37th week of 2008 patent applcation highlights part 65 |
Patent application number | Title | Published |
20080222608 | Method and system for managing software testing - The present invention provides a method and a system for managing a computer software testing process and permitting interactive involvement with test case data. The system manages interactions with manual test cases, presenting the test cases for display and providing a means for collecting execution results data for the entire test case or for selections of the test case. The system of the present invention provides mechanism for interacting with individual steps of a test case. | 2008-09-11 |
20080222609 | AUTOMATED SOFTWARE TESTING SYSTEM - A system and method for testing an application includes modules capable of reading data from one or more data tables and providing the data as input to the application. The input data is correlated by test case, so that each module may provide different input data for each test case. The system also includes a controller that executes the modules. The controller is capable of determining an execution order for the modules by reading a flow table. The flow table correlates each test case with one or more modules, and further correlates each module within the test case with an execution order. The system may read results that the application generates in response to the input data, and correlate the results with the test case and module in a results table. The results table may also contain expected results, and the system may compare the actual results with the expected results to determine whether the application is functioning properly. | 2008-09-11 |
20080222610 | Intelligent Processing Tools - A method and system capable of executing software for recording and playback of actions associated with events occurring during execution of the software configured for processing a software, wherein the software comprises a set instructions for performing one or more system requirements and generating an output; recording an event at a first instance and the associated action taken by the user during execution of the software; creating an action map of the event and respective response for the event as recorded by the user; storing the action map and detecting occurrences of an unexpected event at a next instance during execution of the software; associating a respective response from the action map with the unexpected event; and providing the user with an respective response which comprises the action taken. | 2008-09-11 |
20080222611 | Generic validation layer for object properties - A validation layer that facilitates the automatic annotation of object properties by the object with a validation attribute (e.g., FieldValidation), thereby specifying a set of validation rules declaratively, and scenarios under which these validation rules should fire. During build time, the validation layer iterates through each module and associated module classes to automatically generate the validation code. This not only makes the code more readable, but also ensures that a project has consistent validation handling. The validation layer applies to the annotation and validation at the property-level and inter-property. Thus, property-level validation is employed to ensure the correctness of individual values, and inter-property validation can be employed to ensure the correctness in combinations of values. | 2008-09-11 |
20080222612 | EMBEDDED SYSTEMS DEBUGGING - The invention relates to a data processing system comprising a central processing unit, a first memory coupled to the central processing unit for storing variable data values, an eventing engine coupled to the central processing unit and the memory to monitor in real-time at least one of the variable data values and determine the occurrence of an event based on the at least one of the variable data values, and a debug module coupled to the central processing unit and to the eventing engine for receiving the at least one of the variable data values in real time to conduct a real-time debugging of the program. | 2008-09-11 |
20080222613 | METHOD AND APPARATUS FOR DATA PROCESSING - A method and system can include multiple data handling stages for manipulating tracked information associated with content distributed to users and/or computers, such as static objects, media objects, and/or software objects, for example. The content can be distributed as widget instances and the associated tracked information can be received over a network. The information received can be associated with a session corresponding to each widget instance and/or with multiple identifiers, such as widget, user, content, session, content aggregation point, processor, and/or placement identifiers, for example. Data handling processes, including sorting, storing, filtering, combining, queuing, and/or authenticating, for example, can be performed during the data handling stages. The processed information can be used to determine modifications to a behavior associated with widgets and/or widget containers. | 2008-09-11 |
20080222614 | PREFERENTIAL PATH PROFILING - This paper describes preferential path profiling, which enables profiling a specified subset of all possible program paths with very low overhead. Preferential path profiling compactly identifies paths of interest using an array. More specifically, PPP assigns a unique and compact path index identifier to all interesting paths that can be used to index into a path array. The path array contains a second path value identifier that is used to distinguish interesting paths from other program paths This path numbering allows the implementation of preferential path profiling to use array-based counters instead of hash table-based counters for identifying paths of interest and gathering path profiles, which significantly reduces execution time and computational resource overhead during profiling. | 2008-09-11 |
20080222615 | Processing application data - Electronic devices and methods of processing and preparing processing application data are disclosed. Application data are operated on a first electronic device ( | 2008-09-11 |
20080222616 | Software translation - A computer implemented method for automatically translating a first source code associated with a first programming language to a second source code associated with a second programming language wherein the first and second source codes are associated with the same functionality, the method comprising the steps of: parsing the first source code to form a program structure representation comprising a plurality of program structure elements associated with the first programming language, analysing the program structure elements, wherein the analysis includes the step of searching for at least one program structure element that has no direct associated representation that produces the same result in the second programming language, and transforming the program structure representation into the second source code based on said analysis. | 2008-09-11 |
20080222617 | SERVER SIDE APPLICATION INTEGRATION FRAMEWORK - A flexible, platform-independent integration infrastructure is provided. The integration infrastructure may include an integration bridge and at least one plug-in, where the at least one plug-in may include translation rules, mapping rules, and other information associated with a component coupled to the plug-in. The translation rules, mapping rules, and other information may be used by the integration bridge during a mapping process to control communication between components. Based on the rules and information, a mapping translator of the integration bridge converts data received from component into a form readable by another component. | 2008-09-11 |
20080222618 | Methods for User Interface Generation and Application Modification - A method of generating a user interface for presentation to a user. The method comprises executing a first application computer program to provide a user interface, executing agent computer program code to interrogate and modify said user interface during execution of said first application computer program, and presenting said modified user interface. The first application computer program may be run on a server, while the modified user interface may be presented to a user at a client connected to said server. | 2008-09-11 |
20080222619 | DETECTION OF ERRORS CAUSED BY INTERACTIONS OF INDEPENDENT SOFTWARE VENDOR CODE WITH HOST CODE - A method is provided for isolating errors which occur when code supplied by independent software vendors (ISV code) interacts with code supplied by a primary vendor (host code). Code suspected of containing ISV code with host code is executed. If the results are in error, the code is scanned and then compared with a master host code. Any differences are stored in a delta file, including locations in the host code where ISV code hooks into the host code. The code is then modified to by-pass the hooks to ISV code to generate a side-executable code and both codes are executed and the results are compared. A lack of substantial difference in the results is indicative that the ISV code adversely affects the host code while a difference between the results is indicative of an error in the modified code. | 2008-09-11 |
20080222620 | PARALLEL PROGRAMMING COMPUTING SYSTEM - A computing system receives a program created by a technical computing environment, analyzes the program, generates multiple program portions based on the analysis of the program, dynamically allocates the multiple program portions to multiple software units of execution for parallel programming, receives multiple results associated with the multiple program portions from the multiple software units of execution, and provides the multiple results or a single result to the program. | 2008-09-11 |
20080222621 | Method of Automatically Building a Customised Software Application for a Specific Type of Wireless Computing Device - A customised software application can be built for a specific type of Wireless Computing Device by (a) automatically determining attributes of that type of Wireless Computing Device; (b) automatically determining which Software Components from a library of Software Components are compatible with that type of Wireless Computing Device based on values of the attributes determined in (a); and (c) automatically combining the compatible Software Components together to generate a customised build of the application, compatible for that type of Wireless Computing Device. The attributes can be metadata. This approach enables rich Network Applications to be automatically built for Wireless Computing Devices of a wide variety of types. | 2008-09-11 |
20080222622 | Isolating, managing and communicating with user interface elements - Various technologies and techniques are disclosed that allow a user interface in a managed runtime environment to display content from two or more different partitioned process spaces. A software application having a user interface operates a managed runtime environment. A window handle allows a user interface of the application to display content from different partitioned process spaces at a same time. Information from the partitioned process spaces can be integrated within the user interface while preserving a level of isolation between the partioned process spaces. This is accomplished by providing a first portion of a content container for the user interface with a host control that contains the window handle and resides in a first partitioned process space of a main window. A second portion of the content container is provided with a source control that provides the window handle and resides in a second partitioned process space. | 2008-09-11 |
20080222623 | Efficient Code Generation Using Loop Peeling for SIMD Loop Code with Multiple Misaligned Statements - An approach is provided for vectorizing misaligned references in compiled code for SIMD architectures that support only aligned loads and stores. In this framework, a loop is first simdized as if the memory unit imposes no alignment constraints. The compiler then inserts data reorganization operations to satisfy the actual alignment requirements of the hardware. Finally, the code generation algorithm generates SIMD codes based on the data reorganization graph, addressing realistic issues such as runtime alignments, unknown loop bounds, residual iteration counts, and multiple statements with arbitrary alignment combinations. Loop peeling is used to reduce the computational overhead associated with misaligned data. A loop prologue and epilogue are peeled from individual iterations in the simdized loop, and vector-splicing instructions are applied to the peeled iterations, while the steady-state loop body incurs no additional computational overhead. | 2008-09-11 |
20080222624 | Method and Apparatus for Classpath Optimization in a Java Runtime Environment - A computer implemented method, data processing system, and computer usable program are provided by the aspects of the present invention. Aspects of the present invention identify required classes of a software program in the import statements in the source code. Next, the aspects of the present invention identify an element in a classpath environment variable that contain only the required classes and generate a new classpath environment variable with the identified element. Aspects of the present invention then store the new classpath environment variable in a classpath file that is specific to the software program for subsequent invocation. | 2008-09-11 |
20080222625 | SMART CONTACT LIST - An application for a mobile communications device includes a contact list application providing contact list operations for contact details of at least one contact, the contact details including at least one instance of updatable contact data associated with the contact, and an updater updating the updatable contact data from an external update source specified in the updatable contact data. A contact list update method includes, for each contact having an updatable contact detail, accessing an update source specified in the updatable contact detail, receiving at least one of the updated versions from the update source, and assigning the updated version to the contact. A mobile communication device includes a contact list application displaying a media clip upon communication with an entity listed as part of the contact details of a contact and an updater updating the media clip from an external update source specified as part of the contact details. | 2008-09-11 |
20080222626 | Method, Apparatus, and Program Product for Autonomic Patch Risk Assessment - An automatic risk assessment system is provided that determines a risk for the patch based on collected activity metrics, file weights, a list of files affected by the patch, and other factors. An application monitor collects metrics from the application to determine the level of activity of the application or other component to be patched. The patch may have associated therewith metadata including a list of files that will be affected by the patch. Policies may store information about how risk is to be assessed. This information may include, for example, file weights and information defining categories of risk. | 2008-09-11 |
20080222627 | Static extensibility models with dynamic languages and scripts - Various technologies and techniques are disclosed for generating add-in bridges that allow hosts to be extended using a dynamic language. The system programmatically determines static requirements that an add-in is required to implement in order to integrate with a particular host. The system programmatically generates the add-in bridge to conform to the requirements of the particular host and to operate like a compiled add-in while actually calling dynamic language script files that are executed by a scripting engine. The add-in bridge is generated by generating a component for the add-in that contains at least one class to conform to the host requirements. A constructor is then generated for the class. For each method the add-in is required to implement, a respective method is generated in the class that provides a stub implementation but that calls dynamic-language script files to perform a desired functionality. | 2008-09-11 |
20080222628 | Method and Apparatus for a Browser with Offline Web-Application Architecture - A computer implemented method, apparatus, and computer program product for a computer implemented method, apparatus, and computer usable program code for providing an offline version of an online application. In one embodiment, the process initiates an online application on a connected client device using a specific operating environment associated with the online application. In response to detecting the online application going to an offline status, a determination is made as to whether a native application on the client device is present that is supportive of the online application. In response to a determination that the native application is present, the native application is executed using the specific operating environment associated with the online application. The specific operating environment associated with the online application on a server is transferred to an environment associated with the native application on the client. | 2008-09-11 |
20080222629 | Method and Device Arrangement for Managing the Use Profile of a Terminal Device - The invention relates to a method, device arrangement, server ( | 2008-09-11 |
20080222630 | Customer relationship management portal system and method - A software-based customer relationship management system and method. | 2008-09-11 |
20080222631 | COMPLIANCE MANAGEMENT METHOD AND SYSTEM - A compliance method and system. The method includes receiving by computing system compliance data comprising a plurality of compliance rules from a plurality of different compliance domains. The plurality of compliance rules are converted from said text format to a first plurality of program objects. Attributes for the first plurality of program objects are modified. A compliance report comprising an output of the plurality of program objects is generated. An automated compliance verification software tool compares the first plurality of program objects with compliance verification data in order to verify if the first plurality of program objects is in accordance with the compliance verification data. | 2008-09-11 |
20080222632 | VIRTUAL MACHINE SYSTEM - A virtual machine system in which a physical CPU busy ratio can be measured in consideration of the status of an assignment of the physical CPU, and the measured CPU busy ratio can be reflected to a CPU busy ratio of each guest OS. An elapsed time counter is provided in a hypervisor, and a hypervisor access interface is provided in each of LPARs and used to read the elapsed time counter from the guest OS. A performance monitor program running on each guest OS calculates, based on a value of the elapsed time counter, the number of sampling timings expected to occur during the time when the physical CPU is not assigned to the LPAR in which the performance monitor program is provided. | 2008-09-11 |
20080222633 | VIRTUAL MACHINE CONFIGURATION SYSTEM AND METHOD THEREOF - A virtual machine configuration system, comprising a virtualizer for, in a virtualization environment in which a plurality of physical resources connected mutually through a network circuit has been arranged on a computer system sectioned into a plurality of partitions, dynamically changing a physical resource configuration and a virtual machine configuration while simultaneously controlling a configuration of the physical resources of the partition and a configuration of virtual resources allotted to virtual machines without exerting an influence over an application service operating on the virtual machine. | 2008-09-11 |
20080222634 | PARALLEL PROCESSING FOR ETL PROCESSES - A technique for parallel processing of data from a plurality of data sources in conjunction with an Extract-Transform-Load (ETL) process, the data being part of a related data set, which comprises the following: staging a unit of extracted data from each of the plurality of data sources, thereby generating a plurality of units of staged data; identifying a plurality of tasks relating to transforming the staged data; assigning a subset of the tasks to each of a plurality of child processes being managed by a master process, such that dependent tasks are assigned to a same child process; concurrently executing the subsets of tasks assigned to the child processes, thereby generating a plurality of units of transformed data from the plurality of units of staged data; and publishing the transformed data after all tasks are completely executed, thereby ensuring that the published data represent the related data set. | 2008-09-11 |
20080222635 | Method for Runtime Execution of One or More Tasks Defined in a Workflow Process Language - Runtime execution of one or more tasks defined in a workflow process language. The method may include obtaining a description of the task from a process ontology (PO). The PO may define a hierarchical taxonomy of executable tasks, where each task refers to at least one frame of a hierarchical frame taxonomy of the PO. The method may further include identifying at least one parameter as described in the frame description to which the task refers, resolving the value of the at least one parameter, and executing the most specific applicable version of the task contained in the task taxonomy of the process ontology. | 2008-09-11 |
20080222636 | SYSTEM AND METHOD OF REAL-TIME MULTIPLE-USER MANIPULATION OF MULTIMEDIA THREADS - Embodiments of configuring elements of a media processing system in mechanisms are described generally herein. Other embodiments may be described and claimed. | 2008-09-11 |
20080222637 | Self-Optimizable Code - Methods, systems, and media to increase efficiency of tasks by observing the performance of generally equivalent code paths during execution of the task are disclosed. Embodiments involve a computer system with software, or hard-coded logic that includes reflexive code paths. The reflexive code paths may be identified by a software or hardware designer during the design of the computer system. For that particular computer system, however, one of the code paths may offer better performance characteristics so a monitor collects performance data during execution of the reflexive code paths and a code path selector selects the reflexive code with favorable performance characteristics. One embodiment improves the performance of memory allocation by selectively implementing a tunable, linear, memory allocation module in place of a default memory allocation module. | 2008-09-11 |
20080222638 | Systems and Methods for Dynamically Managing Virtual Machines - Techniques for dynamic management of virtual machine environments are disclosed. For example, a technique for automatically managing a first set of virtual machines being hosted by a second set of physical machines comprises the following steps/operations. An alert is obtained that a service level agreement (SLA) pertaining to at least one application being hosted by at least one of the virtual machines in the first set of virtual machines is being violated. Upon obtaining the SLA violation alert, the technique obtains at least one performance measurement for at least a portion of the machines in at least one of the first set of virtual machines and the second set of physical machines, and a cost of migration for at least a portion of the virtual machines in the first set of virtual machines. Based on the obtained performance measurements and the obtained migration costs, an optimal migration policy is determined for moving the virtual machine hosting the at least one application to another physical machine. | 2008-09-11 |
20080222639 | Method and System Configured for Facilitating Management of International Trade Receivables Transactions - A receivables transaction management platform is configured for facilitating management of international trade receivables transactions. The platform includes a task manager layer and a platform functionality layer. The task manager layer is configured for facilitating management of transaction information workflow tasks and export receivables tasks. The platform functionality layer is accessible by at least a portion of the managers and is configured for enabling facilitation of the transaction information workflow tasks and the export receivables tasks. Managing the transaction information workflow tasks and export receivables tasks includes facilitating preparation of a document and data portfolio required for settlement of an international trade receivables transaction, facilitating electronic submission of the document and data portfolio to a designated recipient and facilitating acceptance of the document and data portfolio. The platform functional components are configured for enabling user workflow functionality, data mapping functionality, data analysis functionality, data storage functionality and third party access functionality. | 2008-09-11 |
20080222640 | Prediction Based Priority Scheduling - Systems and methods are provided that schedule task requests within a computing system based upon the history of task requests. The history of task requests can be represented by a historical log that monitors the receipt of high priority task request submissions over time. This historical log in combination with other user defined scheduling rules is used to schedule the task requests. Task requests in the computer system are maintained in a list that can be divided into a hierarchy of queues differentiated by the level of priority associated with the task requests contained within that queue. The user-defined scheduling rules give scheduling priority to the higher priority task requests, and the historical log is used to predict subsequent submissions of high priority task requests so that lower priority task requests that would interfere with the higher priority task requests will be delayed or will not be scheduled for processing. | 2008-09-11 |
20080222641 | Executing applications - An application executing apparatus comprising including at least one execution resource configured to execute at least one application is disclosed. The apparatus is provided with at least one processor configured to detect events triggering execution of the at least one application and to dynamically control use of the at least one execution resource in handling of the detected events based on a variable reflective of the operating conditions of the apparatus. | 2008-09-11 |
20080222642 | Dynamic resource profiles for clusterware-managed resources - Allowing for resource attributes that may change dynamically while the resource is in use, provides for dynamic changes to the manner in which such resources are managed. Management of dynamic resource attributes by clusterware involves new entry points to clusterware agent modules, through which resource-specific user-specified instructions for discovering new values for resource attributes, and for performing a user-specified action in response to the new attribute values, are invoked. A clusterware policy manager may know ahead of time that a particular resource has dynamic attributes or may be notified when a resource's dynamic attribute has changed and, periodically or in response to the notification, request that the agent invoke the particular resource-specific instructions for discovering new values for attributes for the particular resource and/or for performing a user-specified action in response to the new attribute values. During the majority of this process, the resource remains available. | 2008-09-11 |
20080222643 | COMPUTING DEVICE RESOURCE SCHEDULING - Systems and methods for scheduling computing device resources include a scheduler that maintains multiple queues. Requests are placed in one of the multiple queues depending on how much resource time the requests are to receive and when they are to receive it. The queue that a request is placed into depends on a pool bandwidth defined for a pool that includes the request and a bandwidth request. A request has an importance associated therewith that is taken into account in the scheduling process. The scheduler proceeds through the queues in a sequential and circular fashion, taking a work item from a queue for processing when that queue is accessed. | 2008-09-11 |
20080222644 | RISK-MODULATED PROACTIVE DATA MIGRATION FOR MAXIMIZING UTILITY IN STORAGE SYSTEMS - The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted. | 2008-09-11 |
20080222645 | Process Execution Management Based on Resource Requirements and Business Impacts - Techniques are presented for managing execution of processes on a data processing system The data processing system comprises process instances that are each an execution of a corresponding process. Each process instance comprises activity instances. Business impacts are determined for the process instances, the activity instances, or both. Order of execution of the activity instances is managed by allocating resources to activity instances in order to achieve an objective defined in terms of the business impacts. In another embodiment, requests are received for the execution of the processes. For a given request, one or more of the operations of assigning, updating, aggregating, and weighting of first business impacts associated with the given request are performed to create second business impacts associated with the given request. Additionally, requests can be modified. Modification can include changing the process requested or process input as deemed appropriate, combining related requests into a single request, or both. Unmodified requests and any modified requests are managed. | 2008-09-11 |
20080222646 | PREEMPTIVE NEURAL NETWORK DATABASE LOAD BALANCER - A preemptive neural network database load balancer configured to observe, learn and predict the resource utilization that given incoming tasks utilize. Allows for efficient execution and use of system resources. Preemptively assigns incoming tasks to particular servers based on predicted CPU, memory, disk and network utilization for the incoming tasks. Direct write-based tasks to a master server and utilizes slave servers to handle read-based tasks. Read-base tasks are analyzed with a neural network to learn and predict the amount of resources that tasks will utilize. Tasks are assigned to a database server based on the predicted utilization of the incoming task and the predicted and observed resource utilization on each database server. The predicted resource utilization may be updated over time as the number of records, lookups, images, PDFs, fields, BLOBs and width of fields in the database change over time. | 2008-09-11 |
20080222647 | Method and system for load balancing of computing resources - A load balancing method incorporates temporarily inactive machines as part of the resources capable of executing tasks during heavy process requests periods to alleviate some of the processing load on other computing resources. This method determines which computing resources are available and prioritizes these resources for access by the load balancing process. A snap shot of the resource configuration and made secured along with all data on this system such that no contamination occurs between resident data on that machine and any data placed on that machine as put of the load balancing activities. After a predetermined period of time or a predetermined event, the availability of the temporary resources for load balancing activities ends. At this point, the original configuration and data is restored to the computing resource such that no trace of use of the resource in load balancing activities is detected to the user. | 2008-09-11 |
20080222648 | DATA PROCESSING SYSTEM AND METHOD OF DATA PROCESSING SUPPORTING TICKET-BASED OPERATION TRACKING - A data processing system includes a plurality of processing units coupled by a plurality of communication links for point-to-point communication such that at least some of the communication between multiple different ones of the processing units is transmitted via intermediate processing units among the plurality of processing units. The communication includes operations having a request and a combined response representing a system response to the request. At least each intermediate processing unit includes one or more masters that initiate first operations, a snooper that receives at least second operations initiated by at least one other of the plurality of processing units, a physical queue that stores master tags of first operations initiated by the one or more masters within that processing unit, and a ticketing mechanism that assigns to second operations observed at the intermediate processing unit a ticket number indicating an order of observation with respect to other second operations observed by the intermediate processing unit. The ticketing mechanism provides the ticket number assigned to an operation to the snooper for processing with a combined response of the operation. | 2008-09-11 |
20080222649 | Method and computer program for managing man hours of multiple individuals working one or more tasks - A method and computer program are provided for managing man hours of multiple individuals working one or more tasks during a predefined time period that include selectively opening a plurality of tasks of differing task characteristic and task type, selectively associating one or more individuals to one of the open plurality of tasks, selectively unassociating at least one of the associated one or more individuals, maintaining at least one timer for each of the open plurality of tasks, selectively closing one or more of the open plurality of tasks, and selectively outputting an invoice for the closed plurality of tasks based on the bid price of each of the open plurality of tasks. One or more of the individuals are associated and unassociated prior to completion of the open one or more tasks. The at least one timer maintains a total time for all of the associated one or more individuals for each of the open plurality of tasks. | 2008-09-11 |
20080222650 | Method And System For Recovering Stranded Outbound Messages - A method for recovering and requeueing lost messages is disclosed. The lost messages are intended for delivery from a first computer program to a second computer program but are instead stranded in locations internal to the first program. The method extracts one or more of these stranded messages from the location internal to the first program, determines the original destination of each stranded message and delivers that message to the second program. Delivery of each message to the second program is facilitated by using message queues provided by middleware type software programs. The desired middleware program can be selected by the user of the method, and the method provides for the necessary formatting of each recovered message according to the selected middleware. Absent use of the present method, these stranded messages would not be routed to their original destinations. | 2008-09-11 |
20080222651 | MULTIPLE MESSAGE SOURCE ELECTRONIC DATA INTERCHANGE (EDI) ENVELOPER WITH BATCHING SUPPORT - Embodiments of the present invention address deficiencies of the art in respect to EDI enveloping and provide a method, system and computer program product for multiple message source EDI enveloping with batching support. In one embodiment of the invention, a method for multi-format EDI enveloping can include receiving messages from multiple concurrent message sources, transforming the received messages into an EDI format, inserting the transformed messages into a minimal number of envelopes, and forwarding the envelopes as an EDI interchange to designated trading partners. | 2008-09-11 |
20080222652 | Method and Apparatus for Data Transfer Across a Network - Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within a object (such as a comparison with parameters of the request to determine whether the request can be satisfied). Objects within the request can be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request can be used to provide greater security. For example a store may be able to interpret the request, but credit details may be separately encrypted such that only a bank can decrypt that subcomponent of the request. | 2008-09-11 |
20080222653 | METHOD AND SYSTEM FOR TIME-SLICED AGGREGATION OF DATA - Systems and methods are disclosed herein for aggregating event data in order to reduce the amount of storage space necessary to store event data for later use in statistical analyses of the event data. The raw event data is analyzed and, for each event ID within a time period, a specific set of numbers and sums are calculated. This set is then stored instead of the raw event ID and used for all subsequent analyses of the events. The set of numbers and sums reduce the amount of storage required for each event ID within a time period to a set of five data elements, regardless of the number of underlying events in the raw event data. The set of number and sums include a number of events, a sum of the events, a sum of the squares of the events, a sum of the cubes of the events and a sum of the events raised to the fourth power. | 2008-09-11 |
20080222654 | Techniques to manage event notifications - Techniques to manage event notifications are described. An apparatus may comprise a server having an event notification component. The event notification component may have an event agent component to receive a message indicating a change event for line of business (LOB) data, and convert the change event to a defined LOB entity event. The event notification component may have a notification service component to generate a LOB event message for the entity event. The event notification component may have an event database to store the event message in a user event queue. Other embodiments are described and claimed. | 2008-09-11 |
20080222655 | Information Processing Apparatus and Information Processing Method - An information processing apparatus is provided that is capable of transferring a file to a receiving apparatus without a file location in the receiving apparatus being specified by a user every time the user stores the file and that is capable of automatically transmitting an e-mail notifying the file location to a recipient's e-mail address previously registered when the new file is stored in the file location of the receiving apparatus. The information processing apparatus has an information memory unit memorizing a location information identifying a location in which a file is to be stored and an e-mail recipient information associated with the location information, a file information memory unit memorizing a file information comprised of a file location information of a location in which the file is stored and a date and time as to when the file is stored, a storing determination unit watching the file information to determine whether the file is newly stored, and a communication unit transmitting an e-mail including the file information about the newly stored file to a user whose email address is previously registered in the e-mail recipient information where the storing determination unit determines that the file is newly stored in the file location. | 2008-09-11 |
20080222656 | System and method for event driven browser launch - Systems and methods for providing event driven browser launch are provided. In exemplary embodiments one or more communication data variables associated with a communication are received. Browser launch settings for an individual associated with the communication are reviewed to determine a time to launch a browser. The browser may then be launched at the predetermined time. In exemplary embodiments, the browser provides data retrieved from a URL associated with at least one of the communication data variables. | 2008-09-11 |
20080222657 | Notification Method and Apparatus in a Data Processing System - An method of, apparatus for, or storage device medium having instructions for publishing a first notification within a data processing system where the data processing system comprises a first source generating the first notification, a first destination device, and a second destination device. The source may be a storage unit, a printer, a processing unit, or any other device which is a component of the data processing system. The destination device is typically a monitor, a workstation, a computer, a PC, or other input/output type workstation. The method comprises of having the first destination device subscribe to receive notifications from the first source. In addition, the second destination device subscribes to receive the notifications serially republished from the first destination device. Upon the publication of a notification from the first source to the first destination device, the first destination device will publish the notification to the second destination device. | 2008-09-11 |
20080222658 | METHOD AND APPARATUS FOR WIDGET AND WIDGET-CONTAINER DISTRIBUTION CONTROL BASED ON CONTENT RULES - A method includes receiving an instruction used to define a widget-container containing a service module associated with a widget. The widget-container is a procedural software framework configured to be executed at a widget-container processing device in response to a reference to the widget-container being accessed from a content aggregation point. The widget-container has a portion configured for receiving the widget. The method also includes determining whether processing of the widget within the portion of the widget-container is restricted and/or allowed. | 2008-09-11 |
20080222659 | ABSTRACTING OPERATING ENVIRONMENT FROM OPERATING SYSTEM - The present invention extends to methods, systems, and computer program products for abstracting an operating environment from an operating system running in the operating environment. Within an operating environment, an operating environment abstraction layer abstracts and exposes operating environment resources to an operating system. Accordingly, appropriately configured operating environment abstraction layers provide the operating system with a uniform interface to available resources across a variety of different operating environments. Each operating environment abstraction layer and the operating system include adjustable algorithms that can be adjusted to appropriately provide services to requesting applications based on exposed resources of the operating environment. Abstraction layers can be configured to analyze and become fully aware of their operating environment, including identifying the presence of other abstraction layers. An operating system and corresponding abstraction layer can be run in flexible combinations of privileged and unprivileged processor modes. | 2008-09-11 |
20080222660 | Processing of data of a plurality of applications with a single client application - The present invention is directed to a method, a system, an interface entity, and a client application for processing data of a plurality of applications in a single client application. | 2008-09-11 |
20080222661 | Failover and Load Balancing - Provided are techniques for failover when at least one of a first network adapter and a data path through the first network adapter fails, wherein the first network adapter is connected to a filter driver, and wherein the first network adapter is connected to a second network adapter. With the filter driver, a path fail notification is received that at least one of the first network adapter and the data path through the first network adapter has failed. With the filter driver, packets directed to the first network adapter are rerouted to the second network adapter. | 2008-09-11 |
20080222662 | Method for testing device descriptions for field devices of automation technology - A method for testing device descriptions for field devices of automation technology, which are executed in a frame application running on a computer unit, provides, between the frame application and the device descriptions, a test component, which, on the one hand, is transparent for the communication between the frame application and the device descriptions, and which, on the other hand, tests interface invocations according to a predetermined specification. | 2008-09-11 |
20080222663 | Policy-Based Direct Memory Access Control - A computer that operates in a metered mode for normal use and a restricted mode uses an input/output memory management unit (I/O MMU) in conjunction with a security policy to determine which peripheral devices are allowed direct memory access during the restricted mode of operation. During restricted mode operation, non-authorized peripheral devices are removed from virtual address page tables or given vectors to non-functioning memory areas. | 2008-09-11 |
20080222664 | Dynamic method selection based on declarative requirements of interaction scope - Various technologies and techniques are disclosed that dynamically implement method selections based on declarative requirements and interaction scope. Requirements that describe when each of multiple methods that can perform a particular operation should be called can be declared using a declarative syntax. Based upon a program event, the system determines that a request should be made to select a most appropriate method of the available methods to call to perform the particular operation. Upon receiving the request to select the most appropriate method, a sort process is executed that uses an interaction scope of a current user context in combination with a plurality of sort rules to generate a sorted list of the available methods into a particular order based upon appropriateness. A most appropriate method, if any, is returned to the calling application, and then called to perform the particular operation. | 2008-09-11 |
20080222665 | System and Method for Support of Legacy Communications Protocols in a Smart Card - In general, the invention relates to a converter. The converter includes logic for reading annotations in a source program, where the annotations provide a mapping between method names for methods invoked using messages in a legacy protocol and a native protocol. The converter further includes logic for creating a mapping data structure using the annotations to provide a mapping between method invoking instructions in the legacy protocol and method invoking instructions in the native protocol. | 2008-09-11 |
20080222666 | OPTICAL DISC PLAYER - An optical disc player capable of keeping a rear surface of a door out of a user's sight when the door is opened to present an aesthetically pleasing appearance and promote a beauty thereof. The optical disc player includes a main body with a front panel having an entrance, a tray disposed at the main body to be extracted from or retracted into the main body through the entrance, a door to open or close the entrance, and a door connecting unit to connect the door to the front panel such that the door is opened or closed. The door connecting unit includes a first connecting link having one end rotatably connected to a first position of an inner surface of the door and the other end rotatably connected to a second position of the front panel, and a second connecting link having one end rotatably connected to a third position higher than the first position of the inner surface of the door and the other end rotatably connected to a fourth position higher than the second position of the front panel. | 2008-09-11 |
20080222667 | OPTICAL RECORDING AND/OR REPRODUCING DEVICE - According to one aspect, an optical recording and/or reproducing device for reading and/or writing an optical disc includes a base, optical pickup head, and a moving mechanism for slidably moving the optical pickup head. The moving mechanism includes a worm gear, a motor for rotating the worm gear, and a rack disposed between the worm gear and the optical pickup head for transferring motion from the worm gear to the optical pickup head. The rack includes a fastening portion for fixing the rack to the optical pickup head, an engaging portion for engaging with the worm gear, a restricting portion connected to the engaging portion for preventing the engaging portion from running out of the worm gear, and a connecting portion for connecting the fastening portion with the restricting portion. | 2008-09-11 |
20080222668 | Spindle motor and player - A spindle motor includes a rotor made of metal including a substantially circular top surface section and a tubular skirt section arranged at a predetermined space from an outer periphery of the top surface section and a disk table of synthetic resin outsert-molded in the rotor and including a table main body section located on an outer surface side of the rotor and a rotor-inner-surface superimposing section located on an inner surface side of the rotor. First resin lead-in holes are provided in the tubular skirt section and an inner surface of the table main body section located on the outer surface side of the rotor is connected to the rotor-inner-surface superimposing section located on the inner surface side of the rotor through the first resin lead-in holes. | 2008-09-11 |
20080222669 | Disk protecting plate - A disk protecting plate includes a disk-shaped plate body having a central through hole. The plate body is provided on one side with a centered and low-raised annular wall, and a plurality of reinforcing ribs radially outward extended from the annular wall. Each of the reinforcing ribs has a top gradually inclined toward an outer circumferential periphery of the plate body. The disk protecting plate with the radially outward inclined reinforcing ribs may be made with reduced material to obtain a reinforced overall structural strength without forming an excessively thick outer periphery, and a plurality of disks concentrically stacked and packaged between two pieces of the disk protecting plates could therefore be effectively protected against damage caused by compression or impact against the disk protecting plate. | 2008-09-11 |
20080222670 | Method and system for using coherence of biological responses as a measure of performance of a media - Various embodiments of the present invention create a novel system for rating an event in a media based on the strength of the emotions viewers feel towards the event. The viewer's responses to the media can be measured and calculated via physiological sensors. The metric for rating the strength of the media is created based on the mathematical coherence of change (up or down) of all pertinent physiological responses across multiple viewers. Such rating offers an objective ability to compare the strengths of events of the media, as there is a strong correlation between high coherence of physiological responses (all viewers feel the same thing at the same time) and strong ratings of emotionality, engagement, likeability, success in the marketplace/on screen. | 2008-09-11 |
20080222671 | Method and system for rating media and events in media based on physiological data - Various embodiments of the present invention enable a bottom up analysis approach that derives physiological responses from measured physiological data of viewers of a media, and calculates scores of instances of an event type based on the physiological responses. The scores are then aggregated to rate the event type in addition to scoring the individual event instances. The approach can also form an overall rating of the media by aggregating the event ratings of set of event types within the media. | 2008-09-11 |
20080222672 | Monitoring of a Broadcast Signal - A method of monitoring a broadcast signal ( | 2008-09-11 |
20080222673 | Systems, Methods, and Products for Presenting Content - Methods, systems, and products are disclosed for presenting content. Programming content is received having a program and program control data. The program control data may has a default setting followed by a data record comprising a rating value and a content attribute value. Program presentation preferences of a viewer are received that block or modify the program. When, however, the rating value and the content attribute value are missing from the data record, and when the default setting equals or exceeds the program presentation preferences, then modification of the program is not allowed. An instruction to modify the program is, instead, interpreted as another instruction to block the program from presentation. | 2008-09-11 |
20080222674 | Method, System And Apparatus For Implementing Pay Per View Multicast Service - Various embodiments of the present disclosure provide a method for implementing a Pay Per View (PPV) multicast service, including: sending, by a user terminal, a PPV program playing request to an access device; determining, by the access device, whether the user terminal has the right to receive the PPV program based on the current time and the acquired right information of the user terminal; if the user terminal has the right, forwarding the PPV program data stream from a multicast source to the user terminal. In accordance with the present disclosure, an access device may control the time of forwarding a program data stream to a user terminal according to the right of the user terminal of receiving the program, thus a PPV multicast service is implemented. | 2008-09-11 |
20080222675 | Pointing capability and associated user interface elements for television user interfaces - Systems and methods according to the present invention provide a user interface for television control functionality. | 2008-09-11 |
20080222676 | METHOD FOR TRANSMITTING/RECEIVING BROADCASTING SIGNAL AND BROADCASTING SIGNAL RECEIVER - A method for transmitting/receiving a broadcasting signal and a broadcasting signal receiver are disclosed. An identifier of a burst period is obtained from program table information of the broadcasting signal including mobile data and only the burst period in which a broadcasting program desired by a user is transmitted is received. Accordingly, when the broadcasting signal is received, only a desired burst period is received such that power consumption of the broadcasting signal receiver can be reduced. | 2008-09-11 |
20080222677 | METHOD OF DISPLAYING BROADCAST CHANNEL INFORMATION AND BROADCAST RECEIVER IMPLEMENTING THE SAME - A method of displaying broadcast channel information on a broadcast terminal. The method includes touching a pointer at a first position on a touch screen of the broadcast terminal and then dragging the pointer to a second position on the touch screen, and displaying information about broadcast channels respectively assigned in advance to the first and second positions while the pointer is dragged from the first position to the second position. | 2008-09-11 |
20080222678 | Method and Apparatus for Programme Generation and Presentation - A method for presenting a plurality of programme elements to a user. Each programme element has an associated classification code, and the method comprises presenting a user interface operable to receive user selection data indicating one of said plurality of programme elements, and to cause display of said indicated programme element. One of said programme elements is presented, the classification code associated with said presented programme element is screened to determine if said classification code satisfies a predetermined criteria and operation of said user interface is disabled if but only if said predetermined criteria is satisfied. | 2008-09-11 |
20080222679 | Enhanced personal video recorder including user play programming - The present invention is directed to a system, software system and method for manipulating multimedia broadcast presentations. Manipulating multimedia events offers users increased options in how they experience multimedia presentations. Thus increasing the overall multimedia experience and consequently user satisfaction. Utilization of the present invention allows the user to experience combinations of media previously unavailable. For example, in implementations of the present invention, users may option various combinations of audio and video; including the rate at which a user experiences the media. Further, the user may text search to find starting and stopping points for recording, viewing and pausing operations. The user play programming allows the user to customize how a single media, such as audio, is experienced. | 2008-09-11 |
20080222680 | Electronic program guide provision apparatus, electronic program guide provision method and program thereof - An electronic program guide provision system includes a preference model creating unit configured to create a preference model of a viewer in which a causal relationship between a cause of viewing and a viewing effect is written based on an electronic program guide and viewing history information of the viewer, and a recommended program list creating unit configured to create a recommended program list by using the preference model created by the preference model creating unit. | 2008-09-11 |
20080222681 | Method for Recording Multiple Program in Digital Broadcasting Receiver - The invention relates to a method for recording multiple programs in a digital broadcasting receiver. The digital broadcasting receive, when receiving a record command for multiple programs in the broadcast signal currently incoming, confirms and stores PID's of each of the programs corresponding to the record command. Thereafter, the digital broadcasting receiver searches the broadcast data for the PID's so as to store broadcast data by matching PID values. According to the present invention, the method for recording multiple programs is advantageous in that a broadcasting receiver may be implemented so as to simultaneously record multiple programs. | 2008-09-11 |
20080222682 | Satellite distribution apparatus, control means for use in satellite distribution apparatus and method of use thereof - Satellite distribution apparatus is provided for distributing digital broadcast signals in a predetermined locality or building. The apparatus includes satellite receiving means for receiving broadcast signals from at least one satellite and communication means for transmitting the received signals to a control unit in the locality or building. The control unit allows a plurality of received digital broadcast signals to be selected and output onto a single cable for distribution around said locality or building. The control unit includes means for allowing the bandwidth of the selected signals to be compressed and rearranged for transmitting onto a single cable outlet. At least part of the means for compressing said selected digital broadcast signals includes signal symbol stacking means. | 2008-09-11 |
20080222683 | Cascadable Tv-Signal Distribution Units with Level Indicator - The invention relates to a system comprising a plurality of groups of one or more TV-signal distribution units connected to each other in cascade. Each TV-signal distribution unit comprising a plurality of lines for transporting input signals coming from a head end from an input side to an output side of the unit. At least one of the TV-signal distribution units of each group comprises measurement means for measuring a signal characteristic of a TV-signal transported on the lines, a programmable processing means for comparing each of the measured signal characteristics with at least one programmable reference value and determining a signal quality from each comparison, and indicator means for indicating the signal qualities to an installer of the system. The invention further relates to a method for installing such a system and a signal degradation compensation system. | 2008-09-11 |
20080222684 | Media content distribution system and method - A system and method for transfer of digital content, including providing a listing of sources and content destinations, receiving a user selection of a content source and a destination from the source and destination listing, providing a listing of available paths for the exchange of digital content, receiving a user selection of a routing path from the routing path listing, and permitting transmission of the content from the selected source to the destination via the selected routing path. | 2008-09-11 |
20080222685 | Karaoke system provided through an internet protocol television system - Particular embodiments of the disclosed subject matter provide methods and systems to support a karaoke system provided via a set-top box and internet protocol television system. An example embodiment includes an apparatus and system to receive a karaoke content user selection through a user interface of a set-top box, send the karaoke content user selection to a VOD server via a network, enable access to selected karaoke content corresponding to the karaoke content user selection from the VOD server, and to enable viewing of the selected karaoke content on a display device via the set-top box. The set-top box further includes a karaoke input interface and a storage device operable to store karaoke input received via the karaoke input interface. | 2008-09-11 |
20080222686 | Video Transmitting Over a Cellular Carrier - A system which correlates across multiple images to find commonalities among the images and compresses according to those commonalities. The commonalities can be across multiple different images which are unrelated. The information is quantized according to the client that will display the images, and then, and luminance in common color areas are encoded as a single encoding. A WAP application may also be downloaded. | 2008-09-11 |
20080222687 | DEVICE, SYSTEM, AND METHOD OF ELECTRONIC COMMUNICATION UTILIZING AUDIOVISUAL CLIPS - Device, system, and method of electronic communication utilizing audiovisual clips. For example, a method of electronic communication utilizing audiovisual clips includes: receiving an identifier of a remotely-stored audiovisual clip through an electronic communication channel associated with an electronic messaging application; and automatically playing the remotely-stored audiovisual clip inside the electronic messaging application. | 2008-09-11 |
20080222688 | TRANSMITTING DATA FILE DURING CALL - A method and device for wirelessly communicating data files using a mobile terminal having video communication capability is provided. The method reserves one or more data files to be transmitted during a video call. The communication device associates identifies data files for transmission to a video call recipient, and displays associated information of the data files during the video call. | 2008-09-11 |
20080222689 | System to filter and multicast personal video content - In an embodiment, an Internet Protocol Television (IPTV) Set Top Box (STB) receives information regarding a personal channel on an IPTV system and information regarding a plurality of viewer IPTV STBs associated with the personal channel. The IPTV STB further receives personal video content, and filters the personal video content. The IPTV STB multicasts the filtered personal video content through a network to a plurality of viewer IPTV STBs. | 2008-09-11 |
20080222690 | TERMINAL AND METHOD FOR PROVIDING BROADCAST INFORMATION - A terminal displays a broadcast program from a first provider, and displays one or more identifiers from additional broadcast providers. Upon selection of one of the identifiers of the additional providers, additional information of broadcasts from the additional provider is also displayed thereby enabling a user to decide whether to continue to display the broadcast program from the first provider or to display a broadcast program from the additional provider. | 2008-09-11 |
20080222691 | SYSTEM AND METHOD OF ELIMINATING OR MINIMIZING LO-RELATED INTERFERENCE FROM TUNERS - Systems and methods of eliminating or reducing interference resulting from harmonics of local oscillator frequencies of mixers are shown. In one embodiment, a determination is made as to a zone or zones within an intermediate frequency band associated with undesired spurs. Inter-tuner spurs and intra-tuner spurs may be identified such that frequency information of the identified spurs may be utilized to define a plurality of exclusion zones. Local oscillator frequencies may subsequently be efficiently selected in view of the exclusion zone information. Embodiments may also determine a score for identified spurs which may be used to optimally select from within a set of spur-generating local oscillator frequencies. | 2008-09-11 |
20080222692 | DEVICE-INITIATED SECURITY POLICY - A method and system for executing a security policy at a mobile terminal is provided. The mobile terminal may contact an authentication entity based on the security policy. The mobile terminal may receive a response from the authentication entity indicative of a security status of the mobile terminal. The mobile terminal may execute a security action based on the received response. | 2008-09-11 |
20080222693 | Multiple security groups with common keys on distributed networks - A technique for securing message traffic in a data network using a protocol such as IPsec, and more particularly, various methods for distributing security policies among peer entities in a network while minimizing the passing and storage of detailed policy or key information except at the lowest levels of a hierarchy. | 2008-09-11 |
20080222694 | System, server, and program for access right management - Each domain is provided with an access right management device which creates a resource-sharing policy and performs processing for resource-sharing policy negotiation between a plurality of domain administrators. An access right management device that has created a resource-sharing policy identifies, for each policy unit included in the resource-sharing policy, an access right management device that is a negotiating partner to negotiate with about the policy unit in question. The access right management device generates negotiation information including an identification name of the identified negotiating-partner access right management device and the policy unit in question and sends the negotiation information to the negotiating-partner access right management device. Only when all policy units are agreed on by respective identified negotiating-partner access right management devices, the resource-sharing policy is set on shared resources. | 2008-09-11 |
20080222695 | Key management for content protection - A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining whether step, to be prevented from having access is comprised in at least one group of the authorized set. | 2008-09-11 |
20080222696 | System, Method, Apparatus, and Computer Program Product for Facilitating Digital Communications - A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer. | 2008-09-11 |
20080222697 | Application Server Object-level Security for Distributed Computing Domains - Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components. | 2008-09-11 |
20080222698 | Secure Computer Communication - A method of improving the security of computer communications over a connecting network comprising the steps, carried out before a data packet enters the connecting network from a user domain, of tagging the data packet from a user domain with a security level marking and appending the tagged data packet with a string formed from a check-sum made over the data packet and security level marking tag to form a datagram. The integrity of the data is protected and the method can be used to prevent the mis-routing of data packets to user domains of lower security classification. | 2008-09-11 |
20080222699 | System and Method for Extensible Lobby Services - A server comprising a transceiver configured to support communications from a user terminal and a processor configured to maintain a virtual lobby having one or more variables associated therewith, the processor being further configured to receive from the user terminal one or more variables, and allow the user terminal access to the virtual lobby if each of the one or more variables received from the user terminal match the one or more variables associated with the virtual lobby. | 2008-09-11 |
20080222700 | Challenge/Response in a Multiple Operating System Environment - a secure challenge-response virtualization system including a computer having a memory divided into at least a first and a second logical partition, where the first partition is operative to receive a challenge from an entity, and a challenge/response manager configured with the second partition, where the first partition is configured to provide the challenge to the challenge/response manager configured with the second partition, and where the challenge/response manager is configured to generate a response to the challenge and provide the response to the first partition. | 2008-09-11 |
20080222701 | Using secondary bearer to detect proximity of a device - A new and unique method or apparatus for providing protected transport of digital content from a first device to a second device, featuring activating a proximity link between the first and second devices; performing proximity detection between the first device and the second device; delivering the digital content from the first device to second device over a communications link when it is determined that the proximity between devices is within a predetermined range. The proximity link may take the form of a wireless link that is limited in its range with adequate authentication mechanisms, and may be either is an additional link compared to, for example, a wireless broadband link, or may even form part of the wireless broadband link if its broadband is sufficient. In operation, an actual streaming transfer or other suitable data transfer would be provided from one device to the other device using the additional link, such as the wireless broadband link. In particular, the proximity link may ensure that the physical proximity of the other device is in a certain range. | 2008-09-11 |
20080222702 | SYSTEM AND METHOD FOR PREVENTING VIRUSES FROM INTRUDING INTO NETWORK - Some embodiments of the present invention provide a system and method for preventing viruses from intruding into a network. The system for preventing viruses from intruding into a network includes: a detection unit for performing virus detection to traffic passing through the network, and a control unit arranged between terminals and the network. The control unit is adapted to control access of the terminals to the network, and decide whether to allow the terminals to access the network according to detection result from the detection unit. According to the invention, all the traffic of a terminal infected by a virus is limited, and the connection between the terminal and the network is interrupted, thereby preventing the virus from diffusing and propagating widely over the network, and improving operation security of the network. | 2008-09-11 |
20080222703 | DATA REPRODUCING APPARATUS AND TRANSMITTER AUTHENTICATING DATA REPRODUCING APPARATUS - A data reproducing apparatus includes a receiver receiving the content and outputting the received content to an image display apparatus prepared in advance, and a transmitter transmitting the content to the receiver when authentication of the receiver is successful. Before transmitting the content, the transmitter transmits a request to start authentication to the receiver and executes an authentication process after a predetermined time. When the receiver cannot be authenticated, the transmission of the request to start authentication and the execution of the authentication process are repeated. Here, the predetermined time is variably set according to the number of times the request to start authentication is transmitted and the authentication is executed. | 2008-09-11 |
20080222704 | Method and Apparatus for Computer Network Security - Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network. | 2008-09-11 |
20080222705 | SYSTEM AND METHOD FOR DELIVERING GEOGRAPHICALLY RESTRICTED CONTENT, SUCH AS OVER-AIR BROADCAST PROGRAMMING, TO A RECIPIENT OVER A COMPUTER NETWORK, NAMELY THE INTERNET - A system and method for delivering geographically restricted content, including but not limited to over-air broadcast programming, to a recipient over a computer network, namely the Internet. The content is only delivered over the computer network if the recipient's computer or network device requesting the content over the network is verified to be located in the geographically restricted area. A conventional tuner is employed by the recipient's computer to receive one or more over-air signals having a broadcast range deemed to be synonymous with the geographically restricted area for the requested content. If the tuner is able to receive such over-air signal(s), the requested content is delivered over the network to the recipient's computer. This is because the recipient is known to be physically located in the geographically restricted area by the ability of the tuner to receive the over-air signal(s). | 2008-09-11 |
20080222706 | GLOBALLY AWARE AUTHENTICATION SYSTEM - A computer security monitoring method and system includes receiving input data, wherein the input data includes user account data associated with a user's security-related interaction with a particular network, security-related local network data associated with the particular network, and security-related external network data regarding security threats at one or more independent, external networks. The input data is analyzed to generate at least one composite security status score, wherein the analyzing includes an analysis of the user account data based on previously stored data associated with the user account, and an analysis of the security-related local and external network data to adjust the composite security status score when the analysis of the security-related local and external network data indicates an increased security threat. The method and system may produce human-readable output including an alert associated with the at least one composite security status score. Other features are disclosed. | 2008-09-11 |
20080222707 | SYSTEMS AND METHODS FOR CONTROLLING SERVICE ACCESS ON A WIRELESS COMMUNICATION DEVICE - Methods, devices, systems and computer program products are provided for controlling access to services, content, applications and the like on a wireless communication device. In one aspect, wireless communication device-wide access control is provided such that unified access control may exist on the device; providing access control to more than one, and in some instances all, of the services and/or applications that are accessible on the device. Additionally, aspects provide for limiting or prohibiting access based on numerous access control factors, such as content type, service type, location of the device, time or any other device environmental characteristic. The methods, devices, systems and computer program products for content access control may be executed on the wireless communication device or they may be executed within the wireless network. | 2008-09-11 |