05th week of 2013 patent applcation highlights part 66 |
Patent application number | Title | Published |
20130031529 | DOMAIN SPECIFIC LANGUAGE DESIGN - A method for domain specific language design includes, with a physical computing system, receiving from a user, a number of annotations for at least one of a set of statements within a problem domain, the annotations identifying a set of elements within the statement. The method further includes forming a set of grammar rules for the problem domain based on the annotations, and parsing the set of statements using the set of grammar rules. | 2013-01-31 |
20130031530 | CREATION AND MANAGEMENT OF ELECTRONIC FILES FOR A LOCALIZATION PROJECT - Electronic files for a localization project may be created and/or managed. The electronic files may be based on a data structure that defines the format and content of the electronic files and may include a first data structure portion that may contain data representing a plurality of references to localization project files. The data structure may includes a second data structure portion that may be associated with the first data structure portion that may contain data that may represent a plurality of references to standard files. | 2013-01-31 |
20130031531 | METHOD AND SYSTEM FOR PERFORMING BACKWARD-DRIVEN PATH-SENSITIVE DATAFLOW ANALYSIS - In general, in one aspect, the invention relates to a method for static analysis. The method includes: obtaining source code; constructing a control flow graph (CFG) corresponding to the source code, by identifying control structures within the source code, creating a set of graph nodes of the CFG, and creating a set of directed graph edges of the CFG connecting the set of graph nodes; assigning a first Boolean flow value to a selected node of the set of graph nodes; backward traversing the CFG from the selected node to a target node; computing, by a computer processor and while backward traversing the CFG, disjoint predicate expressions representing flow values at the set of directed graph edges; computing, based on the disjoint predicate expressions, a resulting disjoint predicate expression; and identifying, based on the resulting disjoint predicate expression, a potential program property in the source code. | 2013-01-31 |
20130031532 | METHOD, COMPUTER, AND DEVICE FOR VALIDATING EXECUTION OF TASKS IN ADAPTABLE COMPUTER SYSTEMS - The invention particularly relates to the validation of task execution in a testing environment that includes at least one cluster having a plurality of nodes, at least one of which includes a program for managing the performance of tests. After transmitting at least one characteristic of said nodes to a test element storage system, data representing at least one test enabling the execution of said task in said cluster is received ( | 2013-01-31 |
20130031533 | SYSTEM RELIABILITY EVALUATION DEVICE - A system reliability evaluation device | 2013-01-31 |
20130031534 | Software Development With Information Describing Preceding Execution Of A Debuggable Program - Software development with information describing preceding execution of a debuggable program includes receiving, by a debugger from a compiler, a copy of a debuggable program, the debuggable program including one or more phantom breakpoints not encountered during a previous execution of the debuggable program, each phantom breakpoint inserted at a separate line of source code, phantom breakpoints encountered in a previous execution of the debuggable program being removed during the previous execution and not included in the copy of the debuggable program; executing, by the debugger, the copy of the debuggable program; upon each encounter of a breakpoint, determining, by the debugger, whether the encountered breakpoint is a phantom breakpoint; and if the encountered breakpoint is a phantom breakpoint, issuing, by the debugger, a warning indicating a point of straying execution. | 2013-01-31 |
20130031535 | PROCESSING TABLE OF CONTENT ACCESS OVERFLOW IN AN APPLICATION - The present disclosure provides a method and system for processing table of content (TOC) access overflow in an application. The method may determine whether there occurs a TOC access overflow within an object file during linking the object file that may be generated from the compiling. If the TOC access overflow occurs within the object file, then the source file corresponding to the object file may be re-compiled so as to generate an object file having no TOC access overflow, and the object file may be re-linked to generate an executable file of the application. The present disclosure may adopt two-pass compiling and a dual-instruction TOC access in a form of two pieces of instructions that may be generated for TOC entries within which TOC overflows generally occur. | 2013-01-31 |
20130031536 | APPARATUS AND METHOD FOR IMPROVING THE PERFORMANCE OF COMPILERS AND INTERPRETERS OF HIGH LEVEL PROGRAMMING LANGUAGES - A content processing device and corresponding method are disclosed. The content processing device includes a compiler front end to parse programming language source code into an high level intermediate representation and a detection component to detect high level constructs in the intermediate representation of the source code that satisfy constraints for parallel-merging high level constructs. And a parallel-merging component modifies the high level intermediate representation of the source code by parallel-merging the detected constructs to generate new high level parallel-merged constructs in a modified high-level intermediate representation of the source code that enable runtime operations of the detected constructs when finally lowered into processor instructions to be able to execute in parallel using the executable code generated from the modified intermediate representation. | 2013-01-31 |
20130031537 | Specialized Function Implementation Using Code Frequency Profiling - Systems, methods and products for code optimization are provided. In one embodiment, the method comprises dividing a target code into basic blocks; analyzing traversed execution paths between the basic blocks during multiple executions of the target code to determine a frequency with which the execution path between two or more basic blocks are traversed; and determining whether code optimization may be achieved by identifying execution paths that have been traversed subject to one or more threshold levels. | 2013-01-31 |
20130031538 | Updating Secure Pre-boot Firmware In A Computing System In Real-time - Updating secure pre-boot firmware in a computing system in real-time, including: storing in a secure firmware memory region a firmware update module configured to update the secure pre-boot firmware; responsive to a user request to update the secure pre-boot firmware: entering a processor management mode, including suspending operating system and user-level data processing operations; executing the firmware update module; and determining whether the secure pre-boot firmware was successfully updated; and exiting the processor management mode, including resuming operating system and user-level data processing operations and notifying the user of the successful update. | 2013-01-31 |
20130031539 | SIGNATURE-BASED UPDATE MANAGEMENT - A computing device to determine whether to update using a computer file by generating a file signature for that computer file based on its file header information and comparing the file signature to a collection of file signatures for updates already applied for matches. | 2013-01-31 |
20130031540 | Method and Apparatus for Automatic Module Upgrade - A computer-implemented method includes determining that a connection to an update server should be established. The method also includes establishing a wireless connection with the update server. The method further includes sending at least a VIN number to the update server and downloading one or more module updates corresponding to the sent VIN number. Also, the method includes verifying the one or more downloaded updates. The method further includes flashing one or more modules to which the one or more updates correspond. Additionally, the method includes verifying the functionality of each module which has been flashed. | 2013-01-31 |
20130031541 | SYSTEMS AND METHODS FOR FACILITATING ACTIVATION OF OPERATING SYSTEMS - Systems and methods are disclosed that may be implemented to install and use a replacement BIOS code stored in non-volatile memory of the system BIOS to facilitate activation of a new or replacement OS on an information handling system. The replacement BIOS code may include an activation certificate of authority information to activate a different version operating system for use on an information handling system that has been previously configured with a different operating system version along with a previous BIOS code that did not include the updated OEM activation string. | 2013-01-31 |
20130031542 | METHOD AND SYSTEM FOR DISTRIBUTED APPLICATION STACK DEPLOYMENT - Method, system, and programs for deploying a distributed application stack on a cluster. A request is first received to deploy the distributed application stack including a plurality of software artifacts on the cluster including a plurality of nodes. Configuration information is then retrieved from a configuration repository based on the received request. The configuration information includes a version of each software artifact of the distributed application stack and a type of each node of the cluster. An instruction is created for each node based on the retrieved configuration information. The instruction is to be used to direct each node to deploy at least one of the plurality of software artifacts from a software package repository onto the node itself. The created instruction is then transmitted to each node. | 2013-01-31 |
20130031543 | Virtual Machines for Aircraft Network Data Processing Systems - A method and apparatus are provided for operating a network data processing system on an aircraft. A number of operations are performed in a virtual machine on the aircraft. The virtual machine runs on a processor unit in the network data processing system on the aircraft to create a simulated computer environment. The virtual machine accesses resources of the processor unit for performing the number of operations using a host operating system on the processor unit. A current state of the aircraft is identified by the network data processing system. Running of the virtual machine is managed based on the current state of the aircraft and a policy for managing the virtual machine for different states of the aircraft. | 2013-01-31 |
20130031544 | VIRTUAL MACHINE MIGRATION TO MINIMIZE PACKET LOSS IN VIRTUALIZED NETWORK - Methods and apparatus are provided for controlling live migration of a virtual machine from a first host to a second host in a data center. A virtual machine manager may distribute to at least one host in a virtual network an updated mapping policy that maps a customer address of the virtual machine to a provider address of the migrated virtual machine. The updated mapping policy enables hosts in the virtual network to communicate with the migrated virtual machine. The updated mapping policy can be a shadow policy. The shadow policy is transmitted to hosts in the virtual network by the virtual machine manager before live migration of the virtual machine completes and is maintained by recipient hosts in an inactive state until triggered. The virtual machine manager notifies hosts in the virtual network to activate the shadow policy when live migration completes. | 2013-01-31 |
20130031545 | SYSTEM AND METHOD FOR IMPROVING THE PERFORMANCE OF HIGH PERFORMANCE COMPUTING APPLICATIONS ON CLOUD USING INTEGRATED LOAD BALANCING - A non-transitory computer-implemented method of load balancing includes calculating an expected cost set associated with an application-specific task of an application executing on a processing resource in a cloud computing environment, and communicating the expected cost set from the processing resource to a cloud management system. Resource mapping of applications currently executing in the cloud computing environment are retrieved, and the application-specific task is assigned to a specific computational resource in the cloud computing environment based on the expected cost set and the resource mapping of applications currently executing in the cloud computing environment. A task to VM (virtual machine) assignment is determined based on the assignment of the application-specific task to the specific computational resource. The task to VM assignment is transferred from the cloud management system to the application executing on the processing resource in the cloud computing environment. | 2013-01-31 |
20130031546 | METHODS AND SYSTEMS FOR ON-BOARDING APPLICATIONS TO A CLOUD - Methods and arrangements for on-boarding an application to a cloud. An application for hosting in a cloud environment is provided. Metadata related to the application is provided, and metadata related to the cloud is obtained. The application metadata and cloud metadata are compared, and the compatibility of the application with existing offerings of the cloud is ascertained. The application is on-boarded to the cloud. | 2013-01-31 |
20130031547 | FACILITATING COMPATIBLE INTERACTION, AT LEAST IN PART - An embodiment may include circuitry to determine compatibility, at least in part, of a device with at least one process intended to interact with, at least in part, the device. Such compatibility may be determined by the circuitry based at least in part upon at least one feature set of the device. If the device is incompatible, at least in part, with the at least one process, the circuitry may identify, at least in part, the device in manner that facilitates compatible interaction, at least in part, between the at least one process and at least one portion of the at least one feature set. Many alternatives, variations, and modifications are possible. | 2013-01-31 |
20130031548 | INFORMATION PROCESSING APPARATUS AND STORAGE MEDIUM - According to one embodiment, an information processing apparatus includes a virtual disk management module which manages a first virtual disk, a second virtual disk and a third virtual disk. The first virtual disk is a disk in which disk image data from a disk with various programs installed therein is stored. The second virtual disk is a disk in which the disk image data of the first virtual disk and from which individual information retained by the various programs has been deleted is stored. The third virtual disk is a disk in which the disk image data of the second virtual disk and to which individual information to be retained by the various programs has been added is stored. | 2013-01-31 |
20130031549 | VIRTUAL ACCESS TO NETWORK SERVICES - Methods, systems, and computer readable storage media for providing virtual access to network services. A virtual storage layer contains reference objects configured to reference network services stored in a network computing environment. Network clients access the reference objects through a resource interface based on a resource identifier associated with the virtual storage layer. Initiation of the virtual service by a network client invokes the service in a native computing environment of the service. | 2013-01-31 |
20130031550 | METHOD FOR IMPROVING THE PERFORMANCE OF HIGH PERFORMANCE COMPUTING APPLICATIONS ON CLOUD USING INTEGRATED LOAD BALANCING - A computer-implemented method of load balancing including calculating an expected cost set associated with an application-specific task of an application executing on a processing resource in a cloud computing environment, and communicating the expected cost set from the processing resource to a cloud management system. Resource mapping of applications currently executing in the cloud computing environment are retrieved, the application-specific task is assigned to a specific computational resource in the cloud computing environment based on the expected cost set and the resource mapping of applications currently executing in the cloud computing environment. A task to VM (virtual machine) assignment is determined based on the assignment of the application-specific task to the specific computational resource. The task to VM assignment is transferred from the cloud management system to the application executing on the processing resource in the cloud computing environment. | 2013-01-31 |
20130031551 | ON-BOARDING APPLICATIONS TO A CLOUD - Methods and arrangements for on-boarding an application to a cloud. An application for hosting in a cloud environment is provided. Metadata related to the application is provided, and metadata related to the cloud is obtained. The application metadata and cloud metadata are compared, and the compatibility of the application with existing offerings of the cloud is ascertained. The application is on-boarded to the cloud. | 2013-01-31 |
20130031552 | VIRTUAL MACHINE DISPLAY DEVICE, VIRTUAL MACHINE DISPLAY METHOD, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A dummy layer generating/finishing section | 2013-01-31 |
20130031553 | HARDWARE ACCELERATION - Provided is a hardware accelerator, central processing unit, and computing device. A hardware accelerator includes a task accelerating unit configured to, in response to a request for a new task issued by a hardware thread, accelerate the processing of the new task and produce a processing result for the task; a task time prediction unit configured to predict the total waiting time of the new task for returning to a specified address associated with the hardware thread. One aspect of this disclosure makes the hardware thread aware of the time to be waited for before getting a processing result, facilitating its task planning accordingly. | 2013-01-31 |
20130031554 | HARDWARE ACCELERATION - Provided is a hardware accelerator and method, central processing unit, and computing device. A hardware accelerating method includes, in response to a request for a new task issued by a hardware thread, accelerating processing of the new task and producing a processing result for the task. A predicting step predicts total waiting time of the new task for returning to a specified address associated with the hardware thread. | 2013-01-31 |
20130031555 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY EXECUTING RELATED REPORTS IN PARALLEL BASED ON AN ESTIMATED EXECUTION TIME - In accordance with embodiments, there are provided mechanisms and methods for conditionally executing related reports in parallel based on an estimated execution time. These mechanisms and methods for conditionally executing related reports in parallel based on an estimated execution time can provide parallel execution of related reports when predetermined time-based criteria are met. The ability to conditionally provide parallel execution of related reports can reduce overhead caused by such parallel execution when the time-based criteria is met. | 2013-01-31 |
20130031556 | DYNAMIC REDUCTION OF STREAM BACKPRESSURE - Techniques are described for eliminating backpressure in a distributed system by changing the rate data flows through a processing element. Backpressure occurs when data throughput in a processing element begins to decrease, for example, if new processing elements are added to the operating chart or if the distributed system is required to process more data. Indicators of backpressure (current or future) may be monitored. Once current backpressure or potential backpressure is identified, the operator graph or data rates may be altered to alleviate the backpressure. For example, a processing element may reduce the data rates it sends to processing elements that are downstream in the operator graph, or processing elements and/or data paths may be eliminated. In one embodiment, processing elements and associate data paths may be prioritized so that more important execution paths are maintained. In another embodiment, if a request to add one or more processing elements may cause future backpressure, the request may be refused. | 2013-01-31 |
20130031557 | System To Profile And Optimize User Software In A Managed Run-Time Environment - Method, apparatus, and system for monitoring performance within a processing resource, which may be used to modify user-level software. Some embodiments of the invention pertain to an architecture to allow a user to improve software running on a processing resources on a per-thread basis in real-time and without incurring significant processing overhead. | 2013-01-31 |
20130031558 | Scheduling Mapreduce Jobs in the Presence of Priority Classes - Techniques for scheduling one or more MapReduce jobs in a presence of one or more priority classes are provided. The techniques include obtaining a preferred ordering for one or more MapReduce jobs, wherein the preferred ordering comprises one or more priority classes, prioritizing the one or more priority classes subject to one or more dynamic minimum slot guarantees for each priority class, and iteratively employing a MapReduce scheduler, once per priority class, in priority class order, to optimize performance of the one or more MapReduce jobs. | 2013-01-31 |
20130031559 | METHOD AND APPARATUS FOR ASSIGNMENT OF VIRTUAL RESOURCES WITHIN A CLOUD ENVIRONMENT - A virtual resource assignment capability is disclosed. The virtual resource assignment capability is configured to support provisioning of virtual resources within a cloud environment. The provisioning of virtual resources within a cloud environment includes receiving a user virtual resource request requesting provisioning of virtual resources within the cloud environment, determining virtual resource assignment information specifying assignment of virtual resources within the cloud environment, and provisioning the virtual resources within the cloud environment using the virtual resource assignment information. The assignment of the requested virtual resources within the cloud environment includes assignment of the virtual resource to datacenters of the cloud environment in which the virtual resources will be hosted and, more specifically, to the physical resources within the datacenters of the cloud environment in which the virtual resources will be hosted. The virtual resources may include virtual processor resources, virtual memory resources, and the like. The physical resources may include processor resources, storage resources, and the like (e.g., physical resources of blade servers of racks of datacenters of the cloud environment). | 2013-01-31 |
20130031560 | Batching and Forking Resource Requests In A Portable Computing Device - In a portable computing device having a node-based resource architecture, resource requests are batched or otherwise transactionized to help minimize inter-processing entity messaging or other messaging or provide other benefits. In a resource graph defining the architecture, each node or resource of the graph represents an encapsulation of functionality of one or more resources controlled by a processor or other processing entity, each edge represents a client request, and adjacent nodes of the graph represent resource dependencies. A single transaction of resource requests may be provided against two or more of the resources. Additionally, this single transaction may become forked so that parallel processing among a client issuing the single transaction and the resources handling the requests of the single transaction may occur. | 2013-01-31 |
20130031561 | Scheduling Flows in a Multi-Platform Cluster Environment - Techniques for scheduling multiple flows in a multi-platform cluster environment are provided. The techniques include partitioning a cluster into one or more platform containers associated with one or more platforms in the cluster, scheduling one or more flows in each of the one or more platform containers, wherein the one or more flows are created as one or more flow containers, scheduling one or more individual jobs into the one or more flow containers to create a moldable schedule of one or more jobs, flows and platforms, and automatically converting the moldable schedule into a malleable schedule. | 2013-01-31 |
20130031562 | MECHANISM FOR FACILITATING DYNAMIC LOAD BALANCING AT APPLICATION SERVERS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic load balancing at application servers in an on-demand services environment. In one embodiment and by way of example, a method includes polling a plurality of application servers for status, receiving status from each of the plurality of application servers, assigning a priority level to each of the plurality of application servers based on its corresponding status, and facilitating load balancing at the plurality of application servers based on their corresponding priority levels. | 2013-01-31 |
20130031563 | STORAGE SYSTEM - The storage system includes a progress status detection unit that detects respective progress statuses representing proportions of the amounts of processing performed by respective processing units to the amount of processing performed by the entire storage system, each of the processing units being implemented in the storage system and performing a predetermined task; a target value setting unit that sets target values of processing states of the processing units, based on the detected progress statuses of the respective processing units and ideal values of the progress statuses which are preset for the respective processing units; and a processing operation controlling unit that controls the processing states of the processing units such that the processing states of the processing units meet the set target values. | 2013-01-31 |
20130031564 | Asynchronously Refreshing, Networked Application with Single-Threaded User Interface - An invention is disclosed for updating a networked, single-threaded application's data model without blocking the application's entire user interface. In embodiments of the invention, a client executes a networked application with a single-threaded user interface that communicates with a server to refresh its data model. The client sends a message to the server that requests a refresh of the data model. Before the data model has been refreshed, the client receives local user input to perform an action on the data model. The client sends a message to the server to cancel the refresh. When the client receives an acknowledgement from the server that the refresh has been cancelled, the client performs the action. After performing the action, the client sends a second message to the server that requests a refresh of the data model, and then refreshes the data model upon receiving the refreshed data model from the server. | 2013-01-31 |
20130031565 | MANAGING CONSISTENT INTERFACES FOR A PRODUCT DESIGN VERSION HIERARCHY BUSINESS OBJECT ACROSS HETEROGENEOUS SYSTEMS - A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a product design version hierarchy business object. | 2013-01-31 |
20130031566 | Managing Consistent Interfaces For Business Rule Business Object Across Heterogeneous Systems - A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a business rule business object. | 2013-01-31 |
20130031567 | LOCAL EVENT PROCESSING - The claimed subject matter provides a method for processing a stream of events. The method includes receiving a stream of events at a local device. The stream of events is associated with the local device. Further, the stream of events includes one or more out-of-order events. The method also includes executing a first complex event processing query against the stream of events. The stream of events is processed based on multiple levels of consistency defined by a set of operators. Additionally, the method includes correcting the out-of-order events based on the set of operators. A first output is generated in which consistency is guaranteed based on the corrected out-of-order events. The method also includes sending the first output to a server that performs complex event processing on the output. | 2013-01-31 |
20130031568 | Virtualizable and Forward-Compatible Hardware-Software Interface - Methods and apparatus are disclosed for virtualizable, forward-compatible hardware-software interfaces. Embodiments may be used in a driver whether it is a physical driver or a virtual driver. Commands are queued from the driver and fetched to the device. An actions table is accessed to determine if drivers are permitted to perform commands. Events are queued for the drivers responsive to commands. If drivers are not permitted to perform a command, device firmware may forward the command to a privileged driver to perform the required command. If a driver is only permitted to perform a command with assistance the command is forwarded for corrections and execution. If a command is to be dropped, a completion event may be queued as if the command had executed. Drivers may have no indication of which actions were taken. The actions table may be changed for hardware/software modifications or dynamically according to configuration changes. | 2013-01-31 |
20130031569 | RECEPTION APPARATUS, TERMINAL APPARATUS, CONTROL METHOD, PROGRAM, AND COMMUNICATION SYSTEM - Disclosed herein is a reception apparatus including: a reception portion configured to receive AV content being transmitted; a command execution portion configured to execute a first application program in response to a first command for controlling the operation of the first application program executed in interlocked related to the AV content; a command transmission portion configured to transmit to an external terminal apparatus a second command for controlling the operation of a second application program that can be executed by the terminal apparatus in interlocked relation to the AV content when the terminal apparatus is connected to the reception apparatus; and a command reception portion configured to receive the first command transmitted from the terminal apparatus executing the second application program. The command execution portion executes the first application program in response to the received first command. | 2013-01-31 |
20130031570 | SAS VIRTUAL TAPE DRIVE - A serial attached small computer system interface (SAS) expander for providing a virtual tape drive. The expander includes a virtual tape manager to generate a virtual tape virtual PHY capable of being part of a zone group wherein the virtual tape virtual PHY comprises drive bays which support disk drives for emulation of tape drives. | 2013-01-31 |
20130031571 | PICKUP DAMPER AND DISK DRIVE INCLUDING THE SAME - A pickup damper is provided. The pickup damper is configured to be installed adjacent to a plurality of guide shafts installed on opposite sides of an opening of a base chassis, configured to collide with a pickup and relieve shock via at least three steps in response to an external shock being applied, and configured to prevent the pickup from colliding with the guide shafts to protect the pickup. | 2013-01-31 |
20130031572 | TILT ADJUSTING DEVICE FOR OPTICAL PICKUP HEAD - A tilt adjusting device for an optical pickup head (OPU) is fixed on a chassis of an optical drive. The device includes a first screw and a secondary guide rail. The secondary guide rail includes a guide rail part, a base part, an extension part, and an elastic element. The guide rail part is embedded into a rail notch of the OPU and the extension part has a first end and a second end connected with the base part and the guide rail part. A first compressible space is defined between the base part, the elastic element and the chassis. The first screw is penetrated through the base part and the first compressible space and screwed in the chassis. By changing a screwed depth of the first screw in a screw hole, an altitude of the guide rail part is correspondingly adjusted. | 2013-01-31 |
20130031573 | METHOD FOR ADVERTISERS TO SPONSOR BROADCASTS WITHOUT COMMERCIALS - A system and method that allows content to be broadcast without commercial interruption, yet lets the company or companies that sponsor the broadcast to offer advertisements and discounts and various special offers to the viewers at a later time. The amount of time a viewer spends watching a particular broadcast is recorded along with information about the sponsoring companies or organizations for the broadcast. The viewer later accesses a central database, which sends back to the viewer advertisements, coupons, discounts, contests, and other enticements to purchase products, based on the amount of time the viewer spent watching broadcasts or segments of broadcasts that were sponsored by the advertiser. | 2013-01-31 |
20130031574 | METHOD OF AND SYSTEM FOR FACT CHECKING REBROADCAST INFORMATION - A fact checking system verifies the correctness of information and/or characterizes the information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information. | 2013-01-31 |
20130031575 | SYSTEM FOR MONITORING A VIDEO NETWORK AND METHODS FOR USE THEREWITH - A monitoring system includes a video network analyzer processes the packet data to generate network and media session data relating to the distribution of video content via the data distribution network in at least one media session, wherein the network and media session data includes at least one session metric, location data, protocol identification data, video encoding parameter data, and audio encoding parameter data. An analytics database stores the network and media session data for generation of report data. | 2013-01-31 |
20130031576 | CARD SHARING COUNTERMEASURES - A method for identifying of at least an identifier of a conditional access card used in a control word redistribution system by passing information over a side channel, said method comprising a modification step of the response time, of the card, to a control word request, according to a predefined function which depends on the identifier of the said cards. | 2013-01-31 |
20130031577 | System and method for selling any audio or video advertising and recording the ad spot, collecting payment and delivering by email to broadcast media using software and applications utilized through computing or telecommunications devices - An online or otherwise server hosted software used by any type of electronic Media to offer Advertising minutes (ad spots) for sale to Advertisers who, in one session, selects the ad spot's duration, broadcast dates and times, uploads or writes and record the Ad Spot on the system which then invoices and collects payment by Credit Card or alternative means, whereupon an email containing an insertion order and other details along with the Sound/Video file is sent to the broadcasting Station for transmission. | 2013-01-31 |
20130031578 | SYSTEM AND METHOD FOR CONTROL OF IPTV MULTIMEDIA CONTENT DISTRIBUTION - An IPTV filter node in an IPTV network is operative to control the delivery of multimedia content to a plurality of rendering units in a home network by comparison of various multimedia rendering criteria to predetermined subscriber information maintained in a subscriber profile. In some embodiments, the IPTV filter node is further operative to control the delivery of multimedia content via dynamic interaction with an authorization user. | 2013-01-31 |
20130031579 | SYSTEMS AND METHODS FOR SELECTIVELY MODIFYING THE DISPLAY OF ADVERTISEMENTS AND PROVIDING SUPPLEMENTARY MEDIA CONTENT - Systems and methods are provided for selectively suppressing advertisements and providing supplementary media content in place of the advertisements. A program (including program segments and supplementary media content) and advertisements are transmitted to a user device on two different channels. A database may be queried to determine whether the advertisement suppression feature is enabled for a particular user. For example, the user of the user device may subscribe to an advertisement suppression service and an enabled status may be stored in the database. If the status is enabled, the program segments and supplementary media content are provided to the user device without advertisements. If the status is disabled, the program segments and advertisements are provided to the user device without the supplementary media content. | 2013-01-31 |
20130031580 | APPARATUS AND METHOD FOR INSERTING ADVERTISEMENT IN A BROADCASTING SYSTEM - Provided is an apparatus and method for inserting an advertisement in a broadcasting system based on adaptive streaming To this end, content related information for advertisement content is generated by an advertisement providing server and a content transmitting server. A client is informed of an update required time of the content related information to receive new content related information from the content transmitting server. Therefore, the advertisement content can be reproduced in a set period. | 2013-01-31 |
20130031581 | PREPARING AN ALERT IN A MULTI-CHANNEL COMMUNICATIONS ENVIRONMENT - The pervasive visibility of television and other screens is leveraged to present pop-up alerts to users. These alerts can be made to appear on any channel at any time, but they are formatted in a way that suits the differing policies of the various channel providers. When an alert is received, an “alert mediator” determines which channel is currently being played on a first user device. The alert mediator reviews alert-rendering rules for that particular channel and prepares the alert according to those rendering rules. The alert is then presented either to that first user device or to a second user device. A rule can provide for “skinning” the alert so that the alert fits in with the “look and feel” of the channel. When a user device displays more than one channel at the same time, the alert mediator chooses which channel's rules to apply in displaying the alert. | 2013-01-31 |
20130031582 | AUTOMATIC LOCALIZATION OF ADVERTISEMENTS - In various example embodiments, a system and method for automatic localization of advertisements is provided. In example embodiments, a transmission signal is received. A portion of the transmission signal is identified. A determination of whether localized advertisement data corresponds to the identified portion is performed. Localized advertisement data that correspond to the identified portion of the transmission signal is retrieved. The localized advertisement data is then inserted into the identified portion of the transmission signal to generate an altered signal. The altered signal is transmitted to a user device. | 2013-01-31 |
20130031583 | ELECTRONIC APPARATUS, CONTROL METHOD OF ELECTRONIC APPARATUS AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER EXECUTABLE CONTROL PROGRAM OF ELECTRONIC APPARATUS - According to one embodiment, an electronic apparatus includes: an output instructing module which instructs a server, stored therein electronic program table information, to output the electronic program table information; a receiver which receives the electronic program table information and program related information output from the server; and an electronic program table output module which uses the received electronic program table information and program related information to output an electronic program table being attached with the program related information. | 2013-01-31 |
20130031584 | Programming Contextual Interactive User Interface for Television - A user interface for interactive television services is represented as a visual overlay that provides a viewer with knowledge of a library of available content relating to a currently tuned to television channel and navigation options for selecting desired portions of the available content from the library, the available content being designated according to business rules specified by a provider of the interactive television services. The visual overlay may be displayed over full-screen or embedded television programming, which may be broadcast television programming or on-demand television programming. | 2013-01-31 |
20130031585 | PORTABLE TERMINAL, SYSTEM, INFORMATION PROCESSING METHOD AND PROGRAM - A video viewing/listening system, includes a broadcast receiving apparatus having a receiver portion for receiving a broadcast signal transmitted via a broadcast wave, and a wireless terminal having a communication I/F for transmitting/receiving information, via a wireless LAN router or directly, between the broadcast receiving apparatus, wherein said wireless terminal obtains program-related information about programs, which is broadcasted at present and will be broadcasted in future, via the broadcast wave, while said broadcast receiving apparatus transmits information of a processing condition or a processing schedule of the broadcast receiving apparatus for the program(s), which is/are broadcasted at present and will be broadcasted in future, via the broadcast wave, to the wireless terminal via the communication I/F, and wherein said wireless terminal produces a program table with using both, the program-related information, which is obtained from a distributor differing from the broadcast receiving apparatus, and also the information of the processing. | 2013-01-31 |
20130031586 | METHOD AND APPARATUS FOR PROVIDING INFORMATION - A method of providing information is provided. The method includes determining content-related information corresponding to playable content; inserting the content-related information into IDentification (ID) information of a wireless transceiver; and transmitting, after insertion of the content-related information, the ID information to an external source. | 2013-01-31 |
20130031587 | METHOD AND APPARATUS TO BROADCAST CONTENT TO HANDHELD WIRELESS DEVICES VIA DIGITAL SET-TOP-BOX RECEIVERS - An exemplary method and apparatus to deliver rich media to wireless hand-held devices. | 2013-01-31 |
20130031588 | Wireless Transmission of Multimedia Streams Which Uses Control Information to Associate Error Correction Coding With an Audiovisual Stream - A system and method for wirelessly transmitting audiovisual information. A first plurality of packets including audiovisual information may be generated. A second plurality of packets including error correction coding information for the audiovisual information may be generated. Control information for associating the error correction coding information with the audiovisual information may be generated, and a third plurality of packets including the control information may also be generated. The plurality of packets, including the first, second, and third pluralities of packets, may be transmitted to a mobile device in a wireless manner. The control information may inform the mobile device of the association of the first error correction coding information with the audiovisual information. | 2013-01-31 |
20130031589 | MULTIPLE RESOLUTION SCANNABLE VIDEO - To enable a user to rapidly scan to a desired frame of a video, multiple recordings of the video are provided, each at progressively better resolution. When the user is scanning for a frame, the lowest resolution recording is used to provide the display; when the user arrives at a desired frame, the higher resolution recordings are used. A subsequent user selection of a different frame causes the display of the higher resolution images to be interrupted, and the lowest resolution recording is used to provide an image corresponding to the different frame. The lesser resolution recordings may include a reduction in either spatial or temporal resolution, or both, and may include ‘motion blur’ that provides a visually ‘smoother’ continuous scan. Each higher resolution frame replaces the lower resolution frame that is displayed while waiting for the higher resolution frame to be downloaded. | 2013-01-31 |
20130031590 | METHOD AND APPARATUS FOR GENERATING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a storage medium including computer instructions to receive sensory information at a media device from a first mobile communication device where the first mobile communication device obtains at least a portion of the sensory information from at least one second mobile communication device in response to a broadcast by the first mobile communication device of a wireless signal representing a notice to obtain the sensory information, where the sensory information is associated with an environment of the first mobile communication device, and where the sensory information comprises images of the environment. The computer instructions can enable generating a plurality of personal content utilizing at least a portion of the sensory information, where each of the plurality of personal content includes some of the images captured at different perspectives. Other embodiments are disclosed. | 2013-01-31 |
20130031591 | Internet Protocol Television - An internet protocol television including a TV main chip, an internet module and a micro control processor. The TV main chip receives a TV signal and an internet signal, and outputs a video signal and an audio signal after processing the received TV signal and the internet signal. The internet module receives processes and outputs the internet signal. The micro control processor receives a command signal and accordingly activates the TV main chip to execute corresponding commands. The micro control processor is able to directly control the receiving, processing and outputting of the internet signal by the internet module without activating the TV main chip. | 2013-01-31 |
20130031592 | SMART SET-TOP BOX AND OPERATION METHOD FOR SMART SERVICE AND DIGITAL TELEVISION SERVICE USING SINGLE OPERATING SYSTEM - A smart set-top box (STB) that provides a smart service and a digital television (DTV) service using a single operating system may be provided. The STB may load applications designed based on an application programming interface (API) of a framework corresponding to the operating system, may load a DTV stack including a DTV service function and a security service function, and may allow communication between at least one of the applications and the DTV stack when the at least one of the applications uses a binder driver included in a kernel of the operating system so as to access the DTV service function included in the DTV stack. | 2013-01-31 |
20130031593 | SYSTEM AND METHOD FOR PRESENTING CREATIVES - A system for presenting a creative including main video content and one or more panels including one or more interactive elements. The system includes a server arrangement coupled via a communication network for communicating the creative to at least one user display device. The user device includes computing hardware for executing a software product, which enables the user device to interact with a user of the user display device and to communicate with the server arrangement via the communication network. The software product presents a substantially central panel on a display of the display device in which main video content from the server arrangement is presented, and one or more adjacent panels adjacent to the central panel for providing the interactive elements. According to timing cues associated with presentation of the main video content, the software product renders the adjacent panels active with associated content corresponding to the timing cues. | 2013-01-31 |
20130031594 | MODULE AND METHOD - The present invention relates to a module and method. A content item options module operative for a content item delivery system, is configured to: determine a change in content type of a content item being delivered to a content item receiver apparatus for display on a display apparatus; initiate display of one or more content item identifiers on said display apparatus corresponding to one or more other content items; and respond to selection of a one of said one or more content item identifiers to initiate display of a corresponding other content item on said display apparatus. | 2013-01-31 |
20130031595 | EFFICIENT SECURING OF DATA ON MOBILE DEVICES - A mobile device and associated method and computer-readable medium, wherein the device is configurable for data protection readiness. A preparation module is configured to perform preprocessing to prepare the mobile device for data protection readiness, the preprocessing includes: indicating certain items of data stored in the data storage arrangement which are of personal importance to an owner of the mobile device; indicating criteria that defines a situation for which the items of data of personal importance are to be secured; and indicating a set of actions to be carried out to secure the items of data of personal importance. A protection module is configured to monitor for an occurrence of the situation for which the items of data of personal importance are to be secured based on the criteria indicated by the preparation module, and to execute the set of actions indicated by the preparation module in response to a detection of the occurrence of the situation. | 2013-01-31 |
20130031596 | Evaluating Detectability of Information in Authorization Policies - Techniques for evaluating detectablity of confidential information stored in authorization policies are described. In an example, an authorization policy has a confidential property. The confidential property is defined by whether application of a test probe to the authorization policy results in the grant of access to a resource. A processor automatically determines whether at least one witness policy can be generated that is observationally equivalent to the authorization policy from the perspective of a potential attacker, but the application of the test probe to the witness policy generates an access denial result. In the case that such a witness policy can be generated, an indication that the confidential property cannot be detected using the test probe is output. In the case that such a witness policy cannot be generated, an indication that the confidential property can be detected using the test probe is output. | 2013-01-31 |
20130031597 | METHOD AND EQUIPMENT FOR SECURITY ISOLATION OF A CLIENT COMPUTER - A method and equipment to protect the client computer against attacks through a device that carries out the security isolation of the client computer. It includes isolating all kinds of media that allow for writings in the computer. It uses security software, such as Firewall and antivirus programs configured according to the company's needs and also software to access the company's server, such as a browser or its own software. | 2013-01-31 |
20130031598 | Contextual-Based Virtual Data Boundaries - A system, method, and apparatus for contextual-based virtual data boundaries are disclosed herein. In particular, the present disclosure relates to improvements in access control that work to restrict the accessibility of data based on assigning contextual data thresholds that create a virtual boundary. Specifically, the disclosed method involves assigning at least one threshold to at least one contextual criterion. The method further involves determining whether contextual information from the claimant meets at least one threshold to at least one contextual criterion. Also, the method involves authenticating the claimant, if the contextual information from the claimant meets at least one of the thresholds to at least one contextual criterion. Further, the method involves allowing the claimant access to the data, if the claimant is authenticated. | 2013-01-31 |
20130031599 | MONITORING MOBILE APPLICATION ACTIVITIES FOR MALICIOUS TRAFFIC ON A MOBILE DEVICE - Systems and methods for monitoring mobile application activities for malicious traffic on a mobile device are disclosed. One embodiment of a method which can be implemented on a system includes, monitoring application activities of a mobile application on the mobile device, detecting, from the application activities, suspicious activity, and/or blocking traffic from which the suspicious activity is detected. One embodiment includes creating a policy based on the information aggregated from the multiple mobile devices and/or broadcasting the policy to other mobile devices of the suspicious activity detected from the multiple mobile devices. | 2013-01-31 |
20130031600 | AUTOMATIC GENERATION AND DISTRIBUTION OF POLICY INFORMATION REGARDING MALICIOUS MOBILE TRAFFIC IN A WIRELESS NETWORK - Systems and methods for automatically generating and distributing policy information for malicious mobile traffic in a wireless network are disclosed. One embodiment of a method which can be implemented on a system includes, aggregating suspicious activity information detected across multiple mobile devices in a wireless network, generating policy information for malicious mobile traffic using the suspicious activity information, and/or distributing the policy information among the multiple mobile devices or other mobile devices in the wireless network. The policy information can, for example, be distributed to wireless operators, mobile network carriers, or application service providers. | 2013-01-31 |
20130031601 | PARENTAL CONTROL OF MOBILE CONTENT ON A MOBILE DEVICE - Systems and methods of parental control of content on a mobile device are disclosed. One embodiment includes, proxy server remote from a mobile device which monitors, traffic activities, including inbound or outbound traffic, on the mobile device and detects adult content from the traffic activities. The proxy server communicates identification of the suspicious traffic to a local proxy on the mobile device, such that the suspicious traffic containing the adult content is blocked from access to or from the mobile device. | 2013-01-31 |
20130031602 | THIN CLIENT SYSTEM, AND ACCESS CONTROL METHOD AND ACCESS CONTROL PROGRAM FOR THIN CLIENT SYSTEM - To heighten security in a thin client system, the thin client system includes: a communication unit | 2013-01-31 |
20130031603 | SECURITY METHOD FOR ENGINEERING TOOLS AND INDUSTRIAL PRODUCTS, AND SECURITY SYSTEM - The invention includes a read-restriction setting step of setting read restriction on a program stored in hardware of an industrial product in response to a read restriction request, and a read requesting step of transmitting a read request for the program to the industrial product from an engineering tool that is a read request source. In the read-restriction setting step unique individual information retained in the hardware of the industrial product or unique individual information retained in hardware for executing an engineering tool that is a read-restriction request source is registered as registration individual information, and in the read requesting step, unique individual information retained in hardware for executing the engineering tool that is the read request source or unique individual information retained in the hardware of the industrial product is compared with the registration individual information. | 2013-01-31 |
20130031604 | Method and Apparatus for Remote Authentication - A computer-implemented authentication method includes receiving a request to access one or more features of a vehicle computing system (VCS) from an application running on a wireless device in communication with the VCS. The method further includes preparing a secure access rights request to a remote server including one or more characteristics associated with the application and sending the secure request from the VCS, through the wireless device to the remote server. The method additionally includes receiving a response to the request having been sent from the remote server through the wireless device. The method includes verifying the authenticity of the received response and updating a policy table including information from the received response, the information including at least an expiration trigger and access rights for the application. Also, the method includes validating the application for usage based at least on the information included in the updated policy table. | 2013-01-31 |
20130031605 | Method and Apparatus for Probabilistic Matching to Authenticate Hosts During Distributed Denial of Service Attack - A system and method to track external devices attempting to connect to a protected network using probabilistic filters. When a connection from a new external device attempts to access the protected network, the memory of a protection system, which is organized as a probabilistic filter, is searched to determine if the IP address already exists in the memory of protection system. If the search locates the IP address, the protection system terminates the connection to the external device. If the search is negative, then protection device begins the authentication process for the external device. | 2013-01-31 |
20130031606 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM - There is provided an information processing device, including: an acquisition unit for acquiring information transmitted from terminals; and a generation unit for generating a community according to a similarity degree between the information transmitted from a plurality of terminals, wherein, when a plurality of different types of information are transmitted from one terminal, the community generation unit counts, for each of the plurality of types of information, the number of terminals transmitting information similar to the information, and generates a community in which a user of a terminal is permitted to participate, the terminal transmitting information similar to information which the greatest number of terminals transmit information similar to. | 2013-01-31 |
20130031607 | SOFTWARE DELIVERY MODELS - Generally, this disclosure describes software delivery systems (and methods). A server is provided that operates to provision software on a customer's local machine. The server system, in response to a software purchase from an end user (customer), is configured to install the software on the customer's machine, encrypt the software, and provision encryption keys to grant the customer access to the software. In addition, a software agent is installed on the customer's machine that enables monitoring, by the server, of the customer's installed software. The server system is configured to control customer access to the installed software, via the software agent, and to terminate customer access to the software (for example, for nonpayment of fees). Thus, the software provider can retain control over software that is remotely deployed at an end user location. | 2013-01-31 |
20130031608 | METHODS AND APPARATUS TO TRANSFER MANAGEMENT CONTROL OF A CLIENT BETWEEN SERVERS - An example network device includes a processor configured to execute an Open Mobile Alliance (OMA) Device Management (DM) server, the OMA DM server to perform operations of: participating in mutual authentication with a second OMA DM server; sending a notification to the second OMA DM server for notifying the second OMA DM server to proceed with a delegation process; and sending, to a DM client, information for modifying an access control list (ACL). | 2013-01-31 |
20130031609 | Device Ownership Security On A Network - A method for device ownership security is disclosed. The method includes storing an ownership record on a mobile device identifying a home network for the mobile device. The method further includes connecting, by the mobile device, to a foreign network. The method also includes receiving, from the home network, a negative communication based on an indication that the mobile device is at least one of stolen and lost as a second portion of the transaction. The method still further includes ceasing a function of the mobile device in response to the negative acknowledgment. | 2013-01-31 |
20130031610 | Collaborative information management - A method is provided for implementing collaborative information management. Information collaboration entities are authorized to allow entity members thereof access to a collaborative information data structure. Each information collaboration entity is a different business entity than each other information collaboration entity. An entity member of each one of the information collaboration entities is authorized to maintain business process information associated therewith within the collaborative information data structure. The business process information of each one of the information collaboration entities is generated through a business process thereof. The business process information of each one of the information collaboration entities is useful as quality control information for a manufactured product of a particular one of the information collaboration entities. An entity member of a first information collaboration entity is authorized to access business process information of a second information collaboration entity that is maintained within the collaborative information data structure. | 2013-01-31 |
20130031611 | CLOUD-ENABLED WEB-ENTRY SYSTEM FOR VISITOR ACCESS CONTROL - The present invention is for a web-enabled entry system for access control of visitors to a residential, commercial or institutional facility having or not receptionist at the entry point, where visitors to such facility should be authorized and/or the visit event should be recorded in a database. This web enabled entry system is for visitor self-registration, announcing and obtain access approval for coming into such facility by the means of a system including touch capable tablet computers, wireless communications, remote servers and methods to notify and validate users providing entry authorization. The system is also capable to provide video capture and streaming using a camera embedded in the tablet computer and with the use of an optional door controller the system allows remote opening of the door or gate. The system also can be optionally used to work in conjunction with a receptionist or guard that will assist the visitor, providing a temporary visitor badge. The system on this invention can replace the use of traditional unattended telephone entry (tele-entry) system or manned computer based visitor control systems typically assisted by a guard or receptionist. | 2013-01-31 |
20130031612 | SERVER APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND STORAGE MEDIUM - An information processing method for a server apparatus controlling access based on a role of a user and a scope as authority held by an authorization token for realizing a unified license management structure that does not reduce an overall performance of a cloud service even if a plurality of services collaborate with the cloud service. | 2013-01-31 |
20130031613 | SECURE ACCESS TO CUSTOMER LOG DATA IN A MULTI-TENANT ENVIRONMENT - Systems and methods process log data relating to usage of a multi-tenant application server. An input module receives a request from a user that identifies requested log data by a particular user or tenant of the multi-tenant application system. A log query service automatically formats the database query for the requested log data based upon the request received from the user, and stores the formatted database query on the storage device. A batch server subsequently retrieves the database query from the storage device, submits the database query to the data analysis engine, obtains the requested information from the data analysis engine after the query is completed, and notifies the user that the requested information is available for output. | 2013-01-31 |
20130031614 | METHOD FOR REMOTELY LOCKING/UNLOCKING A MACHINE - A method for changing the status, locked or unlocked, of a target machine including a security service and a session management module includes receiving, by the security service, a query corresponding to a request to change the status of the target machine, the query including at least one piece of identification information from a user of a source machine; from the security service, verifying if access rights to the target machine related to the user of the source machine allow a change in the status of the target machine by the user; if so, sending, from the security service, a status change message to the session management module of the target machine and proceeding to the status change made by the session management module. | 2013-01-31 |
20130031615 | SYSTEM AND METHOD FOR WLAN ROAMING TRAFFIC AUTHENTICATION - A system and method for recognising traffic generated from an authenticated a device roaming in a wireless local area network and related aspects are provided. An authentication server is arranged to authorise communications traffic originating from a wireless access point to use a roaming service, the traffic comprising an NAT translated IP address. The server first authorises a WLAN roaming device, and then processes a meta-data message received from a WLAN access point in which the source address of the message comprises the source address of the roaming device at the WLAN access point. The server then determines, from the information provided in the meta-data message when it is received by the authentication server, which includes at this point a NAT translated source address in the meta-data message what the NAT translated source address of traffic from said NAT translated source address. In this way, all traffic generated by the roaming device whilst that NAT translated IP address is valid is automatically authorised to use a roaming service to access the internet. | 2013-01-31 |
20130031616 | Methods and Systems for Enabling Multiple Accounts Support - Embodiments allow communication for a first and second account on one device to be sent and received over a single socket connection. A unique identifier may be associated with each account on the device. Communications sent from each account on the device may be encapsulated with the unique identifier for the account. Similarly, communications received for each account on the device may be encapsulated with the unique identifier for the account by a mobile endpoint. | 2013-01-31 |
20130031617 | SYSTEM AND METHODS FOR USE IN COMMUNICATING WITH AN ENERGY MANAGEMENT DEVICE IN AN ENERGY DEVICE NETWORK - System, method, and computer-readable instructions for use in communicating with an energy management device in a network that comprises one or more energy devices. First search results are created by searching for devices associated with a first energy management device identifier using a first discovery protocol. Second search results are created by searching for devices associated with a second energy management device identifier using a second discovery protocol. The first and second search results are combined to create a collection of candidate devices, and at least one candidate device of the candidate devices is validated to determine whether the candidate device is an energy management device. | 2013-01-31 |
20130031618 | Reverse Seamless Integration Between Local and Remote Computing Environments - Methods and systems for transparent user interface integration between remote (“published”) applications and their local counterparts are described, providing a seamless, unified user experience, and allowing integration of a start menu, dock, taskbar, desktop shortcuts, windows, window and application switching, system tray elements, client-to-host and host-to-client file type association, URL redirection, browser cookie redirection, token redirection, status message interception and redirection, and other elements. These methods and systems further enhance theme-integration between a client and remote desktop or virtual machine by remoting all UI elements to a recipient for generation, including text controls, buttons, progress bars, radio buttons, list boxes, or other elements; presenting them with the receiver's product and OS-specific UI; and returning status back to the sender. This may achieve a more unified and transparent UI integration. Furthermore, storage resources, printer resources, and identity-based resources may be integrated using a reverse seamless user interface. | 2013-01-31 |
20130031619 | REMOTE AUTHENTICATION SCREEN LOCKER FOR A MOBILE DEVICE - Devices, methods and products are described that provide for remote authentication of mobile information handling devices. One aspect provides a method comprising configuring an information handling device operating through a mobile operating system to allow communication with least one remote authentication architecture; denying access to a information handling device of the information handling device responsive to a device lock event; and granting access to the display device responsive to an unlock event comprising entry of logon credentials authenticated at the at least one remote authentication architecture. Other embodiments and aspects are also described herein. | 2013-01-31 |
20130031620 | LOCALIZED NETWORK AUTHENTICATION AND SECURITY USING TAMPER-RESISTANT KEYS - The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two. | 2013-01-31 |
20130031621 | METHOD FOR APPLYING A HOST SECURITY SERVICE TO A NETWORK - A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for security-based filtering. The request includes filtering parameters that restrict traffic between the host device and the network device. It is determined whether the filtering parameters conflict with an initial filtering configuration. The filtering parameters may be applied to traffic through the network device. | 2013-01-31 |
20130031622 | STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS - Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. | 2013-01-31 |
20130031623 | MULTI-FACTOR AUTHENTICATION USING DIGITAL IMAGES OF BARCODES - Methods, systems, and computer-readable media for implementing a multi-factor authentication scheme utilizing barcode images in computing devices, such as standard mobile devices and smartphones having no native hardware support for reading barcodes other than standard digital camera componentry for capturing digital images of real-world phenomena. A mobile device may be configured by software to require a user, as a first authentication factor, to present a barcode, such as a Quick Response (QR) Code for image scanning using digital camera componentry built into the mobile device. The device analyzes the digital image of the barcode to decode the barcode into its encoded character data. If the device recognizes the character data as valid, then, as a second authentication factor, the device prompts the user to enter a valid password associated with the barcode. If the user-entered barcode is also valid, then the device may grant the user access. | 2013-01-31 |
20130031624 | APPLICANT SCREENING - A system of screening servers, screener client computers, and screening kiosks distribute an applicant screening process among multiple sites and multiple participants. To facilitate and secure communications of screening results and applicant actions, a personal identification code is provided that identifies individual sets of screening results. In this manner, the applicant is authenticated and can then enter appropriate applicant profile data into a secure screening account, such as via a screening kiosk. Screening results may be generated for the applicant in association with a unique personal identification code. This code can then be communicated to the screener, who can access the screening results along with a recommendation, if desired, by sending the code to a screening server. The screener can also enter appropriate screening information into another secure screening account. | 2013-01-31 |
20130031625 | CYBER THREAT PRIOR PREDICTION APPARATUS AND METHOD - Disclosed are a cyber threat prior prediction apparatus, including a DNS based C&C server detecting unit configured to analyze DNS traffic to extract a domain address which is suspected as a C&C server; a network based abnormality detecting unit configured to analyze the network traffic to detect IP addresses of zombie PCs which access the C&C server and information of the zombie PCs; and a cyber threat predicting unit configured to predict a cyber threat situation based on the information of the zombie PCs. | 2013-01-31 |
20130031626 | METHODS OF DETECTING DNS FLOODING ATTACK ACCORDING TO CHARACTERISTICS OF TYPE OF ATTACK TRAFFIC - Disclosed are methods of detecting a domain name server (DNS) flooding attack according to characteristics of a type of attack traffic. A method of detecting an attack by checking a DNS packet transmitted over a network in a computer device connected to the network, includes determining whether the number of DNS packets previously generated within a threshold time with the same type of message, the same specific address and the same field value as in the transmitted packet is greater than or equal to a given number, and determining the transmitted DNS packet as a packet related to the attack if the number of DNS packets previously generated within the threshold time is greater than or equal to the given number. | 2013-01-31 |
20130031627 | Method and System for Preventing Phishing Attacks - A method, system and program product for preventing phishing attacks, wherein the method comprises: acquiring links in a Web page; classifying the acquired links according link types; and determining whether a phishing attack exists according to the classified links, wherein the links are classified into two types: internal links belonging to the same domain as the address of the Web page, and external links belonging to a different domain from the address of the Web page. By carrying out the method or system according to the above one or more embodiments of the present disclosure, since it is first detected whether a Web page is a fake website of a phishing attack before displaying the reproduced Web page to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented. | 2013-01-31 |
20130031628 | Preventing Phishing Attacks - A method, system and program product for preventing phishing attacks, wherein the method comprises: acquiring links in a Web page; classifying the acquired links according link types; and determining whether a phishing attack exists according to the classified links, wherein the links are classified into two types: internal links belonging to the same domain as the address of the Web page, and external links belonging to a different domain from the address of the Web page. By carrying out the method or system according to the above one or more embodiments of the present disclosure, since it is first detected whether a Web page is a fake website of a phishing attack before displaying the reproduced Web page to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented. | 2013-01-31 |