44th week of 2008 patent applcation highlights part 74 |
Patent application number | Title | Published |
20080271047 | Method of Deriving Web Service Interfaces From Form and Table Metadata - A system and method of deriving web service interfaces from form and table metadata is disclosed. The method uses a discovery subsystem to discover services that are available on an application server, retrieves the metadata descriptions of the services on the application server and uses the services discovered and the metadata descriptions to create web services interfaces such that the service is available using web services description language. | 2008-10-30 |
20080271048 | Transaction Execution System Interface and Enterprise System Architecture Thereof - A system for interfacing at least one user interactive device with a trade execution system to execute trading transactions requested by users over a network includes an application in communication with the network for interfacing between the at least one user interactive device and the trade execution system and coordinating interaction of the at least one user interactive device with the trade execution system. The application contains first and second APIs. The first API is structured to deliver a trading transaction request received from the at least one user interactive device to the trade execution system. The second API is structured to deliver real-time information relating to the trading transaction request received from the trade execution system to the at least one user interactive device. The first API includes at least one stub that is called by the application at a predefined step during processing of the trading transaction request. The at least one stub includes code to interface the application with the trade execution system. | 2008-10-30 |
20080271049 | METHOD FOR FACILITATING TRANSACTIONS BETWEEN THIN-CLIENTS AND MESSAGE FORMAT SERVICE (MFS)-BASED INFORMATION MANAGEMENT SYSTEM (IMS) APPLICATIONS - A method is disclosed for facilitating conversational and non-conversational transactions between thin-clients and MFS-based IMS applications. The method includes storing conversation attributes associated with a conversational transaction between a thin-client and an MFS-based IMS application, the conversation attributes comprising connection information and conversation-specific information. Next, one or more transaction messages from the thin-client are preprocessed based on a transaction message type. The stored conversation attributes are updated in response changes in the conversation attributes caused by the one or more transaction messages. Then, a conversation output message is formatted for the thin-client. The method may include a security module authenticating a user, a connection module establishing a connection with an MFS-based IMS application, a state module preserving and maintaining conversation attributes, and a control module processing a transaction message having one or more transaction message types. | 2008-10-30 |
20080271050 | Alternately Processing Messages - Among other things, processing an incoming message stream includes storing context data of an application in a global database. Various messages from the incoming message stream are placed in an in-memory message queue. One of at least a first and a second phases at a first process is executed, and another of the at least first and second phases at a second process is also executed, so as to alternately execute a first phase and a second phase by a first process and a second process. The first phase includes processing at least one message from the various messages and storing at least one corresponding result in a local memory area. The first phase also includes storing al least one modification to the context data in the local memory area. The second phase includes performing a transaction of the at least one result and the at least one modification of the context data to the global database and committing the transaction. | 2008-10-30 |
20080271051 | Component-Oriented Application Servers - The invention relates to a process for component-oriented application servers and thus to the field of distributed applications. This invention expands component-oriented application servers in such a way that the components of an application implemented on this type of application server can provide graphic surfaces. This expansion is an additional function because network communication capabilities can be used without limitations, precisely as in non-expanded components. This makes it possible to assemble distributed applications entirely out of uniform components, while the advantages of application servers remain entirely available. | 2008-10-30 |
20080271052 | Technical place servicing integration - A method includes providing a technical place object to a Customer Resource Management (CRM) system wherein the technical place object includes information from an Enterprise Resource Management (ERP) system about a technical place including information associated with servicing the technical place. A service object may be provided to the ERP system wherein the service object includes information from the CRM system including information based on the technical place object and a service request associated with the servicing of the technical place. The CRM system may be provided an update of the service object wherein the update is based on a response to the service object by the ERP system. | 2008-10-30 |
20080271053 | Proteins, Pools, and Slawx in Processing Environments - Embodiments described herein include mechanisms for encapsulating data that needs to be shared between or across processes. These mechanisms include slawx (plural of “slaw”), proteins, and pools. Generally, slawx provide the lowest-level of data definition for inter-process exchange, proteins provide mid-level structure and hooks for querying and filtering, and pools provide for high-level organization and access semantics. Slawx includes a mechanism for efficient, platform-independent data representation and access. Proteins provide a data encapsulation and transport scheme using slawx as the payload. Pools provide structured and flexible aggregation, ordering, filtering, and distribution of proteins within a process, among local processes, across a network between remote or distributed processes, and via longer term (e.g. on-disk, etc.) storage. | 2008-10-30 |
20080271054 | Computer System, Computer Program Product, and Method for Implementing Dynamic Physical Memory Reallocation - A computer system, computer program product, and method implement dynamic physical memory reallocation. A system management interface (SMI) Handler and an Operating System (OS) are arranged for exchanging communications. Periodically the SMI Handler queries the operating system to identify a percentage of available memory currently being utilized. Responsive to the identified percentage of available memory currently being utilized, physical memory is dynamically reallocated. | 2008-10-30 |
20080271055 | PROTOCOL FOR COMMUNICATION OF DATA STRUCTURES - A system and method are provided for communicating information in a data structure between applications. According to the method, a description of a data structure is sent from a first application to a second application, and there is received from the second application an identification of at least one portion of the data structure that is requested by the second application. The first application marshals a subset of the data structure consisting of the at least one portion that was identified, and there is sent from the first application to the second application the marshalled subset of the data structure. | 2008-10-30 |
20080271056 | METHOD, SYSTEM, AND ARTICLE OF MANUFACTURE FOR DEVICE SELECTION - Provided are a system and article of manufacture for device selection. A command is generated in a host, wherein the command is for a library manager not directly connected to the host. A device is selected from a subsystem in a storage library based on a preference order, wherein the storage library is coupled to the host and the library manager. The command is sent from the host to the selected device for communicating with the library manager. | 2008-10-30 |
20080271057 | SYSTEM AND METHODS FOR THE UNIVERSAL INTEGRATION OF PLANT FLOOR ASSETS AND A COMPUTERIZED MANAGEMENT SYSTEM - A server platform and a method to integrate a plurality of diverse plant floor equipment with at least one computerized management system in a manufacturing operational or maintenance system. The server platform includes a plurality of plant floor drivers adapted to communicatively interface with a plurality of diverse plant floor data sources. The server platform further includes at least one computerized management system driver adapted to communicatively interface with the at least one computerized management system. The server platform also includes a message translator adapted to broker communication between the plant floor data sources and the at least one computerized management system using an open standard. The server platform, using the open standard, enables a universal enterprise type taxonomy across the plant floor data sources and the at least one computerized management system. | 2008-10-30 |
20080271058 | TANGIBLE INTERFACE FOR MOBILE MIDDLEWARE - A system and method for enabling the use of tangible user interfaces with applications on mobile devices. Semantic tagging can be used in connection with everyday objects, with the semantic tags providing semantic information about the object at issue. The semantic tags are configured to belong to an ontology that is understood by mobile middleware. The mobile middleware can scan for the presence of tangible interfaces. The tangible interfaces are then populated to a context representation model so that they can be shared by one or more applications. | 2008-10-30 |
20080271059 | Executing business logic extensions on a client computing system - Technologies are described herein for executing business logic extensions on a client computing system. A server platform exposes server-hosted application services to client applications. Calls to the server-hosted application services may be executed along with custom business logic extensions. A client platform is also provided that exposes client-hosted application services to a client application. The same business logic extensions that execute on the server platform can be utilized by the client platform. When a client application is online and connected to the server platform, the client application utilizes the server-hosted application services in the manner described above. When the client application is offline, the client application utilizes the client-hosted application services. The server platform synchronizes the business logic extensions to the client platform. | 2008-10-30 |
20080271060 | IMAGE FORMING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - In an image forming device which is capable of executing an application program, a plurality of interface providing units are arranged each providing the application program with an interface which enables the application program to use a function of the image forming device. A selecting unit selects at least one of the plurality of interface providing units as an object of use for the application program based on a result of comparison of information stored in a storage device and indicating an execution environment of each of the plurality of interface providing units with information stored in the storage device and indicating an execution environment of the image forming device. | 2008-10-30 |
20080271061 | Managing Multiple Data Processing Systems Using Existing Heterogeneous Systems Management Software - A common consolidation management application provides an interface to the multiple different system management software applications and at least one user input console. An adapter in each of the system management software applications supports communication with the consolidation application. A system administrator issues requests to different system management software applications using a common interface provided by the consolidation application. The consolidation application can be installed over an existing complex of computer systems managed by different management applications, without modifying the managed systems or replacing the management applications. | 2008-10-30 |
20080271062 | Optical disc apparatus - To prevent deformation of a chassis due to an impact force in an optical disc apparatus, there is provided a tray for inserting/ejecting an optical disc into/from an apparatus body, with the chassis connected thereto through vibration proof materials in plural portions in a surface opposite a disc placing surface. The tray has projecting portions projecting in a chassis direction in positions facing the chassis in peripheral portions of the plural connecting portions. The projecting portion is located at a position higher than a tray plane with which the vibration proof material comes into contact, and lower than the surface of a chassis facing the tray. When the vibration proof material is compressed and deformed due to the impact force, the projecting portion comes into contact with the chassis facing surface, to reduce the amount of deformation of the vibration proof material and thereby prevent deformation of the chassis. | 2008-10-30 |
20080271063 | Disc player - The present invention proposes a disc player without risk of damaging a disc and which has the ability to achieve the miniaturization and simplification of the construction. | 2008-10-30 |
20080271064 | PORTABLE INTEGRATED DISC-PUBLISHING DEVICE - A portable integrated media apparatus comprising: a disc transport movable along at least one axis, and includes a disc engagement mechanism for selective engagement of at least one disc; a print assembly for printing to the at least one disc, the print assembly including: one or more print heads movable about a print axis; at least one recording device for recording to the at least one disc; at least one disc receptacle adapted to store the at least one disc; a control unit for controlling the functions of the disc-publishing device; a data interface for transmitting data; and a data storage component for storing the data; wherein the disc transport and the one or more prints heads are adapted to move independent of each other and wherein the control unit controls one or more functions of the disc-publishing device based on the data received from the data interface, stored in the data storage component, or both. | 2008-10-30 |
20080271065 | Methods and Apparatus for Indirect Illumination in Electronic Media Rating Systems - Methods and apparatus for indirect illumination in electronic media rating systems are disclosed. A disclosed electronic media rating system comprises an audience image detection system and a non-visible light source to provide indirect illumination of an audience member. | 2008-10-30 |
20080271066 | LOCAL MESSAGE PERFORMANCE ON AN ENTERTAINMENT SYSTEM - Systems and methods are provided for enabling users to locally request the presentation of messages on an entertainment system. In particular, a method of operating an entertainment system is provided, including: receiving a request to perform a local message for performance in a single venue; and performing a series of messages, said series of messages comprising network messages for performance in on a plurality of entertainment systems and the local message. | 2008-10-30 |
20080271067 | System and method for presenting advertising data - A method for presenting advertising video data, the method including receiving at a first end user device, displayable data; scanning the displayable data for advertising selection data associated with the advertising data; and queuing the future video event for presenting data for the advertising based on the scheduling data. A data structure is disclosed for containing data embedded in a computer readable medium for providing a functional and structural interrelationship between a processor, the data structure and data stored in the data structure. | 2008-10-30 |
20080271068 | System and method for delivering personalized advertising data - A method is disclosed for distributing advertising data in an internet protocol television (IPTV) system, the method including dividing a plurality of end user devices in the IPTV system into K advertising groups; multicasting J advertising data multicast groups to end user devices in J advertising groups having a percentile ranking above or equal to a predetermined percentile ranking; and unicasting advertising data channels for actively viewed IPTV channels being viewed by other end users. | 2008-10-30 |
20080271069 | System and Method for the Provision of Advertisement Coupled to Treatment of Video on Demand Through Set Top Box - The present invention relates to a system and method for providing advertisement at a set top box in connection with processing of video-on-demand (VOD) contents. The system for providing advertisement at a set top box in connection with VOD contents, comprises: a VOD server for providing VOD contents; an advertisement server for providing advertisement data; and a set top box for processing the VOD contents from the VOD server and the advertisement data from the advertisement server to display the VOD contents and the advertisement data on a user's television, wherein the set top box includes: an input/output unit for performing input and output of data transmitted to the set top box; a VOD management application for receiving and processing information of VOD contents orderable for a user, a user interface for expressing the information and an order of the user; a cache memory for buffering the ordered VOD contents; a storage for storing the advertisement data from the advertisement server; an advertisement-data management application for managing the advertisement data; and a buffering monitoring scheduler for monitoring status of buffering VOD contents at the cache memory and controlling the advertisement management application to process the advertisement data during the buffering based on the monitoring result. By implementing the present invention, the advertisement data can be efficiently utilized through a set top box in connection with display of VOD contents. | 2008-10-30 |
20080271070 | Negotiated access to promotional insertion opportunity - A technique (and corresponding system) for controlling access to insertion opportunities in a multi-channel streaming media system is provided. The technique receives parameters for access to the insertion opportunities from multiple advertisers, such as desired audience viewership profile characteristics. The technique evaluates the received parameters to select which advertisers gain access to the insertion opportunities to place promotional content. The technique analyzes an audience of the placed promotional content and identifies which of the possible promotional content optimizes the value of the insertion opportunities or other maxima. Unlike traditional advertising in which advertisers pay per expected viewership, the technique may be arranged to charge advertisers only for a targeted audience that viewed the placed promotional content. The technique thus enables advertisers to access disparate insertion opportunities and to target an audience at lower cost without having to establish relationships with owners of insertion opportunities. | 2008-10-30 |
20080271071 | INFORMATION SYSTEM - A system and method for displaying an electronic program schedule guide is provided. The system has areas for displaying program schedule information. In addition, the system also has areas that may be used for advertising programs, products or services. In another embodiment, the system has areas for dsplaying messages to the user. | 2008-10-30 |
20080271072 | Systems and methods for providing live, remote location experiences - The present invention provides systems and methods for experiencing, in real-time, multimedia events from a remote location with ancillary location-associated content. For example, systems and methods of the present invention provide media users or viewers an enhanced, live, local broadcast and related locational information while the user or viewer is located in another geographical location. | 2008-10-30 |
20080271073 | METHOD OF PROVIDING KEY CODE INFORMATION AND VIDEO DEVICE THEREOF - A method of providing key code information of an external device and a video device thereof are provided. The method of providing key code information includes transmitting a message for requesting supportable key code information of a connected external device, and receiving a response message regarding the supportable key code information from the external device in response to the request message. Accordingly, the video device can provide the key code information supported by the external device to a user. | 2008-10-30 |
20080271074 | METHOD FOR PROVIDING SERVICE INFORMATION AND APPARATUS THEREOF - A method for providing service information and a video apparatus employing the same are provided. The method for providing service information includes transmitting a request message for service information provided by an external apparatus connected according to the High Definition Multimedia Interface Consumer Electronics Control (HDMI CEC) standard, and receiving a reply message for the service information from the external apparatus as a reply to the request message. Accordingly, the video apparatus provides service information provided by the external apparatus connected thereto to a user. | 2008-10-30 |
20080271075 | Broadcasting System, Broadcasting Station Apparatus, Receiving Device, and Broadcasting Method - A receiving device receives a plurality of first and second program information. The first program information is information relating to each of broadcasting scheduled programs within a predetermined time period from the date of transmission of a broadcasting signal by a broadcasting station apparatus. The second program information is information relating to a broadcasting scheduled program in the future after a predetermined time period from the date of transmission of the broadcasting signal. A controller in the receiving device stores, when there is a reservation based on the second program information, the reserved second program information in a reservation information storage. Thereafter, the controller compares the reserved second program information with a plurality of first program information newly received, and determines whether or not there is first program information that coincides with the second program information. The controller updates, when there is first program information that coincides with the second program information, information relating to the reserved program stored in the reservation information storage on the basis of the first program information. | 2008-10-30 |
20080271076 | Method and Apparatus for Switching Between Edge Device Resources in an SDV System - A process is provided that may be employed by a set top terminal when a viewer is engaged in a SDV session and is required to switch from one edge device to another. The method begins when a set top terminal receives an SDV program forwarded over an access network by a first digital modulator. The SDV program is received on a first SDV channel associated with the first digital modulator. Next, a request is received to tune to a second SDV channel associated with a second digital modulator to thereby continue receiving the SDV program over the access network. The set top terminal detects an event indicating that a change from the first SDV channel to the second SDV channel will lessen disruption to a viewer of the SDV program. Finally, the set top terminal tunes to the second SDV channel. | 2008-10-30 |
20080271077 | METHOD OF CONTROLLING AND APPARATUS OF RECEIVING MOBILE SERVICE DATA - A data transmission system for minimizing the number of errors during Tx/Rx times of mobile service data under mobile environments, and a data processing method for the same are disclosed. The system additionally codes the mobile service data, and transmits the resultant coded mobile service data. As a result, the mobile service data has a strong resistance to noise and channel variation, and can quickly cope with the rapid channel variation. | 2008-10-30 |
20080271078 | Momentary Electronic Program Guide - A computer-implemented method includes determining a time relative to a playing media program to insert a user notification, automatically generating a suggestion regarding a media program other than the playing media program to be presented to an audience member of the playing media program, providing, in a format for presentation on a user-related media player, the generated suggestion at the location in the playing media program, and causing the generation of a control that, when selected, performs an action related to the non-playing media program. | 2008-10-30 |
20080271079 | Extended Description to Support Targeting Scheme, and Tv Anytime Service and System Employing the Same - The present research relates to description supporting a targeting scheme, more particularly, to an extended description structure supporting a targeting scheme and a TV-Anytime service providing method and system employing the same based on Moving Picture Experts Group 21 (MPEG-21) Usage Environment Description (UED) tools. The TV-Anytime service providing system employing the extended description structure includes a service providing apparatus for generating package metadata including user information and usage environment information; and a user device for acquiring the package metadata including user information and usage environment information from the service providing apparatus through diverse access networks. | 2008-10-30 |
20080271080 | Customizable Media Channels - A computer-implemented method includes receiving an identification of a media program from a broadcast channel on an electronic program guide for inclusion in a personalized channel, adding the identified program to a personalized channel at a first time, and adding one or more additional programs to the personalized channel at times other than the first time. | 2008-10-30 |
20080271081 | Content guide information processing apparatus, content guide information processing method and computer program thereof - Guide information is provided relating to playing/viewing of content retrieved through various modalities such as television broadcasting and a computer network. A unified program list is created that comprehensively handles program content. For a self-recorded program, program metadata retrieved during a recording operation is additionally registered. For a network program, a network program list is periodically retrieved from a service site, modified and recorded. To play the content, a guide screen is created and supplied based on a unified program list. When a self-recorded program is selected, the program is read and played from an HDD. When a network program is selected, the program is played in a streaming manner via the Internet. | 2008-10-30 |
20080271082 | USER CONTROLLED MULTIMEDIA TELEVISION BROADCAST ON SINGLE CHANNEL - A system and method for the user controlled television broadcast system packaging a live, simultaneous, multiple feed telecast and pre-determined multimedia content over a single channel with viewer manipulation components and methods to protect and generate commercial content are disclosed. | 2008-10-30 |
20080271083 | METHOD AND APPARATUS FOR DISPLAYING INFORMATION ABOUT A BEAUTY PRODUCT ELEMENT - Disclosed herein, in various embodiments, are methods and apparatus incorporating, among other things, the concept of using, in particular but without limitation, traditionally non-commercial programming as a medium for selling products or services on-line, and again in particular over the Internet. Using this concept, for example, a beauty product element identified in motion picture programming can be made electronically identifiable by a viewer of the programming, and thereby enabling a viewer to determine the source or other information about the beauty product element. Using this concept, for example, a viewer viewing a soap opera is able to use a device to electronically select a beauty product element worn or used by an actor or actress. In turn, information about the beauty product element can be displayed to the viewer, including purchase information. Using this particular concept of the invention, traditionally non-commercial programming can be efficiently used to indirectly advertise goods or services and offer them for sale on-line. | 2008-10-30 |
20080271084 | METHOD AND APPARATUS FOR DIGITAL SHOPPING - Disclosed herein, in various embodiments, are methods and apparatus incorporating, among other things, the concept of using, in particular but without limitation, traditionally non-commercial programming as a medium for selling products or services on-line, and again in particular over the Internet. Using this concept, for example, an element identified in motion picture programming can be made identifiable by a viewer of the motion picture programming, and thereby enabling a viewer to determine the source, location, or other information referred to by the element. Using this concept, for example, a viewer viewing a soap opera is able to use a device to electronically select a element identified in the broadcast. In turn, information referred to by the content element can be displayed to the viewer, including purchase information. Using this particular concept of the invention, traditionally non-commercial programming can be efficiently used to indirectly advertise goods or services and offer them for sale on-line. | 2008-10-30 |
20080271085 | SYSTEM AND METHOD FOR EFFECTIVELY IMPLEMENTING A PERSONAL CHANNEL FOR INTERACTIVE TELEVISION - A system and method for effectively implementing a personal channel for interactive television comprises a personal channel manager that may include a configuration module, a search module, and a content packaging module. A system user may utilize the configuration module to perform a personal channel configuration procedure to specify personal channel configuration data for performing a content record search procedure. The search module may manage the content record search procedure according to one or more search parameters that may be defined during the personal channel configuration procedure. The search module may selectively locate and access one or more content records from one or more remote content databases during the foregoing content record search procedure. The content packaging module may then responsively coordinate a content record sorting procedure according to user-specified sorting criteria to thereby organize the located content records into a personal channel program. The personal channel program may then be presented upon a television device for viewing by the system user. | 2008-10-30 |
20080271086 | METHOD AND APPARATUS FOR DISPLAYING INFORMATION ABOUT A REAL WORLD SETTING - Disclosed herein, in various embodiments, are methods and apparatus incorporating, among other things, the concept of using, in particular but without limitation, traditionally non-commercial programming as a medium for selling products or services on-line, and again in particular over the Internet. Using this concept, for example, a real world setting identified in motion picture programming can be made electronically identifiable by a viewer of the programming, and thereby enabling a viewer to determine the source, location, or other information about the real world setting. Using this concept, for example, a viewer viewing a soap opera is able to use a device to electronically select a real world setting or location identified in the programming. In turn, information about the real world setting can be displayed to the viewer, including purchase information. Using this particular concept of the invention, traditionally non-commercial programming can be efficiently used to indirectly advertise goods or services and offer them for sale on-line. | 2008-10-30 |
20080271087 | METHOD AND APPARATUS FOR DELIVERING INFORMATION ABOUT AN AUDIO ELEMENT - Disclosed herein, in various embodiments, are methods and apparatus incorporating, among other things, the concept of using, in particular but without limitation, traditionally non-commercial programming as a medium for selling products or services on-line, and again in particular over the Internet. Using this concept, for example, an audio element identified in a broadcast can be made identifiable by a user of the broadcast, and thereby enabling a user to determine the source, location, or other information about the audio element. Using this concept, for example, a user viewing a soap opera is able to use a device to electronically select an audio element identified in the broadcast. In turn, information about the audio can be displayed to the user, including purchase information. Using this particular concept of the invention, traditionally non-commercial programming can be efficiently used to indirectly advertise goods or services and offer them for sale on-line. | 2008-10-30 |
20080271088 | METHOD AND APPARATUS FOR DELIVERING INFORMATION REFERRED TO BY CONTENT - Disclosed herein, in various embodiments, are methods and apparatus incorporating, among other things, the concept of using, in particular but without limitation, traditionally non-commercial programming as a medium for selling products or services on-line, and again in particular over the Internet. Using this concept, for example, a content element identified in a broadcast can be made identifiable by a user of the broadcast, and thereby enabling a user to determine the source, location, or other information referred to by the content element. Using this concept, for example, a user viewing a soap opera is able to use a device to electronically select a content element identified in the broadcast. In turn, information referred to by the content element can be displayed to the user, including purchase information. Using this particular concept of the invention, traditionally non-commercial programming can be efficiently used to indirectly advertise goods or services and offer them for sale on-line. | 2008-10-30 |
20080271089 | METHOD AND APPARATUS FOR DISPLAYING INFORMATION IN RESPONSE TO MOTION PICTURE PROGRAMMING - Disclosed herein, in various embodiments, are methods and apparatus incorporating, among other things, the concept of using, in particular but without limitation, traditionally non-commercial programming as a medium for selling products or services on-line, and again in particular over the Internet. Using this concept, for example, an element identified in motion picture programming can be made identifiable by a viewer of the motion picture programming, and thereby enabling a viewer to determine the source, location, or other information referred to by the element. Using this concept, for example, a viewer viewing a soap opera is able to use a device to electronically select a element identified in the broadcast. In turn, information referred to by the content element can be displayed to the viewer, including purchase information. Using this particular concept of the invention, traditionally non-commercial programming can be efficiently used to indirectly advertise goods or services and offer them for sale on-line. | 2008-10-30 |
20080271090 | Device, system, network and method for acquiring content - A system, device, network and method for acquiring content that is first transmitted via satellite and received by a satellite receiver such as, for example, a satellite radio receiver. The received content may be listened to (for audio content) upon receipt by the satellite radio receiver, yet may be acquired at some later time. Alternatively, the content may be acquired in real-time—that is, at or proximate to the time during which the content is listened to (again, using audio content as an example). To acquire the content at a later time, the listener captures a part of the signal which carries the content and which is received by the satellite radio receiver. The captured part of the signal may then be transmitted to a content provider that, in turn, transmits a copy of the content identified by the part of the signal to the listener. | 2008-10-30 |
20080271091 | SYSTEM AND APPARATUS FOR ENHANCING DELIVERY OF MEDIA SERVICES - A system and apparatus for enhancing delivery of media services is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a set-top box that can have a controller element to present at a media device content information received over a broadband connection. The content information can be associated with at least one satellite service presented to the media device over satellite signals disassociated with the broadband connection. The content information can also be received responsive to a request for said content information. Additional embodiments are disclosed. | 2008-10-30 |
20080271092 | Methods and apparatus for controlling a satellite antenna - Methods and apparatus are provided for issuing instructions to a satellite antenna configured to receive a transmission from any of a group of satellites and to provide a signal to a receiver. In accordance with one embodiment, the receiver is queried (e.g., by a control module, which in one embodiment is a device equipped with a microprocessor and memory storing instructions defining the query) to determine information relating to a channel selected by a user. Based on the information, a determination is made whether the antenna should receive a transmission from a satellite other than a currently selected satellite. If so, the antenna is instructed (e.g., by the control module) to locate the other satellite. In another embodiment, methods and apparatus are provided for use in systems having multiple receivers, including one master receiver coupled to the antenna and one or more other slave receivers which do not issue instructions to the antenna. In accordance with this embodiment, a determination is made whether a user of a slave receiver has selected a channel provided by a transmission from a satellite other than a currently selected satellite, and if so, the antenna is caused (e.g., by a control module coupled to the slave receiver) to locate the other satellite. | 2008-10-30 |
20080271093 | RECORDING/REPRODUCTION DEVICE AND METHOD FOR DIGITAL BROADCASTING - A recording/reproduction device is provided wherein service content having interactivity can be restored even when recorded. In recording mode, a transport stream from a receiving device | 2008-10-30 |
20080271094 | HOME NETWORK SYSTEM AND METHOD - A demarcation point unit connected between a home network backbone and an external network. The demarcation point unit includes a blocking filter and splitter. The blocking filter receives a home network signal from the home network backbone and an external signal from the external network. The blocking filter separates the home network signal from the external signal, and returns the home network signal back to the home network backbone. The splitter has an input and at least two outputs. The input of the splitter receives the home network signal from the blocking filter. | 2008-10-30 |
20080271095 | METHOD AND SYSTEM FOR PREVIEWING MEDIA OVER A NETWORK - Systems and methods are disclosed that allow a user to preview media content on a device while the device is downloading the media content and without interrupting the downloading of the media content. In addition, the user may preview any location within a media file regardless of whether the media data for the location has been received by the user's device. The user's device, upon receipt of a command to preview a specific location within a file already being downloaded, determines if the data for that location have already been received. If so, the user's device generates a preview frame from the downloaded data. If not, the user's device transmits a preview request to the media server which generates the preview frame and transmits back to the user's device. | 2008-10-30 |
20080271096 | Methods and systems for interactive video transport over Ethernet networks - The present invention provides methods and systems to remove the dependence on the IP layer (OSI layer three) in Video-on-Demand (VoD) transport networks. The present invention replaces the IP layer with Ethernet layer two addressing and even layer one, allowing connectivity in access/aggregation networks without IP layer three capabilities. The present invention enables STBs to communicate with VoD controllers, servers, and the like at layer two and/or layer one, eliminating the need for layer three routing capabilities in access/aggregation networks. | 2008-10-30 |
20080271097 | System And Method For Receiving And Playing Network Television Programs - The present invention discloses a system and method for receiving and playing network television programs. The system of the present invention comprises a program receiving unit, adapted to receive video data of at least two programs and store the video data of the at least two programs in at least two caches respectively; and a program playing unit, adapted to provide at least two video windows and output the video data of the at least two programs respectively retrieved from the at least two caches onto the at least two video windows respectively. The method the present invention comprises receiving video data of at least two programs and storing the video data of the at least two programs in at least two caches respectively; and retrieving the video data of the at least two programs from the at least two caches respectively and outputting the video data onto the at least two video windows respectively. The technical scheme of the present invention enables a user to watch multiple television programs within one playback interface of a network television client terminal. | 2008-10-30 |
20080271098 | SYSTEM AND METHOD FOR VIDEO CONVERSATIONS - This disclosure describes methods and systems for viewing a collection of media objects, such as a video clip and associated responses (video, audio and text), in a seamless way. Provided with a media object and a series of responses and counter responses, a real time media combining methodology is coupled with a text and audio conversion process to generate a media stream, or downloadable media object, that contains the original media object and some or all of the associated responses. The media content is formatted into the stream so that ancillary content, like text associated with a particular video response, may also be displayed. Advertisements may be inserted into the stream between responses or overlaying some portion of the viewing area during rendering of the stream. | 2008-10-30 |
20080271099 | Content transmission apparatus, content reception apparatus, and content transmission/reception system - Disclosed herein is a content transmission apparatus connected to a content reception apparatus at a remote place via a network, the content transmission apparatus including: a broadcast signal reception section configured to receive a broadcast content on one or more channels; a recording/reproducing section configured to compress and record data of at least 24 hours of broadcast content on each channel, and reproduce the recorded compressed data; a communication section configured to transmit the compressed data to the content reception apparatus via the network; and a delay control section configured to control the recording/reproducing section to control a delay time between a broadcasting time of the content and a time at which the compressed data is transmitted. The delay time is set in accordance with time difference information indicating a time difference between places where the content transmission apparatus and the content reception apparatus are placed. | 2008-10-30 |
20080271100 | Method Using A Set-Top Box And Communicating Between A Remote Data Network And A Wireless Communication Network - Disclosed are methods and systems for connecting a set-top box (STB) to the Internet over existing and future wireless networks, combining television with wireless Internet access. A conventional television is used in combination with a STB that has a wireless or wired keyboard, a power supply, and audio/visual connections for connecting the STB to the television. In an embodiment, a wireless telephone is placed in a docking station on top of the STB, providing the user with both data (when docked) and voice capabilities (when being used simply for telephone calls). CDMA, CDPD, or other wireless technologies may used for connection to the Internet. | 2008-10-30 |
20080271101 | SYSTEM AND METHOD FOR BROADBAND DIGITAL VIDEO RECORDING - A broadband digital video recorder (BDVR) system allows cable or satellite television (TV) viewers to cause a copy of a selected TV show to be downloaded via a broadband Internet network and stored for viewing on a designated computer or a portable media player. Television viewers make a selection of a TV show to record using their remote control device. In response, the BDVR system causes a copy of a video file corresponding to the selected television show to be automatically downloaded from a remote server to the user's computer over a broadband Internet connection. Users may conveniently select a television show to record via a conventional television network but automatically download a digital video file corresponding to the television show to their computer via a broadband Internet network without complicated user interaction and without searching for the video files on the Internet. | 2008-10-30 |
20080271102 | BIT-RATE CONSTRAINED TRICK PLAY THROUGH STREAM SWITCHING AND ADAPTIVE STREAMING - A system for bit-rate stream playout at preset speeds including a regular playout speed and other than the regular playout speed includes multiple streams encoded at a same bit-rate (R) but at a plurality of playout speeds. A selection mechanism is responsive to requests for playout speeds. The selection mechanism selects from among the plurality of streams to service a request. | 2008-10-30 |
20080271103 | Controlling Access to Broadcast Services in a Terminal Device - Services are distributed via a distribution network to terminal devices. One of the services is an electronic service guide stored in the terminal devices and providing descriptive data on the distributed services. To control access to the services distributed to a terminal device, the device includes a module for filtering descriptive data on the distributed services in accordance with at least one filtering criterion, and a graphics module for displaying the filtered descriptive data that meets the filtering criterion so as to enable services associated with the displayed filtered descriptive data to be selected. | 2008-10-30 |
20080271104 | POINT-TO-MULTIPOINT HIGH DEFINITION MULTIMEDIA TRANSMITTER AND RECEIVER - A high definition video transmitter and receiver are disclosed. The transmitter provides high definition video to a one-point receiver or to multipoint receivers. The transmission network is asynchronous and the receiver re-synchronizes the video. The transmission can be wired or wireless. | 2008-10-30 |
20080271105 | POINT-TO-MULTIPOINT HIGH DEFINITION MULTIMEDIA TRANSMITTER AND RECEIVER - A high definition video transmitter and receiver are disclosed. The transmitter provides high definition video to a one-point receiver or to multipoint receivers. The transmission network is asynchronous and the receiver re-synchronizes the video. The transmission can be wired or wireless. | 2008-10-30 |
20080271106 | METHOD AND SYSTEM FOR OPTIMIZING THE BANDWIDTH FOR AN AUDIO/VIDEO NETWORK - A system for optimizing the usage of bandwidth on an audio/video network system includes at least one slave client in communication with a gateway box for receiving network services at the at least one slave client. The system includes a remote control unit for communicating with a television to control its operation, including turning it on and off. The remote control is also in communication with the at least one slave client such that when the television is turned on or off by the remote control, the slave client can determine the status of the television and turn itself on or off accordingly. | 2008-10-30 |
20080271107 | IN-HOME RECEIVING TERMINAL SYSTEM - Provided is an in-home receiving terminal system capable of detecting that a receiving terminal device is outside a subscriber's house, and restricting viewing of cable television broadcasting by the receiving terminal device outside the subscriber's house. In the in-home receiving terminal system comprising a main terminal device and a sub-terminal device for receiving digital cable television broadcasting, the main terminal device and the sub-terminal device being connected to an in-home network, a link detecting portion of the sub-terminal device detects the status of a link connection with the in-home network, and a terminal control portion of the sub-terminal device controls activation/deactivation of a television reception tuner based on the detected status of the link connection. | 2008-10-30 |
20080271108 | Satellite and cable ready TV display device - A display system includes a display device including a plurality of signal decoders, a video processing module, and an audio processing module, the display device excludes a tuner device, and a signal receiving module including a tuner module and a demodulator module, wherein the signal receiving module is removably connected to the display device. | 2008-10-30 |
20080271109 | PHYSICAL SECURITY TRIGGERED DYNAMIC NETWORK AUTHENTICATION AND AUTHORIZATION - A unified access control component (UACC) can maintain information relating to network access information and physical location information associated with respective users who may access a network that can include network resources (e.g., applications, information). The UACC can cross reference the network access information (e.g., user network access events, credentials, and policy) and physical location information (e.g., user physical access events, credentials, and policy) and can generate and enforce a unified network access policy based on network access information and physical location information associated with a particular user. After network access privileges have been granted to a user, the UACC can continue to monitor the user. The UACC can include a dynamic authentication component that can request a user re-authenticate if a change in the physical location and/or network access associated with the user is detected, such that a re-computation of network access privileges is desired. | 2008-10-30 |
20080271110 | Systems and Methods for Monitoring Compliance With Standards or Policies - In one embodiment, a system or method pertain to accessing a model that comprises a computer-readable version of a standard or policy, identifying rules or requirements specified by the model that pertain to compliance with the standard or policy, and automatically generating questions relevant to the identified rules or requirements, the questions being intended to query intended respondents as to compliance with the identified rules or requirements. | 2008-10-30 |
20080271111 | EFFICIENT POLICY CONFLICT DETECTION - A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict. | 2008-10-30 |
20080271112 | AUTOMATIC FILE TRANSFER - A computer-readable medium contains software that, when executed by a processor, causes the processor to perform various actions. For example, as a result of a user-initiated event, the software causes the processor to automatically select at least one file from among a plurality of files based on a policy, and to automatically transfer the selected at least one file across a network. | 2008-10-30 |
20080271113 | POLICY CONTROL IN A NETWORK - There are disclosed measures for policy control in a network, including an authorization check. Namely, a method of policy control in a network comprises obtaining, at an application function entity of the network, a request for a service, determining, at the application function entity, whether service information associated with the requested service requires an authorization check or a configuration of a policy enforcement entity of the network, and providing, depending on the determining result, an indication from the application function entity to a policy control entity of the network, whether or not the policy enforcement entity is to be configured for the requested service information, together with that requested service information. | 2008-10-30 |
20080271114 | SYSTEM FOR PROVIDING AND UTILIZING A NETWORK TRUSTED CONTEXT - A system for establishing a connection between a data server and a middleware server is disclosed. The system includes defining a plurality of trust attributes corresponding to a trusted context between the middleware server and the data server and validating the plurality of trust attributes against a plurality of attributes corresponding to the middleware server. The plurality of attributes provided in a connection request. The system also includes establishing the trusted context based on the validating the plurality of trust attributes. | 2008-10-30 |
20080271115 | Method and System for Authentication of a Low-Resource Prover - A method is presented for enabling authentication of a prover in a Radio Frequency Identification system comprising the prover and a verifier, the method comprising the steps of: the prover sending a prover identifier and a parent identifier to the verifier, the verifier sending a verifier identifier to the prover, the prover calculating a first common secret by means of a prover polynomial, where an unknown in the prover polynomial is substituted by a result calculated using a function of at least the verifier identifier, and the verifier calculating the first common secret by means of a first verifier polynomial, wherein a first unknown in the first verifier polynomial is substituted by the prover identifier and a second unknown in the first verifier polynomial is substituted by the parent identifier, the prover creating a first message by modulating a first core secret with regard to at least the first common secret, aid prover sending the first message to the verifier, and the verifier creating a first candidate for the first core secret by demodulating the first message with the first common secret, whereby the candidate for the first core secret is for use in the authentication. This allows the verifier and prover to independently create a common secret, used for modulating the core secret. Furthermore, no pre-registration of the prover with the verifier is required and calculation using polynomials requires little processing power. A corresponding system, prover and verifier are also presented. | 2008-10-30 |
20080271116 | SYSTEM AND METHOD FOR ENROLLING IN A BIOMETRIC SYSTEM - The present invention is a system and method of enrolling potential system users for a biometric system for identity verification. Potential system user information is entered into the system, either by the user or a system operator, and is stored as a partially-enabled user record. The user of a partially-enabled user record fully enables the record by presenting information previously stored in the user record and presenting the remainder of user information necessary to complete record activation. Enrollment data is used to authenticate the system user's identity and authorize related transaction accesses in a biometric system for identity verification. | 2008-10-30 |
20080271117 | Cascading Authentication System - Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a user to a server may include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan. If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user's current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments of the method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user. | 2008-10-30 |
20080271118 | METHOD OF PROTECTING AGAINST DENIAL-OF-SERVICE ATTACKS - An apparatus and method of protecting against a denial-of-service (DoS) attack are described. The apparatus comprises a classification engine, a meter engine, and a copy engine. The method comprises assigning a received packet to a meter based upon a classification of the network packet, determining that a DoS attack is in progress based upon a meter count, copying at least one packet from the meter to a processor; and suppressing the copying of subsequently received network packets to the processor. | 2008-10-30 |
20080271119 | BEHAVIORAL ADVERTISING AND CREATION OF AD-HOC MICROCOMMUNITIES THROUGH USER AUTHENTICATION - Implementations of behavioral advertisement targeting and creation of ad-hoc microcommunities through user authentication are described. In one implementation, a user is allowed to submit authentication information on a webpage associated with a third party website. For example, a user can identify himself by entering a username and password to an email account unaffiliated with the third party website. The authentication information can then be used to access a personal account associated with the user. For example, behavioral data associated with the user can be gathered from the personal account and be used to present advertisements on the webpage targeting a specific behavioral profile of the user. Alternately, the user can be presented with options to interact with information in the personal account. For example, the user may be given the opportunity to invite members of a contacts list in the personal account to visit the webpage. | 2008-10-30 |
20080271120 | Network Pre-Authentication - A method of dynamic pre-authentication includes receiving at an access point from one or more content platforms a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user. Updates to the white list are dynamically received from the one or more content platforms which are each responsible for a particular promotional campaign that features specific content. A request is received at the access point from a non-authenticated user for certain of the specific content, which is allowed such that a domain of the content platform responsible for the certain specific content is accessed by the user. | 2008-10-30 |
20080271121 | EXTERNAL USER LIFECYCLE MANAGEMENT FOR FEDERATED ENVIRONMENTS - The present invention provides a generic technique that externalizes the management of a user session, particularly in the context of a federated environment. The invention obviates any requirement to design and implement special software (or any requirement to modify a previously installed plug-in) to enable third party SSOp-aware applications to manage the lifecycle of a user session. In an illustrative embodiment, the user session lifecycle is managed externally through an external authentication interface (EAI) that has been extended to enable any POC (or SSOp-aware application) to interface to a federated identity provider component using a simple HTTP transport mechanism. In the inventive approach, HTTP request and response headers carry the information that is used by the POC to initiate and later destroy a user session, and such information is provided by a federated entity without requiring use of a special authentication API. | 2008-10-30 |
20080271122 | GRANULATED HARDWARE RESOURCE PROTECTION IN AN ELECTRONIC SYSTEM - A control logic secures access to an electronic system. The control logic comprises an initialization logic and an operational logic. The initialization logic allocates access rights individually among a plurality of hardware and/or operation elements in the electronic system and individually secures the plurality of hardware and/or operation elements with electronic and/or software-activated access. The operational logic responds to attempted access by a user to authenticate hardware and/or operation elements and enable operation of the hardware and/or operation elements upon authentication. | 2008-10-30 |
20080271123 | System and Method For Controlling Devices in a Home-Automation Network - A home-automation system ( | 2008-10-30 |
20080271124 | Secure Computer Use System - Methods and apparatus for ensuring the computer security of users of a computer system are described. A user is allocated a security grading relating to how secure their computer system ( | 2008-10-30 |
20080271125 | Authenticating a Requestor Without Providing a Key - A system for authenticating a requesting entity in a subnet communications environment includes determining a client identification of a client node associated with the requesting entity, and determining whether the requesting entity associated with the client node is acting in a supervisor capacity. A key to the requesting entity is returned from a resource provider node upon determining that the client identification of the client node indicates that the client node is permitted to access one or more resources of the provider node, and that the client node is acting in a supervisor capacity. | 2008-10-30 |
20080271126 | Pre-authenticated calling for voice applications - Architecture for providing pre-authenticated information from an endpoint for subsequently authenticating a device and/or user associated with the previously-authenticated information. A pre-authentication module of the architecture can be a trust component as part of an application that facilitates the utilization of user information and/or endpoint information in a media session protocol message to replace information that would otherwise be gathered via a dialog. In the context of IP-based voice communications, a call can be made from a client that is pre-authenticable, and no longer requires that an IP-based telephone interact with the phone user to facilitate sign-on. | 2008-10-30 |
20080271127 | APPARATUS AND METHOD FOR CREATING STAND-ALONE BUSINESS INTELLIGENCE WIDGETS WITHIN AN AUTHENTICATION FRAMEWORK - A computer readable storage medium includes executable instructions to retrieve a list of one or more widgets from a repository. A set of items representing the list of one or more widgets is displayed. A widget is selected from amongst the one or more widgets in the repository. The widget is configured with a set of authentication credentials | 2008-10-30 |
20080271128 | Method and System for Retaining and Protecting Sensitive User-Related Information - A method, device and system for managing and altering a plurality of sensitive information are disclosed. The device comprises a memory for storing the sensitive information, an interface device for enabling communication between the memory and an external device, and a timer for providing a time-based value associated with the storing of each of the sensitive information. The device may communicate with a processor-based system that includes an input device via a wired or wireless communication media. The processor-based system receives selected sensitive information from the device and may provide altered sensitive information to the device. | 2008-10-30 |
20080271129 | Single sign-on functionality for secure communications over insecure networks - Techniques for identity techniques for single sign-on functionality for secure communications over insecure networks are provided. A principal achieves single sign-on access to a server via a client by initially authenticating to third-party authentication service. Next, a credentialing service supplies a randomly generated credential to the client and the server unbeknownst to the principal. The principal is then equipped to engage in secure communicates over an insecure network using the credential that is managed by services of the client to authenticate to services of the server in a fashion that the principal is unaware of. | 2008-10-30 |
20080271130 | MINIMIZING CLIENT-SIDE INCONSISTENCIES IN A DISTRIBUTED VIRTUAL FILE SYSTEM - A method of minimizing inconsistencies seen by a client in a distributed virtual file system having multiple clients and a plurality of servers, by creating a token that identifies one of the plurality of servers for creating or modifying a file in the distributed virtual file system. The token has an expiry greater than a propagation time between the identified server and the plurality of servers. | 2008-10-30 |
20080271131 | Configuring devices in a secured network - An exemplary method for configuring a device to enable it to become a member of an established network comprises reading, using a portable device, a first token of a networked device, obtaining configuration data based on the first token, reading a second token of a non-networked device, establishing a communication session with the non-networked device based on the second token, and providing the configuration data to the non-networked device to enable it to become a member of the same network as the networked device. | 2008-10-30 |
20080271132 | Host Identity Protocol Method and Apparatus - A method is provided of at least partially securing communications between first and second hosts using the Host Identity Protocol, HIP, where the first host is not HIP enabled and the second host is HIP enabled. A persistent HIP identity is associated with the first host and maintained at a remote server. A public part of the persistent HIP identity is obtained from the remote server together with a certificate authorising a gateway node between the first and second hosts to use a temporary HIP identity associated with the first host in a subsequent negotiating step. A secure HIP connection is then negotiated between the gateway node and the second host using at least part of each of the persistent HIP identity, the temporary HIP identity and the certificate. A Host Identity Protocol, HIP, method is provided for use in a network in which a non-HIP-enabled host is communicating with a HIP-enabled host via a plurality of gateway nodes in turn, comprising using a persistent HIP identity for the first host, maintained at a remote server, for each such gateway node used. | 2008-10-30 |
20080271133 | Authenticating a Requestor Without Providing a Key - A method for authenticating a requesting entity in a communications environment. In an exemplary embodiment, the method includes determining a client identification of a client node associated with the requesting entity, and determining whether the requesting entity associated with the client node is acting in a supervisor capacity. A key to the requesting entity is returned from a resource provider node upon determining that the client identification of the client node indicates that the client node is permitted to access one or more resources of the provider node, and that the client node is acting in a supervisor capacity. | 2008-10-30 |
20080271134 | Method and system for combined security protocol and packet filter offload and onload - A network interface card (NIC) includes a security association database (SADB) comprising a plurality of security associations (SAs), a cryptographic offload engine configured to decrypt a packet using one of the plurality of SAs, a security policy database (SPD) comprising a plurality of security policies (SPs) and a plurality of filter policies, and a policy engine configured to determine an admittance of the packet using one of the plurality of SPs from the SPD and apply one of the plurality of filter policies to the packet. | 2008-10-30 |
20080271135 | Remote network device with security policy failsafe - A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network; a user-defined network security policy for the firewall component to define constraints on data flows permitted by the network device; and a failsafe protocol to enable remote control of the device independent of the user-defined network security policy and the firewall filter. | 2008-10-30 |
20080271136 | METHOD AND SYSTEM FOR CONTROLLING SOFTWARE LOADS ON A THIRD-PARTY MOBILE STATION - A system and method for allowing a licensee having mobile station hardware to support its own set of carriers and software demands of these carriers, the software including licensor software, the method comprising the steps of: assigning a unique third party identifier to the licensee; assigning a range of carrier identifiers for the licensee; allowing the licensee to create a unique identifier by combining the unique third party identifier with an identifier chosen from the range of carrier identifiers; and associating, in a gateway program, the unique identifier with one or more software versions acceptable by a carrier for download onto the mobile station hardware. | 2008-10-30 |
20080271137 | INSTANT COMMUNICATION WITH TLS VPN TUNNEL MANAGEMENT - Techniques are provided for securing instant communications, such as text, audio, and video. A tunnel management module is included in an instant communication suite that comprises one or more instant communication applications. Any communication between a user of the instant communicate suite and a contact passes through the tunnel management module, which may use TLS (or IPSec) technologies to ensure security of the instant communications. Each contact of a user may be associated with a different set of security mappings, which may be specified by the user. A tunnel configuration file is generated from a security mapping and is used to create a tunnel through which secure instant communications may pass. | 2008-10-30 |
20080271138 | SYSTEM AND METHOD FOR OPTIMIZING DATA OVER SIGNALING TRANSMISSIONS - A system for optimizing data over signaling (DoS) transmissions in wireless communications system is disclosed. The system comprises at least one access network and at least one access terminal. The at least one access network is adapted to determine location of the at least one access terminal through communication between the at least one access network and the at least one access terminal, and adapted to transfer data between the at least one access network and the at least one access terminal. | 2008-10-30 |
20080271139 | DETERMINATION OF ACCESS CHECKS IN A MIXED ROLE BASED ACCESS CONTROL AND DISCRETIONARY ACCESS CONTROL ENVIRONMENT - A computer implemented method, apparatus, and computer program product for access control in a mixed discretionary access control and role based access control environment. In one embodiment, an execution access for a command is determined using a set of role based authorizations for a user invoking the command. In response to a determination that the user invoking the command is authorized based on the set of role based authorizations, a privilege in a set of privileges associated with the command is raised. Raising the privilege in the set of privileges bypasses discretionary access control checks. In response to a determination that the user invoking the command is unauthorized based on the set of role based authorizations, an execution access for the command is determined using a set of discretionary access mode bits associated with the command. | 2008-10-30 |
20080271140 | Verification for Computer Programs that Include External Call References - A program verification mechanism includes an external call reference verification mechanism that verifies external call references in a computer program. The external call reference verification mechanism checks the computer program after the computer program has been loaded by a loader/linker. The loader/linker stores a list of trusted entry points that specifies a trusted entry point for each external call reference, along with a list of allowable caller code for each trusted entry point. The external call reference verification mechanism determines the entry point for each instruction that is an external call reference, determines whether the entry point is listed as the trusted entry point for the external call reference, and whether the external call reference instruction is in the list of allowable caller code for the trusted entry point. If so, the computer program is verified. If not, verification of the computer program fails. | 2008-10-30 |
20080271141 | PARALLELIZED PATTERN MATCHING USING NON-DETERMINISTIC FINITE AUTOMATA - This disclosure describes techniques of determining whether a symbol stream includes a pattern defined by a regular expression. As described herein, the regular expression may be represented using a non-deterministic finite automaton (NFA). A plurality of states in the NFA may be evaluated in parallel. These states may be associated with a plurality of symbol positions in a symbol stream. Evaluating a plurality of states and symbols in parallel may allow for faster determinations of whether the symbol stream includes the pattern defined by the regular expression. | 2008-10-30 |
20080271142 | PROTECTION AGAINST BUFFER OVERFLOW ATTACKS - A system including storage comprising software code and a plurality of data structures. The system also includes processing logic coupled to the storage and adapted to execute the software code. If the processing logic executes a function call instruction, the processing logic stores copies of software code return information to a first data structure location and to a second data structure location. If, after executing a function associated with the function call instruction, the processing logic determines that data from the first and second data structure locations do not match, the processing logic initiates a security measure. The data is associated with the copies. | 2008-10-30 |
20080271143 | Insider threat detection - Methods, systems, and computer program products for insider threat detection are provided. Embodiments detect insiders who act on documents and/or files to which they have access but whose activity is inappropriate or uncharacteristic of them based on their identity, past activity, and/or organizational context. Embodiments work by monitoring the network to detect network activity associated with a set of network protocols; processing the detected activity to generate information-use events; generating contextual information associated with users of the network; and processing the information-use events based on the generated contextual information to generate alerts and threat scores for users of the network. Embodiments provide several information-misuse detectors that are used to examine generated information-use events in view of collected contextual information to detect volumetric anomalies, suspicious and/or evasive behavior. Embodiments provide a user threat ranking system and a user interface to examine user threat scores and analyze user activity. | 2008-10-30 |
20080271144 | METHOD FOR THE AUTHENTICATED TRANSMISSION OF A PERSONALIZED DATA SET OR PROGRAM TO A HARDWARE SECURITY MODULE IN PARTICULAR OF A FRANKING MACHINE - In a method and arrangement for authenticated transmission of a personalized data set or program to a hardware security module in a device such as a franking machine, a system manufacturer buys security modules, from a security module manufacturer and incorporate the security modules at a production site in the device and loads a data set and/or an application program into the security module, making the device operable. Authentication occurs using a first security module-specific fixed code, a second security module-specific fixed code that is calculated from the first code according to a given algorithm, and a third security module-specific fixed code that is calculated from the second code and the data in the data set and/or in the program. | 2008-10-30 |
20080271145 | Tamper indication system and method for a computing system - A tamper indication system for a computing system comprises a sensor reader configured to determine a state of a tamper sensor of the computing system, and firmware disposed in the computing system and configured to cause a report to evidence whether the report has been tampered with, the report indicating the state of the tamper sensor. | 2008-10-30 |
20080271146 | Identifying a distributed denial of service (DDoS) attack within a network and defending against such an attack - The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packets at a point or points in Internet backbone connections to determine a packet metric parameter. The packet metric parameter which might comprise the volume of packets received is analysed over selected time intervals with respect to specified geographical locations in which the hosts transmitting the packets are located. The expected behaviour can be employed to identify traffic distortions revealing a DDoS attack. In a complementary aspect, the invention provides a method of authenticating packets at routers in order to elevate the QoS of authenticated packets. This method can be used to block or filter packets and can be used in conjunction with the DDoS attack detection system to defend against DDoS attacks within the Internet in a distributed manner. | 2008-10-30 |