52nd week of 2008 patent applcation highlights part 68 |
Patent application number | Title | Published |
20080320499 | Method and System for Direct Insertion of a Virtual Machine Driver - A method and system for a communication network containing both trusted peers and untrusted hosts within the network. Trusted peers can collaborate with each other to observe and monitor the activity of the untrusted hosts. In addition, a trusted peer instantiated with a virtual machine can have an operating system kernel collaborate with a hypervisor to determine whether threats are present. A trusted peer that needs particular functionality installed can collaborate with other trusted peers and with an administrative console to have that functionality installed. An untrusted host can have a driver directly inserted into it by an administration console, which will facilitate in the collaboration process. | 2008-12-25 |
20080320500 | Remote human interface device in an aggregate computer system - Described is a technology by which a human interface device (e.g., a keyboard or mouse) physically coupled to a first computing machine controls a second computing machine in an aggregated computer system. When the first computing machine enters a device producer state with respect to the human interface device, the first machine routes the human interface device data to the second computing machine. The second computing machine receives the human interface device data, and simulates a physical connection of the human interface device to the second computing machine by providing the human interface device data to a virtual device driver loaded on the second computing machine. The virtual device driver may be registered with a virtual bus driver to receive the data. | 2008-12-25 |
20080320501 | Aggregate personal computer system - Described is an aggregate computer system that operates by sharing devices of networked computing machines. A consumer machine uses a real device of a producer machine as a virtual device, by coupling the real driver of the real device over the network to a virtual driver of the consumer machine. Each machine may include an aggregate device manager that manages the virtual devices, and/or an aggregate connection manager that processes communications received over at least two different types of networks. Each machine may include a virtual bus and virtual bus driver that simulates a physical connection of a remote device to that machine via a bus. Upon receiving a request to plug-in a virtual device, the consumer machines queries for information of the device, and loads a virtual driver based on the device information when received. The consumer machine may query by sending plug-and-play events to the virtual bus. | 2008-12-25 |
20080320502 | Providing Information about Software Components - Aspects of the subject matter described herein relate to providing information about software components. In aspects, an interface is provided via which processes may request component information. The interface is publicly exposed and is callable by both local and remote procedures. In response to a request received at the interface, static information regarding one or more components is retrieved and combined with discovered dynamic information regarding the one or more components. This information is then transformed into a form suitable for sending via the interface. | 2008-12-25 |
20080320503 | URL Namespace to Support Multiple-Protocol Processing within Worker Processes - A server system in typical operation has a process manager, multiple listeners (each to receive requests for its protocols) and multiple worker processes that are each able to handle requests in multiple protocols. At server start-up, each listener connects with the process manager via a pipe published by the process manager. The listener then receives information via the process manager that includes information defining the application(s) for which that listener is to “listen” and associating application(s) to application pool(s). When the listener receives a request for such an application, the listener starts a queue for the associated application pool. The listener may use a hierarchical matching scheme to determine the associated application or application pool from the requested application. The process manager launches an appropriate worker process to handle requests in the listener's protocol. The worker process then makes a connection with the listener. | 2008-12-25 |
20080320504 | Media processing apparatus and controlling method of the same - A medium is transferred and loaded to a media tray provided with a media processing unit which is operable to perform information processing on the medium, by using a transfer arm of a media transfer mechanism. A distance from a surface of the medium loaded on the media tray to a reference position of the transfer arm is acquired. A difference between the acquired distance and a predetermined distance from a reference surface of the media tray to the reference position of the transfer arm is calculated. It is determined that a double transfer of the medium to the media tray occurs when the calculated difference is larger than a predetermined threshold value. | 2008-12-25 |
20080320505 | OPTICAL DISC DRIVE - For the optical disc drive in the invention, the holder, the gear set and the transmission part and other components have mechanical interacting relationship, and therefore, when the power of the optical disc drive is cut off, the optical disc still can be ejected from the casing by the mechanical interaction of the components. An optical disc drive including a casing, a holder, a motor, a first and second gear sets, and a transmission part is provided. The holder which can move between a first and second position is disposed in the casing. When the holder moves to the second position, the second gear set is away from the first gear set at a distance, and the transmission part drives the disc to eject from the casing by the external force. | 2008-12-25 |
20080320506 | Disk Device - A disk device is capable of quickly identifying an inserted optical disk. A reading portion obtains disk surface information from an optical disk that is passing, and stores the obtained disk surface information in a storing portion provided in a disk playing device. An identifying portion decides whether or not the disk playing device is able to play the optical disk, based on the surface information. | 2008-12-25 |
20080320507 | Optical Disk Apparatus - An optical disc apparatus capable of reducing looseness vibrations resulting from a gap between a sub-guide shaft and a bearing is provided. According to an optical disc apparatus in the present invention, both ends of the sub-guide shaft are supported by being sandwiched between a pair of support parts formed in a chassis and a pair of pressing members mounted on the chassis. The support part is formed by bending a protruding portion both protruding in an inward direction of a hole from an edge of the hole of the chassis and extending along the direction perpendicular to the sub-guide shaft. | 2008-12-25 |
20080320508 | Methods and Apparatus to Monitor Media Content on a Consumer Network - Example methods and apparatus to monitor media content on a consumer network as described herein. An example metering system includes a metering device to monitor the consumption of media content at a consumer location and a universal plug and play (UPnP) compatible metering helper to collect audience measurement data from UPnP devices in a consumer network. | 2008-12-25 |
20080320509 | Quantitative Assessment of Marketing Strategies - Systems and methods allow business and marketing professionals to quantitatively measure the success of distributed marketing information and the quality of the sales opportunity at any given phase in the sales process. | 2008-12-25 |
20080320510 | SHARING VIEWING STATISTICS - A content recommendation system and methodology is provided in which various demographic information and viewing information is obtained from multiple viewers and recommendations of video content to view are provided to a viewer based on the viewer's demographic profile and the viewing preferences of other viewers with the same or similar demographic profile. The recommendations are a result of data mining the aggregated viewing information. Other feedback, such as real-time statistics or likes/dislikes, can also be provided for presentation to the viewer. | 2008-12-25 |
20080320511 | High-speed programs review - High-speed programs review is described. In embodiment(s), a television client device can initiate a high-speed review of a group of programs that have been recorded together. A content distributor may record a group of television programs that have been previously broadcast for a particular television channel, and then maintain the programs for on-demand viewing when selected by a viewer. The client device can receive program information from the content distributor, and the program information can identify each of the progress when reviewing the group of programs at high-speed. The program information that corresponds to a program can then be rendered for display when the program becomes selectable for on-demand viewing while reviewing the programs at high-speed. | 2008-12-25 |
20080320512 | SYSTEMS AND METHODS FOR PROVIDING INTERACTIVE ADVERTISEMENTS THROUGH MEDIA PLAYER SKIN - An advertisement delivery technology for advertisers to place advertisements within a frame that wraps around media players embedded in web pages (the media player skin) is disclosed. Advertisers develop advertisements suited to be served into media player skin and avail the advertisements on an online advertisement platform. Video publishers integrate the advertisement delivery technology into their web pages to create media player skins that wrap around embedded video players. When a viewer visits one of these web pages to watch a video clip, the video player is loaded to play the video clip. The media player skin communicates with the online advertisement platform to retrieve an advertisement and places it within the skin. The viewer is exposed to the advertisement while watching the video clip. | 2008-12-25 |
20080320513 | DYNAMIC CHANNEL SURFING GUIDE AND CUSTOMIZED TELEVISION HOME PAGE - The disclosure relates to an enhanced system and methodology of navigating video sources to determine video content to potentially view. Available video sources, such as individual television channels, not currently being viewed are monitored and analyzed, such as to determine if an advertisement is currently being presented. As a result of the content analysis and user preferences, the user is provided with a recommended subset of video sources to potentially view. User preferences can be explicitly indicated or inferred, such as based on a user's historical viewing habits. In addition, user preferences can be set for individual users or collective users, such as a combined mother and son “user.” | 2008-12-25 |
20080320514 | MOBILE TV SYSTEM AND METHOD WITH FAST CHANNEL CHANGE - To reduce latency during channel change, when a user changes the TV channel on a mobile TV device such as a wireless phone, the device leaves the power save mode and enters, for a limited timeout period, a Hilly energized mode in which the receiver and front end logic of the device remain energized during periods in which content from the old channel, content from the new channel, and content from a “next” channel are interleaved into the broadcast. | 2008-12-25 |
20080320515 | Self-organizing media content - Self-organizing media content is described. In embodiment(s), a self-organizing map can be applied to metadata that corresponds to television media content. A media content array of television media content choices can then be generated based on the mapped metadata where the media content array is organized to include n-dimensions that are each based on a different attribute of the metadata. The media content array can then be displayed on a user interface that facilitates dynamic traversal of the media content array for viewer selection of the television media content choices. | 2008-12-25 |
20080320516 | TAILORED CHANNEL FOR CONTENT CONSUMPTION - The claimed subject matter relates to an architecture that can establish a tailored and/or personalized content channel. The content channel can be interfaced with one or more devices, and can be configured to serve particular content or types of content as well as to filter particular content or types of content. The content can be selected or filtered based upon a wide variety of factors that can be expressly specified, or in some cases intelligently inferred. In addition, the architecture can provide detailed analysis of content and summarize various content consumption habits or histories. | 2008-12-25 |
20080320517 | System and method for creating and using a smart channel tuner list - Systems and/or methods are disclosed herein to identify a user interacting with a content presentation system, adaptively learn, in a passive manner, a user's pattern of accessing content over time, and globally store the user's identifying and use information. Specifically, disclosed are systems and/or methods for creating a smart channel tuner list, including determining an identity of a user interacting with a content presentation system, collecting channel switching information from the first channel to each of a plurality of second channels from the user's interaction with the content presentation system, determining a value for each of the plural second channels as a function of the channel switching information, and creating a smart channel tuner list as a function of the determined value. | 2008-12-25 |
20080320518 | System and method for a passively-adaptive preferred channel list - Systems and/or methods are disclosed herein to identify a user interacting with a content presentation system, adaptively learn, in a passive manner, a user's pattern of accessing content over time, and globally store the user's identifying and use information. Specifically, systems and/or methods for creating a preferred channel list, including determining an identity of a user interacting with a content presentation system, collecting channel use information for each of a plurality of channels from the user's interaction with the content presentation system, storing the channel use information, determining a value for each of the plural channels as a function of the channel use information, and creating a preferred channel list for the plural channels as a function of the determined value. | 2008-12-25 |
20080320519 | System and method for networking data collection devices for content presentation systems - Systems and/or methods are disclosed herein to identify a user interacting with a content presentation system, adaptively learn, in a passive manner, a user's pattern of accessing content over time, and globally store the user's identifying and use information. Specifically, disclosed are systems and/or methods for sharing user information where a first data collection device is connected to a second data collection device, determining an identity of a user, collecting channel use information at the first data collection device, determining a value for each of plural channels as a function of the channel use information, and creating a preferred channel list at the first data collection device for the plural channels as a function of the determined value. | 2008-12-25 |
20080320520 | System and method for biometric identification using portable interface device for content presentation system - Systems and/or methods are disclosed herein to identify a user interacting with a content presentation system, adaptively learn, in a passive manner, a user's pattern of accessing content over time, and globally store the user's identifying and use information. Specifically, the systems and/or methods may be user to identify a viewer of a content presentation system having a portable device with an actuator, operating the actuator by the viewer, obtaining biometric information via the actuator, and providing the biometric information to a content provider. The systems and/or methods may further include determining at the content provider an identification of the viewer based on the biometric information. | 2008-12-25 |
20080320521 | System and method for creating and using a smart electronic programming guide - Systems and/or methods are disclosed herein to identify a user interacting with a content presentation system, adaptively learn, in a passive manner, a user's pattern of accessing content over time, and globally store the user's identifying and use information. Specifically, disclosed are systems and/or methods for creating a smart electronic programming guide, including determining an identity of a user interacting with a content presentation system, collecting channel use information for each of a plurality of channels from the user's interaction with the content presentation system, storing the channel use information, determining a value for each of the plural channels as a function of the channel use information, and creating a smart electronic programming guide for the plural channels as a function of the determined value. | 2008-12-25 |
20080320522 | Systems and Methods for Automated Media Programming (AMP) - Automated media programming (AMP) systems and methods are provided. The systems and methods allow independent users to summit, edit, rate, and watch video content (preferably, although not necessarily, from other users) over a broadcast media channel or network. In one embodiment, among others, the AMP system a topic generator means for determining one or more topics that will be used for identifying one or more videos to be broadcast; an upload means for receiving uploads of one or more user videos relating to the determined topics; a prescreening means for allowing users to view the uploaded user videos; a rating means for rating the uploaded user videos, their respective producers, or both; a pre-production means for scheduling the uploaded videos for transmission based upon the ratings; and a broadcast means for enabling broadcast of the videos. In preferred embodiments, the AMP system is controlled by independent users, and the settings, procedures for operation, and procedures for evaluations of the AMP system are user controllable. | 2008-12-25 |
20080320523 | Content-progress indicator for an EPG - A content-progress indicator for an EPG is described. In an implementation, a user interface (UI) for output by a client and for display by a display device includes a plurality of representation of content items and at least one pictorial representation. Each representation of a content item is selectable by a user to navigate to a corresponding content item. Each content item has a duration when streamed for output by the client. The at least one pictorial representation corresponds to a respective content item and indicates a time remaining in the duration of the respective content item. | 2008-12-25 |
20080320524 | INFORMATION SELECTION APPARATUS AND INFORMATION SELECTION METHOD - Of one embodiment, an information selection screen including a plurality of selection areas is divided into a predetermined number of groups each having an identical number of selection areas. One group is selected from the divided groups by use of selection keys arranged to correspond in position to the groups. Processing is repeatedly executed to divide the selected groups into a predetermined number of groups each having an identical number of selection areas. Processing corresponding to an option displayed in the selection area and selected on a final selection screen is executed. | 2008-12-25 |
20080320525 | Audio stream management for television content - Audio stream management techniques are described. In an implementation, a unique representation is generated by a client for each of a plurality of audio streams associated with television content received at the client. Each of the unique representations is displayed in a user interface at the client to be selectable by a user to cause output of a respective audio stream with the television content | 2008-12-25 |
20080320526 | Video-Communication in Mobile Networks - A video-communication service in a mobile communication network using a packet-switched connection, in which a monitoring of a radio channel portion is performed at the mobile stations of the users involved in the communication. Parameters of the video communication (e.g. the coding rate) are adjusted based on a result of the monitoring of the radio channel portion. | 2008-12-25 |
20080320527 | METHOD, SIGNAL AND APPARATUS FOR MANAGING THE TRANSMISSION AND RECEIPT OF BROADCAST CHANNEL INFORMATION - The present invention provides a method for transmitting broadcast channel information as part of a broadcast channel signal having one or more transmission intervals, where each transmission interval includes a plurality of transmissions, and one or more of the transmissions are active frames in which broadcast channel information is transmitted. Invariant portions that are present in the broadcast channel information are identified separate from any variant portions and are encoded for transmission, and the variant portions are used to select transmission specific configurations, which can be detected during the decoding by the receiver. Upon detection of the transmission specific configuration used to encode the invariant portions, the value of the variant portion can be identified and reintroduced as part of the received broadcast channel information. | 2008-12-25 |
20080320528 | METHOD OF CONTROLLING AND APPARATUS OF RECEIVING MOBILE SERVICE DATA - The present invention relates to a digital broadcasting system, when transmitting mobile service data. In order to do so, the present invention performs additional encoding on the mobile service data and outputs the additionally encoded data. Accordingly, robustness is provided to the mobile service data, thereby enabling the mobile service data to respond swiftly and strongly against noise and channel changes. | 2008-12-25 |
20080320529 | Satellite transmission channel detection method and reception device using the method - The invention reduces the time needed for an automatic channel search on a device receiving channels of different widths. The invention proposes a channel detection method which carries out a first scan of the frequency range in order to locate all the carrier frequencies. The measurements are saved. Then an analysis of the saved measurements can determine whether it comes from a satellite or FM source, only the data corresponding to satellite sources are kept. | 2008-12-25 |
20080320530 | Methods, apparatuses, and computer program products for delivering video on demand content - Methods, apparatuses, and computer program products for delivering video on demand media content. The methods comprise receiving a selection of media content for viewing on demand; receiving an input specifying delayed viewing; determining that the media content is to commence before expiration of a predetermined time interval; determining whether or not any inputs from other viewers have been received that also specify delayed viewing of the same media content before expiration of the predetermined time interval; and if no such inputs from other viewers are received, then requesting a plurality of packets from the network, each of the packets bearing a unicast identifier corresponding to the selected media content; otherwise, requesting a plurality of packets from the network, each of the packets bearing a multicast identifier corresponding to the selected media content; receiving the plurality of packets; and delivering the plurality of packets for presentation of the media content. | 2008-12-25 |
20080320531 | SYSTEMS AND METHODS FOR THIRD-PARTY AGGREGATED VIDEO RATINGS - A computer implemented method for providing a third-party video content rating unit to a client device, is disclosed. A web browser running on the client device requests video content from an affiliate video content server. The media player running on the client device receives a data stream of the video content from the affiliate video content server, renders the video content and sends a request for the third-party video content rating unit to a third-party ad content server once the video content has been completely rendered. The third-party ad content server receives the request for the third-party video content rating unit, sends the third-party video content rating unit to the client device and streams advertising content to the third-party video content rating unit. The third party video content rating unit is configured to be rendered on top of the media player. | 2008-12-25 |
20080320532 | Multi-moving picture searching service providing system and method - Disclosed is a multi picture searching service providing system. The multi picture searching service providing system includes a head end transmitting a multi moving picture including plural moving pictures, moving picture-related data for each of the moving pictures, and multi moving picture configuration information for each of the moving pictures, and a user terminal receiving the multi moving picture, the moving picture-related data, and the multi moving picture configuration information and provides a user with a moving picture searching view, which is created by editing the plural moving pictures and the moving picture-related data, according to predetermined searching view generation information and the multi moving picture configuration information | 2008-12-25 |
20080320533 | Content Download System and Method, Content Providing Apparatus and Method, Content Receiving Apparatus and Method, and Program Therefor - A content download system includes a content providing apparatus providing content and a content receiving apparatus receiving the content from the content providing apparatus via a network. The content receiving apparatus includes an operation input unit, a downloader obtaining download control data and downloading encrypted content and play control data, an obtaining unit obtaining a license including a key for decrypting the encrypted content, checking the license based on the play control data, and re-obtaining the license according to a checking result, and a player decrypting and playing the encrypted content using the license. The content providing apparatus includes a control-data providing unit providing the download control data and the play control data to the content receiving apparatus, a content providing unit providing encrypted content, and a license providing unit providing the license based on the download control data and the license based on the play control data. | 2008-12-25 |
20080320534 | Method for creating a subscriber cable channel and set-top box for use therewith - Media content is received from at least one external device that is coupled to a set-top box. Subscriber channel content is generated based on the media content. The subscriber channel content is transferred to a cable network to produce a subscriber cable channel. | 2008-12-25 |
20080320535 | Ip-Enabled Terminal for Combined Video-Based Entertainment and Communication Services - An IP-enabled terminal for combined video-based entertainment and communication services is provided. Hardware and software components are integrated into one terminal to support video-based communication and entertainment services. | 2008-12-25 |
20080320536 | System and Method for Providing Personalized Datat Broadcasting Service, User Terminal and Method for Using Personalized Data Broadcasting Service, and Data Broadcasting Application Structure Therefor - Provided is a system and method for providing a personalized data broadcasting service, a user terminal and method for using a personalized data broadcasting service, and a data broadcasting application structure therefor, to provide a desired broadcasting service to a viewer anytime and anywhere by using diverse terminals. The user terminal includes: a data broadcasting middleware for receiving unidirectional data broadcasting contents transmitted through a broadcasting network; a personalized broadcasting middleware for receiving bidirectional data broadcasting contents transmitted through a communication network; and a contents storing means for storing the unidirectional data broadcasting contents and the bidirectional data broadcasting contents, wherein the data broadcasting middleware executes the unidirectional data broadcasting contents and bidirectional data broadcasting contents. The present invention provides a fast and stable data broadcasting service through a communication-broadcasting integration personalized data broadcasting service. Also, it provides diverse data broadcasting services to each user through a targeting personalized data broadcasting service. | 2008-12-25 |
20080320537 | SYSTEM AND METHOD FOR REDUCING CHANNEL CHANGE TIME - Presented herein are system(s) and method(s) for reducing channel change time. In one embodiment, there is presented a method for transmitting data. The method comprises receiving a request for video data from a client; transmitting a transaction header to the client, said transaction header comprising media metadata; and transmitting compressed video data to the client after transmitting the transaction header. | 2008-12-25 |
20080320538 | METHODS AND SYSTEMS FOR TRANSMITTING AND ACCESSING VIDEO DATA - In embodiments of the present invention improved methods and systems are described for transmitting and accessing video data. The methods and systems may include capturing and streaming live video data from any point at any time in real time. The capturing and streaming of the video data may be done remotely. The video data may be transmitted wirelessly to any location in real-time. Transmitting the video data wirelessly may include uploading the video data, wirelessly streaming the video data or transmitting the video data using some other type of method. The transmitted video data may be accessed by one or more users of one or more electronic devices. | 2008-12-25 |
20080320539 | Data Transmission Apparatus and Data Transmission Method - According to one embodiment, a data transmission apparatus classifies a plurality of electronic devices into a plurality of groups in accordance with functions of the electronic devices, and generates list information indicative of a list of structures of the groups. Each of the groups includes a combination of an electronic device which is usable for video display and an electronic device which is usable for audio output, or an electronic device which is usable for both the video display and the audio output. The data transmission apparatus transmits the generated list information to the source device. In accordance with selection information which is output from the source device, the video transmission apparatus specifies destinations of transmission of video data and audio data which are output form the source device. | 2008-12-25 |
20080320540 | Methods and apparatus for bandwidth recovery in a network - Methods and apparatus for recovery and/or utilization of bandwidth within a network. In one embodiment, the network comprises a switched architecture (e.g., broadcast switched) content-delivery network such as a cable television network. Reclamation, overflow, and/or triage logical processes are selectively applied in order to more efficiently manage bandwidth utilization within the network while maintaining user experience, and optionally achieve one or more business and/or operational goals. | 2008-12-25 |
20080320541 | Method and apparatus for locating network impairments - A system for locating an impairment in a coaxial cable network comprises an encoder, an impairment detector, and a decoder. The encoder couples to the network at a predetermined encoding point, upstream of the impairment. The encoder automatically encodes an identification code on a signal originating downstream of the encoding point and associated with the impairment. The impairment detector couples to the network at an access point, upstream from the encoding point, and receives signals from the network. The detector is adapted to detect from the received signals the signal associated with the impairment and generate a detected version of the signal. The decoder is adapted to decode the identification code from the detected version of the impairment signal. Once the identification code is determined, the encoder and encoding point are identified, and the location of the impairment is determine to be downstream of the encoding point. | 2008-12-25 |
20080320542 | Method and apparatus for programming a remote control using broadcast data - A set top box | 2008-12-25 |
20080320543 | Digital rights management for multiple devices with and methods for use therewith - Media content is received for a plurality of devices based on a user selection. The media content includes digital rights for the plurality of devices. The media content is transferred to at least one of the plurality of devices in accordance with the digital rights. | 2008-12-25 |
20080320544 | HARDWARE-IMPLEMENTED VIDEO BROADCASTING RECEIVER - A hardware-implemented video broadcasting receiver is described. The hardware-implemented video broadcasting receiver includes a radio frequency (RF) tuner, a demodulator connected to the RF tuner, link layer logic connected to the demodulator, and a power manager connected to the RF tuner, the demodulator and the link layer logic. The power manager is configured to receive delta-T values extracted from a transport stream by the link layer logic, to determine whether each of the RF tuner, the demodulator and the link layer logic can be powered down based on the delta-T values, and to power down the RF tuner, the demodulator and the link layer logic based on the determination, thereby reducing the average power consumed by the video broadcasting receiver. | 2008-12-25 |
20080320545 | System and method for providing audio-visual programming with alternative content - A system for presenting audio-video programming with alternative content comprises a first input port for receiving a first signal containing at least one audio-video program, the at least one audio-video program having at least one default component associated therewith and a second input port for receiving a selected alternative content stream, the selected alternative content stream selected from a plurality of available alternative content streams. The system further comprises a first output port for transmitting a modified audio-video program to an output device, and at least one controller in communication with the first input port, the second input port and the first output port. The at least one controller is operative to (i) synchronize the at least one audio-video program and the selected alternative content stream to form the modified audio-video program and (ii) transmit the modified audio-video program via the first output port. | 2008-12-25 |
20080320546 | SNAPSHOT RECOGNITION FOR TV - A system may include logic to provide a video program to a video display, logic to provide interactive content to indicate that a snapshot of the video program can be captured, and snapshot capturing logic to capture a video frame of the video program. | 2008-12-25 |
20080320547 | EVENT MANAGEMENT MECHANISM FOR ATHLETE RECRUITING ARCHITECTURE - An athlete recruiting architecture is disclosed. The athlete recruiting system allows a recruiting entity, such as a school, to search for and find athletes that satisfy recruiting entity-specified criteria. The athlete recruiting system also allows motion videos to be associated with athletes. These motion videos may be uploaded or streamed to interested recruiting entities over a communication network. The athlete recruiting system provides a video indexing mechanism that allows athletes and recruiting entities to generate and store indices to motion videos. The athlete recruiting system provides hit tracking mechanisms for notifying athletes about recruiting entities that have taken actions that indicate that the recruiting entities are interested in the athlete. As a result, athletes are encouraged to initiate contact with interested recruiting entities. This promotes the formation of relationships between athletes and recruiting entities while adhering to rules imposed on the recruiting process. | 2008-12-25 |
20080320548 | PROXY-BASED MALWARE SCAN - A system that employs out-of-process (‘out-of-proc’) architectures with respect to malware scanning related to network services applications is provided. The ‘out-of-proc’ malware (e.g., virus) scanning is employed in connection with a web conferencing server. This architecture enables more versatile options related to scanning, for example, selective bypass in a crisis situation. | 2008-12-25 |
20080320549 | Method and System for Determining Policy Similarities - A method for determining similarity of two policies includes providing a first policy with n rules and a second policy with m rules, wherein each rule is structured into a plurality of identifiable elements, categorizing the rules in each policy based on an action, for each pair of rules finding those predicates whose attribute names match, computing an attribute similarity score for the attribute values, summing the attribute similarity scores for all pairs to obtain an element similarity score, and computing a rule similarity score for the pair of rules from a weighted sum of said element similarity scores. | 2008-12-25 |
20080320550 | PERFORMING POLICY CONFLICT DETECTION AND RESOLUTION USING SEMANTIC ANALYSIS - A method and system for managing a policy includes, in response to determining the presence of a conflict, determining a semantic equivalence between a component of a policy rule and at least one additional policy rule. The determining a semantic equivalence is performed by using a semantic reasoning algorithm that includes the steps of determining a first policy target of a first policy rule and a second policy target of a second policy rule, determining a meaning of the first policy target and a meaning of the second policy rule, assigning a confidence value based on the determined meaning of the first policy, assigning a confidence value based on the determined meaning of the second policy, performing a semantic comparison between the first policy target and the second policy target, and determining, based at least in part on the semantic comparison, the presence of a conflict between the first and second policy targets. | 2008-12-25 |
20080320551 | Controlling access to multiple pieces of content of a presentation - In one or more embodiments, a license associated with a first piece of content can grant rights with respect to a second and/or additional pieces of content. That is, language that is included in a first license can express a policy that is interpreted by a client-side device. This policy can establish rights with respect to additional pieces of content. Accordingly, policy enforcement with respect to licensed content can take place on the client-side device and can establish how different content is to be played relative to one another. | 2008-12-25 |
20080320552 | ARCHITECTURE AND SYSTEM FOR ENTERPRISE THREAT MANAGEMENT - Enterprise threat assessment and management provides both physical and logical security. Physical access control systems are configured to identify physical events in the physical domain, and logical access control systems are configured to identify logical events in the logical domain. Connectors establish uninterrupted coupling to the physical and logical access control systems. Event middleware is configured to selectively subscribe only to those events that correspond to defined policies. The policies define a correlation of the physical and logical events, actions are initiated depending upon the correlated physical and logical events defined by the policies. | 2008-12-25 |
20080320553 | MANAGING HIERARCHICALLY ORGANIZED SUBSCRIBER PROFILES - Methods are provided for managing hierarchically organized subscriber profiles. According to one embodiment of the present invention, a subscriber connection is created with a virtual router operable within a telecommunications system of a service provider. A connection request is received from a subscriber of multiple subscribers of the service provider at a subscriber manager of the virtual router. The virtual router maintains a database of hierarchically organized profile identifiers, including multiple lower-level profile identifiers, which explicitly define subscriber services, and multiple first-level profile identifiers, which define service contexts representing combinations of services available to subscribers when connected by (i) explicitly defining the subscriber services or (ii) referring to one or more of the multiple lower-level profile identifiers. If the subscriber is successfully authenticated, a connection is created by creating and configuring a virtual interface within the virtual router for the subscriber connection based on the subscriber's first-level profile identifier. | 2008-12-25 |
20080320554 | SECURE DATA STORAGE AND RETRIEVAL INCORPORATING HUMAN PARTICIPATION - A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities of a human, but beyond the current state of the art for computer systems. The puzzled can be visually and/or audibly rendered to the user. In one configuration, the puzzle is obtained via a library of pluggable puzzle generators. Puzzle generators in the library can be replaced as the state of the art of computing technology improves. | 2008-12-25 |
20080320555 | RESET-TOLERANT AUTHENTICATION DEVICE - An authentication device comprises a processor having a reset input, a trigger source coupled to the reset input of the processor, and interface circuitry for outputting codes generated by the processor. The trigger source may comprise, for example, a trigger button having an associated switch that when actuated supplies a reset to the reset input. The processor is configured to analyze a given reset applied to the reset input to determine if the reset is an inadvertent reset or a reset generated by the trigger source. The processor generates a code responsive to the reset if the reset is determined to be a reset generated by the trigger source. The code may be supplied to a host device which communicates the code to an authentication server for authentication. | 2008-12-25 |
20080320556 | METHOD FOR RECOGNIZING INFORMATION FLOW AND DETECTING INFORMATION LEAKAGE BY ANALYZING USER'S BEHAVIORS - A method for analyzing user's behaviors is provided. API function call patterns occurring when operations on various objects are performed on a computer system are configured with contexts. User's behaviors are recognized as associations between the contexts and systematically expressed. Information flow occurring in the user's behaviors (i.e., associations between the contexts) is tracked. The information flow chain is divided into a source and a destination. When the information flow a confidential object to a leakage point occurs, the information leakage is rapidly detected and blocked. By exactly recognizing behaviors belonging to the corresponding information flow chain, user's behaviors related to the information leakage can be detected. Furthermore, the behavior expression based on the contexts configured with the API function call patterns with respect to the system object can be achieved by naturally connecting the API function call occurring on the system as an abstract behavior. | 2008-12-25 |
20080320557 | BATCH VERIFICATION DEVICE, PROGRAM AND BATCH VERIFICATION METHOD - Realization of batch verification having both high security and high efficiency. | 2008-12-25 |
20080320558 | CONTENT VIEWING SYSTEM, CONTENT VIEWING APPARATUS, AND VIEWING APPROVAL APPARATUS - Disclosed herein is a content viewing system including a content viewing apparatus, and a viewing approval apparatus used by a viewing approval party to perform an approval process. The content viewing apparatus includes: a viewing approval requesting section that transmits a viewing approval request to the viewing approval apparatus when it has been determined that approval for viewing of a content is necessary; and a content viewing control section that receives, from the viewing approval apparatus, an approval/disapproval response, and, if the approval/disapproval response indicates that the viewing of the content has been approved, enables the viewing of the content. The viewing approval apparatus includes: an output section that outputs information concerning the viewing approval request; an input section that accepts input of the approval/disapproval response; and an approval/disapproval response notification section that notifies the content viewing apparatus of the approval/disapproval response. | 2008-12-25 |
20080320559 | Limiting access to publicly exposed object-oriented interfaces via password arguments - Limiting access to publicly exposed object-oriented interfaces is disclosed. A system includes inter-related first objects that share a predetermined password. First object-oriented interfaces define methods supported by the first objects. The first objects publicly expose the first interfaces, which are queryable by the first objects and second objects. Each first interface includes a password argument to limit access to the first objects. The system may also include second object-oriented interfaces that define methods supported by the first objects that publicly expose the second interfaces, which are queryable by the first and the second objects. The second interfaces are required by specification, such as that for the Common Information Model (CIM), and correspond to the first interfaces. The second interfaces lack password arguments to limit access, and the methods defined thereby return “not implemented” messages when invoked. Each second interface is a non-implemented and password-free version of a first interface. | 2008-12-25 |
20080320560 | Delegating or Transferring of Access to Resources Between Multiple Devices - A gatekeeper device delegates an ability to access a resource to an access device by transmitting metadata, which includes access information for accessing the resource. The access device uses the metadata to retrieve the associated resource from a resource server. By transmitting the metadata in lieu of the resource, flexible use of the resources is implemented while enabling compliance with various restriction schemes. The system may condition the delegation or transfer of resource access on one or more factors, such as proximity between the gatekeeper device and the access devices. Using information about an access device, the resource server may optimize the resources for the receiving access device. | 2008-12-25 |
20080320561 | Method and System for Collaboration Involving Enterprise Nodes - A method and system for a communication network containing both trusted peers and untrusted hosts within the network. Trusted peers can collaborate with each other to observe and monitor the activity of the untrusted hosts. In addition, a trusted peer instantiated with a virtual machine can have an operating system kernel collaborate with a hypervisor to determine whether threats are present. A trusted peer that needs particular functionality installed can collaborate with other trusted peers and with an administrative console to have that functionality installed. An untrusted host can have a driver directly inserted into it by an administration console, which will facilitate in the collaboration process. | 2008-12-25 |
20080320562 | EFFORTLESS REGISTRATION WITH CONTENT PROVIDERS AND METHODS THEREOF - A communication system ( | 2008-12-25 |
20080320563 | SYSTEM AND PROGRAM PRODUCT FOR ASSOCIATING EVENT CATEGORIZATION AND ROUTING WITH SECURITY AUTHORIZATION ROLES - Under the present invention, when an event is received on a server, it is stored and then categorized. In being categorized, an event group pertaining to the event is identified. Based on the group of events, a set (e.g., one or more) of destinations to which the event should be routed can be determined. The group of events is then associated with an access control list (ACL) that contains entries identifying users (or groups of users) and their permissions to interact with events in that group. Once the association is made, the event and optionally the ACL is routed to the appropriate destinations. Based on the permissions contained in the ACL, the destinations will interact with the event accordingly. | 2008-12-25 |
20080320564 | Method for Handling Event Triggers and Re-Authorization Triggers in Flow Based Charging - The present invention discloses a method for handling event triggers and re-authorization triggers in flow based charging. The method comprises: TPF determines whether the bearer event matches an event trigger, if the bearer event matches an event trigger, TPF requesting the charging rules from CRF, then TPF determines whether the bearer event matches a re-authorization trigger, if it matches, the TPF performing a re-authorization process, otherwise, ending the current process; if the bearer event does not match any event trigger, just determining whether the bearer event matches a re-authorization trigger, if it matches, the TPF performing a re-authorization process, otherwise ending the current process. In this way, only one interaction for re-authorization is needed between TPF and OCS, thus the re-authorization process is optimized when there is overlap between event triggers and re-authorization triggers, and the re-authorization process in flow based charging is improved. | 2008-12-25 |
20080320565 | Open enhanced federation security techniques - Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed. | 2008-12-25 |
20080320566 | Device provisioning and domain join emulation over non-secured networks - Proxy service that enables a domain join operation for a client over a non-secure network. The join operation is achieved with minimal security exposure by using machine identity information rather than user credentials. The proxy only uses permission associated with adding a new machine account to the enterprise directory, and not for adding a user account or take ownership of existing accounts. The proxy enables authentication based on actual machine account credentials to obtain a signed certificate, rather than conventional techniques such as delegation. Moreover, the enrollment process employs an original trust relationship between the device and the proxy rather than requiring or depending on public trust. | 2008-12-25 |
20080320567 | SYSTEM AND METHOD FOR PREVENTING WEB FRAUDS COMMITTED USING CLIENT-SCRIPTING ATTACKS - A method for detecting and blocking Javascript hijacking attacks, comprising checking if an incoming request belongs to a valid session established between a client and a trusted server. When said incoming request does belong to a valid session, it is checked if a Referer header of said incoming request includes a valid domain name. The incoming request is marked as suspicious, when said incoming request does not include a valid domain name. It is checked if a respective response of said suspicious incoming request includes a script code. A preventive action responsive to a user input is taken when said respective response includes a script code. | 2008-12-25 |
20080320568 | CONTENT DISTRIBUTION AND EVALUATION PROVIDING REVIEWER STATUS - A content distribution system may be provided for reviewing content such as video games, music, movies, or the like that may be shared by the system. The content distribution system may receive a credential from a user and authenticate the user based on the credential to permit access to the system. The content distribution system may also receive content generated by the user if the user may be authenticated. The content distribution system may provide the received content to a content evaluation entity, for example. The content distribution system may receive a review for the content from the content review entity and then may determine whether the content passes a review process based on the review, for example. The content distribution system may provide additional access to the content if the content passes the review process. | 2008-12-25 |
20080320569 | METHODS, SYSTEMS, AND APPARATUS FOR STAGGERED RENEWAL PERIODS - An embodiment relates generally to receiving a plurality of security certificates for each user of a plurality of users and generating a random renewal period for a selected security certificate. The method also includes associating the random renewal period to the selected security certificate and providing the selected security certificate with the random renewal period to the respective user of the plurality of users. | 2008-12-25 |
20080320570 | INFORMATION PROCESSING APPARATUS - According to one embodiment, an information processing apparatus includes a wireless communication unit which receives and transmits a voice call wireless signal with a base station, an acceptance unit which accepts instructions related to a privacy protection operation using the voice call wireless signal received by the wireless communication unit, and a control unit which controls the privacy protection operation in accordance with the instructions accepted by the acceptance unit. | 2008-12-25 |
20080320571 | EMERGENCY RESPONDER CREDENTIALING SYSTEM AND METHOD - A system for collecting, verifying, and managing identity data, skill data, qualification data, certification data, and licensure data of emergency responders. The system trusted verification of identity, skills, qualifications, certifications, and licensure, and disseminates information specific or related to identity, skills, qualifications, certifications, and licensure at the scene of an emergency. The system includes information collection devices, data storage media, information retrieval devices, and information management devices. The information collected, managed, and disseminated may include identity information, medical information, skills information, qualification information, certification information, licensure information. Data in the system is stored in multiple formats, allowing for the retrieval of trusted information in an environment that is part of a network or devoid of network connectivity. | 2008-12-25 |
20080320572 | EMERGENCY RESPONDER CREDENTIALING SYSTEM AND METHOD - A system for collecting, verifying, and managing identity data, skill data, qualification data, certification data, and licensure data of emergency responders. The system trusted verification of identity, skills, qualifications, certifications, and licensure, and disseminates information specific or related to identity, skills, qualifications, certifications, and licensure at the scene of an emergency. The system includes information collection devices, data storage media, information retrieval devices, and information management devices. The information collected, managed, and disseminated may include identity information, medical information, skills information, qualification information, certification information, licensure information. Data in the system is stored in multiple formats, allowing for the retrieval of trusted information in an environment that is part of a network or devoid of network connectivity. | 2008-12-25 |
20080320573 | Automated User Registration - For users to access network services such as video streaming from a device, users usually have to register themselves with the service first. Most registration mechanisms require a user to input a username, password, date of birth and other details. When implemented through a web interface, this mechanism is relatively easy for the service provider to provision. However, the problem is that users are required to manually enter significant amounts of information which can be both time consuming, especially on a mobile device where there usually no QWERTY input device, and susceptible to unintentional errors. The present invention proposes an automated registration process that does not require a user to enter any details manually except for the initial request to subscribe to a service. The process gathers information automatically about the user and the device used, which is then stored and used for user authentication during subsequent service requests following the initial subscription request. The subsequent requests for service also do not require the user to manually input any user data. | 2008-12-25 |
20080320574 | SYSTEM, METHOD AND PROGRAM FOR AUTHENTICATION AND ACCESS CONTROL - System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password. In response, the production server authenticates the GroupID with the group password and grants the user access to the file. | 2008-12-25 |
20080320575 | SYSTEM AND METHOD FOR DATA CAPTURE AND REPORTING - A database system includes an intermediary program that provides a variety of functions. Logging on to the intermediary program results in log-in information being transmitted from an encrypted file to the database system via the intermediary program. The database system includes the ability for the user to enter criteria for a query in a variety of different manners, including the ability to directly modify generated SQL statements and the ability to use input lists in creating queries. In addition, the queries entered by the user can be stored in a separate database, such that the efficiency and operation of the database system can be improved. In addition, the delivery of query results and reports allows for delivery of files that are associated with a data period in any format and also allows the user to receive multiple reports in a single, compressed file. | 2008-12-25 |
20080320576 | Unified online verification service - A web-based, graphical user interface-driven arrangement for configuring federated access management across a group of federations and associated identity providers is enabled by a centralized server, called a global verification server. The global verification server operates to give service providers who host protected resources (i.e., those that have access restricted to only users having particular attributes, such as being a member of a particular group) a unified view of federations that are typically deployed on a global basis, as well as provides web-based tools to manage federated access. The global verification server also provides a single location on the web where users can go to access protected resources by discovering and using their home identity provider for verified single sign-on. | 2008-12-25 |
20080320577 | Personal Token With Parental Control - The invention relates to a personal token (in particular a SIM card), a system comprising a personal token and a communication device (in particular a cellular phone), and a method for parental control of the services of the communication device. The personal token of the invention comprises connection means for connecting to a communication device and parental control means, the parental control means controlling access of a controlled entity to the services offered by the communication device according to a set of rules stored in the personal token. The personal token also comprises rules modification means enabling the modification of the set of rules (access to the rules modification means being restricted to a controlling entity), and a web server, the rules modification means being accessible through at least one web page on the web server. | 2008-12-25 |
20080320578 | METHODS AND APPARATUS FOR DYNAMIC SUBSCRIPTION BINDING - A method for dynamic management of subscription based data for a fielded system utilizing a remote computer system is described. The method comprises providing unique identification data for the fielded system to the remote computer system, receiving user identification data at the remote computer system, and determining, at the remote computer system, from at least one of the unique fielded system identification data and the user identification data, if the fielded system is bound to a set of subscription based data, or if the fielded system is available to be bound to a set of subscription based data. | 2008-12-25 |
20080320579 | Method and system for validating references - The present invention relates to enhanced workflow solutions for authors (e.g., researchers, scientists, and scholarly authors) and publishers (e.g., journals and professional and technical societies) in preparing documents in structured format for facilitating efficient and accurate validation of references cited or included in papers and other submissions for publication or for review. An author prepares a document containing a set of cited references using a formatting structure. A system includes a processor to process the document to extract embedded metadata associated with the set of cited references. The processor executes code associated with a reference validation software module and automatically recognizes the formatting structure and the embedded metadata. The processor automatically extracts the embedded metadata and compares the extracted metadata against an authority database to determine the validity of the set of cited references. | 2008-12-25 |
20080320580 | SYSTEMS, METHODS, AND MEDIA FOR FIREWALL CONTROL VIA REMOTE SYSTEM INFORMATION - Generally speaking, systems, methods and media for implementing a firewall control system responsive to remote system information are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions. | 2008-12-25 |
20080320581 | SYSTEMS, METHODS, AND MEDIA FOR FIREWALL CONTROL VIA PROCESS INTERROGATION - Generally speaking, systems, methods and media for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions. | 2008-12-25 |
20080320582 | REAL-TIME INDUSTRIAL FIREWALL - Providing for employing a real time firewall to secure components of an automation control network from unauthorized communication to or from such components is disclosed herein. A monitoring component can inspect at least a portion of an instance of communication directed toward or originating from a component of the automation control network. Such inspection can, e.g., be a deep packet inspection based on information received from a communication request and/or response protocol. A filtering component can selectively admit or deny propagation of the instance of communication based on the inspection and a predetermined security criterion. In such a manner, the subject innovation can provide for limited access to network components from office network machines and for securing components of an automation control network from influence by unauthorized entities. | 2008-12-25 |
20080320583 | Method for Managing a Virtual Machine - Methods for managing a virtual machine wherein an administration console (AC) ( | 2008-12-25 |
20080320584 | FIREWALL CONTROL SYSTEM - Generally speaking, systems, methods and media for implementing a firewall control system responsive to user authentications are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program. Embodiments may include determining whether an authentication plan is required to be matched for the associated program and, if so, accessing a stored authentication plan associated with the program and having one or more authentication records each having expected information relating to user access to a particular server. Embodiments may include accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having information relating to user access to a particular server. Embodiments may include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response, performing one or more firewall actions. | 2008-12-25 |
20080320585 | METHOD AND SYSTEM TO MITIGATE LOW RATE DENIAL OF SERVICE (DoS) ATTACKS - A technique to mitigate low rate Denial-of-Service (DoS) attacks at routers in the Internet is described. In phase 1, necessary flow information from the packets traversing through the router is stored in fast memory; and in phase 2, stored flow information is periodically moved to slow memory from the fast memory for further analysis. The system detects a sudden increase in the traffic load of expired flows within a short period. In a network without low rate DoS attacks, the traffic load of all the expired flows is less than certain thresholds which are derived from real Internet traffic analysis. The system can also include a filtering solution to drop attack packets. The filtering scheme treats the long-lived flows in the Internet preferentially, and drops the attack traffic by monitoring the queue length if the queue length exceeds a threshold percent of the queue limit. | 2008-12-25 |
20080320586 | SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM - A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to at least some of the devices in the network. The security subsystem is configured to monitor activities of the at least some devices on the network and detect attacks on the at least some devices. The master system monitors the integrity of the security subsystem and registers information pertaining to attacks detected by the security subsystem. The secure link is connected between the security subsystem and the master system. The master system monitors the integrity of the security subsystem and receives the information pertaining to the attacks through the secure link. | 2008-12-25 |
20080320587 | Secure Pairing for Wired or Wireless Communications Devices - Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that th.—device identification displayed on the host device matches that printed on the peripheral diwice, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device. | 2008-12-25 |
20080320588 | System of Assigning Permissions to a User by Password - A data processing system includes a data storage unit for storing data sets accessible to a user upon receipt of permission. The data processing system restricts access to data sets by requiring a username and then requiring a password to obtain permission for access to a data set stored in a data storage unit. The system is adapted to support use of more than one said password associated with a username; and each of those passwords associated with that username permits a distinct level of access to a particular data set, whereas other passwords can provide different levels of access to any data set assigned thereto. | 2008-12-25 |
20080320589 | SECURING SYSTEM AND METHOD USING A SECURITY DEVICE | 2008-12-25 |
20080320590 | METHOD AND APPARATUS FOR CREATING SECURED FILE VIEWS IN A SOFTWARE PARTITION - A computer implemented method, apparatus, and computer program product for creating secured file views of a protected file. The process receives a request to access the file, wherein the file is stored in a common location, and wherein the request includes a set of file viewing parameters. The process identifies a callback function associated with the file and calls the callback function with the set of file viewing parameters to form a set of virtual viewing parameters. Thereafter, the process generates a secured file view of the file using the virtual viewing parameters, wherein the secured file view is viewable by a user of an authorized partition. | 2008-12-25 |
20080320591 | METHOD AND SYSTEM FOR VERIFYING IDENTIFICATION OF AN ELECTRONIC MAIL MESSAGE - A method and system for verifying identification of an electronic mail message. An electronic mail message including a signature and a key is received, the signature identifying a domain from which the electronic mail message originated and the key for verifying the signature. A key registration server of the domain is accessed to verify the key. The key registration server provides for verifying that a key used to sign an electronic mail message is valid and that the sender is authorized by the domain to send the electronic mail message from the return address. | 2008-12-25 |
20080320592 | METHOD AND SYSTEM FOR CLOAKED OBSERVATION AND REMEDIATION OF SOFTWARE ATTACKS - A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities. | 2008-12-25 |
20080320593 | Method, System and Computer Readable Medium For Intrusion Control - An intrusion control system, method and computer readable medium. The system includes an input interface adapted to receive traffic over a session opened between a user and a computerized system; and a processor, adapted to control the session while determining whether the traffic is a part of an attack. The method includes determining an occurrence of an attack; and mitigating the attack by providing false information representative of a defense capability of a computerized system. | 2008-12-25 |
20080320594 | Malware Detector - The malware detection system enables out-of-the box, tamper-resistant malware detection without losing the semantic view. This system comprises at least one guest operating system and at least one virtual machine, where the guest operating system runs on the virtual machine. Having virtual resources, the virtual machine resides on a host operating system. The virtual resources include virtual memory and at least one virtual disk. A virtual machine examiner is used to examine the virtual machine. With a virtual machine inspector, a guest function extrapolator, and a transparent presenter, the virtual machine examiner resides outside the virtual machine. The virtual machine inspector is configured to retrieve virtual machine internal system states and/or events. The guest function extrapolator is configured to interpret such states and/or events. The transparent presenter is configured to present the interpreted states and/or events to anti-malware software. The anti-malware software is configured to use the interpreted states and/or events to detect any system compromise. | 2008-12-25 |
20080320595 | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine - An automated analysis system identifies the presence of malicious P-code or N-code programs in a manner that limits the possibility of the malicious code infecting a target computer. The target computer system initializes an analytical virtual P-code engine (AVPE). As initialized, the AVPE comprises software simulating the functionality of a P-code or intermediate language engine as well as machine language facilities simulating the P-code library routines that allow the execution of N-code programs. The AVPE executes a target program so that the target program does not interact with the target computer. The AVPE analyzes the behavior of the target program to identify occurrence of malicious code behavior and to indicate in a behavior pattern the occurrence of malicious code behavior. The AVPE is terminated at the end of the analysis process, thereby removing from the computer system the copy of the target program that was contained within the AVPE. | 2008-12-25 |
20080320596 | Distributed digital rights management system and methods for use therewith - A digital rights management (DRM) node module for use in a node of a public data includes a node data module that stores DRM data associated with a plurality of digital files, the DRM data including a plurality of DRM identifiers. A packet monitoring module receives the plurality of DRM identifiers from the node data module, that receives packets containing incoming content and compares the incoming content to the DRM identifier, and generates event data when the incoming content matches at least one of the DRM identifiers. A node reporting module receives the event data, and generates node report data based on the event data. | 2008-12-25 |
20080320597 | Smartcard System - A programmable smartcard device ( | 2008-12-25 |
20080320598 | METHOD AND SYSTEM FOR TRACKING AND MANAGING RIGHTS FOR DIGITAL MUSIC - A method for digital rights management for a copyright work that is copied from device to device from among a plurality of devices, some of which are parent devices and some of which are child devices, and wherein a child device may be registered with a parent device, including copying a digital work from a parent device, P | 2008-12-25 |