | SECURE AND SCALABLE SOLID STATE DISK SYSTEM - A solid state disk system is disclosed. The system comprises a user token and at least one level secure virtual storage controller, coupled to the host system. The system includes a plurality of virtual storage devices coupled to at least one secure virtual storage controller. A system and method in accordance with the present invention could be utilized in flash based storage, disk storage systems, portable storage devices, corporate storage systems, PCs, servers, wireless storage, and multimedia storage systems. | 2008-11-13 |
20080282265 | Method and system for non-intrusive monitoring of library components - Embodiments of the present invention provide a method for monitoring components in a library by tracking the movement of library components. By tracking the movement of library components, the degradation of library components can be monitored and the reliability of library components determined, allowing unreliable components to be bypassed or replaced, enhancing the reliability of the library and preventing data loss. | 2008-11-13 |
20080282266 | METHOD AND ARRANGEMENT FOR RE-LOADING A CLASS - The method is for deploying an input class in a computer readable memory. A state class is created that has at least one field and at least one proxy method and a behavior class version that includes at least one method on the basis of the input class. At least one method call of the state class is redirected to the behavior class version. Also, an arrangement and a computer-software are disclosed. | 2008-11-13 |
20080282267 | Dynamic Application Instance Placement in Data Center Environments - Techniques are disclosed for determining placements of application instances on computing resources in a computing system such that the application instances can be executed thereon. By way of example, a method for determining an application instance placement in a set of machines under one or more resource constraints includes the following steps. An estimate is computed of a value of the first metric that can be achieved by a current application instance placement and a current application load distribution. A new application instance placement and a new application load distribution are determined, wherein the new application instance placement and the new load distribution optimize the first metric. | 2008-11-13 |
20080282268 | APPLICATION MODULE AND REMOTE MANAGEMENT SERVER WITH PARAMETER DESCRIPTION MODEL - An application module ( | 2008-11-13 |
20080282269 | Disk device - A slider is mounted on a chassis forming a frame so as to be movable in a first direction, and is configured to start a movement in conjunction with an operation in which an optical pickup is switched from an operation mode into a non-operation mode and returns to an initial position. A disk tray is mounted on the chassis so as to be movable in a second direction perpendicular to the first direction, is configured to move in conjunction with the movement of the slider, and is provided with a first groove extending in the first direction. A protrusion is provided in the slider and is engaged with the first groove when the disk tray moves, thereby preventing the disk tray from moving in the second direction. A second groove is provided in the disk tray, communicates with the first groove, and introduces the protrusion into the first groove when the disk tray is moved. A first drive mechanism is configured to move the disk tray and includes a first pinion provided in the chassis and a first rack provided in the disk tray. The second groove is provided with an opening by cutting a portion of a groove wall of the guide groove. | 2008-11-13 |
20080282270 | Disc drive adapted to be downsized - When an optical sensor | 2008-11-13 |
20080282271 | Recording Medium Drive Device - A recording medium drive device includes a tray to mount a cartridge | 2008-11-13 |
20080282272 | Disk chucking apparatus and disk drive having the same - A disk chucking apparatus and a disk drive having the same are disclosed. The disk chucking apparatus may include: a chuck base having a plurality of holding portions, a plurality of chuck pins which are inserted in the holding portions such that the chuck pins protrude out from the chuck base, and a plurality of elastic members which elastically support the chuck pins, where each of the elastic members elastically supports a pair of adjacent chuck pins concurrently. When this disk chucking apparatus is utilized, the center of the disk and the center of the chuck base can be aligned with greater ease, since forces can be transferred uniformly to the center of disk. | 2008-11-13 |
20080282273 | INFORMATION STORAGE DISK HANDLING APPARATUS - An information storage disk handling apparatus includes a first disk device, a second disk device and a turn-over device. The first disk device has a first tray, and the second disk device has a second tray. The first disk device is mounted over the second disk device. Each of the trays has an ejected position. The turn-over device is mounted between the ejected positions of the trays of the first disk device and the second disk device to turn over an optical disk removed from the first tray at its ejected position and received by the second tray at its ejected position after the optical disk is turned. | 2008-11-13 |
20080282274 | Disk Selecting Device And Disk Device - To provide a disk selecting device and disk device which require only a small space and can prevent an erroneous selection of disks. | 2008-11-13 |
20080282275 | ENTRY/EXIT PORT METHOD AND APPARATUS FOR CARTRIDGE LIBRARY - A cartridge library ( | 2008-11-13 |
20080282276 | DISK APPARATUS AND DISK DRIVE UNIT - A disk apparatus includes: an apparatus body including a disk drive portion for housing a disk medium having an information recording surface and for recording and/or reproducing information; and a lid body including a display for displaying information, and closed and opened with respect to the apparatus body in such a way that the display is postured face down and up. The apparatus body further includes: a drive-portion cover which is movable in a bottom direction of the apparatus body and inserts and ejects the disk medium into and from the disk drive portion; and a lock hook and a cover hook locking the disk medium housed in the apparatus body. A locking state of the lock hook and the cover hook is kept when the lid body is in the open state with respect to the apparatus body. | 2008-11-13 |
20080282277 | Information Processing Device - The present invention relates to an apparatus capable of optically recording information onto an information medium ( | 2008-11-13 |
20080282278 | TRANSPORT METHOD AND APPARATUS FOR CARTRIDGE LIBRARY - A cartridge transport robot transports a cartridge of information storage media between differing locations in a cartridge library. The cartridge robot comprises a robot carriage; a robot tray; and a carriage motive system. The robot tray comprises a guide configured to facilitate linear motion of the robot carriage, the robot carriage being situated on a first side of the robot tray. The robot carriage comprises cartridge engagement elements configured to selectively engage and release the cartridge. The carriage motive system is configured to provide linear motion to the robot carriage along the robot tray from a carriage retracted position to a carriage extracted position and thereby linearly displace the cartridge engaged by the cartridge engagement elements. | 2008-11-13 |
20080282279 | DISC CARTRIDGE - A disc cartridge is provided. The disc cartridge in which is housed an optical disc includes a main cartridge body unit, rotatably housing an optical disc, and having an aperture for a head part for exposing a part of the optical disc to outside across the inner and outer rims of the optical disc, and a shutter unit mounted for movement to this main cartridge body unit for opening/closing the aperture for the head part. A recess into which is introduced a portion of a head part of the recording and/or reproducing apparatus is formed in continuation to the aperture for the head part in a surface of the main cartridge body unit on which slides a shutter unit in an area opposite to the area of movement of the shutter unit with the aperture for the head part in-between. | 2008-11-13 |
20080282280 | Disc Device - A disc device includes: a casing including: a casing body that has a housing section of a disc | 2008-11-13 |
20080282281 | CARTRIDGE ENGAGEMENT APPARATUS AND METHOD FOR CARTRIDGE LIBRARY - A cartridge library ( | 2008-11-13 |
20080282282 | Method of fabricating cartridge for miniature optical data storage disc - A cartridge for an optical data storage disc includes a monolithic shell and a sheet metal cover plate. The shell includes lateral walls and a floor that together define a cavity that holds an optical data storage disc. The cover plate is attached to the shell, with the cover plate abutting the top surfaces of the lateral walls of the shell. The optical disc is housed in the disc cavity, with the data side of the disc facing the cover plate. A sheet metal shutter is wrapped around an edge of the cartridge and is slideable between an open position, wherein a portion of the optical disc is exposed through a shutter window in the cover plate and a closed position wherein the shutter overlies the shutter window. The cartridge is very strong and is easy to fabricate. The use of sheet metal next to the data side of the optical disc allows the data on the disc to be read or recorded with a very short wavelength laser. | 2008-11-13 |
20080282283 | Method And System For Processing Commerce Transactions In An Interactive Environment - A method and system for processing commerce transactions between a consumer and a business in an interactive environment is disclosed. According to one embodiment, a computer-implemented method, comprises generating a request package from commands received at a set top box. The request package is received over a cable network. The request package includes a product identifier. Product information is retrieved from a product database using the product identifier. Vendor information is retrieved using the product identifier; and a vendor fulfillment package is sent to a deployment server. | 2008-11-13 |
20080282284 | Method and Apparatus For Utilizing a Broadcast Flag - There are provided apparatus and methods for controlling distribution of data from a first device to a second device. One such apparatus includes a broadcast flag detector and a data manipulation device ( | 2008-11-13 |
20080282285 | INTERACTIVE MEDIA SYSTEM AND METHOD FOR PRESENTING PAUSE-TIME CONTENT - Interactive media systems and methods are provided for substituting pause-time content in place of media that has been paused. The user may pause media such as real-time media, video-on-demand media, near video-on-demand, or recorded media. If the user pauses real-time media or near video-on-demand media, the interactive media application may store the media. The interactive media application may also provide the user with the ability to rewind, resume play of, and fast-forward the media. The pause-time content may be audio or video media and may be an advertisement, trivia, program summaries or any other suitable pause-time content. The interactive media application may provide customized pause-time content specific to the user or specific to the media paused by using media data associated with the media. The interactive media application may also prevent the user from accessing features (e.g., fast-forward) of the system. | 2008-11-13 |
20080282286 | Method and Apparatus for Conducting Real Time Dialogues With Mass Viewer Audiences During Live Programs - Disclosed is a system for conducting real time dialogues with an audience comprising a plurality of remote viewers of a broadcast program, said system comprising: (a) a Real Time Dialog Machine having input ports for enabling substantially simultaneous data input from each of a plurality of viewers in data communicating therewith over at least one data network; (b) a Dialogue Management Console coupled to the Real Time Dialog Machine via a data link, said Dialog Management Console for allowing management of said dialogues by program production personnel; (c) a database of interactive sessions accessible by the dialogue management console and in data communication with the Real Time Dialog Machine via a participation processor for processing aggregated data from the Real Time Dialog Machine, and (d) displaying means for adding derived data and/or visual cues to program for transmission to displays viewable by the viewers. | 2008-11-13 |
20080282287 | METHOD FOR PROCESSING A SPORTS VIDEO AND APPARATUS THEREOF - The present invention discloses a method of processing a sports video. The method includes the steps of: analyzing the sports video to detect at least one semantic event and each of the at least one semantic event associated with a segment length; and generating a summarized video according to the detected at least one semantic event. | 2008-11-13 |
20080282288 | REMOTE CONTROL UNIT AND REMOTELY OPERATING METHOD - Provided is a remote control unit for remotely controlling an external device. The remote control unit includes a key input part having a plurality of keys, a wireless communication module, a memory device, a display part, and a controller. The wireless communication module transmits/receives data to/from the external device. The memory device stores key codes controlling operations of the external device, and electronic program guide information transmitted from the external device. The display part displays the electronic program guide information. The controller allows the electronic program guide information stored in the memory device to be output through the display part when a predetermined key of the key input part is input, and allows program information selected by manipulation of the key input part to be transmitted to the external device through the wireless communication module. | 2008-11-13 |
20080282289 | Interactive Television User Interface - An interactive television user interface ( | 2008-11-13 |
20080282290 | Interactive Viewer for Advertisements - A system, method, and computer-readable media are presented for displaying an interactive viewer associated with an advertisement within a user interface. In one aspect, the system includes an advertisement manager for providing advertisements in response to request from clients. The system further includes a rendering component for determining if an advertisement has an associated interactive viewer, determining features associated with the advertisement, and displaying the interactive viewer including the determined features. Additionally, the system includes an event tracking module for monitoring a user's interaction with the interactive viewer, and reporting feedback regarding the interaction to the advertisement manager. | 2008-11-13 |
20080282291 | TV content search system and method with multi-field search and display - A search based TV interface system and method is disclosed. Search results are dynamically displayed based on search parameters and/or time. A dynamically adjusted grid may be provided which collapses to a list if a minimum grid size is not met. Search results may also be dynamically displayed organized by category. | 2008-11-13 |
20080282292 | RECEIVING APPARATUS AND METHOD - Partial data related to information data is received, image data corresponding to the received partial data is generated by sequentially processing the received partial data, and the generated image data is output to a display unit. Before output of the image data corresponding to the partial data to the display unit is completed, reception of the information data is started. Then, image data corresponding to the information data is generated by processing the received information data, and image data to be displayed on said display unit is switched to the image data corresponding to the information data from the image data corresponding to the partial data after the reception of the information data is started. | 2008-11-13 |
20080282293 | System and method for an event scheduler - A system and a method for event searching and scheduling for network events of various event types, including offline and online events. | 2008-11-13 |
20080282294 | FEATURES FOR USE WITH ADVANCED SET-TOP APPLICATIONS ON INTERACTIVE TELEVISION SYSTEMS - Advanced features for interactive television applications are described, including a back feature, a forward feature, a history feature, a go to feature, an extras feature, a reminder feature, a favorites feature, a parental control feature, and a search feature. Features may be inter-resource. Support for multiple data paths, Internet access, interactive services, and user profiles are also described. | 2008-11-13 |
20080282295 | Pausing and Resuming Content Streaming On Wireless Devices - In one embodiment, a communication system transmits video content in a looped manner using wireless communications to a cell phone capable of playing the content in a streaming manner. The cell phone is capable, after the playing of the received video content has been interrupted during a current transmission of the content, of resuming play of the content during a subsequent transmission of the looped content, based on the timing of the interruption. The timing of the interruption is compared to a schedule of content transmissions to determine when to resume the playing of the content, e.g., to enable the playing to resume from the location of the interruption. | 2008-11-13 |
20080282296 | IMAGE DATA DELIVERY - A conversion apparatus is connected to a camera server delivering image information obtained by image sensing to a display operation terminal. When image information is received from the camera server, the conversion apparatus converts the received image information to a format for a portable display terminal, and delivers it to the portable display terminal. | 2008-11-13 |
20080282297 | SYSTEM AND METHOD FOR PROVIDING ADDITIONAL INFORMATION USING BI-DIRECTIONAL BROADCASTING SERVICE - Disclosed is a system for providing additional information using a bi-directional broadcasting service and a method for the same. The system provides additional information using a bi-directional broadcasting service, after the additional information provided through the bi-directional broadcasting service is book-marked, and is capable of providing the book-marked additional information through wired/wireless communications when a user wants. | 2008-11-13 |
20080282298 | Method and apparatus for supporting file sharing in a distributed network - To facilitate instant playback of an ordered title (e.g., a movie), a file pertaining to the title is fragmented into a header and segments. The header is seeded in all boxes in service and none, one or more segments are distributed to the network of boxes. When the title is ordered, the header is instantly played back while the segments, if not locally available, are streamed in respectively from the boxes having the segments to enable continuous playback of the ordered title. Should one of the boxes fails to deliver the segment according to a certain requirement (e.g., a lower transmission rate), the box gets immediately replaced by a substitute machine that continues to supply the segment from where it was stopped. | 2008-11-13 |
20080282299 | Method and Apparatus for Delivering Consumer Entertainment Services Accessed Over an Ip Network - The present invention provides IP-centric, multi-channel, time-shifted and real-time telecommunications services to a plurality of system users. The system can capture both digital and analog multi-channel feeds and, through a cross-connect layer, can convert the signals to a digital format and subsequently send them to an encoder to be compressed. The encoding process can use a firmware upgradeable software developed to decrease data bitrates while retaining quality of the information at a desired level. The encoded, compressed signals may either be stored on a data-on-demand server for later viewing services, such as television/video-on-demand or audio-on-demand, or may be streamed directly to system users using a Media Streaming Subsystem (MSS). The MSS can be responsive to a system user request and operative to forward a selected stream of compressed digital data to the system user via a gateway means. The system can include a System Controller that can provide management and control of the system components and services provided by the system. The gateway means is able to receive compressed digital data from the Media Streaming Subsystem and transmit that data to a system user sending a request over a communication network. A cable modem, DSL modem or other appropriate interface can be located at each system user's location, thereby providing a means for sending multiple signal sources to a system user's Local Area Network (LAN) to which the User Computing Device(s) (UCD) of a system user are connected. The UCD receives the compressed data from the gateway means, subsequently decodes this compressed data and presents this decompressed information to the system user via a presentation system which may or may not be integrated into the UCD, thereby providing the requested entertainment services to the system user. | 2008-11-13 |
20080282300 | DIGITAL TELEVISION RECEIVER - A digital television receiver for use in a digital television broadcast system in which a plurality of digital television data streams can be provided in respective streams of television broadcast packets forming the lowest layer of a layered digital television structure and also in respective streams of Internet protocol packets forming the lowest layer of a layered Internet protocol structure, at least the streams of television broadcast packets being broadcast with a plurality of tables indicating where data of one layer of one structure can be found in another layer of one or other of the two structures, the received plurality of tables being used to determine where data contained in one layer can be found in an adjacent layer so as to construct tree structures or a new table allowing determination of in which stream of television broadcast packets the television data of a selected stream of Internet protocol packets is found. A two-stage process for identifying an alternative stream with television broadcast packets containing the same television programme is also proposed in which, first, identical transport streams are looked for and, second, the stream of Internet protocol packets containing the television programme are used to identify alternative streams of television broadcast packets containing the same television programme. | 2008-11-13 |
20080282301 | System and method of providing video content - A method of providing video content includes receiving a channel change data packet from a set-top box device at a subscriber premise via a packet-based video distribution network. The channel change data packet includes data indicating a requested channel and a channel change index value. The method also includes reading the channel change data packet to identify the channel change index value. The channel change index value indicates an available bandwidth at the subscriber premise to receive video content of the requested channel via the packet-based video distribution network. The method also includes allocating an overhead bandwidth to the set-top box device based on the channel change index value. | 2008-11-13 |
20080282302 | Open API video system and method of making and using same - A video player unit, system and method, and a video hierarchy. Included are at least one memory device, a plurality of communication access points for receiving at least one program play, an open application programming interface associated with the at least one memory device, wherein a plurality of applications correspondent to the open application programming interface allow a user to manipulate metadata associated with ones of the programs plays, wherein the metadata relates to interframe interactivity with detailed aspects of the ones of the program plays, and at least one correlation engine in communication with the open application programming interface, wherein the at least one correlation engine provides for correlation among at least for the interframes of the program play to ones of the interframes of other ones of the program plays. | 2008-11-13 |
20080282303 | DETECTION OF MEDIA LINKS IN BROADCAST SIGNALS - A detection apparatus includes a tuner tuned to the program and a meter coupled to the tuner and arranged to detect content ancillary information from the program tuned by the tuner. The content ancillary information may be a media link, closed captioning information, or the like. The meter may also be arranged to extract a broadcast signature from the program. A comparator compares the broadcast signature to a reference signature selected from a library of reference signatures based upon the content ancillary information. Broadcast signatures from unknown programs may be clustered at least partially on the basis of the content ancillary information. | 2008-11-13 |
20080282304 | Module and architecture for generating real-time, multiple-resolution video streams and the architecture thereof - A module for generating real-time, multiple-resolution video streams and the architecture thereof are disclosed. A module for generating multiple-resolution video streams as well as the architecture thereof for use with a video encoder includes a system bus, an external memory and a main processor. The main processor and the external memory are coupled to the system bus. The main processor includes a microprocessor, a main arithmetic unit and a secondary arithmetic unit. By applying the present invention, a less time-consuming arithmetic module can synchronously perform together with a more time-consuming arithmetic module, thereby reducing idle time and increasing hardware efficiency and parallelism. | 2008-11-13 |
20080282305 | Media Distribution System, Apparatus, Method and Software - Exemplary embodiments of the invention provide for media delivery and reporting. Modules are defined using a an extendable mark up language for first media, second media, and system users. A first module includes characteristics and requirements for first media and second media locations within the first media. A second module includes a second media description and requirements. A third module for each user includes second media preferences and strategies. Corresponding second media is determined for a selected user by searching and matching the second media preferences and strategies with the characteristics and requirements of the first and second modules. Selected first media and the corresponding second media are transmitted in the form of either at least two separate media packet streams, or as a combined first and second media packet stream with the corresponding second media embedded in the first media at least some of the determined second media locations. | 2008-11-13 |
20080282306 | Mapping Transport Streams - In a digital network that includes a plurality of devices, which include multiple devices that transmit transport streams, a system and method are provided for discovering and mapping the transport streams and the plurality of devices included in the digital network. One such method sends a transport stream map request to a plurality of network devices. The network devices include a plurality of network transport stream sources and a plurality of network transport stream handlers. The method receives a plurality of replies to the transport stream map request. Each reply includes information associated with the respective network device. The method generates a transport stream map based on the received replies. The transport stream map represents a flow of transport streams among the plurality of network devices. | 2008-11-13 |
20080282307 | Providing Video Content to a Subscriber While Minimizing Transmission Channel Capacity - A method for providing video content to a subscriber while minimizing transmission channel capacity that includes acquiring information corresponding to factors contributing to a perceived picture quality at a display device in communication with a set-top box, compressing video content based on the acquired information, and transmitting over a local loop the compressed video content at a bit rate based on the acquired information, the bit rate corresponding to the perceived picture quality of the video content capable of being provided by an ensemble comprised of the display device, the set-top box, and the local loop. | 2008-11-13 |
20080282308 | Optimizing Data Rates For Video Services to a Subscriber - A method for optimizing data rates for video services to a subscriber that includes receiving an indication of whether incoming video signals to a set-top box corresponding to the subscriber are being recorded, receiving an indication of whether video content corresponding to the video signals being recorded is being simultaneously viewed by the subscriber, and reducing a data rate for storing the video content that is not simultaneously being viewed by the subscriber. | 2008-11-13 |
20080282309 | METHOD AND APPARATUS FOR PROVIDING CONTENT THROUGH BIDIRECTIONAL COMMUNICATION NETWORK - Provided are a method and apparatus for providing content. The apparatus includes a content acquisition information storage unit to store content acquisition information that is identified by a content identifier for content acquired through a bidirectional communication network and necessary to acquire the content by communication with a server that provides the content, a controller to allocate reduction information to the content acquisition information, and to search for the content acquisition information corresponding to the inputted reduction information when reduction information of the content is input, and a communicator to acquire the content from the server using the content acquisition information. Accordingly, a user can acquire Internet content through a communication network by selecting reduction information allocated to the Internet content. | 2008-11-13 |
20080282310 | Ip Datagram De-Encapsulation - An apparatus ( | 2008-11-13 |
20080282311 | Subscribing to Programming Packages - Methods and systems for enabling users visiting a friend or family member to subscribe to a TV programming package that the friend or family member currently subscribes to. In one embodiment, the method includes generating a user-interface (UI) via the friend's set-top box to enable entry of visitor user identification information. This information, along with programming identification information is then sent to the service provider for the programming package. The service provider retrieves or generates information by which a UI may be generated to easily enable the visitor to setup and activate the programming package and sends it to the visitor's home set-top box. In another embodiment, programming package identification information is stored on a portable storage medium and carried to the visitor's home set-top box, where it is read to retrieve the identification information. The information is then sent to the service provider, which sends back appropriate data to generate the UI. | 2008-11-13 |
20080282312 | SYSTEM AND METHOD FOR ALLOCATING TUNER AND/OR RECORDING RESOURCES - A system and method of implementing a distributed recording capability may be employed to allocate tuner resources among connected recorder devices, including digital video recorder (DVR) devices. In accordance with one aspect, a server may receive a request to record a multimedia broadcast from a user. The server may search a network for a recorder device having an available tuner from among a plurality of recorder devices connected to the network using predetermined search criteria. The server may transmit a command over the network to the identified recorder device to record the requested multimedia broadcast. The identified recorder device may automatically transfer the recorded multimedia broadcast over the network to a user-associated recorder device. | 2008-11-13 |
20080282313 | MULTI-PROFILE INTERFACE SPECIFIC NETWORK SECURITY POLICIES - Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device. | 2008-11-13 |
20080282314 | Firewall with policy hints - A firewall helps a user make a decision regarding network access for an application executing on a computing device by providing “hints” to the user about an appropriate network access policy. If at least one previously set firewall policy for the application exists in a context different from a current context, the user may be presented with information based on a previously set firewall policy. The information may be prioritized based on a source of the previously set firewall policy and other factors, to provide the user with a hint that facilitates making the decision appropriate in the current context. A programming interface to the firewall allows third party applications to specify a format in which hints are provided to the user. | 2008-11-13 |
20080282315 | Host control of partial trust accessibility - Various technologies and techniques are disclosed for providing host control of partial trust accessibility. A framework allows libraries to be identified as partial trust callers allowed to indicate that the libraries are allowed to be called from partially trusted code by default. The framework allows libraries to be identified as partial trust callers enabled to indicate the libraries could be called from partially trusted code, but not by default. A hosting application is notified that a particular library has been loaded. If the particular library has been identified as partial trust callers allowed, then a determination is received from the hosting application on whether to remove or keep partial trust accessibility for the particular library. If the particular library has been identified as partial trust callers enabled, then a determination is received from the hosting application on whether or not to enable partial trust accessibility for the particular library. | 2008-11-13 |
20080282316 | Information processing apparatus, program and method for transmitting content in security scheme according to license policy - An information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the item of content can be received by the user device in the security scheme, the processor transmits the item of content in the security scheme. | 2008-11-13 |
20080282317 | METHOD AND APPARATUS FOR CONVERTING A LICENSE - A method of converting a license is provided. The method includes obtaining a domain policy from a domain to which content is to be transmitted, determining whether license information that is information for a content usage limitation and the domain policy coincide, and then based on the determination result, selectively converting a license. | 2008-11-13 |
20080282318 | WORKFLOW AUTHORIZATIONS EVALUATION IN MULTI-LAYERED APPLICATIONS - There is provided a computer-implemented method, computer-program product, system and security index structure for a security enforcement strategy for a composite application. The method comprises providing a workflow for the composite application, wherein the composite application is constructed from a set of sub-applications and wherein at least a plurality of the sub-applications has a policy. A consolidated workflow policy is generated for the workflow by combining the policies of the sub-applications and by taking into account a control flow of the workflow, wherein the control flow provides an order in which the set of sub-applications are performed. The consolidated workflow policy is enforced by providing a security index structure for the consolidated workflow policy adapted for checking authorization in the workflow. | 2008-11-13 |
20080282319 | System for Managing Access Control - A content distribution system ( | 2008-11-13 |
20080282320 | Security Compliance Methodology and Tool - An apparatus is provided for evaluating risk to an organization. The apparatus includes a plurality of governmental rules directed to protecting shareholders, a plurality of security domains of the organization wherein each security domain is associated with a different asset of the organization and a request for an information risk assessment within at least one of the plurality of security domains of the organization formed under the plurality of governmental rules from a set of initializing inputs. The apparatus further includes a information risk assessment plan formed from the request for the information risk assessment, a set of information assessment templates and test cases formed from the information risk assessment plan, a set of information risk assessment tests conducted on the IT system using the assessment templates and test cases, a set of test results generated by the risk assessment tests, one or more security control gaps identified by the assessment responses and one or more gap remediation plans formed from the identified security gaps. | 2008-11-13 |
20080282321 | SYSTEM AND METHOD OF MANAGING DATA PROTECTION RESOURCES - Herewith disclosed a method and system for computerized managing a plurality of data protection (DP) resources. The computerized management comprises obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting; accommodating the obtained data in a data repository thus giving rise to accommodated data; processing the accommodated data, said processing resulting in at least one of the following: a) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) identifying one or more data protection (DP) gaps. | 2008-11-13 |
20080282322 | Authentication Medium, Authenticable Substate, Authentication Medium Label, Authentication Medium Transfer Sheet, Authenticable Sheet, and Authenticable Information Recording Medium - The invention relates to an authentication medium capable of eliminating problems with the formation of an authentication portion with and embossed hologram, for instance, difficulty with which fabrication time is cut down, and difficulty with which an authentication pattern is changed due to an increased step counts at the time of embossing mold fabrication. A thin-film layer( | 2008-11-13 |
20080282323 | ACCESS CONTROL APPARATUS, ACCESS CONTROL METHOD, AND ACCESS CONTROL PROGRAM - Additional information indicating photographic conditions for a received image signal is compared with additional information indicating photographic conditions for an access target image signal. If the both conditions satisfy a predetermined relationship, an access to the access target image signal is permitted. | 2008-11-13 |
20080282324 | Secure Social Networking System with Anti-Predator Monitoring - The invention provides a method for managing an online social network, the method including the steps of: a) identifying patterns associated with inappropriate user activity; a) monitoring the online actions of at least one user of the social network; b) evaluating online actions taken by the at least one user; and c) comparing the online actions to the identified patterns associated with inappropriate activity. | 2008-11-13 |
20080282325 | Aaa Support for Dhcp - A basic idea is to use the AAA infrastructure to assign (S | 2008-11-13 |
20080282326 | CONTROL PRODUCTION SUPPORT ACCESS - A device creates a group for accessing a front door program that enables access to a secure resource, assigns, to the group, one or more permissions to perform one or more tasks associated with the secure resource, and adds a user to the group using identification information associated with the user, wherein the user is permitted to perform the one or more tasks based on the addition of the user to the group. | 2008-11-13 |
20080282327 | NETWORK AUTHORIZATION STATUS NOTIFICATION - A system that enables network authorization status to be conveyed to the device requesting network services within or outside the scope of an authentication exchange is provided. The authorization status notification or information can be automatically generated or otherwise triggered by a request from the user or device. For instance, a query can be employed to solicit device authorization status related to a particular service or group of services. Additionally, authorization status notification can be automatically triggered based upon a change in the device authorization state. | 2008-11-13 |
20080282328 | METHOD AND SYSTEM FOR MODELING OPTIONS FOR OPAQUE MANAGEMENT DATA FOR A USER AND/OR AN OWNER - Distributed Management Task Force (DMTF) management profiles, based on the Common Information Model (CIM) protocol, may be utilized to perform access authentication during opaque management data profile operations based on DMTF/CIM Role Based Authorization (RBA) profile and/or Simple Identity Management (SIM) profiles. Instances of CIM_Identity class may be utilized to enable validation of ownership and/or access rights, via instances of CIM_Role class and/or instances of CIM_Privilege class for a plurality of common users and/or applications. Quota related operations may be performed via “QuotaAffectsElement” associations between instances of CIM_Identity class and instances of the CIM_OpaqueManagementDataService class. The “QuotaAffectsElement” association may comprise “AllocationQuota” and/or “AllocatedBytes” properties to enable tracking and/or validating of quota related information within the opaque management data profile. | 2008-11-13 |
20080282329 | CONTROLLING ACCESS TO NAME SERVICE FOR A DOMAIN NAME SYSTEM - A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet. | 2008-11-13 |
20080282330 | BLUETOOTH DEVICE CONNECTION METHOD AND RELATED BLUETOOTH DEVICE - The present invention provides a bluetooth device connection method. The bluetooth device connection method includes: acquiring a device list, the device list at least records a bluetooth device; assigning a bluetooth device belonging to a target class in the device list as a target device; determining whether the target device authorizes a match password; and utilizing the match password to build a connection with the target device if the target device authorizes the match password. | 2008-11-13 |
20080282331 | User Provisioning With Multi-Factor Authentication - A method and system for authenticating a user in a network includes a network software client of a computing device requesting network software services from a service gateway. A call between a user phone and an IVR phone login system is initiated in response to the user phone and the computing device being within a coverage area of the service gateway. A location of a user uniquely assigned to the computing device is identified within the coverage area. A first information received in the network software services from the computing device is correlated with a second information received from the IVR phone login system. When the first and second information match, access by the computing device to services of the service gateway is allowed. | 2008-11-13 |
20080282332 | Method For Executing a Protected Function of an Electric Field Unit and Electrical Field Unit - In order to develop a method for carrying out a protected function of an electrical field device in such a manner that a high degree of security against unauthorized accesses to the electrical field device can be ensured irrespective of the nature of the communication link between a user and the electrical field device, an identification device for the electrical field device and a security device are used to check whether a stated protected function of the electrical field device can be carried out, or should be refused. The invention also relates to an appropriately configured electrical field device. | 2008-11-13 |
20080282333 | IMAGE FORMING APPARATUS UNIFYING MANAGEMENT FOR USE OF IMAGE FORMING APPARATUS AND USE OF WEB SERVICE - An MFP stores information of a web service for permitting use with respect to each user, and information for limiting a use of its function. When there is a web service allowed to be used by the logged in user, its list is displayed. When a linked function with the selected web service is not allowed to be used, a massage to the effect that is displayed and when the use of the function is limited, limited contents are displayed to confirm the use of the web service. | 2008-11-13 |
20080282334 | Security Device, Method and System For Financial Transactions, Based on the Identification of an Individual Using a Biometric Profile and a Smart Card - A device to secure payments or transactions made with a smart card and validate the identity of the smart card holder using a client/server biometric control operation, regardless of whether the payments or transactions are made directly at a point of sale or indirectly. A client/server-type system authenticates the identity of a smart card holder, based on the use of the smart card and on the identification of the holder by biometric data which are stored on an extended memory smart card and compared with biometric data from an external, remote database that is secured and operated by the third-party authentication server or by the financial institution, but which, for reasons of security and performance, are not transferred over the telecommunication network. | 2008-11-13 |
20080282335 | Software firewall control - A software firewall that may be simply configured using rules specified for types of network interfaces rather than individual network interfaces. The network types may be specified with type identifiers that have a readily understandable meaning to a user, facilitating ease of configuring the firewall. The network types could include, for example, wired, wireless and remote access. A rule specified based on a network type can be translated to firewall filters for network interfaces of that network type. The translation may be performed automatically and may be updated based on network location awareness information. | 2008-11-13 |
20080282336 | Firewall control with multiple profiles - A networked computer with a software firewall that may be configured for any of a number of network contexts may be quickly configured with an appropriate set of rules for a current network context. The computer has multiple profiles, each containing rules applicable to a different network context. When a change in network context is detected, a difference between the profile for the current context and the profile with which the firewall was previously configured is determined. These differences are applied to quickly reconfigure the firewall without blocking, even temporarily, communications that are allowed in the previously configured and current profiles. Additionally, when the networked computer is connected to multiple networks simultaneously, an appropriate profile may be selected. | 2008-11-13 |
20080282337 | CONTENT FILTERING OF REMOTE FILE-SYSTEM ACCESS PROTOCOLS - Methods and systems for content filtering of remote file-system access protocols are provided. According to one embodiment, a transparent proxy running within a network gateway logically interposed between a client and a server intercepts remote file-system access protocol requests/responses. Responsive to receipt of a remote file-system access protocol request from the client, the network gateway issues the remote file-system access protocol request to the server on behalf of the client. The network gateway buffers into a holding buffer associated with the network gateway data being read from or written to a file associated with a share of the server. Then, responsive to a predetermined event in relation to the remote file-system access protocol or the holding buffer, the network gateway determines the existence or non-existence of malicious, dangerous or unauthorized content contained within the holding buffer by performing content filtering on the holding buffer. | 2008-11-13 |
20080282338 | SYSTEM AND METHOD FOR PREVENTING THE RECEPTION AND TRANSMISSION OF MALICIOUS OR OBJECTIONABLE CONTENT TRANSMITTED THROUGH A NETWORK - A system for preventing the reception and transmission of malicious or objectionable content transmitted through a network. A thin is client installed upon a user computer and is associated with a web browser computer program installed upon the user computer, the thin client and web browser being coupled to a web proxy server with a network service provider. At least one protective server is intermediate the web proxy server and the network, the protective server being dedicated to detecting a type of malicious or objectionable content and acting to deter the reception of detected content by the user computer. At least one reference library contains a profile defining malicious or objectionable content, the protective server utilizing the library to identify the malicious or objectionable content. | 2008-11-13 |
20080282339 | ATTACK DEFENDING SYSTEM AND ATTACK DEFENDING METHOD - An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source. | 2008-11-13 |
20080282340 | SAFE HASHING FOR NETWORK TRAFFIC - Secure network communications between a source computer and a destination computer utilizing a firewall. The firewall determines a remote endpoint and the local physical memory address associated with a local endpoint included in the outbound request. The remote endpoint and the local physical memory address are hashed to generate an index value corresponding to an entry in an internal state table of the firewall. When an inbound request is received, the firewall determines a remote endpoint and the local physical memory address associated with a local endpoint included in the inbound request. The remote endpoint and the local physical memory address of the inbound request are hashed to generate an index value corresponding to an entry in the internal state table of the firewall. The firewall forwards the inbound request to the local endpoint if a matching entry is found in the internal state table at the index value. | 2008-11-13 |
20080282341 | METHODS AND APPARATUS FOR RANDOM NUMBER GENERATION IN A MULTIPROCESSOR SYSTEM - Methods and apparatus include: providing each of a plurality of processors of a multiprocessing system with an integrally disposed random number generator (RNG); and permitting one or more of the processors to enter into a secure mode using one or more random numbers generated by one or more of the RNGs. | 2008-11-13 |
20080282342 | METHODS AND APPARATUS FOR ACCESSING RESOURCES USING A MULTIPROCESSOR IN A TRUSTED MODE - A system and method are disclosed which may include entering a secure mode by a processor, whereby the processor may initiate a transfer of information into or out of the processor, but no external device may initiate a transfer of information into or out of the processor; sending a DMA (direct memory access) command including at least one authorization code from the processor to at least one trusted data storage region external to the processor; evaluating the authorization code; and enabling the processor to access at least one trusted data storage location within the trusted data storage region if the authorization code is valid. | 2008-11-13 |
20080282343 | Digital Rights Management Using Biometric Data - Present inventions relates to a method of digital rights management for content data, comprising the steps of: obtaining ( | 2008-11-13 |
20080282344 | E-MAIL AUTHENTICATION - A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. The system and method may also provide for determining whether an e-mail originates from a forged source. A server receives data relating to an e-mail, including a purported sender and a verification host. The server queries the verification host with information pertaining to the e-mail and requests confirmation that the e-mail originates from the purported sender. The e-mail is determined to originate from a forged source unless the verification host responds that the e-mail originates from the purported sender. | 2008-11-13 |
20080282345 | APPARATUS FOR CONTROLLING PROCESSOR EXECUTION IN A SECURE ENVIRONMENT - Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager. | 2008-11-13 |
20080282346 | Data Type Management Unit - A data type management unit. The data type management unit is configured to include a rules module which includes at least one identification standard paired with an associated code type, an interface module configured to receive a code signal, and an analysis module coupled to the interface module and to the rules module. Each identification standard includes a comparison rule paired with an associated rejection criteria; the comparison rule of each identification standard includes at least one code pattern representative of the associated code type; and the rejection criteria of each identification standard includes at least one rejection rule. The analysis module is configured to compare the received code signal to each code pattern in each identification standard and to recognize if one or more of the comparison results violates one or more of the rejection rules. | 2008-11-13 |
20080282347 | Real-time network malware protection - A Network State Database (NSD) can comprise information regarding the network-centric state of one or more computing devices connected to a network. The information contained in the NSD can be passively received by the NSD, or it can be actively obtained by the NSD. Additionally the NSD can comprise either a centralized collection of information, or a distributed collection of information independently maintained and conceptualized as a single entity. The information of the NSD can be used by a Network Risk Management Service (NRMS) to appropriately respond and protect the network. The NRMS can provide relevant information from the NSD to subscribers, which can independently act to protect the network. The NRMS can likewise itself instruct computing devices regarding an appropriate action, or it can itself instruct the performance of such action. | 2008-11-13 |
20080282348 | Methods, Devices and Data Structures for Trusted Data - A data structure has within it the following elements: an identification of a data structure type; and a proof that two or more instances of the data structure type are as trustworthy as each other. Methods and devices using such data structures are described. | 2008-11-13 |
20080282349 | Computer Virus Identifying Information Extraction System, Computer Virus Identifying Information Extraction Method, and Computer Virus Identifying Information Extraction Program - To enable quick extraction of computer virus identifying information. | 2008-11-13 |