15th week of 2011 patent applcation highlights part 43 |
Patent application number | Title | Published |
20110088002 | METHOD AND PLATFORM FOR GESTURAL TRANSFER OF DIGITAL CONTENT FOR MOBILE DEVICES - A platform is provided which allows for gesture-initiated transfer of digital content from a mobile device to at least one other device which may also be a mobile device. The platform includes an application that leverages components which help in determining the pose of the mobile device. Upon detecting a gesturing motion (e.g., a throwing or casting motion), the system begins transfer of digital content (such as the current application or a set of pre-packaged information) to the at least one other device. The throwing or casting direction is analyzed to determine the appropriate device or devices to receive the content. | 2011-04-14 |
20110088003 | APPARATUS, METHODS AND COMPUTER-READABLE STORAGE MEDIA FOR SECURITY PROVISIONING AT A COMMUNICATION DEVICE - Apparatus, methods and computer-readable storage medium are provided for security provisioning at a communication device. In some embodiments, a method can include: executing a high security application on a communication device based, at least, on detecting that high security is enabled for the communication device and detecting execution of a low security application; outputting, via a user interface (UI), information configured to detect an entry to the communication device; detecting an entry at the UI of the communication device; determining whether the entry corresponds to security access information stored in the communication device; and providing access to the communication device based, at least, on determining that the entry corresponds to the security access information. | 2011-04-14 |
20110088004 | TOOL IDENTIFYING METHOD AND APPARATUS - A method includes generating A | 2011-04-14 |
20110088005 | METHOD AND APPARATUS FOR CONFIGURING A CONTENT-ADDRESSABLE MEMORY (CAM) DESIGN AS BINARY CAM OR TERNARY CAM - A method for producing a configurable content-addressable memory (CAM) cell design, in which the method includes: inputting the configurable CAM cell design to a computer, the configurable CAM cell design capable of being configured as one of a binary CAM design and a ternary CAM design, depending on connections of a metal overlay; selecting one of a first metal overlay design for the binary CAM design and a second metal overlay design for a ternary CAM design; if the first metal overlay design is selected, then combining the first metal overlay design with the configurable CAM cell design to produce a binary CAM design including two binary CAM cells with a single search port, and outputting the binary CAM design; and if the second metal overlay design is selected, then combining the second metal overly design with the configurable CAM cell design to produce a ternary CAM design including a single ternary CAM cell with two search ports, and outputting the ternary CAM design by the computer. | 2011-04-14 |
20110088006 | METHOD FOR LAYOUT VERIFICATION OF SEMICONDUCTOR INTEGRATED CIRCUIT - A method for verifying a match between layout patterns of elements provided in a semiconductor integrated circuit, includes a verification condition setting step of setting a verification condition including information about paired elements whose layout patterns should match each other, a layout data input step of inputting layout data including pattern information and arrangement information of the paired elements, and a mismatched pattern parameter calculation layout verifying step of comparing the layout patterns of the paired elements based on the verification condition and the layout data to calculate a distance between the paired elements and at least one mismatched pattern. | 2011-04-14 |
20110088007 | BALL GRID ARRAY AND CARD SKEW MATCHING OPTIMIZATION - A method, system, and computer storage device simultaneously compare the timing of conductive signal paths in a substrate and a printed circuit board to achieve a predetermined signal timing goal. Specifically, the method automatically calculates a substrate-based length of time it will take a signal to pass within each substrate conductor (within a conductor group) and automatically calculates a board-based length of time it will take a signal to pass within each of board conductors (within the conductor group). The method automatically adds the substrate-based length of time and the board-based length of time for each of the combined substrate-board conductors to produce a combined timing for each of the combined substrate-board conductors. The method automatically compares the combined timing of each the combined substrate-board conductors to determine whether the combined substrate-board conductors pass signals within a predetermined timing variance limit. | 2011-04-14 |
20110088008 | METHOD FOR CONVERSION OF COMMERCIAL MICROPROCESSOR TO RADIATION-HARDENED PROCESSOR AND RESULTING PROCESSOR - A method is provided to convert commercial microprocessors to radiation-hardened processors and, more particularly, a method is provided to modify a commercial microprocessor for radiation hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation hardened applications. The method is implemented in a computing infrastructure and includes evaluating a probability that one or more components of an existing commercial design will be affected by a single event upset (SEU). The method further includes replacing the one or more components with a component immune to the SEU to create a final device. | 2011-04-14 |
20110088009 | TUTORIAL SYSTEMS FOR CODE CREATION AND PROVENANCE TRACKING - The disclosed embodiments of computer systems and techniques facilitate creation and retrieval of software code. Provenance tracking at the step level allows for each step to be tracked to its original creator and to various remixes of the original in the line of provenance. | 2011-04-14 |
20110088010 | CONVERTING AN ACTIVITY DIAGRAM INTO CODE - An activity diagram can be converted into code, by traversing the activity diagram to identify the cycles in the activity diagram. Each identified cycle can be stored in a list of cycles. Intermixed cycles among the list of cycles can be resolved. When resolving, the identified cycles can be compared one to another to determine if they have common nodes. If so one of the cycles can be removed from the list of cycles. The other cycle can be labeled as a GOTO loop. The activity diagram can be traversed. For each traversed node, code statements can be generated based on the node type and the labels associated with the node. | 2011-04-14 |
20110088011 | Automated Enterprise Software Development - The preferred embodiment provides a system and method for automatically generating enterprise software applications with minimal level of manual coding. The preferred embodiment provide a graphical design tool that models an application using Unified Model Language (UML), validate the UML model, and automatically generate deployable application. The preferred embodiment also provides a framework of libraries that the target application can be build from. | 2011-04-14 |
20110088012 | Graphical Computer Programming - A computer program product and method for using a computer program product for graphically developing a computer program for execution at least in part on a separate host processor device, such as, a digital signal processor. The computer program product includes code for providing a graphical programming environment. The computer code which is used for developing the computer program includes a cell module for graphically representing a graphical control. The cell module does not contain any host processor specific code. The cell module may include code for rendering on the display of the computer that is operating as the programming environment one or more graphical controls. The cell module may also contain host processor independent code that accepts input from a user (parameter value) and converts the parameter value or applies an equation to the parameter value. The computer program also includes a plurality of algorithm modules, wherein each algorithm module provides functional code for the graphical control. The functional code is host processor specific code. The computer program also includes computer code for associating the cell module with one or more of the plurality of algorithm modules for developing the computer program. The computer program also includes code for defining an execution path amongst the algorithm modules. This can be achieved by graphically connecting the cell modules and defining an input and output. | 2011-04-14 |
20110088013 | METHOD AND SYSTEM FOR SYNCHRONIZING SOFTWARE MODULES OF A COMPUTER SYSTEM DISTRIBUTED AS A CLUSTER OF SERVERS, APPLICATION TO DATA STORAGE - A method for synchronizing software modules of an IT system distributed across plural servers interconnected as a network, each software module being executed on a server of the IT system for management of a set of data elements describing a service, and at least a part of descriptive data elements is replicated on plural software modules. The method includes: execution, on a first software module, of an action acting on a descriptive data element, transmission of a synchronization message identifying the action to all the other software modules of the IT system including a replication of this descriptive data element, and on receipt of this message by any of the software modules concerned, execution of the action identified on this software module so as to act on the replication of the descriptive data element located on this software module. | 2011-04-14 |
20110088014 | AUTOMATED TEST EXECUTION PLAN GENERATION - A set of user-configured testing parameters for a software application under test can be received by a test execution plan generation tool. At least one testing objective for the software application can be defined by user-configurable testing parameters. A test execution plan can be automatically generated utilizing the user-configured testing parameters and a predefined test execution plan data model. The predefined test execution plan data model can include testing metadata representing software testing domain data for a software testing system being used to evaluate the software application under test. The testing metadata can specify details of finite shared resources of a test center shared by all projects under test. The generated test execution plan can detail specific allocation of the finite shared resources dedicated towards at least one phase of testing the software application to satisfy the at least one testing objective for the software application. | 2011-04-14 |
20110088015 | SYSTEM AND METHOD FOR REMOTELY DEBUGGING APPLICATION PROGRAMS - A method, system, and apparatus for debugging an application program from a workstation that is remote from a server on which the application program resides includes invoking the application program from the workstation via a network interface; displaying a user frame at the workstation that includes information generated by the application program; providing a debug view option at the workstation for generating a debug frame of the application program; and displaying the debug frame at the workstation when the debug view option is selected. A user can select options to switch between the user frame and the debug frame. The debug frame includes information about one or more components of the application program such as a list of the variables or objects, and the fields, methods, and/or the constructors associated with them. When the debug view option is selected, the information for the user frame is saved, and can be restored to regenerate the information on the user frame when the user view option is selected. The developer can view internal, public, and private code associated with the application program without compromising the security of other application programs on the server. This ability to remotely debug application programs in accordance with the present invention is thus more time and cost efficient than previous methods, and also alleviates concerns about security and unauthorized access to the server. | 2011-04-14 |
20110088016 | PROGRAM ANALYSIS THROUGH PREDICATE ABSTRACTION AND REFINEMENT - An analysis engine is described for performing static analysis using CEGAR loop functionality, using a combination of forward and backward validation-phase trace analyses. The analysis engine includes a number of features. For example: (1) the analysis engine can operate on blocks of program statements of different adjustable sizes; (2) the analysis engine can identify a subtrace of the trace and perform analysis on that subtrace (rather than the full trace); (3) the analysis engine can form a pyramid of state conditions and extract predicates based on the pyramid and/or from auxiliary source(s); (4) the analysis engine can generate predicates using an increasingly-aggressive series of available discovery techniques; (5) the analysis engine can selectively concretize procedure calls associated with the trace on an as-needed basis and perform other refinements; and (6) the analysis engine can add additional verification targets in the course of its analysis, etc. | 2011-04-14 |
20110088017 | OFFLINE FORMAL VERIFICATION OF EXECUTABLE MODELS - A system and method for automatic formal verification of an executable system includes an assertion monitor configured to verify a system against an assertion in the specification. The assertion monitor includes a parser configured to generate a propositional formula representing an assertion in the specification using Boolean propositions, a filter configured to generate a trace of truth assignments for the propositional symbols and a trace verifier configured to verify the assertion using the trace of truth assignments for the propositional symbols and the propositional formula. | 2011-04-14 |
20110088018 | METHODS AND APPARATUS FOR TESTING USER INTERFACES - Methods and apparatus for testing user interfaces are disclosed herein. An example method includes extracting object data from a file associated with a user interface; storing a plurality of object definitions corresponding to the extracted object data in a computer readable storage medium; and generating, at a computer having a tangible memory, a test script for the user interface using the object definitions, wherein the test script is to be generated based on one or more test definitions defining one or more attributes of the object definitions to be tested in the test script, and wherein the test script is to be generated based on one or more automation rules defining how the object definitions are to be tested. | 2011-04-14 |
20110088019 | Asynchronous Preemptive Edit Time Semantic Analysis of a Graphical Program - System and method for analyzing a graphical program. A graphical program is displayed on a display. A semantic edit operation is performed on the graphical program in response to user input. The semantic edit operation is performed by a first process. Semantic analysis of the graphical program is performed by a second process in response to performing the semantic edit operation, where the second process is asynchronous with respect to the first process. Results from the semantic analysis of the graphical program are displayed in response to completion of the semantic analysis. If during the semantic analysis, another semantic edit operation is performed on the graphical program, the semantic analysis may be preemptively terminated and re-initiated. Displaying results from the semantic analysis of the graphical program may then include displaying results from the re-initiated semantic analysis of the graphical program in response to completion of the re-initiated semantic analysis. | 2011-04-14 |
20110088020 | PARALLELIZATION OF IRREGULAR REDUCTIONS VIA PARALLEL BUILDING AND EXPLOITATION OF CONFLICT-FREE UNITS OF WORK AT RUNTIME - An optimizing compiler device, a method, a computer program product which are capable of performing parallelization of irregular reductions. The method for performing parallelization of irregular reductions includes receiving, at a compiler, a program and selecting, at compile time, at least one unit of work (UW) from the program, each UW configured to operate on at least one reduction operation, where at least one reduction operation in the UW operates on a reduction variable whose address is determinable when running the program at a run-time. At run time, for each successive current UW, a list of reduction operations accessed by that unit of work is recorded. Further, it is determined at run time whether reduction operations accessed by a current UW conflict with any reduction operations recorded as having been accessed by prior selected units of work, and assigning the unit of work as a conflict free unit of work (CFUW) when no conflicts are found. Finally, there is scheduled, for parallel run-time operation, at least two or more processing threads to process a respective the at least two or more assigned CFUWs. | 2011-04-14 |
20110088021 | Parallel Dynamic Optimization - Technologies are generally described for parallel dynamic optimization using multicore processors. A runtime compiler may be adapted to generate multiple instances of executable code from a portable intermediate software module. The various instances of executable code may be generated with variations of optimization parameters such that the code instances each express different optimization attempts. A multicore processor may be leveraged to simultaneously execute some, or all, of the various code instances. Preferred optimization parameters may be determined from the executable code instances that may correctly complete in the least time, or may use the least amount of memory, or that may prove superior according to some other fitness metric. Preferred optimization parameters may be used to seed future optimization attempts. Output generated from the preferred instances may be used as soon as the first instance correctly completes block. | 2011-04-14 |
20110088022 | Dynamic Optimization Using A Resource Cost Registry - Technologies are generally described for runtime optimization adjusted dynamically according to changing costs of one or more system resources. Multicore systems may encounter dynamic variations in performance associated with the relative cost of related system resources. Furthermore, multicore systems can experience dramatic variations in resource availability and costs. A dynamic registry of system resource costs can be utilized to guide dynamic optimization. The relative scarcity of each resource can be updated dynamically within the registry of system resource costs. A runtime code generating loader and optimizer may be adapted to adjust optimization according to the resource cost registry. Information regarding system resource costs can support optimization tradeoffs based on resource cost functions. | 2011-04-14 |
20110088023 | SYSTEM AND METHOD FOR STATIC DETECTION AND CATEGORIZATION OF INFORMATION-FLOW DOWNGRADERS - A system and method for static detection and categorization of information-flow downgraders includes transforming a program stored in a memory device by statically analyzing program variables to yield a single assignment to each variable in an instruction set. The instruction set is translated to production rules with string operations. A context-free grammar is generated from the production rules to identify a finite set of strings. An information-flow downgrader function is identified by checking the finite set of strings against one or more function specifications. | 2011-04-14 |
20110088024 | SOFTWARE UPDATES VIA DIGITAL AUDIO MEDIA - Systems and methods for processing encoded digital data for programming a device to be re-programmed in an audio playback system. The system includes an audio media source containing digital data having audio data or encoded data in an audio data format. An audio media reader reads the digital data from the audio media source. A stream detector receives the digital data from the audio media reader and detects whether the received digital data includes encoded data formatted as audio data or audio data. An audio receiver device receives the audio data and processes the audio data for playback. A device to be re-programmed uses the encoded data formatted as audio data. | 2011-04-14 |
20110088025 | USE OF SOFTWARE UPDATE POLICIES - A portable device may be roamed from one host to another. In one example, the portable device stores software that is to be executed by a host. The host may maintain a policy that governs which software may be executed on the host. When the portable device is connected to a host, the host checks the software version installed on the guest to determine whether that software version is compatible with the host's policy. If the guest's software does not comply with the host's policy, then the host installs a compatible version. If the guest's version complies with the policy and is newer than the host's version, then the host copies the guest's version to the host and propagates it to other guests. In this way, newer versions of software propagate between hosts and guests, while also respecting specific execution policies of the various hosts. | 2011-04-14 |
20110088026 | MOBILE DEVICE APPLICATION UPDATE MANAGEMENT - A method of updating an application on a mobile device is disclosed. One embodiment obtains a device identifier from the mobile device. In addition, at least one updatable application associated with the device identifier that is available to install on the mobile device is obtained from an installation manager. The at least one updatable application is installed on the mobile device and the installation manager is updated to represent that the at least one updatable application is installed on the mobile device. | 2011-04-14 |
20110088027 | TRACKING BLOCK-LEVEL WRITES - One embodiment is a method of installing a block-level write tracking driver in a Microsoft Windows™ operating system so that no reboot of the system is need, another embodiment is a method of installing a block-level write tracking driver in a Linux operating system so that no reboot of the system is needed, and still another embodiment is a method of tracking block-level writes to snapshots under newer Microsoft Windows™ operating systems. | 2011-04-14 |
20110088028 | Mobile Point-Of-Presence for On Demand Network Client Services and Security - Devices, systems and methods are disclosed which relate to implementing a point-of-presence system on a mobile service network. Such a point-of-presence system includes a mobile device communications network; a mobile device; a point-of-presence logic installed on a mobile device; and an application server in communication with the point-of-presence logic via the communications network. Communications between the point-of-presence logic and the network and application server include network data, configuration, and/or installation of connection and device management applications. This point-of-presence system constitutes a mechanism for the service provider to best optimize network resources, even at the device level, while providing optimum network service to mobile users—even for mobile devices that have not been pre-configured for the mobile service network. | 2011-04-14 |
20110088029 | SERVER IMAGE CAPACITY OPTIMIZATION - Embodiments of the invention provide a solution to optimize/minimize the total capacity of Gold Image within the entire datacenter which utilizes a scale-out type of storage systems. A method of server image provisioning comprises checking whether a gold image exists in a first storage system, the gold image being one of a real gold image or a virtual gold image; if no gold image exists in the first storage system, searching a remainder of the storage systems until a real gold image is found in a second storage system; after finding the real gold image in the second storage system, creating a virtual gold image in the first storage system, the virtual gold image in the first storage system being associated with the real gold image in the second storage system; and creating a snapshot volume in the first storage system based on the virtual gold image. | 2011-04-14 |
20110088030 | Efficient Virtualization of Input/Output Completions for a Virtual Device - Completion interrupts corresponding to I/O requests issued by a virtual machine guest, which runs on a host platform, are virtualized in such a way that I/O completion interrupts to the requesting guest are delivered no faster than it can stably handle them, but, when possible, faster than the nominal speed of a virtual device to which a virtual machine addresses the I/O request. In general, completion events received from the host platform in response to guest I/O requests are examined with respect to time. If enough time has passed that the virtual device would normally have completed the I/O request, then the completion interrupt is delivered to the guest. If the nominal time has not elapsed, however, the invention enqueues and time-stamps the event and delivers it at the earliest of a) the normal maturity time, or b) at a safepoint. | 2011-04-14 |
20110088031 | VIRTUAL COMPUTER DEVICE, VIRTUAL COMPUTER SYSTEM, VIRTUAL COMPUTER PROGRAM, AND CONTROL METHOD - Lack of freedom in the operation of terminals has been a problem. On the other hand, there has been concern that allowing freedom of operation would negatively impact systems. A virtual computer device is provided with a memory unit and a CPU. The CPU executes an access program, which has the CPU input from or output to the memory unit in accordance with a received input/output request, and a VM monitor which implements a virtual computer in the CPU. Under the control of the VM monitor, the CPU executes a VM program which sends a input/output request to the access program, and via the access program, has the CPU input from or output to the storage device. | 2011-04-14 |
20110088032 | METHOD AND APPARATUS FOR CONFIGURING A HYPERVISOR DURING A DOWNTIME STATE - In one embodiment, a computer system comprises a host machine comprising a plurality of compute resources, at least one management processor, a hypervisor, at least one persistent state data store location coupled to the host machine, wherein the persistent state data store location stores configuration data for the hypervisor, and a persistent state module coupled to a management processor coupled to the host machine, wherein the persistent state module maps hypervisor configuration data to a persistent state data store. | 2011-04-14 |
20110088033 | PROVIDING THREAD SPECIFIC PROTECTION LEVELS - A method, system and computer program product is disclosed for providing thread specific protection levels in a multithreaded processing environment. The method comprises generating a group of threads in a process, one of the group of threads opening a thread entity, and that one of the group of threads specifying one or more levels of access to the thread entity for the other threads. In one embodiment, when a first of the threads attempts to perform a specified operation on the thread entity, the method of this invention determines whether that first thread is the one of the group of threads that opened the thread entity. When the first thread is not that one of the group of threads, the first thread is allowed to perform the specified operation if and only if that operation is permitted by the specified one or more levels of access. | 2011-04-14 |
20110088034 | METHOD AND SYSTEM FOR MANAGING RESOURCES - A method, computer program product, and computer system for generating a timing sequence for activating resources linked through time dependency relationships. A Direct Acyclic Graph (DAG) includes nodes and directed edges. Each node represents a unique resource and is a predefined Recovery Time Objective (RTO) node or an undefined RTO node. Each directed edge directly connects two nodes and represents a time delay between the two nodes. The nodes are topologically sorted to order the nodes in a dependency sequence of ordered nodes. A corrected RTO is computed for each ordered node after which an estimated RTO is calculated as a calculated RTO for each remaining undefined RTO node. The ordered nodes in the dependency sequence are reordered according to an ascending order of the corrected RTO of the ordered nodes to form a timing sequence for activating the unique resources represented by the multiple nodes. | 2011-04-14 |
20110088035 | RETROSPECTIVE EVENT PROCESSING PATTERN LANGUAGE AND EXECUTION MODEL EXTENSION - A novel and useful method, system and framework for extending event processing pattern language to include constructs and patterns in the language to support historical patterns and associated retrospective event processing that enable a user to define patterns that consist of both on-line streaming and historical (retrospective) patterns. This enables entire functions to be expressed in a single pattern language and also enables event processing optimization whereby function processing is mapped to a plurality of event processing agents (EPAs). The EPAs in turn are assigned to a physical processor and to threads within the processor. | 2011-04-14 |
20110088036 | Automated Administration Using Composites of Atomic Operations - Various techniques for automatically administering software systems using composites of atomic operations are disclosed. One method, which can be performed by an automation server, involves accessing information representing an activity that includes a first operation and a second operation. The information indicates that the second operation processes a value that is generated by the first operation. The method generates a sequence number as well as an output structure, which associates the sequence number with an output value generated by the first operation, and an input structure, which associates the sequence number with an input value consumed by the second operation. The method sends a message, via a network, to an automation agent implemented on a computing device. The computing device implements a software target of the first operation. The message includes information identifying the first operation as well as the output structure. | 2011-04-14 |
20110088037 | SINGLE-STACK REAL-TIME OPERATING SYSTEM FOR EMBEDDED SYSTEMS - A real time operating system (RTOS) for embedded controllers having limited memory includes a continuations library, a wide range of macros that hide continuation point management, nested blocking functions, and a communications stack. The RTOS executes at least a first and second task and uses a plurality of task priorities. The tasks share only a single stack. The task scheduler switches control to the highest-priority task. The continuations library provides macros to automatically manage the continuation points. The yield function sets a first continuation point in the first task and yields control to the task scheduler, whereupon the task scheduler switches to the second task and wherein at a later time the task scheduler switches control back to the first task at the first continuation point. The nested blocking function invokes other blocking functions from within its body and yields control to the task scheduler. | 2011-04-14 |
20110088038 | Multicore Runtime Management Using Process Affinity Graphs - Technologies are generally described for runtime management of processes on multicore processing systems using process affinity graphs. Two or more processes may be determined to be related when the processes share interprocess messaging traffic. These related processes may be allocated to neighboring or nearby processor cores within a multicore processor using graph theory techniques as well as communication analysis techniques to evaluate interprocess communication needs. Process affinity graphs may be established to aid in determining grouping of processors and evaluating interprocess message traffic between groups of processes. The process affinity graphs may be based upon process affinity scores determined by monitoring and analyzing interprocess messaging traffic. Process affinity graphs may further inform splitting process affinity groups from one core onto two or more cores. | 2011-04-14 |
20110088039 | Power Monitoring and Control in Cloud Based Computer - According to another general aspect, a method for displaying the system resource usage of a computer may include identifying the number of open tabs in one or more tabbed based browsers running on the computer. The method may include determining the system resource usage of each tab. The method may further include displaying the system resource usage of each tab in a system resource meter. | 2011-04-14 |
20110088040 | Namespace Merger - In a virtualization environment, there is often a need for an application to access different resources (e.g., files, configuration settings, etc.) on a computer by name. The needed resources can potentially come from any one of a plurality of discrete namespaces or containers of resources on the computer. A resource name can identify one resource in one namespace and another resource in another namespace, and the namespaces may have different precedence relative to one another. The resources needed by the application can be accessed by enumerating names in a logical merger of the namespaces such that as new names in the logical merger are needed they are dynamically chosen from among the namespaces. When two resources in different namespaces have a same name, the resource in the higher precedence namespace can be chosen. | 2011-04-14 |
20110088041 | Hardware support for thread scheduling on multi-core processors - A method, device, and system are disclosed. In one embodiment the method includes scheduling a thread to run on first core of a multi-core processor. The determination as to which core the thread is scheduled on uses one or more processes. These processes may include ranking all of the cores specific to a workload of the thread, establishing a current utilization of each core of the multi-core processor, and calculating an inter-core migration cost for the thread. | 2011-04-14 |
20110088042 | COMBINING MONITORING TECHNIQUES - A first subset of information about a transaction is received from a first application. The first application has a first monitoring technique. A second subset of information about the transaction is received from a second application. The second application has a second monitoring technique that is different from the first monitoring technique. The first subset of information is combined with the second subset of information to produce composite information about the transaction. | 2011-04-14 |
20110088043 | JAVA VIRTUAL MACHINE HAVING INTEGRATED TRANSACTION MANAGEMENT SYSTEM AND FACILITY TO QUERY MANAGED OBJECTS - A computing system and method is a specification of user-defined business logic is provided as JAVA program instructions (or another programming language) which does not natively provide for specification of full transactionality, to accomplish a fully transactional application, including executed managed objects. The managed objects are persisted in a shared memory of the computing system, such that a scope of the objects is global to the fully transactional application. Furthermore, a catalog of the managed object is maintained. A query interface is provided for querying the managed objects, in order to receive a query from an application, to process the catalog, and to provide a result indication of at least one of the managed objects back to the querying application. Thus, for example, the application may process the managed objects that are indicated in the query result. | 2011-04-14 |
20110088044 | METHODS AND SYSTEMS FOR IMPLEMENTING A LOGICAL PROGRAMMING MODEL - Embodiments of the invention provide systems and methods for implementing a logical programming model that separates a resource from its state and processes the resource and the state of the resource independently. According to one embodiment, a method of method for implementing a logical programming model can comprise defining a resource and defining one or more state objects for the resource. An application can be defined including at least one instance of the defined resource and at least one instance of the defined one or more state objects. Logic of the application can handle the one or more state objects independent from the resource. | 2011-04-14 |
20110088045 | LINKING TRANSACTIONS - A first unique identifier is received from a first monitoring agent. The first unique identifier may be based on first natural data associated with a transaction. A second unique identifier is received from a second monitoring agent. The second unique identifier may be based on second natural data associated with the transaction. The first unique identifier may be correlated with the second unique identifier to monitor the transaction through a plurality of application environments. | 2011-04-14 |
20110088046 | SYSTEM LANDSCAPE AWARE INTER-APPLICATION COMMUNICATION INFRASTRUCTURE - This disclosure relates to systems, methods, and software that involve system landscape aware inter-application communication infrastructure. This inter-application communication infrastructure may implement one metamodel to describe how an application could participate in an inter-application communication. The metamodel can describe the input parameters accepted but the application and the possible output of it. Based on the metadata, which would be exposed or otherwise available for involved applications, there is a protocol defining the communication flows between applications. | 2011-04-14 |
20110088047 | Runtime Emulating Static Thread Local Storage of Portable Executable Software Code - A computer readable storage medium containing a program which, when executed by a processor, performs an operation of emulating static thread local storage of an executable software code at runtime, is disclosed. The operation includes executing the executable software code within a process memory space. During the execution of the executable software code, an occurrence of an event that is associated with a thread create operation is monitored. When the monitored event occurs, a thread data block duplicate is established within the process memory space and associated with a thread created by the thread create operation. The thread data block duplicate is configured to be accessed by executing a thread local storage callback function. | 2011-04-14 |
20110088048 | Disc Picking Device and Disc Processing Apparatus Having the Same - A disc transporting mechanism includes a gripping mechanism having a plurality of gripping members configured to grip a disc, a transport arm provided with the gripping mechanism, and a moving mechanism configured to move up and down the transport arm. The transport arm is connected to the moving mechanism through an elastic member. | 2011-04-14 |
20110088049 | SLOT-IN OPTICAL DISK DRIVE WITH LIFTING EJECTION DEVICE - A slot-in optical disk drive with lifting ejection device is disclosed. A sliding device which has a first guiding slot and a second guiding slot is driven by a transmission unit. A sliding bolt protruded from a traverse is inserted into the first guiding slot, and the traverse connects with the sliding device. A lifting ejection device has a column vertically set in a housing and a sleeve which covers the column. A guiding pin protruded from the sleeve is inserted into the second guiding slot and is driven by the sliding device to disengage an optical disk. | 2011-04-14 |
20110088050 | Holographic Film and Recording Method - This invention relates to holographic film for recording multicolor volume holograms, especially full color volume reflection holograms, and to manufacturing techniques for such film, and to corresponding methods of recording multicolor and full-color volume, in particular volume reflection holograms. We describe a holographic film for recording a multicolor volume hologram, the film comprising: a carrier; a first photosensitive recording layer sensitive to one or both of red and green laser light; and a second photosensitive recording layer sensitive to blue laser light. Both the first and second photosensitive recording layers comprise silver halide and have a grain size of less than 30 nm, and at least one of the photosensitive recording layers has a thickness of greater than 3 μm and less than 5 μm. | 2011-04-14 |
20110088051 | Method, Apparatus and System for Recommending Media Content - A method, an apparatus, and a system for recommending media content beyond existing single form of media content recommendation through selection of content from Electronic Program Guide (EPG) menus. The method includes: detecting media content recommendation trigger events; generating media content recommendation information according to a preset media content recommendation policy when a media content recommendation trigger event is detected; and sending the generated media content recommendation information to a user terminal. The method, apparatus and system for recommending media content are applicable to Internet Protocol Television (IPTV) networks. | 2011-04-14 |
20110088052 | METHODS AND APPARATUS TO DETERMINE AUDIENCE VIEWING OF VIDEO-ON-DEMAND PROGRAMS - Methods and apparatus to determine audience viewing of video-on-demand programs are disclosed. An example method disclosed herein to monitor presentation of video-on-demand content comprises obtaining server metering data determined using a server metering device in communication with a video-on-demand server, the video-on-demand server to provide the video-on-demand content specifically to a first subscriber site among a plurality of subscriber sites, obtaining subscriber metering data corresponding to media content presented at the first subscriber site, the subscriber metering data determined using a site metering device different from the server metering device, and combining the subscriber metering data and the server metering data to monitor the video-on-demand content provided specifically to the first subscriber site. | 2011-04-14 |
20110088053 | METHODS AND APPARATUS TO ADJUST SIGNATURE MATCHING RESULTS FOR AUDIENCE MEASUREMENT - Methods and apparatus to adjust signature matching results for audience measurement are disclosed. An example method to adjust a signature matching result associated with monitoring a media content presentation disclosed herein comprises obtaining a monitored signature representative of the monitored media content presentation from a monitoring device, obtaining an environmental characteristic associated with the monitored signature from the monitoring device, and adjusting the signature matching result using an adjustment value when the monitored signature is determined to match a reference signature representative of reference media content, the adjustment value selected from a plurality of adjustment values based on the matched reference signature and the environmental characteristic. | 2011-04-14 |
20110088054 | System and Method to Obtain Content and Generate Modified Content Based on a Time Limited Content Consumption State - Methods and systems to obtain content and generate modified content based on a time limited content consumption information is disclosed. In one embodiment, content may be obtained from a content source and modified based on the time limited content consumption information. In one embodiment, such modified content is stored in a memory of a content modification system and subsequently delivered to a target consumer. | 2011-04-14 |
20110088055 | SYSTEM AND METHOD FOR PRESENTING DURING A PROGRAMMING EVENT AN INVITATION TO FOLLOW CONTENT ON A SOCIAL MEDIA SITE - A system and method for linking the account of a subscriber of a multi-channel video programming distributor (MVPD) network to an account of the subscriber on a social networking site and to receive invitations to follow a page or join a group hosted on a social networking site that is relevant to the video content being displayed on the subscriber's television. | 2011-04-14 |
20110088056 | PORTABLE WIRELESS ACCESSORY FOR A WIRELESS COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, a portable wireless High Definition Multimedia Interface (HDMI) accessory for a wireless communication system, including: an HDMI processor which receives an audio/video encrypted signal and sends out an audio/video stream; a wireless HDMI module which receives the audio/video stream from the HDMI processor and transmits the audio/video stream wirelessly; a housing assembly for carrying the HDMI processor and the wireless HDMI module; and a coupling member which is operative to be coupled to a media processor via a port. Other embodiments are disclosed. | 2011-04-14 |
20110088057 | CONSUMER MANAGED CREDIT BASED ADVERTISEMENTS - A device may include a storage device and a processor. The storage device may be configured to store video programs and advertisements. The processor may be configured to display a graphical user interface that provides a list of video programs and advertisements stored in the storage device, receive a user selection of a video program and advertisement in the list of video programs and advertisements, provide the advertisement to a content presentation device for user viewing, track whether the device plays the advertisement, determine a number of credits for playing the advertisement, and credit the user account based on the number of credits. | 2011-04-14 |
20110088058 | METHOD AND APPARATUS FOR TRANSMITTING EMERGENCY ALERT MESSAGES - A method and apparatus for transmitting emergency messages is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a set top box in communication with an interactive television network where the set top box has a controller to receive a notification signal from a network server of the interactive television network where the notification signal is associated with an emergency alert message received by the network server from an emergency alert system, determine a language for presenting the emergency alert message, select a first multicast of the emergency alert message from a group of multicasts based on the determined language where each of the group of multicasts of the emergency alert message being in a different language, transmit a request to the network server to join the first multicast of the emergency alert message, and receive the first multicast of the emergency alert message. Additional embodiments are disclosed. | 2011-04-14 |
20110088059 | RESPECTING PRIVACY IN A TARGETED ADVERTISING SYSTEM - A method and apparatus for delivering targeted assets to subscribers using communication media, wherein each subscriber has a set top box, the method comprising the steps of generating a profile of each subscriber at the set top box associated with the respective subscriber, broadcasting an asset to all subscribers along with target information; and delivering the asset only to subscribers whose profiles match the target information. The delivery of the asset, and accumulated information from delivery of the asset to other subscribers, is reported to a user using an asset delivery notification, without identifying the subscriber to the user. A privacy manager is used to strip identification information from the asset delivery notification. The profile, which may include real time information, for example on whether the subscriber set is on and what it is tuned to, is generated by monitoring the viewing habits of the subscriber and storing the information at a set top box. | 2011-04-14 |
20110088060 | INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM FOR DETERMINING USER VALUES FOR DEMOGRAPHIC CATEGORIES - An interactive television program guide system for determining user input values for demographic categories is provided. The system includes user television equipment having a receiver for receiving program guide information for the interactive television program guide, a user input receiver for receiving user input from user interface, such as a remote control, a microprocessor which utilizes the user input received to determine user values for demographic categories, and memory for storing the user values determined. In one illustrative use of the system for targeting advertisements to a user of the interactive television program guide, the receiver also receives advertisements, where the advertisements have preselected values for specified demographic categories. The user television equipment, preferably using microprocessor, compares the preselected values for the specified demographic categories associated with the advertisements with values of corresponding demographic categories stored in memory to determine which advertisements should be displayed. Those advertisements determined to be displayable based upon the comparison are then displayed. | 2011-04-14 |
20110088061 | DISPLAYING ADVERTISEMENTS ON BLANK TELEVISION OUTPUT - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing television advertisements while a viewing device is tuning to a channel. In one aspect, a viewing device, in response to receiving a signal to tune to a channel, selects advertisement data for an advertisement from a data storage device storing advertisement data for one or more advertisements, and generates a video signal when tuning to the channel, the video signal generated only for the duration that the viewing device is tuning to the channel and for displaying on the television device, and the video signal causing the advertisement to be displayed on the television device. | 2011-04-14 |
20110088062 | PROXY FOR VIDEO ON DEMAND SERVER CONTROL - A video on demand system includes a head-end coupled through a proxy server to plural client terminals. The proxy server performs (or cooperates with another component in performing) various functions, including user interface definition, security, system administration (e.g. channel management, load distribution, and failover), and protocol translation. | 2011-04-14 |
20110088063 | System and Method for Television Programming Data Management - A system, method, and service of managing data comprises establishing a computerized user profile guideline corresponding to selected television programming interests of a user; instructing a processor to manage data based on the computerized user profile guideline, wherein the data is received from a television programming broadcaster; and managing access to specified television programming when the computerized user profile guideline corresponding to the selected television programming interests of the user is satisfied. The process of managing access may comprise alerting the user with information pertaining to the specified television programming. | 2011-04-14 |
20110088064 | Individual internet video link channel - A system and method for establishing and provisioning a new Internet Video Link (IVL) category under user control and utilizing user requests for locating and including preferred video content. The new IVL category will include video content located on a local device as well as video content retrieved from any interne URL provided by a user. The IVL category is built in the background and contains a category as a directory of video content and channels as sub-directories containing subsets of the video content described by the category. The user may also input keywords for use in searching for preferred video content so as to establish a mix of video content concatenated into a single mix channel for use in viewing only those video content items associated with the keywords supplied by the user. Alternatively, the mix channel may be provisioned by locating and mixing together video content that has similar metadata tags associated with the user preferred video content. The user may also receive recommendations for IVL content from other users that is similar to the content preferred by the user. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2011-04-14 |
20110088065 | Time Shifting Enhanced Television Triggers - Enhanced television broadcasts including triggers with expires attributes may be utilized in a variety of situations where the expires attribute may adversely affect the utilization of the trigger. For example, in situations where the broadcast is recorded, playback may be enabled even after the trigger expiration. Similarly, local affiliates or FNOCs may rebroadcast enhanced television content by adjusting the expires attributes of the original trigger. | 2011-04-14 |
20110088066 | NAVIGATION METHOD OF MOBILE TERMINAL AND APPARATUS THEREOF - A method of controlling a television receiver, and which includes receiving, via an input unit, an automatic channel setting command for automatically setting channels; searching, via a processor, television broadcast channels including television airwave and cable channels and media sources different than the television airwave and cable channels; and assigning, via the processor, preset channels to the television broadcast channels and assigning non-preset channels to the media sources found in the searching step. | 2011-04-14 |
20110088067 | BOOKING CONTROL APPARATUS, BOOKING EXECUTION APPARATUS, BOOKING CONTROL SYSTEM, AND BOOKING CONTROL METHOD - A remote controlling apparatus ( | 2011-04-14 |
20110088068 | LIVE MEDIA STREAM SELECTION ON A MOBILE DEVICE - A method may include establishing, via a mobile device, a plurality of media streaming sessions with a respective plurality of source devices. A plurality of media streams may be received at the mobile device from respective plurality of source devices. Representations of the plurality of received media streams may be displayed at the mobile device. A user selection of a particular one of the plurality of received media streams may be received. An output stream that includes the particular one of the plurality of received media streams may be outputted. | 2011-04-14 |
20110088069 | NETWORK DEVICE, INFORMATION PROCESSING APPARATUS, STREAM SWITCHING METHOD, INFORMATION PROCESSING METHOD, PROGRAM, AND CONTENT DISTRIBUTION SYSTEM - There is provided a network device including a stream analysis section for detecting a latest time point of distribution of the reference compressed video data after analyzing each of the multiple compressed data streams generated by single video/audio content, a distribution request processing section for receiving a distribution request for video/audio content transmitted from an information processing apparatus as well as using a distribution time point of the reference compressed video data detected by the stream analysis section to select a compressed data stream to be distributed to the information processing apparatus among the multiple compressed data streams corresponding to the video/audio content related to the distribution request, and a distribution switching section for switching the compressed data streams to be distributed to the information processing apparatus that transmitted the distribution request into the compressed data stream selected by the distribution request processing section. | 2011-04-14 |
20110088070 | ACCESSING REMOTE VIDEO DEVICES - A control server receives a local input to control a remote video device and sends an indication of the local input to the remote video device to control, access, or operate the remote video device. Video data indicative of images provided by the remote video device in response to the local input are relayed to the control server by the remote video device or associated components. A plurality of remote video devices can be simultaneously controlled, accessed, or operated. Control code sets for remote video devices are mapped to a local interface control set. Local input is translated to a remote video device command based on such mappings. | 2011-04-14 |
20110088071 | SYSTEM OF PROVIDING DATA FOR ENTERTAINING PRESENTATIONS TO AT LEAST ONE AUDIENCE - The present invention relates to a system and to a method for providing data for entertaining presentations to at least one audience, such as data for video and audio presentations in cinemas, theater rooms or the like. In particular data for computer-based entertainment such as so-called theater gaming shall be provided. The system of the invention comprises: at least one content server providing content data, the data representing at least content information for a video presentation to be displayed to the audience; and at least one computing server computing output data from said content data, the output data representing at least a video signal for controlling a display device. The computing serves can be part of the Internet to form an “Online Gaming Server Cloud” or can be installed at the locations of each cinema to form “Local Gaming Server Clouds”. | 2011-04-14 |
20110088072 | Distributed Diagnostics for Internet Video Link - In one embodiment consistent with the invention a method of quality of service (QOS) data aggregation and service management for Internet Protocol Television (IPTV) involves receiving data from a plurality of DDRIVL collector devices representing QOS service for sets of IPTV content providers assigned to each collector device, with each collector device being in a separate specified region of Internet service; evaluating from a geographic and interconnection perspective the data from the plurality of collector devices to isolate IPTV receivers located in areas where problems with IPTV service is likely to be occurring; and populating the isolated IPTV receivers with channel set tuning information that either excludes or flags the channels that may be having problems with IPTV service. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2011-04-14 |
20110088073 | USER-CONFIGURED BACKGROUND CHANNELS IN INTERNET-PROTOCOL TELEVISION - A method and system for implementing background channels includes storing configuration information for a user of a multimedia content distribution network (MCDN). The MCDN user may receive and view a selected channel at an MCDN client. When an exception condition occurs, an indication of a background channel may be displayed to the MCDN user. The configuration information may include user content preferences for matching to metadata in multimedia content to generate the exception condition, as well as an identifier for a desired background channel. | 2011-04-14 |
20110088074 | Multimedia Content Distribution Management - A method of managing distribution of multimedia content is disclosed. The method includes receiving multimedia content from a communications network at a communications gateway associated with a customer premises. The communications gateway encodes the multimedia content based on a heartbeat signal that is superimposed on an alternating current (AC) electrical power signal associated with an electrical wiring system of the customer premises. The communications gateway wirelessly transmits the encoded multimedia content. | 2011-04-14 |
20110088075 | System and method for distributing auxiliary data embedded in video data - A system and method for distributing auxiliary data embedded in video data includes a content source that embeds the auxiliary data into the video data. The content source then encodes the video data together with the auxiliary data to create a distribution multiplex including compressed video data. A decoder receives and decompresses the distribution multiplex to reproduce the video data with the auxiliary data embedded. A television or other device then detects and extracts the auxiliary data from the video data. The television or other device processes the auxiliary data to support a variety of possible interactive applications including displaying a synchronized widget on a display of the television. | 2011-04-14 |
20110088076 | System and Method for Media Adaptation - A system and method for media adaptation are provided. A method for providing media to an electronic device includes receiving a request for a media with a set of characteristics, and determining if the media with the set of characteristics resides in a media storage. The method also includes if the media with the set of characteristics resides in the media storage, retrieving the media with the set of characteristics from the media storage. The method further includes if the media with the set of characteristics does not reside in the media storage, transcoding an alternate media with an alternate set of characteristics to produce a transcoded media with the set of characteristics. The method additionally includes providing the media with the set of characteristics from the media storage or the transcoded media with the set of characteristics to the electronic device. | 2011-04-14 |
20110088077 | DOWNSTREAM BANDWIDTH CONDITIONING DEVICE - A downstream bandwidth conditioning device includes a forward path. A coupler is connected within the forward path providing a secondary path. A tuner connected to the coupler is tunable based on an input from a microprocessor. The tuner provides a tuner output of a selected channel, the selected channel being at least one high frequency channel and one low frequency channel. A channel analyzer connected to an output of the tuner provides the microprocessor with a modulation output that differs when the selected channel is an analog modulation versus a digital modulation. A slope adjustment circuit connected within the forward path between the coupler and the supplier side connector is adjustable based on an slope control output provided by the microprocessor. An output compensation circuit connected within the forward signal path between the coupler and the supplier side connector is adjustable based on a level control output from the microprocessor. | 2011-04-14 |
20110088078 | Authentication Failure in a Wireless Local Area Network - In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication process, thus affecting how subsequent scans—other than discovery scans—and connection attempts are handled. In the event of an authentication process failure, a mobile station bans or suppresses an access point with which the mobile station initiated the failed authentication process. The mobile station refrains from transmitting any communications addressed to the unique identifier of any banned access point. The mobile station may ignore any communications received from a banned access point. Suppressed access points are occasionally not made available to the mobile station for selection as a target for a connection attempt. | 2011-04-14 |
20110088079 | Dynamically Constructed Capability for Enforcing Object Access Order - Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A capability is dynamically constructed when the capability is needed. After the capability is used to access an object, a new capability is generated. In the alternative, multiple capabilities for enforcing an access order are generated independently of each other. The new capability is then employed by the same or another subject to access the object according to a prescribed access sequence. In this manner, at any particular time there is one capability valid to access the object by the appropriate subject. In addition, the capability includes information for verifying the authenticity of the capability and for specifying an expiration time associated with the capability. The technology may also be enhanced by providing a linkage between capabilities intended for use in a sequence. | 2011-04-14 |
20110088080 | Apparatus and Method for Authorization for Access Point Name (APN) Usage in a Specific Access - An apparatus and method for receiving a request for authorization and access from a requestor; determining the association of a care-of-address (CoA) in the request with an access technology used by the requestor; administering authorization rules based on the association of the care-of-address (COA) and the access technology; and determining either to allow access or to deny access to the requestor using results from administering the authorization rules. | 2011-04-14 |
20110088081 | METHODS FOR EFFECTING REMOTE INTERVIEW INVITATIONS - The invention comprises a method allowing for easy procurement of remote interviews across different web servers. While browsing through prospective candidate personal profiles (or online resume) on e.g. a job-marketplace website, a community website or a networking website, an inviter can directly with limited user input invite any given prospective candidate for a remote interview. By the click of a link embedded within the prospective candidate's profile, the system will invoke a second web server which selects a remote interview profile including information about the open (job) position, remote interview questions and parameters related to the remote interview. The system then associates the remote interview profile, the prospective candidate and the inviter and generates a remote interview invitation link including the associated parameters and sends it to the prospective candidate by e-mail. Once the prospective candidate clicks on the link included in the invitation e-mail she is directed to the remote interview web page which can commence immediately at the second web server. The remote interview webpage display customized look and feel based on the parameters associated with the remote interview profile. Since the associated parameters are included in the link, the second web server can retrieve and use the correct parameters for the remote interview. A candidate can also consent to embed the above remote interview mechanism to allow any inviter sees her online profile to directly invite her for an interview. | 2011-04-14 |
20110088082 | HOME IMAGE CONTENT SECURELY ISOLATED FROM CORPORATE IT - An exemplary apparatus includes one or more processors, volatile memory, a storage drive and circuitry configured to establish a network connection and to attempt to send credentials via an established network connection. Such an apparatus further includes circuitry configured, responsive to authentication failure after an attempt to send credentials, to release an implemented security policy and load an operating system stored on the storage drive, and, responsive to an attempt to send credentials, to maintain an implemented security policy and to use an operating system exposed via an established network connection and associated with the sent credentials Such an apparatus optionally includes circuitry configured to implement a security policy that isolates at least a portion of a local storage drive. Various other apparatuses, systems, methods, etc., are also disclosed. | 2011-04-14 |
20110088083 | METHOD AND SYSTEM FOR AUTHENTICATING A USER BASED ON A PHYSICAL OBJECT - An authentication method based on the use of an inanimate physical object that includes storing first object data in a storage medium, wherein the first object data is generated based on a first image of at least a portion of the physical object, capturing a second image of the at least a portion of the physical object, and generating second object data based on the second image. The method further includes searching the storage medium and determining that the second object data and the first object data are a match, and authenticating an individual associated with the physical object in response that determination. Also provided are embodiments of an authentication system that may be adapted to implement the method. | 2011-04-14 |
20110088084 | INFORMATION STORAGE APPARATUS, RECORDING MEDIUM, AND METHOD - A storage apparatus includes: an access acceptance unit to receive an access request associated with an access from a host apparatus; an authentication processing unit to judge whether the access is authenticated or unauthenticated; a storage unit including a first area that stores first data and a second area that stores second data serving as a substitute for the first data; a data switching unit to allow, when the access acceptance unit judges the access as authenticated, the access to the first area and switches the access to the second area in a case where the authentication processing unit judges the access as unauthenticated, the access to the second data in the second area being provided to disguise that the access was unauthenticated. | 2011-04-14 |
20110088085 | PROTECTING PASSWORD FROM ATTACK - A password may be provided along with a validation code, which can help prevent the password from being sent to the wrong recipient. When a password is created, a validation code may be created based on (a) the password, and (b) the identity of the target of authentication (TA) to which the password is intended to be sent. When a user is requested to provide a password, validation component intercepts the request and asks the user to enter both the password and validation code. The validation component then re-calculates the validation code based on the entered password and on the TA that is requesting the password. If the re-calculated validation code matches the validation code entered by the user, then the password is released to the user agent that the user uses to communicate with the TA, and the user agent sends the password to the requesting TA. | 2011-04-14 |
20110088086 | LOCKING AND UNLOCKING OF AN ELECTRONIC DEVICE USING A SLOPED LOCK TRACK - Systems, apparatuses, and methods that can facilitate securing an electronic device and associated information are presented. A security component facilitates display and operation of a lock track comprising a locked portion having a positive slope and an unlocked portion, including a chasm, that is adjacent to a high point of the positive-sloped unlocked portion of the lock track. A lock facilitator component (LFC) can be moved along the track between a low point of the locked portion and the unlocked portion. The LFC can be moved in response to received input, and if the input is not sufficient to move the LFC from the locked region to the unlocked region, the LFC can be moved back down the positive-sloped lock track to the low point. The security component can control information to be displayed in an overlay display region in accordance with security level(s) of the device or application. | 2011-04-14 |
20110088087 | METHOD FOR AUTHENTICATION - A method for authentication of a first party, A, to a second party, B, by a trusted third party, C, is disclosed. A is registered at C, and the method comprises the steps of receiving a identification data of A from A; determining, based on the identification data, if A has the right to request a random private key, RPK; and generating a temporary RPK. Further, C combines the RPK and a random open key, ROK, to form a single use temporary master authentication code; transmits the RPK to A; and, upon receipt of the RPK and the ROK from B, determines if the received RPK and ROK matches a valid single use temporary master authentication code; and authenticates, in case of match, A to B. The first party, A, may be any handheld device, such as a mobile phone, or a PDA, or a stationary device, such as a stationary computer or an ATM. The communication between the parties may be wired or wireless. A corresponding system is also disclosed. | 2011-04-14 |
20110088088 | Method of frame blocking for wireless device - A frame blocking method for wireless device comprises the steps of: receiving a frame; determining if a size of the frame complies with a predetermined size? If “YES” then proceed; determining if the frame complies with a predetermined frame format? If “YES” then proceed; determining if an IP address contained in the frame is the same with a currently using IP address pre-stored in the client device? If “NO” then ignore the frame, if “YES” then handle the frame by normal operations. Therefore, unnecessary frames can be blocked as early as possible so as to save power and improve overall communicating quality. | 2011-04-14 |
20110088089 | METHOD, APPARATUS AND SYSTEM FOR MANAGING PACKET DELIVERY - Portable electronic devices typically have reduced computing resources, including reduced available bandwidth to receive communications. A method, apparatus and system is provided to manage packet delivery to electronic devices to mitigate some of these problems. | 2011-04-14 |
20110088090 | ENHANCEMENTS TO CLAIMS BASED DIGITAL IDENTITIES - A system and method of identifying a user to a digital system is disclosed. The method includes receiving a request for a value of an identification claim of a digital identity from a relying party, allowing a user to select the digital identity via an identification selector, querying an identification provider for the value of the identification claim, and providing the value of the identification claim to the relying party. | 2011-04-14 |
20110088091 | METHODS AND APPARATUS TO MAINTAIN VALIDITY OF SHARED INFORMATION - Example methods and apparatus to maintain validity of shared information are disclosed. A disclosed example method involves receiving a communication requesting an extensible markup language (XML) document from an XML document management client associated with a principal. In addition, the example method involves generating a subset of the XML document for the principal such that validity of the subset is ensured by including all document parts required according to an XML schema despite the principal having access rights to only certain parts of the XML document but not other parts. The other parts are included in the subset without values. | 2011-04-14 |
20110088092 | DETECTION OF NETWORK ADDRESS SPOOFING AND FALSE POSITIVE AVOIDANCE - A method for detection of network address spoofing and false positive avoidance in a network is described herein. The network may include one or more hosts and a network management system. The network management system may identify a suspicious host in the network. A condition indicative of network address spoofing by the suspicious host may be detected. It may be determined whether the spoofing condition is expected in normal traffic of the network. In response to a determination that the spoofing condition is expected, it is determined that the suspicious host generated normal traffic. | 2011-04-14 |
20110088093 | USB CONNECTOR AND INTRUSION PREVENTION SYSTEM USING THE SAME - A security USB connector implements an intrusion prevention function preventing the propagation of malicious codes to a host terminal from a USB device while minimizing host terminal resource consumption, and an intrusion prevention system using the same are disclosed. A security USB connector is positioned between the host terminal supporting a USB host and a USB device, and a security inspection is performed on data transferred from the USB device to the host terminal through the security USB connector. Also, a host terminal without an intrusion prevention function can prevent an intrusion by using the portable security USB connector. | 2011-04-14 |
20110088094 | System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment without comprising security - A system for determining the validity of a received cryptographic message while ensuring for out-of-order messages is utilized to provide for secure communications among peers in a network. In particular, a secure communication module may be configured to accept the cryptographic message in response to a received nonce value of the received message is greater than the largest nonce value yet seen. Otherwise, when the received nonce value is not the largest nonce value yet seen, the secure communication module may be configured to compare the received nonce value with a nonce acceptance window. If the received nonce value falls outside the nonce acceptance window, the secure communication module may be further configured to reject the received message and assume that a replay attack has been detected. If the received nonce value falls within the nonce acceptance window, the secure communication module may be further configured to determine if the received nonce value has been seen before by comparing the received nonce value with a replay window mask. If the received nonce has been seen before, the secure communication module may be further configured to reject the received message and assume a replay attack. Otherwise, the secure communication module may be further configured to accept the message and add the received nonce value to the replay window mask. | 2011-04-14 |
20110088095 | Anti-Tamper System Employing Automated Analysis - A computer implemented anti-tamper system employing runtime profiling of software in order to decide where to inject integrity checks into the software, to enable verification of whether or not the software has been tampered with. Runtime profiling and analysis is used to record information about the application, in order to establish the locations and targets of runtime integrity checks in order to optimise protection security, while minimising the performance penalty and the need for hand configuration. | 2011-04-14 |
20110088096 | SYSTEMS AND METHODS FOR LICENSE ENTITLEMENT KEY DISTRIBUTION - The present disclosure relates to systems and methods for the distribution of license entitlement keys utilizing a small form-factor pluggable (SFP) transceiver. An SFP transceiver may be utilized in connection with a communication device that transmits data according to a variety of communication protocols. In various embodiments, the license entitlement keys may be generated using an SFP configuration value stored in machine-readable storage medium in the SFP transceiver. The SFP configuration value may be an input, together with other values associated with the SFP transceiver and a secret key in order to generate a license entitlement key. The secret key may be stored in the communication device, and may be stored in such a manner so to not be externally readable. In certain embodiments, configuration settings may be tied to the license entitlement key. | 2011-04-14 |
20110088097 | SYSTEM AND METHOD FOR PREVENTING DELIVERY OF UNSOLICITED AND UNDESIRED ELECTRONIC MESSAGES BY KEY GENERATION AND COMPARISON - A sending device prepares a key for each electronic message sent by the device by applying an algorithm to specified data in the message and then incorporates the key in the message. A receiving device, upon receipt of an electronic message, locates the incorporated key and the data from which a sending device practicing the invention would have prepared it. The receiving device communicates a confirmation request to the purported sending device which contains the key and the data for its preparation. The sending device receives the confirmation messages and prepares a comparison key by applying the algorithm to the data in the confirmation request. The sending device replies to the confirmation request confirming that the sending device sent the message if the comparison key matches the key in the confirmation request and otherwise responds with a denial. | 2011-04-14 |
20110088098 | ELECTRONIC DEVICE AND COPYRIGHT PROTECTION METHOD OF AUDIO DATA THEREOF - An electronic device stores audio data and digital right information, determines zero crossing rate of the audio data store in the memory module. The zero crossing rate is embedded in the audio data and indicates a rate at which the voltage of the audio data changes from positive to negative or back during a time period, the electronic device then reads the audio data, and searches special audio data in the audio data. The audio data with the zero crossing rate more than a constant is defined as the special audio data. The electronic device reads the digital copyright information, and writes the digital copyright information into the special audio data. | 2011-04-14 |
20110088099 | On demand visibility services and smart directory - An on-demand communication system, device, method and program are provided which allows a consumer to request information from an on-demand visibility service. The on-demand visibility service places a request with the on-demand directory service that may then choose a relevant provider to be queried for this information based on situation-based access control logic. The on-demand visibility service then queries the relevant providers with the request for information. Providers may then gather information by optionally using sensors, and may then transmit a provider response to the on-demand visibility service. The on-demand visibility service may then forward this provider response in the form of an answer to the consumer, thereby satisfying the consumer request for information. | 2011-04-14 |
20110088100 | DISABLING ELECTRONIC DISPLAY DEVICES - A system for and method of management of electronic content access are disclosed. The system and method provide for managing electronic content access including detecting, at an electronic paper display device, an event requiring electronic content access management. According to some embodiments, access may be disabled to one or more portions of electronic content for a user of the electronic paper display device based at least in part on the detection of an event requiring electronic content access management. In one or more embodiments, a notification may be sent to a user of an electronic paper display device based at least in part on the detection of an event requiring electronic content access management. | 2011-04-14 |
20110088101 | INFORMATION EXCHANGE/SHARE SYSTEM, METHOD AND PROGRAM THEREOF - It is checked whether or not information requested in an information request is present in a message sharing/storing unit which stores information provided from an information provider and accessibility information setting an information requester which is allowed to access the information. It is also determined whether or not the information requester can access information requested in an information request message based on the accessibility information. When it is determined that the information requested in the information request message is already registered in the message sharing/storing unit and the information requester can access the information, information on a request-reply-message to the information requester is created based on the information in the message sharing/storing unit. | 2011-04-14 |