08th week of 2011 patent applcation highlights part 64 |
Patent application number | Title | Published |
20110047541 | SECURITY MANAGEMENT DEVICE AND METHOD - In a case where a master virtual machine, which is constructed on the basis of master information for configuring either part or all of a virtual machine, and an individual virtual machine, which is constructed on the basis of individual information that is configured partially or entirely in accordance with the master information, exist as the types of virtual machines that a physical client provides to a user terminal, a security check of a plurality of virtual machines is selectively executed, with respect to each check item, for a virtual machine of the type corresponding to the contents of the check item. | 2011-02-24 |
20110047542 | System and Method for Enforcing Security Policies in a Virtual Environment - A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems. The method also includes verifying an authorization of the object by computing a checksum for the object and comparing the checksum to a plurality of stored checksums in a memory element. The execution of the object is denied if it is not authorized. In other embodiments, the method can include evaluating a plurality of entries within the memory element of the computer, wherein the entries include authorized binaries and kernel modules. In other embodiments, the method can include intercepting an attempt from a remote computer to execute code from a previously authorized binary. | 2011-02-24 |
20110047543 | System and Method for Providing Address Protection in a Virtual Environment - A method in one example implementation includes identifying an address space in a memory element of a system configured to operate in a virtual environment. The address space includes at least one system address, and the address space is provided to a virtual machine monitor. The method also includes generating a page table entry for the system address in a shadow page table stored in the virtual machine monitor in response to a guest operating system initiating a process. The page table entry is marked as a page not being present in order to trigger a page fault for a system address access from the guest operating system. In more specific embodiments, the method may include evaluating a page fault to determine access to the address space, where access to a writeable area of the memory element is denied. | 2011-02-24 |
20110047544 | PARA-VIRTUALIZATION IN A NESTED VIRTUALIZATION ENVIROMENT - A para-virtualization method is provided. The method comprises implementing a virtual machine (VM) for guest software running on first host software. In response to a privileged instruction, the guest software causes a first VM exit. If the first host software is not running directly on hardware, the privileged instruction is managed without causing a second VM exit. Otherwise, the privileged instruction is managed normally. | 2011-02-24 |
20110047545 | Entropy Pools for Virtual Machines - In the host operating system of a computing device, entropy data is collected based at least in part on each of one or more hardware components of the computing device. An entropy pool is updated based at least in part on the collected entropy data, and data from the entropy pool is provided to a guest operating system running as a virtual machine of the computing device. The guest operating system maintains a guest operating system entropy pool based on the data from the entropy pool provided by the host operating system. The guest operating system accesses the guest operating system entropy pool and uses the guest operating system entropy pool as a basis for generating values including random numbers. | 2011-02-24 |
20110047546 | Mechanism for Out-of-Synch Virtual Machine Memory Management Optimization - In one embodiment, a mechanism for out-of-synch virtual machine memory management optimization is disclosed. In one embodiment, a method for out-of-synch virtual machine memory management optimization includes receiving a memory management unit (MMU) synchronization event issued from a VM virtualized by a VM monitor (VMM) of a host server device, and synchronizing one or more unsynchronized page tables (PTs) of a shadow PT hierarchy maintained by the VMM with one or more corresponding guest PTs of a guest PT hierarchy maintained by the VM, wherein the one or more unsynchronized PTs include an unlimited number of unsynchronized PTs in a visible address space of the shadow PT hierarchy that is determined by a current CR3 register address of the shadow PT hierarchy. | 2011-02-24 |
20110047547 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 2011-02-24 |
20110047548 | Systems and Methods for a Disaster Recovery System Utilizing Virtual Machines Running on at Least Two Host Computers in Physically Different Locations - The present invention is directed to systems and methods for providing disaster recovery services using virtual machines. The invention provides an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices. The system includes a production host and a backup host that communicate via a communications link. The state of the processor and devices on the production host are periodically stored onto backup host and can be restored in the event of an emergency. Additionally, the invention includes two business methods for utilizing the system and methods for providing disaster recovery services. | 2011-02-24 |
20110047549 | Manipulating a spin bit within the wait primitive - A method of avoiding unnecessary context switching in a multithreaded environment. A thread of execution of a process waiting on a lock protecting access to a shared resource may wait for the lock to be released by executing in a loop, or “spin”. The waiting thread may continuously check, in a user mode of an operating system, an indicator of whether the lock has been released. After a certain time period, the thread may stop spinning and enter a kernel mode of the operating system. Subsequently, before going to sleep which entails costly context switching, the thread may perform an additional check of the indicator to determine whether the lock has been released. If this is the case, the thread returns to user mode and the unnecessary context switching is avoided. | 2011-02-24 |
20110047550 | SOFTWARE PROGRAM EXECUTION DEVICE, SOFTWARE PROGRAM EXECUTION METHOD, AND PROGRAM - The present invention provides a software program execution device which can accept a processing request even during a setting change of a software program without interrupting the processing in-execution. An execution monitoring unit monitors, in processing units and based on an instruction of a software program control unit, the operation of a server application unit which executes a software program in a process, and notifies a software program control unit that the processing being executed in a first process is completed. Upon receiving the notification, the software program control unit stops and then restarts the first process, and the first process is restarted while reflecting the setting change recorded in a setting storage unit during the restart step. | 2011-02-24 |
20110047551 | PARALLELIZATION OF ELECTRONIC DISCOVERY DOCUMENT INDEXING - A system and method for parallelizing document indexing in a data processing system. The data processing system includes a primary processor for receiving a list of data having embedded data associated therewith, at least one secondary processor to process the data as provided by the primary processor, a data processor to determine a characteristic of the embedded data and process the embedded data based upon the characteristic, and a messaging module to exchange at least one status message between the primary processor and the at least one secondary processor. | 2011-02-24 |
20110047552 | ENERGY-AWARE PROCESS ENVIRONMENT SCHEDULER - A device receives a request associated with a process, and determines one or more current states of one or more process resources used to execute the process request. The device also calculates a power consumption associated with execution of the process request by the one or more process resources, and assigns an urgency for the process request, where the urgency corresponds to a time-variant parameter that indicates a measure of necessity for the execution of the process request. The device further determines whether the execution of the process request can be delayed to a future time based on the one or more current states, the power consumption, and the urgency, and causes, based on the determination, the process request to be executed or delayed to the future time. | 2011-02-24 |
20110047553 | APPARATUS AND METHOD FOR INPUT/OUTPUT PROCESSING OF MULTI-THREAD - Provided sets a limit of execution threads which can be simultaneously processes in an input/output system and compares the number of threads which are being currently executed with the limit of execution threads at the time of requesting an input/output event from a thread and manages a job of processing the input/output event in accordance with the comparison result. The apparatus for asynchronous input/output processing of a multi-thread according to the present invention restricts the number of threads which are processed in the asynchronous input/output system as many as the limit of execution threads to prevent deterioration of performance caused due to context switching overhead of the thread and efficiently manage the thread. | 2011-02-24 |
20110047554 | DECENTRALIZED LOAD DISTRIBUTION TO REDUCE POWER AND/OR COOLING COSTS IN AN EVENT-DRIVEN SYSTEM - A computer-implemented method, computer program product and computer readable storage medium directed to decentralized load placement in an event-driven system so as to minimize energy and cooling related costs. Included are receiving a data flow to be processed by a plurality of tasks at a plurality of nodes in the event-driven system having stateful and stateless event processing components, wherein the plurality of tasks are selected from the group consisting of hierarchical tasks (a task that is dependent on the output of another task), nonhierarchical tasks (a task that is not dependent on the output of another task) and mixtures thereof. Nodes are considered for quiescing whose current tasks can migrate to other nodes while meeting load distribution and energy efficiency parameters and the expected duration of the quiesce provides benefits commensurate with the costs of quiesce and later restart. Additionally, tasks are considered for migrating to neighbor nodes to distribute the system load of processing the tasks and reduce cooling costs. | 2011-02-24 |
20110047555 | DECENTRALIZED LOAD DISTRIBUTION IN AN EVENT-DRIVEN SYSTEM - A computer-implemented method, computer program product and computer readable storage medium directed to decentralized load distribution in an event-driven system. Included are receiving a data flow to be processed by a plurality of tasks at a plurality of nodes in the event-driven system having stateful and stateless event processing components, wherein the plurality of tasks are selected from the group consisting of hierarchical tasks (a task that is dependent on the output of another task), nonhierarchical tasks (a task that is not dependent on the output of another task) and mixtures thereof. Tasks are considered for migration to distribute the system load of processing tasks. The target node, to which the at least one target task is migrated, is chosen wherein the target node meets predetermined criteria in terms of load distribution quality. The computer-implemented method, computer program product and computer readable storage medium of the present invention may also include migrating tasks to target nodes to reduce cooling costs and selecting at least one node to go into quiescent mode. | 2011-02-24 |
20110047556 | SYNCHRONIZATION CONTROL METHOD AND INFORMATION PROCESSING DEVICE - Provided are a synchronization control section that executes a current thread and a reference thread in parallel, a waiting time calculation section that calculates the time needed for the reference thread to reach a second synchronization point as a waiting time of the current thread when the reference thread does not reach the second synchronization point at a time when the current thread reaches a first synchronization point, a quality difference calculation section that estimates a quality difference between data that the current thread generates by referring to processing data at the second synchronization point of the reference thread and data that the current thread generates without referring to the processing data, and a synchronization determination section that determines whether to make the current thread wait until the reference thread reaches the second synchronization point depending on the waiting time and the magnitude of the quality difference. | 2011-02-24 |
20110047557 | METHOD AND APPARATUS FOR EXPEDITED SERVICE INTEGRATION USING ACTION TEMPLATES - An approach is provided for expedited service integration using action plugin templates. Context information and a target object are determined. A plugin based on a template configured for a service provider is received. A plugin action is determined using the target object and context information. Execution of the plugin on the target object is initiated to perform the plugin action. | 2011-02-24 |
20110047558 | METHOD FOR PRESENCE INFORMATION SUBSCRIPTION IN A GROUP COMMUNICATIONS SYSTEM - In a group communications system, a group watcher module subscribes to presentities of interest for a particular group by communicating, to at least one presence server module, a set of subscriptions to a plurality of presentities, wherein each subscription contains a set of event notification criteria for a presentity. When the group watcher module detects a change in presence information for the set of subscriptions, it determines current members of the group and distributes the change in presence information to the current members. | 2011-02-24 |
20110047559 | OPTICAL DISK DRIVE - An optical disk drive includes a main body and a tray. The main body includes a housing and two rails disposed in the housing. The tray is slidably coupled to the two rails, and is operable to be switched between a first state and a second state. The tray is received in the housing in the first state, and protrudes out of the housing in the second state. The main body further includes a first resisting member. The tray includes a second resisting member. The first resisting member is adapted to apply a resisting force to the second resisting member in the first state to secure the tray. The first resisting member is away from the second resisting member in the second state. | 2011-02-24 |
20110047560 | MOTOR, STORAGE DISK DRIVE APPARATUS AND MOTOR MANUFACTURING METHOD - A motor includes a stationary unit, a bearing mechanism, a rotary unit, and a chucking device. The rotary unit includes a rotor yoke provided with a cover portion extending around the chucking device and designed to allow the storage disk to be directly or indirectly mounted thereto and a removal-preventing member fixed to the cover portion to prevent removal of the rotary unit from the stationary unit. The removal-preventing member made of metal. The removal-preventing member includes a removal-preventing portion, an upper fixing portion having a plurality of upper protrusions inserted into the through-holes of the cover portion and bent toward the upper surface of the cover portion, and a lower fixing portion making direct or indirect contact with the lower surface of the cover portion and cooperating with the upper fixing portion to fix the position of the removal-preventing portion in a direction parallel to the center axis. | 2011-02-24 |
20110047561 | MOTOR AND STORAGE DISK DRIVE APPARATUS - A motor includes a bearing mechanism, a stationary unit including a stator arranged radially outwards of the bearing mechanism, and a rotary unit supported by the bearing mechanism at the upper side of the stationary unit for rotation about a center axis with respect to the stationary unit. The rotary unit includes a substantially cylindrical closed-top rotor yoke having a cover portion arranged to cover the stator. The bearing mechanism includes a substantially cylindrical closed-bottom bush formed by a press work, a sleeve fixed inside the bush and provided with an upper portion protruding beyond the bush and a shaft inserted into the sleeve. An upper end of the bush is lower than or flush with an upper end of the stator in a direction parallel to the center axis. | 2011-02-24 |
20110047562 | SPINDLE MOTOR HAVING BALL BALANCER - Disclosed is a spindle motor including a turn table on which a disk is mounted; a rotation shaft that is a rotational center of the turn table; and a ball balancer including a lace formed on the turn table and a ball stored in the lace in order to reduce a rotation vibration of the disk; wherein a gap Gr formed between the ball contacting an inner surface of the lace adjacent to the rotation shaft and an outer surface of the lace facing the inner surface is about 10% to 20% of the diameter of the ball. | 2011-02-24 |
20110047563 | SPINDLE MOTOR HAVING A CHUCKING MEMBER - A spindle motor is disclosed, wherein a spindle motor includes a rotating shaft coupling to a rotor yoke for supporting an optical disc, a clamp case disposing on the rotor yoke and coupling to the rotating shaft; and a chucking member including a rim portion combined with the clamp case, a plurality of extension portion radically extruded from an edge portion of the rim portion, and chucking arm portions formed at each of the end portion of the extension portions to chuck an inner face of the optical disc. | 2011-02-24 |
20110047564 | OPTICAL DISK PACKAGING STRUCTURE - An optical disk packaging structure includes primarily a cartridge and an optical disk. The cartridge is formed by adhering correspondingly a first sheet and a bottom sheet, the first sheet is formed with a first window and a surface of the first sheet is coated with a layer of separator film. The bottom sheet, on the other hand, is defined with a peel-off part. As a peel-off range of the peel-off part is sufficient for removing out the optical disk, when a user is take outing the optical disk, entire beauty of the packaging will not be spoiled. | 2011-02-24 |
20110047565 | Data Transmitting and Receiving System - Disclosed is a data transmitting and receiving system including: a data transmitting device; and a data receiving device connected to the data transmitting device through an HDMI, wherein the data transmitting device includes: an extracting section to extract contents information of a video; and a transmitting section to transmit contents information to the data receiving device, and the data receiving device includes: a receiving section to receive contents information; an acquiring section to acquire keyword and/or category information from the contents information; a storing section to store the keyword and/or category information; a determining section to compare the keyword and/or category information stored in the storing section with EPG data and to determine whether or not there is a match; and a display section to display with highlight program information of the EPG data determined by the determining section to match with the keyword and/or category information. | 2011-02-24 |
20110047566 | SYSTEM AND METHOD FOR SESSION MANAGEMENT OF STREAMING MEDIA - A system and method for session management of streaming media are provided. The system and method authenticate and validate any request for live or streaming video and manage the streaming session in a manner that continues to verify the validity of existing video streams with respect to new requests. The system and method provide for receiving a first request for a first video stream from a client, generating a token based on the first request and at least one parameter associated with the client, validating the token based on at least one predetermined rule associated with the client, and upon validation, providing the first video stream to the client. Upon receiving a subsequent second request for a second video stream, the system and method validate a second token based on the first video stream, terminate the first video stream and provide the second video stream to the client. | 2011-02-24 |
20110047567 | ADVERTISEMENT TRANSCODING AND APPROVAL - Advertising parameters and associated television advertisements are received from advertisers. The television advertisements can be designated as pending approval. An automated approval process and a television provider approval process can be utilized to approve or disapprove of the television advertisements pending approval. Approved television advertisements can be provided to the television provider, e.g., by a download process over a network. | 2011-02-24 |
20110047568 | TV USER INTERFACE WITH RECOMMENDED CONTENT ENTRY IN FAVORITES MENU - A “recommendation” genus entry is added to the list of other genre in a TV “favorites” menu. Entries in the recommendation genus entry are depicted in a stack and sorted by recommendation strength and channel number. A user can elect to hide the recommendation entry from the favorites menu. | 2011-02-24 |
20110047569 | SYSTEM AND METHOD OF PROVIDING IMPROVED RECEPTION OF BROADCAST SIGNALS - A method comprises playing a selected channel. The method further comprises determining a quality metric for the selected channel, determining whether an alternate channel with the same program as the selected channel is available, determining a quality metric for the alternate channel if the alternate channel with the same program as the selected channel is available, and playing the alternate channel if the quality metric of the alternate channel is higher than the quality metric of the selected channel. | 2011-02-24 |
20110047570 | APPARATUS AND METHOD FOR QUICK NAVIGATION BETWEEN RECOMMENDATION SETS IN A TV CONTENT DISCOVERY SYSTEM - A method for quick navigation between recommendation sets in a TV content discovery system includes mapping of several physical buttons on a remote controller to a single virtual representation button on a TV screen. The virtual representation button provides a one click function of selecting and changing recommendation domains and/or recommendation sets within the recommendation domains. The virtual representation button may also be changed with the single click to indicate the status of the selected content | 2011-02-24 |
20110047571 | METHOD AND SYSTEM FOR PROCESSING BOOKMARK SERVICE AND APPARATUS FOR PROVIDING BOOKMARK SERVICE - A method and system for processing a bookmark service and an apparatus for providing a bookmark service are provided. The method for processing a bookmark service includes: receiving a bookmark association trigger message; acquiring a bookmark list associated with a program content according to the bookmark association trigger message; sending the bookmark list to display a bookmark operation interface associated with the program content and perform an operation on a bookmark When the program content is played normally by a user, the method and system for processing a bookmark service and the apparatus for providing a bookmark service indicates the bookmark associated with the program content to the user, so as to help the user to perform operations such as bookmark jumping. | 2011-02-24 |
20110047572 | INTEGRATED USER INTERFACE FOR INTERNET-ENABLED TV - A user interface (UI) for an Internet enabled TV lists content genre such as photos, music, and video, and for each genre a sub-list of content is provided regardless of the source of the content, i.e., regardless of whether the content in the particular genre is stored locally or is sourced from the Internet. | 2011-02-24 |
20110047573 | Display device and display method - Provided is a display device including a display mode controller for controlling a screen transition to a whole screen display mode for displaying an image in an entire screen of a display section, a multiple content display mode for displaying, on the screen, a plurality of thumbnail images related to contents, or a panel display mode for displaying, on the screen, a first panel on which information related to the contents is displayed, an information obtaining section for obtaining externally various information, and a panel display section for displaying the various information obtained in the whole screen display mode on a second panel. | 2011-02-24 |
20110047574 | Interface Strategies for Creating and Invoking Marks - Strategies are described for adding a mark to media content at a source location in response to the activation of a marking mechanism, and then resuming the presentation of the media content at a second location based on the mark. The source location may be the same as the destination location, or the source location may differ from the destination location. In the latter case, the source location can correspond to a first room in a home that provides a first media processing mechanism, and the destination location can correspond to a second room in the home that provides a second media processing mechanism. The marking mechanism can correspond to a mark button provided by a remote control. Various user interface displays facilitate the adding of the mark and the resuming of the presentation, including various timelines displays, mark panel displays, thumbnail displays, etc. | 2011-02-24 |
20110047575 | METHOD FOR PROVIDING GUI TO DISPLAY LIST FOR PLURALITY OF ITEMS AND DISPLAY APPARATUS APPLYING THE SAME - Provided are a method and display apparatus for providing a graphical user interface (GUI), the method includes: receiving program information; dividing the program information into a first main group having a first set of items of program information, and a second main group having a second set of items of program information, wherein the dividing is performed according to a property, and each of the first and second main groups corresponds to a unique value of the property; if a number of items in the first main group together with a number of items in the second main group is less than or equal to a maximum number, grouping the first set of items and the second set of items together into a sub-group; and displaying the GUI including at least one item of program information from the sub-group. | 2011-02-24 |
20110047576 | INTUITIVE ELECTRONIC PROGRAM GUIDE DISPLAY - A method and system for generating an electronic program guide includes a receiving unit | 2011-02-24 |
20110047577 | SYSTEM AND METHOD FOR SELECTING PROGRAMS TO RECORD - An exemplary method of identifying program content to record comprises receiving a signal corresponding to a plurality of broadcast programs, collecting data about specific broadcast programs selected by a user from the signal corresponding to the plurality of broadcast programs, adding a one of the plurality of broadcast programs to a list of favorite programs if the user selects the one of the plurality of broadcast programs more than a specific number of times, and recording the broadcast programs added to the list of favorite programs. | 2011-02-24 |
20110047578 | IMAGE DISPLAY APPARATUS AND METHOD FOR OPERATING AN IMAGE DISPLAY APPARATUS - A method and an apparatus may provide thumbnail images for a display. A plurality of thumbnail images may be generated based on television channels that have been tuned during a first prescribed time period. A channel list including the plurality of thumbnail images may be provided for output to a display. At least one additional thumbnail image may be generated based on at least one additional television channel that has been tuned during a second time period, the second time period being a time period subsequent to the first time period. The channel list may be updated to further include the at least one additional thumbnail image with the plurality of thumbnail images. The updated channel list may be output to a display. | 2011-02-24 |
20110047579 | System for remotely controlling client recording and storage behavior - A system for remotely controlling client recording and storage behavior schedules the recording, storing, and deleting of multimedia content on a client system storage device. The invention accepts as input a prioritized list of program viewing preferences which is compared with a database of program guide objects that indicate when programs of interest are actually broadcast. A schedule of time versus available storage space is generated that is optimal for the viewer's explicit or derived preferred content. The viewer may request that certain content be captured, which results in the highest possible priority for those content. The invention provides objects called a capture requests that are sent by the service to client systems. Capture requests reflect local storage management decisions about how the client system storage is partitioned. Capture requests also allow the service to determine content to be recorded by the client system in the same manner that a viewer requests that certain content are recorded but are more powerful than what a viewer can request. Recording requests for a capture request can preempt viewer requests or be entered at the same or lower priority as a viewer request. Capture requests can adjust all aspects of a recording request and affect the capture request itself. Client system operational functionality are also manipulated by the service using capture requests. | 2011-02-24 |
20110047580 | AV CONTENT VIEW SYSTEM - In video/audio information such as a movie in a mobile terminal connected to a terminal of a seat terminal for a mobile terminal, the video is converted into video data and transmitted to a seat terminal of a front seat via a transmission path. The video data are decoded by a video decoder of the seat terminal of the front seat and displayed on a video display section. Furthermore, audio is listened to by a user via a headphone of the user's own seat. | 2011-02-24 |
20110047581 | APPARATUS AND METHOD FOR A HOME COMMUNICATION CENTER - Embodiments of the invention provide a home communications device. The home communications device is connected to an external network comprising external devices. The home communications device comprises a plurality of interfaces for connecting a plurality of internal devices to form one or more internal networks. The home communications device further comprises a communication manager configured to enable communication among one or more of the internal devices and the external devices, wherein one or more of the internal devices operate on separate or similar communication protocols. | 2011-02-24 |
20110047582 | MULTILEVEL BANDWIDTH CHECK - A subscription system for providing content by subscription using an Internet connection is disclosed. The subscription system includes a content object store and an interface. The content object store stores a plurality of content objects. The interface is configured to receive a request to initiate a subscription with a first address for a particular account using the Internet. The subscription allows use of the plurality of content objects by the particular account without individually charging for the plurality of content objects. It is verified that a first connection speed is greater than a first threshold value before allowing the subscription, where the first connection speed is over the Internet with the first address. A request to access the subscription of the particular account is received from a second address with the Internet. It is verified that a second connection speed is greater than a second threshold value. The second connection speed is over the Internet with the second address. The second threshold value is associated with at least one of a product or a level of service for the subscription. | 2011-02-24 |
20110047583 | INTEGRATED WIRELESS MOBILEMEDIA SYSTEM - An integrated wireless MobileMedia system is provided. One embodiment includes a wireless media system for distributing media content, the wireless media system including; a base unit that includes: (1) a WWAN modem for receiving the media content over a WWAN network; (2) a router in communication with the WWAN modem; and (3) a transmitter for wirelessly transmitting the media content to one or more wireless receivers, wherein a first wireless receiver is configured to wirelessly receive the media content from the transmitter and push the media content to a video device. In some embodiments, the wireless media system further includes a TV tuner device for receiving live video content. Another embodiment is a method for distributing media content using a base station with a WWAN modem, a router, a controller, and a transmitter, the method including: receiving, over a WWAN network, the media content at a WWAN modem; transmitting, by way of the router, the media content from the WWAN modem to the controller; coordinating, using the controller, the delivery of the media content to one or more wireless receivers; and transmitting the media content to a first wireless receiver. | 2011-02-24 |
20110047584 | METHOD AND SYSTEM FOR SWITCHING SUBSCRIBER CONTENT - Embodiments of the present invention provide that a content provider itself provide subscription content to a device of a second type, rather than to a device of a first type. For example, the device of the second type may be a mobile telephone or the like, whilst the device of the first type may be a set—top box. By providing the content itself the content provider can keep track as to when it is providing content to the device of the second type, and further, in some embodiments, take action to prevent reproduction of the content at the device of the first type, such that whilst the user is viewing the subscriber content on the device of the second type, another user is not able to view the same content on the device of the first type. In order to provide such an arrangement, the content provider is preferably provided with suitable content encoding and streaming server apparatus, which is able to encode the content in a format appropriate for transmission to the device of the second type (such as, for example, transmission to a mobile device. | 2011-02-24 |
20110047585 | METHOD AND APPARATUS FOR HIGH SPEED DATA SERVICES - A system that incorporates teachings of the present disclosure may include, for example, a network device to transmit interactive TV services using minimally twisted or non-twisted pair cables including a controller to receive a very high digital subscriber line (VDSL) signal at the minimally twisted or non-twisted pair cable and adapt the VDSL signal for transmission over the minimally twisted or non-twisted pair cable to form an adapted VDSL signal which can subsequently be used for presentation of interactive TV services. Other embodiments are disclosed. | 2011-02-24 |
20110047586 | COMMUNICATION APPARATUS, CONTROL METHOD, AND COMPUTER READABLE RECORDING MEDIUM - A communication apparatus includes a communication unit, an acquisition unit, and a control unit. The control unit controls the acquisition unit to acquire again information for generating video data to be transmitted to an external apparatus by the communication unit from an apparatus if the predetermined signal is detected, the predetermined signal indicates that a state of the apparatus is changed to a first state from a second state after the state of the apparatus is changed to the second state from the first state. | 2011-02-24 |
20110047587 | DIGITAL TELEVISION RECEIVER - A digital television receiver for use in a digital television broadcast system in which a plurality of digital television data streams can be provided in respective streams of television broadcast packets forming the lowest layer of a layered digital television structure and also in respective streams of Internet protocol packets forming the lowest layer of a layered Internet protocol structure, the streams of television broadcast packets being broadcast with a plurality of tables indicating where data of one layer of one structure can be found in another layer of one or other of the two structures, the received plurality of tables being used to determine where data contained in one layer can be found in an adjacent layer so as to construct tree structures or a new table allowing determination of in which stream of television broadcast packets the television data of a selected stream of Internet protocol packets is found. | 2011-02-24 |
20110047588 | Wired transmission line for AV devices - There is provided a wired transmission line for AV devices which includes a first AV device and a second AV device, the wired transmission line allowing millimeter-wave communication between the first AV device and the second AV device using a millimeter-wave communication module provided for each of the first AV device and the second AV device, wherein the wired transmission line includes: a first coupling unit capable of being attached to a housing of the first AV device above the millimeter-wave communication module included in the first AV device; a second coupling unit capable of being attached to a housing of the second AV device above the millimeter-wave communication module included in the second AV device; and a waveguide which couples the first coupling unit and the second coupling unit. | 2011-02-24 |
20110047589 | DYNAMIC SWITCHING OF SECURITY CONFIGURATIONS - Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method. | 2011-02-24 |
20110047590 | APPARATUS, SYSTEM, AND METHOD FOR SHARING REFERENCED CONTENT THROUGH COLLABORATIVE BUSINESS APPLICATIONS - An apparatus, system, and method are disclosed for sharing referenced content through collaborative business applications. The method includes detecting referenced content in an electronic communication. The referenced content references content stored in an external repository. The referenced content identifies a registered external repository connector. The method also includes determining that an Access Control List (“ACL”) for the referenced content lacks an entry for a recipient of the electronic communication. The method includes generating an ACL entry for the recipient in response to the recipient lacking an entry in the ACL for the referenced content. The ACL entry controls access to the referenced content for the recipient. The ACL entry is defined based on a security policy associated with the recipient. | 2011-02-24 |
20110047591 | APPLICATION NETWORK COMMUNICATION METHOD AND APPARATUS - A method and apparatus is provided to discover and integrate applications in an application router framework. The discovery operation includes receiving a registration notification for an application on a network, adding information describing the application to a repository into a data structure and publishing the data structure onto an application router. The association operations include querying one or more application routers on an application network for meta-data and other information on applications, exchanging the meta-data and other information between the application routers and associating the applications together automatically using their respective application protocols. Routing operations include receiving application information in an application protocol format, converting the application information in the application protocol format into a neutral protocol format and forwarding the application information in the neutral protocol format along with state information to other application router devices on the network. | 2011-02-24 |
20110047592 | PRE-REGISTRATION SECURITY SUPPORT IN MULTI-TECHNOLOGY INTERWORKING - Pre-registration security support in a multiple access technology environment is disclosed. For example, a method is disclosed for use in a computing device of a communication system. The communication system supports two or more access technologies for permitting a communication device to access the communication system, and at least part of a first security context is generated at the computing device for a given communication device permitting the given communication device to access the communication system via a first access technology. The method comprises generating at the computing device at least part of at least a second security context for the given communication device such that the given communication device is pre-registered to access the communication system via at least a second access technology while maintaining the first security context such that the given communication device continues to access the communication system via the first access technology and is pre-registered to subsequently access the communication system via the second access technology. | 2011-02-24 |
20110047593 | SYSTEM AND METHOD FOR SECURE MANAGEMENT OF TRANSACTIONS - Secure management of electronic transactions is provided by a system server that is communicatively coupled to terminals configured as thin client devices (TCD) and to one or more application servers. A TCD completes a secure communications link with the system server, and transfers information concerning the identity of a user and account information from a secure transaction card (STC). Upon authentication, the system server drives the display of available applications at the TCD, allowing the user to select and engage in a desired transaction with the application server hosting the selected application. During the transaction, the system server brokers communications according to the different security schemes used by the TCD and the application server and, ultimately, stores a transaction ticket that memorializes the transaction. The transaction ticket can later be retrieved by presenting appropriate authentication information. | 2011-02-24 |
20110047594 | SYSTEM AND METHOD FOR MOBILE COMMUNICATION DEVICE APPLICATION ADVISEMENT - This disclosure is directed to a system and method for providing advisement about applications on mobile communication devices such as smartphones, netbooks, and tablets. A server gathers data about mobile applications, analyzes the applications, and produces an assessment that may advise users on a variety of factors, including security, privacy, battery impact, performance impact, and network usage. The disclosure helps users understand the impact of applications to improve the experience in using their mobile device. The disclosure also enables a server to feed information about applications to other protection systems such as application policy systems and network infrastructure. The disclosure also enables advisement about applications to be presented in a variety of forms, such as through a mobile application, as part of a web application, or integrated into other services via an API. | 2011-02-24 |
20110047595 | DISTRIBUTED SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ESTABLISHING SECURITY IN A PUBLISH/SUBSCRIBE DATA PROCESSING BROKER NETWORK - A technique for establishing security in a publish/subscribe data processing broker network is presented. The technique includes providing a security extension module from a publisher to a broker of the network, wherein the security extension module is for a topic asset of the publisher. The broker employs the security extension module, responsive to receipt of a request from a subscriber for the topic asset, to authenticate the request at the broker before pushing the topic asset of the publisher to the subscriber. In addition to authenticating the request, the security mode extension can be employed to authorize the request, and to automatically forward messages to the publisher providing information on when topic asset access by a subscriber begins and ends. | 2011-02-24 |
20110047596 | KEYSTROKE LOGGER FOR UNIX-BASED SYSTEMS - A device receives, from an Internet program manager (IPM) server, an identification (ID) of a user associated with a user device and an Internet protocol (IP) address of the user device, and connects to the user device based on the user ID and the IP address of the user device. The device also receives, from the IPM server, a request to execute a logging application for the user device, and executes the logging application based on the request. The device further receives, via the logging application, one or more inputs or outputs associated with the user device, and records the one or more inputs or outputs associated with the user device. | 2011-02-24 |
20110047597 | SYSTEM AND METHOD FOR SECURITY DATA COLLECTION AND ANALYSIS - Disclosed herein is a system and method for efficiently gathering information about applications for mobile communication devices (e.g., smartphones, netbooks, and tablets). This disclosure is also directed to a server producing assessments for applications by analyzing data from multiple sources. To gather information, a device sends information about an application to a server, which stores some or all of the information and may request additional information, if necessary. The server collects information from many devices, including devices that have varied configurations and different operating systems, by only collecting the appropriate information from each device. The server gathers the appropriate data to perform in-depth, granular mobile application analysis while minimizing overhead on devices, wireless networks, and the server. The server may collect portions of data from multiple devices, combining them on the server to produce an assessment for an application. | 2011-02-24 |
20110047598 | DEVICE IDENTITY MATCHING - Devices are identified by their owners and authorization to network two or more devices is based on device ownership. Data structures such as address books can store information about an owner of a device and maintain an entry indicating that a particular entry identifies the owner of the device. Other entries in the address book are contacts of the owner. A host device can authorize a client for communication with the host based on a relationship between the owner of the client and the owner of the host as indicated by the presence of the contact information of the client's owner in the host's address book. Devices and can enable communication and sharing of services and levels of access permissions based on the relationship of the owners' of the respective devices. | 2011-02-24 |
20110047599 | MICROMINIATURE PERSONAL COMPUTER AND METHOD OF USING THEREOF - A microminiature personal computer that is connected to external devices using standard interfaces for information input and output. The microminiature personal computer has an interconnected processor, a memory, a security module, and a connector. At least part of memory should be non-volatile to keep operating system, drivers to work with external devices, programs and data. The microminiature personal computer does all processing and all programs are running inside its memory while external device is used only for information input and output through a virtual window thus ensuring security of both systems and lack of unauthorized interaction between them. | 2011-02-24 |
20110047600 | SYSTEMS AND METHODS FOR PROVIDING A VIRTUAL WORLD COMMODITY DEVICE - The present invention describes methods and apparatus to enable efficient and protected interaction with a virtual world environment. An exemplary embodiment of the present invention provides a system including a virtual world commodity device including a housing and a memory. Furthermore, the system includes a product unique identifier stored in the memory of the virtual world commodity device. The virtual world commodity device is enabled to communicate with a virtual world environment to provide the product unique identifier and the virtual world environment provides a globally unique identifier to be stored in the memory of the virtual world commodity device. | 2011-02-24 |
20110047601 | Electronic Content Distribution and Exchange System - An electronic content distribution and exchange system provides authenticated, reliable content downloads and tracking capabilities. Content is distributed to users through the invention's architecture. A user registers for the purchase of content through an interface on a client system or via a Web site. The purchase is for a license to the content, not for the content itself. A list of available content is displayed to the user through the client system or the Web site. The invention's central servers log the purchase of the content into a license database. The user accesses content through the client system's user interface where the user plays the content and controls its playback. | 2011-02-24 |
20110047602 | End-of-Session Authentication - Techniques for facilitating an online transaction session with an end-of-session authentication are provided. The techniques include performing a start-of-session authentication to enable an online transaction session, and performing an end-of-session authentication to end the online transaction session, wherein the end-of-session authentication comprises a scope comprising each pre-defined critical transaction from the transaction session. | 2011-02-24 |
20110047603 | Systems and Methods for Obtaining Network Credentials - Systems and methods for obtaining network credentials are disclosed. In some embodiments, a method comprises receiving, with a digital device, a network identifier from a network device, providing a first credential request including the network identifier to another digital device on a network, receiving a request for additional network information from the other digital device, providing a second credential request including additional network information to the other digital device, receiving a credential request response including network credentials from the other digital device, and providing the network credentials from the credential request response to a network device. | 2011-02-24 |
20110047604 | COMPUTING INPUT SYSTEM WITH SECURE STORAGE AND METHOD OF OPERATION THEREOF | 2011-02-24 |
20110047605 | System And Method For Authenticating A User To A Computer System - A system and method for verifying the identity of a user to a secure website. The user provides a server associated with the secure website with an account identifier, a biometric authentication element comprising a voice print and secret pass phrase, and contact information for a user communication device during the enrollment process. Upon subsequent attempts to access the secure website the user is prompted to provide an account identifier. Upon receipt of the account identifier, the server transmits a request for voice print and pass phrase samples to the user's communication device. The server receives the samples, compares them to the user's stored voice print and pass phrase and authenticates the user to the secure website if the sample voice print and sample pass phrase match the stored voice print and pass phrase sample. The server request may comprise a sponsored message. Additionally, the server may request the user speak a pass phrase comprising an advertiser's slogan, product name, or company name. | 2011-02-24 |
20110047606 | Method And System For Storing And Using A Plurality Of Passwords - A system and method for managing a plurality of a user's authentication elements. In a preferred embodiment a user initiates a webpage browser session at a user website access device and activates a password manager program. The user's identity is authenticated to an authentication server and allowed to access a secure database comprising a plurality of website authentication elements. Thereafter, the user accesses a first secure website and the program determines the presence of a user authentication data field. When a user authentication data field is present the program instructs the authentication server to automatically transmit at least one of the authentication elements specific to the authentication data field of the first secure website to authenticate the user to the first website. | 2011-02-24 |
20110047607 | User verification using voice based password - Verifying a user includes: receiving a service request; generating a text based first dynamic password upon receiving the service request; converting the first dynamic password into sound information; transmitting the sound information to a user terminal over a communication network; receiving over the Internet a second dynamic password entered by the user based on the sound information, the second dynamic password being a text based password; comparing the first and second dynamic passwords for consistency; and indicating that verification is successful if the first and the second dynamic passwords are consistent. | 2011-02-24 |
20110047608 | DYNAMIC USER AUTHENTICATION FOR ACCESS TO ONLINE SERVICES - A dynamic authentication system that makes authentication stronger, while reducing the cost to business and the burden to users. The system includes a service that provides centralized, non-federated, proxied authentication. The system uses a two-pass authentication process that first receives a supposed identity of the user and then determines one or more authentication criteria for proving that supposed identity. When the user attempts to use an online service that relies on the dynamic authentication system for authentication, the service requests the user's identity. The system dynamically determines authentication criteria for the user to prove the provided identity belongs to the user. In the second pass, the service receives a response from the user containing additional authentication information, and forwards the received response to the system for verification. If verification succeeds, the service allows the user to access the requested resources. | 2011-02-24 |
20110047609 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, MOBILE COMMUNICATION DEVICE, AND METHOD FOR MANAGING USER INFORMATION USED FOR THEM - An information processing system is provided that guarantees personal authentication only while a mobile communication device is connected to allow user information, stored in the mobile communication device, to be used while using a PC on which a guest account is used. In the information processing system, the mobile communication device is used as art authentication key when a user logs into an information processing device, and information on a personal setting environment stored in the information processing device and information on application software used in the information processing device are acquired and saved into the mobile communication device, which is used as the authentication key, as personal account information. | 2011-02-24 |
20110047610 | Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication - Identity access appliance works in conjunction with the edge network devices and provides the necessary protocol authentication, user authentication statement, authorization summary and its attributes. Besides authentication these appliances protect the infrastructure against intrusions such as possible authentication vulnerabilities, authentication connection attacks, denial of service attacks, spam and scanning/hacking the credentials, in a short span of time and generate real time alerts, statistics and reports. | 2011-02-24 |
20110047611 | User Role Mapping in Web Applications - Roles and policies are used to provide display and access to data in a flexible manner. Users and/or web applications can be mapped to user roles that dictate which displays or other application resources are available to the user or application. Roles are assigned to web applications individually, allowing for user roles to be used without requiring an independent mapping of users to roles. In some cases, application roles can be centrally managed, so that presentation systems also avoid the need for an independent mapping of user or application roles. | 2011-02-24 |
20110047612 | Method for Network Access, Related Network and Computer Program Product Therefor - A method of providing access of a mobile terminal to an IP network includes establishing a security association between the mobile terminal and a first security gateway of a first router in said plurality of routers. The mobile terminal is provided access to the IP network via the first router, and the data exchanged between the mobile terminal and the first router is encapsulated by using the security association. The security association is made available to at least one second router having a second security gateway. The mobile terminal is provided access to the IP network via said the second router, and data exchanged between the mobile terminal and the second router is encapsulated by using the same security association. Establishing the security association includes assigning a Security Parameter Index that identifies univocally the first security gateway and the security association. Making the security association available to the second router includes making available to the second router the Security Parameter Index. The second router may thus have access to the security association either by requesting it from the first router or by identifying it in a set of security associations sent from the first router to a set of routers candidate to become the second router as result of the mobility of the mobile terminal. | 2011-02-24 |
20110047613 | SYSTEMS AND METHODS FOR PROVIDING AN ISOLATED EXECUTION ENVIRONMENT FOR ACCESSING UNTRUSTED CONTENT - A sandbox tool can cooperate with components of a secure operating system to create an isolated execution environment for accessing untrusted content without exposing other processes and resources of the computing system to the untrusted content. The sandbox tool can allocate resources (storage space, memory, etc) of the computing system, which are necessary to access the untrusted content, to the isolated execution environment, and apply security polices of the operating system to the isolated execution environment such that untrusted content running in the isolated execution environment can only access the resources allocated to the isolated execution environment. | 2011-02-24 |
20110047614 | Permission management system for data accessing and method thereof - The invention discloses a permission management system for data accessing and a method thereof, applicable to operating system. The method of permission management for accessing data comprises the steps of: first, monitoring an unoccupied drive letter in operating system; then, detecting a drive letter request event and actively executing an authorizing procedure to produce an access right of the drive letter; and stop monitoring the drive letter and allowing a user to access data corresponding to the drive letter according to the access right. | 2011-02-24 |
20110047615 | SYSTEMS AND METHODS FOR LOCALLY GENERATING LICENSE AND ACTIVATING DRM AGENT - Systems and methods for locally generating a license and activating a Digital Rights Management (DRM) agent are provided. The system includes a storage device and an electronic device. The storage device includes a DRM treated file, operation information, and a management application. The electronic device activates the management application from the storage device to retrieve information, such as a Unique Identification (UID) or a DRM machine certificate from the electronic device, and generate a license for the electronic device according to the operation information, and the retrieved information of the electronic device. The electronic device activates a DRM agent by providing the DRM treated file and the license to the DRM agent for playing back the DRM treated file based on the license. The management application may set the license expired after the DRM treated file is played back on the electronic device. | 2011-02-24 |
20110047616 | INFORMATION PROCESSING APPARATUS AND ACCESS METHOD - An information processing apparatus configured to control authority, the apparatus including a log-in-sequence storage configured to store a log-in ID used to log in the apparatus and a search user ID that is searched for when the apparatus is logged in using the log-in ID in association with each other; a log-in processor configured to accept a log-in ID, and if a search user ID associated with the log-in ID is present in the log-in-sequence storage, to receive the search user ID from an authentication device in the vicinity of the information processing apparatus; and an operation-state reproducer configured to output the screen of an operation state corresponding to the log-in ID received by the log-in processor and the received search user ID with reference to a cooperation-history information table in which log-in IDs and search user IDs are recorded in association with operation states. | 2011-02-24 |
20110047617 | PROTECTING AGAINST NETWORK RESOURCES ASSOCIATED WITH UNDESIRABLE ACTIVITIES - Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities. | 2011-02-24 |
20110047618 | Method, System, and Computer Program Product for Malware Detection, Analysis, and Response - A method, system, and computer program product for detecting malware from outside the host operating system using a disk, virtual machine, or combination of the two. The method, system, and computer program product detects malware at the disk level while computer files in the host operating system are in actual program execution by identifying characteristic malware properties and behaviors associated with the disk requests made. The malware properties and behaviors are identified by using rules that can reliably detect file-infecting viruses. The method, system, and computer program product also uses the disk processor to provide accelerated scanning of virus signatures, which substantially decreases overhead incurred on the host operating system by existing malware detection techniques. In the event that malware is detected, the method, system, and computer program product can respond by limiting the negative effects caused by the malware and help the system recover to its normal state. | 2011-02-24 |
20110047619 | NON-SENSITIVE-PASSAGE DATABASE FOR CUT-AND-PASTE ATTACK DETECTION SYSTEMS - One embodiment provides a system that detects sensitive passages. During operation, the system receives a document and disassembles the document into a plurality of passages. For a respective passage, the system performs a search through a non-sensitive-passage database to determine whether the passage is a known non-sensitive passage. If so, the system marks the passage as non-sensitive, and if not, the system determines whether the passage triggers a cut-and-paste attack detection. If so, the system forwards the passage to an administrator and allows the administrator to determine whether the passage is non-sensitive and, further, to add the passage to the non-sensitive-passage database responsive to the administrator determining the passage to be non-sensitive. | 2011-02-24 |
20110047620 | SYSTEM AND METHOD FOR SERVER-COUPLED MALWARE PREVENTION - This disclosure is directed to a system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets). A mobile communication device uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces an assessment for the application, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats. | 2011-02-24 |
20110047621 | SYSTEM AND METHOD FOR DETECTION OF NON-COMPLIANT SOFTWARE INSTALLATION - A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules stored on the device where the flag is determined to be set to a first state, and, where the flag is determined to be set to a second state, generate an active representation of modules stored on the first device, compare the active representation of modules to the baseline representation of modules, and, responsive to a determination in the comparing step of a difference between the baseline and active representations of modules, output an alert. The flag status may depend on an association of the device with one of a plurality of authorization policies, each mapped to one of the two states. Results of the comparison may be appended to an activity log of the device. | 2011-02-24 |
20110047622 | SYSTEM AND METHOD FOR CALL PATH ENFORCEMENT - Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters. | 2011-02-24 |
20110047623 | APPARATUS AND METHOD FOR TRACING WEB USER USING SIGNED CODE - Provided are an apparatus and method for tracing web user using signed code. The apparatus for tracing web user includes at least one access terminal, a web server, and a monitoring server. The at least one access terminal requests a web page. The web server provides the web page including a signed code to the each access terminal according to the request. The monitoring server receives and analyzes access information which is extracted from the each access terminal according to execution of the signed code. | 2011-02-24 |
20110047624 | Method and System for Software Licensing Under Machine Virtualization - A method and system implementing software licensing management under machine virtualization are disclosed. According to one embodiment, a system comprises a virtual platform running on a physical machine; a binding agent running on a host operating system of the virtual platform; a license enforcement module running on a virtual machine instance of the virtual platform. The license enforcement module is in communication with the binding agent. The binding agent enforces a mutex lock to ensure that only a specified number of license enforcement modules are running on the physical machine. | 2011-02-24 |
20110047625 | System and method for secure sharing of creatives - A method of creating and securely sharing creatives is described. The method includes the steps of accessing a central processing environment, requesting at least one recording of at least a portion of an audio transmission generated from a communication device, generating at least one audio asset, adding the audio asset to a pool of related assets stored in a vault connected to the central processing environment, selecting the generated audio asset and at least one other related asset from the pool of related assets to form a creative, then requesting delivery of the creative to another communication device, and finally delivering the creative to the other communication device. The method is performed in part by a creative composition engine, which is also described. The engine includes a central processing environment having a processor, a digital recorder and a digital asset storage vault. | 2011-02-24 |
20110047626 | DIGITAL CONTENT MANAGEMENT SYSTEM AND APPARATUS - There are provided a digital content management apparatus which further embodies a digital content management apparatus used with a user terminal, and a system which protects the secrets of a digital content. The system and the apparatus are a real time operating system using a micro-kernel, which is incorporated in the digital content management apparatus as an interruption process having high priority. When a user uses the digital content, whether there is an illegitimate usage or not, is watched by interrupting the usage process. In the case where illegitimate usage is carried out, a warning is given or the usage is stopped. The decryption/re-encryption functions of the digital content management apparatus having the decryption/re-encryption functions are not restricted to the inside of the user apparatus. By providing the decryption/re-encryption functions between the networks, the exchange of secret information between different networks is secured. By using this apparatus for converting a crypt algorithm, information exchange is made possible between systems which adopt different algorithms. | 2011-02-24 |
20110047627 | METHOD AND SYSTEM FOR SECURE DATA EXFILTRATION FROM A CLOSED NETWORK OR SYSTEM - A method, system, and device for secure data exfiltration from a closed communications network or system, including at least one of means for data exfiltration from one or more of computers or computing devices of a closed communications network or system to one or more of computers or computing devices on another communications network or system; and means for internal or external secure data storage coupled to the exfiltration means and the other communications network or system and configured to receive the data for exfiltration based on control from the exfiltration means. | 2011-02-24 |
20110047628 | IDENTITY VERIFICATION AND INFORMATION MANAGEMENT - The present invention provides an efficient, secure and verified information exchange using an identity verification platform and common interface data formats, whereby an individual can set different levels of access for different clients and further set different levels of access for different files. Therefore, the present invention provides a multi-layer access to records particular to an individual. | 2011-02-24 |
20110047629 | Method and Apparatus for Enhanced Age Verification and Activity Management of Internet Users - Methods and apparatus are provided for verifying the age of an online user. The age and identity of at least one primary user is verified and the primary user provides an age of at least one secondary user. Content requests from the secondary user to access content from at least one online content provider are granted if the primary user has authorized the secondary user to access the content. A content provider delivers content by receiving an identifier and a content request from a secondary user to access content; redirecting the secondary user to a third party age verification server; receiving an indication from the third party age verification server that the secondary user has been authorized by a primary user to access the content; and granting the content request if the primary user has authorized the secondary user to access the content. | 2011-02-24 |
20110047630 | METHOD AND SYSTEM FOR TAMPER PROOFING A SYSTEM OF INTERCONNECTED ELECTRONIC DEVICES - A method and system for tamper proofing a system of interconnected electronic devices. The method comprises splitting embedded software of each electronic device into at least two executable parts, a stationary part residing in memory of said each electronic device and a non-stationary part residing in memory of another electronic device. | 2011-02-24 |
20110047631 | HEAT SHOCK PROTEIN DEFICIENCIES AS MODEL SYSTEMS FOR BRAIN PATHOLOGY AND CANCER - The invention provides non-human transgenic animals as models of neurodegenerative brain pathology, including, but not limited to, Alzheimer's disease (AD), and cancer. The non-human transgenic animals of the present invention include an exogenous DNA that reduces or eliminates the expression and/or function of a molecular chaperone, including, but not limited to heat shock protein 110 (Hsp1 10) or heat shock protein 70 (Hsp70). These non-human transgenic animals may be used in methods of screening and identifying compounds useful for the prevention and/or treatment of neurodegenerative brain pathology and/or cancer. | 2011-02-24 |
20110047632 | Fibrinogen immune complexes to diagnose and guide therapy in rheumatoid arthritis - Compositions and methods are provided for prognostic classification of rheumatoid arthritis disease patients into subtypes, which subtypes are informative of the patient's need for therapy and responsiveness to a therapy of interest. | 2011-02-24 |
20110047633 | Control of Exocrine Pancreatic Function Using Bone Morphogenetic Proteins - Methods are described for controlling exocrine pancreatic function, for reducing the level of amylase in the blood, and for treating pancreatitis in an individual comprising administering to the individual a bone morphogenetic protein (BMP). Methods for identifying candidate molecules for use in treating diabetes are also described. | 2011-02-24 |
20110047634 | METHODS AND COMPOSITIONS FOR THE DIAGNOSIS AND TREATMENT OF ACUTE LYMPHOBLASTIC LEUKEMIA - Compositions and methods for the identification, prognosis, classification, diagnosis, and treatment of leukemia or a genetic predisposition to leukemia are provided. The present invention is based on the discovery of a novel intragenic deletion in the v-ets erythroblastosis virus E26 oncogene homolog (ERG) allele which is shown herein to be associated with a novel subtype of B-progenitor acute lymphoblastic leukemia (ALL). In one embodiment, the intragenic deletion in ERG results in the expression of C-terminal domain deletion forms of the ERG polypeptide which lacks the DNA-binding PNT domain and CAE domain of the ERG polypeptide and have dominant negative ERG activity. In other embodiments, the intragenic deletions results in a loss of expression of the native ERG polypeptide. Such nucleotide sequences and amino acid sequences of ERG find use in methods and compositions useful in the identification and/or the prognosis and/or predisposition and/or treatment of ALL, more particularly, the novel subtype of B-progenitor AL. | 2011-02-24 |
20110047635 | METHODS AND COMPOSITIONS FOR TRANSPOSON-MEDIATED TRANSGENESIS - Methods and compositions for transposon-mediated transgenesis are provided herein. In some embodiments, methods are provided for generating a transgenic embryo containing a piggyBac-like transposon. In some embodiments, such methods can include: contacting a nucleic acid containing a transgene flanked by two terminal repeats with one of the group consisting of: a piggyBac-like transposase polypeptide and a nucleotide sequence encoding a piggyBac-like transposase to form a mixture; contacting the mixture with a sperm to form a composition; and introducing the composition into an unfertilized oocyte to form a transgenic embryo, wherein the piggyBac-like transposase catalyzes the integration of the transgene into the genome of the embryo. In some embodiments, the piggyBac-like transposase can be encoded by a nucleotide sequence on the same nucleic acid containing the transgene. In some embodiments, the nucleic acid encoding the piggyBac-like transposase can be an mRNA. | 2011-02-24 |
20110047636 | Crop Automated Relative Maturity System - An automated relative maturity system for measuring the relative maturity of a large number of plots of diverse varieties of plants growing in a field or fields. A field to be evaluated is laid out in multiple plots with a specific variety assigned to a preselected plot or plots and with areas set aside throughout the field for planting of check varieties of known relative maturity. High-precision GPS is used with a planter to record the location of each plot within the field on a map. When leaf senescence is under way throughout the field, a radiometric crop sensor mounted on a vehicle also equipped with high-precision GPS is used to scan the plants in the plots to record readings of the plants synchronized to the GPS map locations, including the check plants of known relative maturity. Software is used to calculate the relative maturity of each variety. | 2011-02-24 |
20110047637 | Soybean Cultivar 8235453 - A soybean cultivar designated 8235453 is disclosed. The invention relates to the seeds of soybean cultivar 8235453, to the plants of soybean 8235453, to plant parts of soybean cultivar 8235453, and to methods for producing a soybean plant produced by crossing soybean cultivar 8235453 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8235453, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8235453, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8235453 with another soybean cultivar. | 2011-02-24 |
20110047638 | Soybean Cultivar 8322144 - A soybean cultivar designated 8322144 is disclosed. The invention relates to the seeds of soybean cultivar 8322144, to the plants of soybean 8322144, to plant parts of soybean cultivar 8322144, and to methods for producing a soybean plant produced by crossing soybean cultivar 8322144 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8322144, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8322144, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8322144 with another soybean cultivar. | 2011-02-24 |
20110047639 | Soybean Cultivar 8536465 - A soybean cultivar designated 8536465 is disclosed. The invention relates to the seeds of soybean cultivar 8536465, to the plants of soybean 8536465, to plant parts of soybean cultivar 8536465, and to methods for producing a soybean plant produced by crossing soybean cultivar 8536465 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8536465, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8536465, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8536465 with another soybean cultivar. | 2011-02-24 |
20110047640 | Soybean Cultivar 8647195 - A soybean cultivar designated 8647195 is disclosed. The invention relates to the seeds of soybean cultivar 8647195, to the plants of soybean 8647195, to plant parts of soybean cultivar 8647195, and to methods for producing a soybean plant produced by crossing soybean cultivar 8647195 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8647195, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8647195, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8647195 with another soybean cultivar. | 2011-02-24 |