09th week of 2010 patent applcation highlights part 41 |
Patent application number | Title | Published |
20100058278 | METHOD AND APPARATUS FOR AUTOMATED SYNTHESIS OF MULTI-CHANNEL CIRCUITS - Methods and apparatuses to automatically generate time multiplexed multi-channel circuits from single-channel circuits. At least one embodiment of the present invention automatically and efficiently synthesize multi-channel hardware for time-multiplexed resource sharing by automatically generating a time multiplexed design of multi-channel circuits from the design of a single-channel circuit. Channel specific elements of the single-channel design (e.g., registers and memories) are replaced with corresponding elements of N-times more capacity for pipelining the signal processing for multiple channels. | 2010-03-04 |
20100058279 | Method and System for Design of a Reticle to be Manufactured Using Variable Shaped Beam Lithography - A method for fracturing or mask data preparation or proximity effect correction of a desired pattern to be formed on a reticle is disclosed in which a plurality of variable shaped beam (VSB) shots are determined which can form the desired pattern. Shots within the plurality of VSB shots are allowed to overlap each other. Dosages of the shots may also be allowed to vary with respect to each other. The union of the plurality of shots may deviate from the desired pattern. The plurality of shots may be determined such that a pattern on the surface calculated from the plurality of shots is within a predetermined tolerance of the desired pattern. In some embodiments, an optimization technique may be used to minimize shot count. In other embodiments, the plurality of shots may be optionally selected from one or more pre-computed VSB shots or groups of VSB shots. | 2010-03-04 |
20100058280 | BULK IMAGE MODELING FOR OPTICAL PROXIMITY CORRECTION - A method is described herein for predicting lateral position information about a feature represented in an integrated circuit layout for use with an integrated circuit fabrication process, where the process projects an image onto a resist. The method includes providing a lateral distribution of intensity values of the image at different depths with the resist. Next, the lateral position of an edge point of the feature is predicted in dependence upon a particular resist development time, and further in dependence upon the image intensity values at more than one depth within the resist. | 2010-03-04 |
20100058281 | METHOD FOR OPTICAL PROXIMITY CORRECTION OF A RETICLE TO BE MANUFACTURED USING CHARACTER PROJECTION LITHOGRAPHY - A method for optical proximity correction of a design of a pattern on a surface is disclosed with the method comprising the steps of inputting desired patterns for the substrate and inputting a set of characters some of which are complex characters that may be used for forming the patterns on the surface. A method of creating glyphs is also disclosed. | 2010-03-04 |
20100058282 | METHOD AND SYSTEM FOR DESIGN OF A RETICLE TO BE MANUFACTURED USING CHARACTER PROJECTION LITHOGRAPHY - A method for fracturing or mask data preparation or proximity effect correction is disclosed which comprises the steps of inputting patterns to be formed on a surface, a subset of the patterns being slightly different variations of each other and selecting a set of characters some of which are complex characters to be used to form the number of patterns, and reducing shot count or total write time by use of a character varying technique. A system for fracturing or mask data preparation or proximity effect correction is also disclosed. | 2010-03-04 |
20100058283 | FLEXIBLE BASE CLASS LIBRARY - Mechanisms that allow frameworks significant flexibility in varying the library of common base classes in a manner that better suits the domain of applications served by the framework. Instead of providing the base class library, the runtime provides a data contract for the data structure of each base class. The frameworks can then define each base class in a custom way so long as the data contract is honored. Thus, for example, the framework may provide custom framework-specific methods and/or properties as is appropriate for the framework. Another framework might define the base classes in a different way. | 2010-03-04 |
20100058284 | METHOD AND SYSTEM FOR DETERMINING A REUSE FACTOR - The present invention provides a method, system and computer program product for determining a reuse factor associated with a set of resources available for a project. The method includes identifying the set of resources from a repository. The predetermined saved-effort associated with the set of resources is also determined from the repository. The method further includes identifying one or more resources from the set of resources. The one or more resources are identified by a project leader to be used in the project. Thereafter, the reuse factor is estimated on the basis of the predetermined saved-effort associated with the set of resources and the effort saved by the use of the one or more resources. | 2010-03-04 |
20100058285 | COMPOSITIONAL VIEW OF IMPERATIVE OBJECT MODEL - A compositional or alternate object model is employed over an imperative object model to facilitate inspection and construction of imperative structures in a user-friendly manner. Transformations between compositional and imperative models and vice versa can be specified to provide a bridge between differing computing worlds. Moreover, various architectures and/or design patterns can be employed to effect transformation in different ways. | 2010-03-04 |
20100058286 | SYSTEM AND A METHOD FOR RENDERING COMPUTER-BASED INTERACTIONS AS GROUP ACTIVITIES - Disclosed herein is a system and a method for creating and facilitating computer-based interactions amongst a group of individuals during a group activity. In an embodiment herein, an activity player is provided for rendering instances of the group activity. A library of activity templates is also provided so that instances of said activity templates may be used to create an activity executable. An activity data file may be created for storing data corresponding to the instances of activity templates used in the activity executable, wherein said activity executable and activity data file are used to create the group activity. Said group activity may be then rendered by the activity player. | 2010-03-04 |
20100058287 | MODEL DRIVEN SOFTWARE - A system and method for model driven software is disclosed. In one embodiment, the method of handling changes to a software system in a business environment includes capturing customer requirements of the software system in a schema, modeling business-software architecture of the software system in a first level of the schema, modeling design architecture of the software system in a second level of the schema, defining events that connect the first level and second level of the schema, defining links that represent interactions between the user interfaces, defining integration services for each of the events, mapping each element in the first level to a corresponding one of elements in the second level using the events, links and integration services, creating a knowledge repository with a traversable user interface representing the mappings, identifying changes to the software system, and analyzing impact of the changes using the knowledge repository. | 2010-03-04 |
20100058288 | Method And System for Structuring a Software Implementation - The present invention refers to a method for structuring a software implementation with a plurality of modules, in particular, Java packages and for checking whether these modules fit a logical model. In a preparation phase the logical model will be defined and consists of two independent dimensions comprising a technical dimension and a business-driven-dimension. Further, allowed dependencies between the elements of the logical model, namely layers and slices, will be defined. In a subsequent implementation phase the modules of the software implementation will be assigned to the logical model. Further, monitoring is done in order to check whether the software implementation comprises any violations of the allowed dependencies. After assigning the modules to the logical model the logical model with the assigned modules will be visualised interactively and integrally and the allowed dependencies and any violations of the checked dependencies will be indicated. | 2010-03-04 |
20100058289 | Generating a Hardware Description for a Programmable Hardware Element Based on a Graphical Program Including Multiple Models of Computation - Generating a hardware description for a programmable hardware element based on a graphical program including multiple models of computation. A graphical program may be received which includes a first portion having a first computational model and a second portion having a second computational model. A hardware description may be generated based on the graphical program. The hardware description may describe a hardware implementation of the graphical program. The hardware description may be configured to configure a programmable hardware element to implement functionality of the graphical program. | 2010-03-04 |
20100058290 | SYSTEMS AND METHODS FOR APPLICATION DEVELOPMENT USING MIDDLEWARE PLATFORM - Embodiments relate to systems and methods for application development using middleware. A developer can launch a development request from a client or local network to a remote development server, thereby invoking a set of frameworks and other tools to carry out a desired application build. The development request can specify the type or configuration of the desired application, such as, for example, email, spreadsheet, media playback, or other applications, along with parameters such as target operating systems. The user can assemble desired code from libraries stored in the virtualized middleware framework, and debug the application build against a set of data sources aggregated by the development server. A developer can therefore leverage rapid application development tools at the middleware, without a necessity to invest in local development tools or separately build or locate test data sources. | 2010-03-04 |
20100058291 | DEVELOPMENT TOOLING ENABLEMENT FOR AUDIT EVENT GENERATION - Mechanisms for development tooling enablement of audit event generation are provided. The mechanisms automatically generate and insert compliance audit record generation code where appropriate in identified portions of program instructions based on established compliance policies and labels associated with keywords/library functions appearing in the source code. The mechanisms may analyze the program instructions to identify at least one portion of program instructions meeting a compliance policy requirement for generation of a compliance audit record. Compliance audit record generation code for generating the compliance audit record may be generated. The compliance audit record generation code may be inserted into the at least one portion of program instructions to generate modified program instructions. The modified program instructions may be output for execution on a computing device. | 2010-03-04 |
20100058292 | Automatically Correcting Problems Found During Programmatic Analysis of a Graphical Program - A system and method for visually indicating one or more problems in a graphical program. The graphical program may be programmatically analyzed to discover a problem (or potential problem) in the graphical program. The problem found during the programmatic analysis of the graphical program may then be visually indicated on a display device. Visually indicating the problem may comprise visually indicating one or more objects in the graphical program to which the problem corresponds. Visually indicating the graphical program object(s) may comprise displaying information or altering the appearance of the object(s) in order to call the user's attention to the object(s). | 2010-03-04 |
20100058293 | DETOURING IN SCRIPTING SYSTEMS - A system described herein includes a receiver component that receives third party code for execution in a host environment, wherein the third party code corresponds to a dynamic programming language, and wherein the third party code has at least one object reference to a first object that is used by the third party code. A detouring component automatically replaces the first object referenced by the third party code with a proxy object such that the third party code at runtime calls the proxy object instead of the first object. | 2010-03-04 |
20100058294 | GUARDING CODE CHECK-IN WITH TEST CASE EXECUTION RESULTS - A mechanism for providing a source code control system that employs test case execution results to mandate that software code have a specific level of quality for check-in to a central repository. A request to check-in a modified copy of a source code file to a repository is received, wherein the modified copy comprises changes to the source code file located in the repository. The modified copy of the source code file is placed in a quality check pending state in the repository. Responsive to an occurrence of a specific event or expiration of a set time period, applicable regression test cases are executed against the changes in the modified copy. A determination is made as to whether the regression test cases are successful. If the regression test cases are successful, the changes in the modified copy are committed to the source code file located in the repository. | 2010-03-04 |
20100058295 | Dynamic Test Coverage - Dynamic test coverage to evaluate an artifact code is provided. Code of an artifact to be tested is identified. The code coverage of the test code is analyzed. The current coverage information is stored. Code coverage information for one or more prior versions of the test code is retrieved. The current coverage information is compared with the prior coverage information. Responsive to a determination that a difference between the current coverage information and the prior coverage information exists, the difference is collected. Responsive to a determination that test cases are to be generated automatically, generating, automatically, new test cases based on the difference. The new test cases are stored. Code coverage of the test code is analyzed based on the new test case. The new coverage information is stored. The new coverage information is sent to the user. | 2010-03-04 |
20100058296 | Programmatic Analysis of Graphical Sub-Programs within a Graphical Program - A system and method for visually indicating one or more problems in a graphical program. The graphical program may be programmatically analyzed to discover a problem (or potential problem) in the graphical program. The problem found during the programmatic analysis of the graphical program may then be visually indicated on a display device. Visually indicating the problem may comprise visually indicating one or more objects in the graphical program to which the problem corresponds. Visually indicating the graphical program object(s) may comprise displaying information or altering the appearance of the object(s) in order to call the user's attention to the object(s). | 2010-03-04 |
20100058297 | SEAMLESS DEBUGGING AMONG DIFFERENT APPLICATION VIEWS - In an embodiment, a computer system initiates an application debugging process for an application that is to be debugged and maps runtime object elements of the application to both code elements and graphical elements. The computer system appends portions of software code to each runtime object element so that a runtime event is outputted indicating which corresponding graphical or code element is currently being processed. The computer system accesses the outputted runtime events to determine which graphical or code element is currently being processed and, based on the accessed outputted runtime events and based on the mappings, displays the elements currently being debugged in a first view. The computer system, based on the accessed outputted runtime events and based on the mappings, switches views from the first view to a second view without restarting the application debugging process for the application being debugged. | 2010-03-04 |
20100058308 | CENTRAL PROVIDER AND SATELLITE PROVIDER UPDATE AND DIAGNOSIS INTEGRATION TOOL - The present invention generally relates to computer systems and methods of integrating a central system and a satellite system for automatically updating software and providing diagnostics for a product system to be shipped to an end customer. | 2010-03-04 |
20100058309 | Method and system for upgrading firmware of a card reader - The invention discloses a method and a system of upgrading firmware of a card reader. In the method, a card reader is connected to an IC card; the card reader determines whether the IC card is an IC card for upgrading, if it is, the card reader makes one-way or mutual authentication with the IC card; after a successful authentication, the card reader acquires files for upgrading the firmware of the card reader. The system includes a card reader and an IC card. The firmware of card reader is upgraded in the invention by acquiring the files for upgrading from an IC card in which the files for upgrading are pre-stored. The invention improves the efficiency of upgrading the card reader and also improves the security of the upgrading by the authentication between the card reader and the IC card. | 2010-03-04 |
20100058310 | WORKFORM MANAGEMENT APPARATUS AND METHOD, IMAGE FORMING APPARATUS, AND WORKFORM MANAGEMENT SYSTEM - A workform management apparatus and method, an image forming apparatus, and a workform management system are provided. In the workform management apparatus, a workform storage unit stores one or more workforms, an update execution unit updates the stored workforms in accordance with a preset workform update option, and a main control unit controls the workform storage unit to store the updated workforms. | 2010-03-04 |
20100058311 | Providing Code To A Programmable Device - According to one embodiment, providing a bitstream to one or more programmable devices of a service unit card includes receiving the bitstream at a snooper of the service unit card. The snooper determines whether the bitstream is current. If the bitstream is current, the bitstream is loaded onto the programmable devices. If the bitstream is not current, the received bitstream is discarded, and a substitute bitstream is identified. The substitute bitstream is loaded onto the programmable devices. | 2010-03-04 |
20100058312 | Content Data Providing System, Content Providing Apparatus and Content Data Processing Terminal - According to one embodiment, making an account management server manage also a user ID in the recording medium in a way, which transfers a firmware update toll of a set-top box (STB) terminal by using a recording medium such as a Secure Digital card as a medium, associates a medium and an account with each other. When loading the recording medium in the STB terminal, the STB terminal also associates an STB property with the account management server as account management data. Thereby, when loading a recording medium the next time, the update tool is automatically downloaded to the recording medium if a firmware function update tool is provided. If the recording medium is shared with a plurality of STB terminals, all of necessary firmware tools for the STB terminals are downloaded to the recording medium. | 2010-03-04 |
20100058313 | UPDATING A COMPUTER SYSTEM - A method, computer program product, and system for updating a computer system may include collecting data describing usage characteristics on a customer computer system. Available updates may be stored on a support system together with one or more relevant rules. A recommendation engine may be used to analyze the data describing usage characteristics and to recommend one or more changes based on evaluation of one or more relevant rules for each available update. Changes having one or more attributes and one or more successor relationships to recommend for installation in the computer system may be selected. | 2010-03-04 |
20100058314 | Computer System and Related Method of Logging BIOS Update Operation - In order to record a BIOS update operation, a non-volatile memory space is configured in a computer system. When the BIOS of the computer are updated, an update log is generated and stored into the non-volatile memory space when updating the BIOS. | 2010-03-04 |
20100058315 | METHOD AND SYSTEM FOR PROCESS UPGRADE - A method and a system for process upgrade are disclosed. A source process implements data interaction, via a socket interface, with a far end entity connected with the socket interface. When the source process intends to upgrade itself, the source process copies its process data to a target process and determines if the data from the far end entity received via socket interface is complete. If it is determined that the data is complete, the source process ceases data interaction with the socket interface and copies the received data to the target process. After the data is copied, the source process sends an upgrade and switch indication to the target process and enables the target process to send an upgrade and switch request to the socket interface. The socket interface then switches a socket interface service to the target process. Accordingly, the technical solutions according to the present invention realize a reliable and smooth process upgrade without disconnecting the socket connection. | 2010-03-04 |
20100058316 | Updating Firmware with Multiple Processors - The present invention provides apparatuses, methods, and computer readable media for updating memory containing representations of computer-executable instructions in a processing system. A primary processor receives original sets of computer-readable instructions and updated sets of computer-readable instructions for the processors in processor system from a host system. The sets of computer-readable instructions are stored in memory (e.g., flash memory), where each processor in the system may utilize different sets. The primary processor then initiates updating its firmware with the corresponding updated set. If the update is unsuccessful, the primary processor reverts to the original set and the update process is terminated. Otherwise, the firmware update proceeds to the secondary processor. If the firmware update succeeds, the next secondary processor is updated. Otherwise, all of the updated processors revert to the corresponding original set of computer-readable instructions and the updating process is terminated. | 2010-03-04 |
20100058317 | Method for provisioning trusted software to an electronic device - The operations required to verify the origin and the authenticity of a software module for an electronic device can advantageously be divided between a general-purpose computer, hereinafter the host, having the electronic device attached to it, and the electronic device itself. More specifically, memory and processing intensive tasks such as syntax checking are done at the host, while security-critical tasks such as cryptographic verifications are done at the electronic device. The present invention thus provides a method for updating software on an electronic device in a trusted way, wherein verification steps are divided between a host system connected to the electronic device, and the electronic device itself. The present invention thus further provides a storage medium containing a program for a host system, causing this host system to perform verification steps with respect to a software update for an attached electronic device, and to appropriately interact with said electronic device. | 2010-03-04 |
20100058348 | MEMORY MANAGEMENT FOR PREDICTION BY PARTIAL MATCHING CONTEXT MODELS - Techniques for resource management of a PPM context model are described herein. According to one embodiment, in response to a sequence of symbols to be coded, contexts are allocated, each having multiple entries and each entry representing a symbol that the current context is able to encode, including a counter value representing a frequency of each entry being used. For each symbol coded by a context, a local counter value and a global counter value are maintained. The global counter value represents a total number of symbols that have been coded by the context model and the local counter value represents a number symbols that have been coded by the respective context. Thereafter, a resource management operation is performed for system resources associated with the plurality of contexts based on a global counter value and a local counter value associated with each of the plurality of contexts. | 2010-03-04 |
20100058349 | System and Method for Efficient Machine Selection for Job Provisioning - A method for efficient machine selection for job provisioning includes receiving a job request to perform a job using an unspecified server machine and determining one or more job criteria needed to perform the job from the job request. The method further includes providing a list of one or more server machines potentially operable to perform the job. For each server machine on the list of one or more server machines, a utilization value, one or more job criteria satisfaction values, and an overall suitability value are determined. The overall suitability value for each server machine is determined from the one or more job criteria satisfaction values and the utilization value, and may include a numeric degree to which each server machine is suitable for performing the job. Furthermore, the overall suitability value for each server machine may be included on a list of one or more overall suitability values. | 2010-03-04 |
20100058350 | FRAMEWORK FOR DISTRIBUTION OF COMPUTER WORKLOADS BASED ON REAL-TIME ENERGY COSTS - Energy costs for conducting compute tasks at diverse data center sites are determined and are then used to route such tasks in a most efficient manner. A given compute task is first evaluated to predict potential energy consumption. The most favorable real-time energy costs for the task are determined at the various data center sites. The likely time period of the more favorable cost as well as the stability at the data center are additional factors. A workload dispatcher then forwards the selected compute task to the data center having the most favorable real-time energy costs. Among the criteria used to select the most favorable data center is a determination that the proposed center presently has the resources for the task. A stabilizer is utilized to balance the workload among the data centers. A computer implementation for performing the various steps of the cost determination and allocation is also described. | 2010-03-04 |
20100058351 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - A system resource leak is reliably detected and released. The invention is an information processing apparatus which allocates/releases a system resource in response to a request from a process. The apparatus includes a unit configured to, when a request to allocate the system resource is sent, store an identifier which is assigned to a job including the process as a request source, and system resource information in a management table, a unit configured to, when a request to release the system resource is sent, delete the corresponding system resource information from the management table, a unit configured to, each time the job ends, refer to the management table to determine whether the management table stores an identifier assigned to the job, and a unit configured to, when it is determined that the management table stores the identifier, release the system resource specified by the corresponding system resource information. | 2010-03-04 |
20100058352 | System and Method for Dynamic Resource Provisioning for Job Placement - A method for dynamic resource provisioning for job placement includes receiving a request to perform a job on an unspecified computer device. One or more job criteria for performing the job are determined. Each job criteria defines a required operational characteristic needed for a computer device to perform the job. A list of available computer devices is provided. The list includes a plurality of computer devices currently provisioned to perform computer operations. A list of suitable computer devices for performing the job is determined from the list of available computer devices by comparing operational characteristics for each available computer device with the job criteria. The list of suitable computer devices includes one or more computer devices having operational characteristics that satisfy the job criteria. From the list of suitable computer devices, a least active computer device is determined, and the job is forwarded to the least active computer device. | 2010-03-04 |
20100058353 | EXPOSURE OF REMOTELY INVOKABLE METHOD THROUGH A WEBPAGE TO AN APPLICATION OUTSIDE WEB BROWSER - Web browsing environments are commonly used to facilitate user interaction with data over the Internet. A web browser is a tool used to view and interact with a webpage. A webpage may interface with a web service to provide remote functionality that the webpage does not locally provide. An effective method for specifying and consuming remote functionality that an application invokes outside of the web browser is disclosed herein. A webpage exposes remote functionality (e.g., web service) that a web browser and/or browser extensions may discover through browsing the webpage. A browser extension associated with an application determines whether the application is compatible with the remote functionality. Once a compatible application is determined, it may be executed so as to connect to and invoke the remote functionality outside of the web browser. The application may provide a more robust experience with the remote functionality compared to the web browsing environment. | 2010-03-04 |
20100058354 | ACCELERATION OF MULTIMEDIA PRODUCTION - A device includes a processor and a computer-readable medium including computer-readable instructions. Upon execution by the processor, the computer-readable instructions cause the device to receive a first request from a second device, where the first request includes edited multimedia content to be rendered by a third device. The computer-readable instructions also cause the device to provide a second request to the third device, where the second request includes the edited multimedia content. The computer-readable instructions also cause the device to receive rendered multimedia content from the third device, where the rendered multimedia content corresponds to the edited multimedia content. The computer-readable instructions further cause the device to provide the rendered multimedia content to the second device. | 2010-03-04 |
20100058355 | FIREWALL DATA TRANSPORT BROKER - A message broker system is described that allows exchanging data reliably through a firewall without introducing firewall exceptions. The message broker system uses a broker running on each side of the firewall and a database. The sending broker creates a localized transaction between the local sender and the database. The sending broker then submits the message into the database. The sending broker also creates a state for the message that indicates the progress of the message through the process of delivering it to the recipient. On the other side of the firewall, the receiving broker pulls the data from the database, changing the state of the message to a pending and/or retrieved state. The receiving feed then creates a localized transaction with the local destination. After that transaction completes, the receiving broker marks the state of the message completed in the database. | 2010-03-04 |
20100058356 | Data Processing In A Hybrid Computing Environment - Data processing in a hybrid computing environment that includes a host computer having a host computer architecture; an accelerator having an accelerator architecture, the accelerator architecture optimized, with respect to the host computer architecture, for speed of execution of a particular class of computing functions; the host computer and the accelerator adapted to one another for data communications by a system level message passing module; and a host application process executing on the host computer. Data processing such a hybrid computing environment includes starting, at the behest of the host application process, a thread of execution on the accelerator; returning, by the system level message passing module to the host application process, a process identifier (‘PID’) for the thread of execution; and managing, by the host application process, the thread of execution on the accelerator as though the thread of execution were a thread of execution on the host computer. | 2010-03-04 |
20100058357 | SCOPING AN ALIAS TO A SUBSET OF QUEUE PARTITIONS - A method of performing message operations includes receiving a message operation request identifying a queue, retrieving a list of the subset of partitions associated with the alias received in the request, and selecting at least one of the partitions within the retrieved subset. According to the method, the queue includes a plurality of partitions, the request identifies the queue with an alias, and the alias having a subset of the plurality of partitions associated therewith. | 2010-03-04 |
20100058368 | OPTICAL DISC DRIVE - A protrusion is formed by bending a part of a skirt at the periphery of a TRV mechanism, or a protrusion is formed at the periphery of a traverse cover, and the protrusion faces a disc tray forming a slight gap in between. When impact is imposed, the protrusion is brought into contact with the disc tray and thereby the TRV mechanism is prevented from largely deforming without adding another part in order to enhance the resistance. | 2010-03-04 |
20100058369 | OPTICAL DISK APPARATUS - The present invention provides an optical disk apparatus which allows for accurate centering of an optical disk regardless of its placed attitude and in which reliability of chucking operation has been improved, and the apparatus includes a first disk guide | 2010-03-04 |
20100058370 | OPTICAL PICKUP GUIDE DEVICE, METHOD FOR MANUFACTURING THE SAME, AND DISC DEVICE - A disc device includes. a sub-shaft; a sub-shaft support for supporting the sub-shaft; a holder body for holding an optical pickup; and a pair of engagement slide portions disposed in the holder body in a manner that the sub-shaft slide surfaces are opposed to each other. The cross section of the sub-shaft is provided in a shape other than a perfect circle with a maximum external diameter larger than the slide-surface distance and the sub-shaft is rotatably supported by the sub-shaft support. | 2010-03-04 |
20100058371 | PATH MECHANISM AND AN INFORMATION PROCESSING DEVICE HAVING THE PATH MECHANISM - A path mechanism and an information processing device having the path mechanism can guide disc media to a predetermined position without the data recording area of the disc being affected. The path mechanism has a stacker tray | 2010-03-04 |
20100058372 | DISK CHUCKING DEVICE - A disk chucking device is disclosed. In accordance with an embodiment of the present invention, the disk chucking device coupling a disk to a rotor of a motor can include: a housing, which accommodates a boss that is coupled to the rotor; a plurality of chuck pins, which is inserted into the housing such that the chuck pins are protruded to the outside of the housing; an elastic body, which elastically supports an adjacent pair of the chuck pins toward the outside of the housing; a supporting surface, which is formed on an outer circumference of the boss to support a center portion of the elastic body; a guide part, which faces the supporting surface to guide a movement of the elastic body; and a protruding part, which is protruded on a lower end of the guide part toward the boss to support a lower side of the center portion of the elastic body. | 2010-03-04 |
20100058373 | DISK ROTATING DEVICE, DISK, DISK ASSEMBLY, DISK CARTRIDGE, AND RECORDING AND REPRODUCING DEVICE - A disk rotating device includes a flexible disk in which information is recordable, a turntable on which the disk is held, a spindle that rotates the disk held on the turntable, and a stabilizer that stabilizes the rotating disk. In the disk rotating device, a rotation transmitting device transmits the rotation of the spindle to the disk via the turntable, and a disk holding device holds the disk so that the disk is elastically deformable from a center of the rotation of the disk in a radial direction of the disk. | 2010-03-04 |
20100058374 | PLACEMENT OF DATA STORAGE CARTRIDGES IN SINGLE CARTRIDGE SLOTS AND IN MULTI-CARTRIDGE DEEP SLOT CELLS OF AN AUTOMATED DATA STORAGE LIBRARY - In an automated data storage library having a plurality of multi-cartridge deep slot cells, each configured to store a plurality of data storage cartridges arranged in sequential order of tiers from front to rear; having a plurality of single cartridge storage slots; and having accessor(s) configured to selectively extract, place and transport cartridges with respect to the cells; operating the accessor(s) to selectively extract, place and transport data storage cartridges with respect to the multi-cartridge deep slot cells and the storage slots, and with respect to other elements of the automated data storage library; and, if a data storage cartridge is recently used by and is to be demounted from a selected other element of the automated data storage library: first, extracting another data storage cartridge from the storage slots, vacating one of the storage slots; and second, extracting, transporting and placing the demounted data storage cartridge in the vacated storage slot. | 2010-03-04 |
20100058375 | METHOD AND SYSTEM FOR PROVIDING USAGE INFORMATION FOR A SET-TOP BOX - A method and system for providing usage information for a set-top box is disclosed. An embodiment is disclosed that receives a request for usage information for a set-top box and the usage information has media content received by the set-top box, queries a database with a query based upon the request and the request has criteria for usage information, and sends a query result for the query. | 2010-03-04 |
20100058376 | Multimedia Content Viewing Confirmation - Disclosed herein is a computer implemented method and system for confirming that a viewer viewed multimedia content on a client device. A multimedia content owner uploads multimedia content on a server. The client device receives the multimedia content from the server and plays the multimedia content on a display screen of the client device. A random challenge is presented to the viewer by overlaying the random challenge on the multimedia content. A response for the presented random challenge is invoked from the viewer. A correct or partially correct response from the viewer confirms that the multimedia content has been viewed by the viewer. A response report is generated based on the response from the viewer. The viewer is credited with an item of value and the multimedia content owner is debited a fee, if the response report confirms the multimedia content was viewed by the viewer. | 2010-03-04 |
20100058377 | METHODS AND APPARATUS FOR AN ENHANCED MEDIA CONTEXT RATING SYSTEM - Methods, apparatus, systems and computer program products are provided for an improved media content rating system. The rating system herein disclosed is highly-granular in nature, in that, the rating system allows for ratings to be based on the number of times that portions, segments, clips of the media file are played or otherwise executed, as opposed to basing the media content rating solely on the number of times that the media file is played. In this regard, the aspects herein described may further provide for ratings of the portions, segments, clips of the media content as opposed to limiting the rating to a rating for the overall media content file. | 2010-03-04 |
20100058378 | COMPUTER-COST SUBSIDIZING METHOD - A computer-cost subsidizing method wherein an interface medium ( | 2010-03-04 |
20100058379 | METHOD AND SYSTEM FOR SELECTING A MOVIE FOR VIEWING - A movie selection method and system is provided for selecting a movie for viewing. The method includes displaying a plurality of movie titles over a network, each one of the plurality of movie titles corresponding to a candidate movie. The method further includes receiving at least one vote corresponding to one of the plurality of movie titles, and determining a winning movie based on the at least one vote. The winning movie is to be presented in a movie theater. The method further includes initiating a payment transaction for each user who voted for the winning movie. As a result, the method and system disclosed herein enables users to choose which movies are shown in the movie theater and enables the movie theater to increase profits. | 2010-03-04 |
20100058380 | METHODS, COMPUTER PROGRAM PRODUCTS, AND APPARATUS FOR RECEIVING TARGETED CONTENT BASED ON LOCALLY STORED USER DATA - Targeted content is delivered to and received by at least one user device based on user information stored locally at the user device. Program content and targeted content are received. The targeted content received is associated with user information stored locally on the user device, while the program content is broadcast to multiple users. A determination by a scanning process is made at what position or at what time in the program content to include the targeted content. The program content and the targeted content are rendered, with the targeted content included at the determined position or time in the program content, for presentation to the user. | 2010-03-04 |
20100058381 | Methods and Apparatus for Dynamic Construction of Personalized Content - Systems and techniques for delivering custom created content to users. As programming content is delivered to a user, the content selected for delivery is continuously monitored. When a point is reached in the delivered content appropriate for delivery of custom created content such as an advertisement, stored user information is examined and analyzed to identify content to which the user is likely to be receptive. Customized content is constructed based on the identification, by collecting and organizing media objects, and the constructed content is placed in the content being delivered. | 2010-03-04 |
20100058382 | METHODS, COMPUTER PROGRAM PRODUCTS, AND APPARATUS FOR PROVIDING TARGETED CONTENT BASED ON USER DATA - Targeted content associated with user information stored in a database within a network in communication with a user device is received along with program content. A determination by a scanning process is made at what position or at what time in the program content to include the targeted content. The program content and the targeted content are rendered, with the targeted content included at the determined position or time in the program content, for presentation to at least one user. This rendering may occur within a network or within a user device. | 2010-03-04 |
20100058383 | METHOD AND APPARATUS FOR DISTRIBUTING CONSUMER ADVERTISEMENTS - A system that incorporates teachings of the present disclosure may include, for example, a set-top box (STB) having a controller to present a plurality of advertisement categories, detect a selection of one of the plurality of advertisement categories, present an advertisement template associated with the selected advertisement category, detect a plurality of entries in the advertisement template for constructing a consumer classified advertisement, generate an advertisement graphical user interface (GUI) corresponding to the entries, detect one or more demographic patterns in the plurality of entries, identify a plurality of users of a media communication system from which the STB operates according to the detected one or more demographic patterns, and provide the plurality of users of the media communication system accessibility to the advertisement GUI. Other embodiments are disclosed. | 2010-03-04 |
20100058384 | SYSTEM AND METHODS FOR TELEVISION INTEGRATED SURROUND SOUND SYSTEMS - Systems and methods for audio-video entertainment systems comprising a television and surround sound system integrating the television in the audio broadcast and/or the control of the surround sound system. More particularly, in one embodiment, an audio-video entertainment system includes a television and surround sound system incorporating the television speaker as the center channel speaker of the surround sound system. In another embodiment, the audio-video entertainment system includes a television driven surround sound system with the option of incorporating the television speaker as the center channel speaker of the surround sound system. | 2010-03-04 |
20100058385 | System and Method for Detecting Closed Captioning and Creating a Closed Captioning Electronic Programming Guide - A set-top box device includes a detector module and an electronic programming guide module. The detector module is configured to detect a closed captioning flag in a video stream, and to cache electronic programming guide information for the video stream if the video stream includes the closed captioning flag. The detector module is further configured to create a closed captioning electronic programming guide including the electronic programming guide information. The electronic programming guide module is in communication with the detector module, and is configured to output the closed captioning electronic programming guide. | 2010-03-04 |
20100058386 | METHOD AND APPARATUS FOR TUNING A DIGITAL TELEVISION CHANNEL - There is provided a method and apparatus for tuning a digital television channel. More specifically, in one embodiment, there is provided a method comprising receiving a request to access a first digital television channel, downloading a first program map table associated with a frequency of the first digital television channel, storing the first program map table, receiving a request to access a second digital television channel, determining if the second digital television channel is associated with the frequency of the first digital television channel, and creating a conditional access program map table for the second digital television channel based on the stored program map table if the second digital television channel is associated with the frequency. | 2010-03-04 |
20100058387 | METHOD FOR UPDATING STRUCTURED DATA BROADCAST IN LOOP TO MOBILE TERMINALS - A method for the acquisition of structured data to be memorized by a terminal, the structured data being periodically broadcasted in the form of sets of structured data flows, the method comprising: receiving a starting data flow available at an address known by the terminal and comprising information for accessing at least one selected set of structured data flows, associated to an update piece of information, determining according to the update piece of information if the selected set has been updated, and if the selected set has been updated: receiving structured data flows of the selected set, and updating the data memorized by the terminal with the updated data received. | 2010-03-04 |
20100058398 | Method for Providing Access to Media Content Through A Server - A system for providing devices such as WCDs, televisions, stereos, video game systems, etc. access to media content through an entity such as a web server. In accordance with at least one embodiment, UPnP or DLNA compliant devices may utilize a user's home network to access a user's media library from on an online media service. The media service may provide a user interface to the device to enable the user to access his media library. The media may be stored on a networked storage device connected to the media service, on the user's network devices, on the user's WCD, etc. The media service may automatically query the user's WCD to determine the presence of other persons in his proximity, and determine their preferences. A customized media stream that is suitable for the whole group may be generated based at least in part on the combined preferences of the group. | 2010-03-04 |
20100058399 | METHOD AND ANTENNA SYSTEM FOR SATELLITE LOCK-ON BY CHANNEL SELECTION - A method for satellite lock-on in an antenna system by channel selection is initiated by receiving a channel selection signal. The channel selection signal is flagged to retrieve satellite parameters corresponding to the selected channel from a pre-stored satellite channel table which provides a correlation among the channels, the bands and the satellite coordinates. Then, according to the retrieved satellite parameters, an antenna control signal and thus a drive signal are generated orderly to drive the antenna to direct at the satellite responsible to the selected channel. | 2010-03-04 |
20100058400 | Managing Access to High Definition Content - A system and method for managing access to high definition (HD) content includes a master customer premises equipment (CPE) device enabled for prioritizing conflicting requests for HD content based on predefined priority settings associated with a plurality of client CPE devices. Access to HD content by the client CPE devices may be associated with a token and conflicting requests may be resolved in favor of the client CPE device that holds the token. Disclosed systems permit administrators to control the use of limited resources within a location by limiting access to the limited resources by secondary users. | 2010-03-04 |
20100058401 | THROTTLING VIDEO ON DEMAND (VOD) BASED ON USAGE - A device receives, from one or more of a set-top box (STB) or a user device, usage information associated with video content and high definition video content, and calculates a cost factor, based on the usage information, for a customer associated with one or more of the STB or the user device. The device also compares the cost factor to a threshold, and receives, from one or more of the STB or the user device, a request for free video content. The device further one of provides reduced quality free video content to one or more of the STB or the user device when the cost factor exceeds the threshold, or blocks transmission of free high definition video content to one or more of the STB or the user device when the cost factor exceeds the threshold. | 2010-03-04 |
20100058402 | SYSTEM AND METHOD FOR TAILORED VIDEO-ON-DEMAND CATALOGS - A video-on-demand server, having a plurality of audiovisual assets stored in association therewith, and an application server module, are interconnected with a first group of consumer premises equipment associated with a first group of subscribers and a second group of consumer premises equipment associated with a second group of subscribers, different than the first group of subscribers, via a video content network. The application server module, the first group of consumer premises equipment, and the second group of consumer premises equipment are cooperatively configured to prepare a first video-on-demand catalog comprising a first group of the audiovisual assets and a second video-on-demand catalog comprising a second group of the audiovisual assets, different than the first group of the audiovisual assets. The application server module, the first group of consumer premises equipment, and the second group of consumer premises equipment are further cooperatively configured to make the first video-on-demand catalog available to the first group of subscribers and to make the second video-on-demand catalog available to the second group of subscribers. | 2010-03-04 |
20100058403 | Distributing On-Demand Multimedia Content - A disclosed method of distributing multimedia content to end users in a multimedia content distribution network includes segmenting time in a series of intervals referred to herein as limited-chain relay (LCR) intervals. The LCR intervals may have a duration of time T although an LCR interval may be terminated before the duration expires. During any interval, the LCR distribution method includes responding to a first request for a program of multimedia content (PMC) from a first requestor by delivering the PMC from a video server to the customer premises equipment (CPE) of the requestor and storing the PMC on the CPE of the first requestor. The method further includes responding to subsequent requests for the PMC that occur before the time T and before the interval terminates otherwise from subsequent requestors by delivering at least some portion of the PMC to the subsequent requestors from the CPE of at least one previous requestor. | 2010-03-04 |
20100058404 | Fulfilling Extended Video on Demand Customer Content Requests - Systems and methods are disclosed for a user to initiate a request for program content to a cable services provider wherein the program content is not stored locally at the cable service provider. The cable services provider headend queries a librarian as to a location from which the content may be downloaded. Additionally, the librarian may inform the cable service provider if a license is required in order to download the content. The cable service provider obtains a license, if necessary, and initiates a request for the download from the appropriate content provider. Once obtained, the cable services provider informs the viewer the content is available and streams the content to the viewer. | 2010-03-04 |
20100058405 | Systems and Methods for Distributing Video on Demand - A method of receiving content includes joining an in-progress multicast stream to receive a first portion of a content. The method further includes sending a request to a peer for a catch-up portion of the content, the request including a deadline for delivery of the content, and receiving the catch-up portion of the content from the peer prior to the deadline. | 2010-03-04 |
20100058406 | SYSTEM AND METHOD FOR CONTENT COMMUNICATION - A system such as a multicast VOD system communicates content, e.g., delivers content or receives content, responsive to a user request for content and according to a schedule adapted to a user-specified acceptable latency for content delivery. The schedule may be modified to minimize initiation of delivery of content in response to the user's request. The schedule may also be modified to delay delivery of subsequent portions of the content as late as possible to allow subsequent requests to share a content stream while not exceeding the acceptable latency parameter specified by the user. | 2010-03-04 |
20100058407 | SYSTEM AND METHOD FOR SET-TOP BOX BASE STATION INTEGRATION - A system for conducting a voice call includes a set-top box operable to control the selection of a television channel for display on a television. The set-top box is also operable to initiate a voice call in response to a selection of a user-interface displayed on the television. The system also includes a wireless set in communication with the set-top box, the wireless set operable to establish a portion of the voice path for the voice call. Signaling for the voice call is initiated by the set-top box. | 2010-03-04 |
20100058408 | SYSTEM AND METHOD FOR PROVIDING OUTBOUND TELEPHONE CALLS VIA A SET-TOP BOX - A system and method for providing outbound telephone calling through an integrated set-top box includes a telephone connection, a media signal connection, and a modem. A user may input a telephone number to the set-top box to initiate an outbound telephone call. The set-top box modem dials the telephone number via the telephone connection to the publicly switched network. Once the call is connected, the user may take the call using a telephone connected to the home telephone network or through a speaker and microphone integrated with or connected to the set-top box. A status of the outbound telephone call may be displayed on a screen connected to the set-top box. A user may also initiate a telephone call to a number displayed on the screen as part of media signal. The on-screen telephone number may be provided along with the media signal or may be extracted from the media signal using character recognition software. | 2010-03-04 |
20100058409 | Audio and video testing methodology - A centralized audio video testing system utilizes a remote client device. The remote client device includes a decoder, a renderer, a media engine, a video capture module and a frame module. The decoder receives a transmitted video stream from a video streaming server and to generate a decoded video stream. The renderer receives the decoded video stream and generates a rendered video stream that is able to be displayed on a display of the remote client device. The media engine receives the rendered video stream and plays the rendered video stream on a media player resident on the remote client device. The video capture module captures frames of the played rendered video stream. The frame manager receives the captured frames of the played rendered video streams and creates a degraded streaming video file. | 2010-03-04 |
20100058410 | System and method for self management of a live web event - A system, method, and computer program for self management of a live web event is provided. In exemplary embodiments, an individual associated with a channel may schedule a web event. Upon scheduling, a user, such as one or more presenters, may be provided a management interface through which content may be prepared for the live web event during a self preparation process. In exemplary embodiments, the user may upload content (e.g., images such as slides) and generate content (e.g., polling questions and answers) autonomously. | 2010-03-04 |
20100058411 | SYSTEM AND METHOD SUPPORTING DYNAMIC DELIVERY OF PROGRAM TIME TABLES AND BROADCAST PROGRAMS - A broadcast service provider must transmit broadcast programs by dynamically reflecting real-time reconfiguration of broadcast timetables and broadcast programs of a plurality of broadcast program providers and the broadcast service provider. | 2010-03-04 |
20100058412 | METHOD FOR MIGRATING A VIDEO SESSION BETWEEN A FIXED MULTIMEDIA DEVICE AND A MOBILE MULTIMEDIA DEVICE - The invention relates to a method for migrating a video session between a migrating device ( | 2010-03-04 |
20100058413 | APPARATUS AND METHOD FOR PROVIDING AUDIO AND/OR VIDEO DATA FOR IPTV - A method for providing audio and/or video data for Internet Protocol Television includes receiving source material. Encoded source data is generated by encoding the source material in a target format. The encoded source data is transmitted to a memory that is configured to output the encoded source data. | 2010-03-04 |
20100058414 | METHODS, COMPUTER PROGRAM PRODUCTS, AND APPARATUS FOR PROVIDING BROADBAND TELEVISION SERVICE - Methods, computer program products and apparatus for providing broadband television service (BTS) are provided. The method includes receiving a channel selection at a receiver located at a service location. The channel selection is correlated to an Internet address. Data is requested from the Internet address. The request is made to a digital subscriber line (DSL) network via a modem. Video data packets containing live streaming video content are received from the Internet address in response to the requesting. The video data packets are received from the DSL network via the modem. The video data packets are assembled into video signals for display on a television and the video signals are transmitted to the television. | 2010-03-04 |
20100058415 | METHOD AND SYSTEM FOR COMMUNICATION WITH A SET-TOP BOX - A method and system for communication with a set-top box is disclosed. An embodiment is disclosed that receives security information and the security information has identification information for a user assigned to a set-top box, services a request to create a notification preference for the set-top box in response to successful entry of security information, establishes the notification preference for the set-top box and the notification preference has a rule for providing information in a notification on media content available to be received by the set-top box, sends the notification to the recipient in accordance with a notification preference, receives a communication for the set-top box from a user device and the communication comprises a partial command for a set-top box, interprets the partial command in view of the notification, and sends a command to the set-top box based on the partial command and the notification. | 2010-03-04 |
20100058416 | METHOD AND SYSTEM FOR PROVIDING A WEB-BASED CONTENT FEED FOR A SET-TOP BOX - A method and system for providing a web-based content feed for a set-top box is disclosed. An embodiment is disclosed that receives a web-based content feed at a set-top box, receives a television broadcast at the set-top box and the television broadcast has audio and visual content for one or more television programs, identifies a television program from the one or more television programs related to a portion of the web-based content feed, determines if the portion of the web-based content feed is selected for display at a time that coincides with a broadcast time for the television program, and associates a television content identifier with the portion of the web-based content feed and the television content identifier allows for retrieval of the television program in the television broadcast, and retrieves the television content identifier in response to a request to link to the television program within the web-based content feed. Another embodiment is disclosed that receives a web-based content feed with a link to a television program, transmits the web-based content feed for display, receives an indication that the link has been selected, and sends a request to receive the audio and visual content for the television program at the set-top box. | 2010-03-04 |
20100058417 | METHOD AND SYSTEM FOR PROVIDING A SOCIAL NOTIFICATION FOR A SET-TOP BOX - A method and system for providing a social notification for a set-top box is disclosed. An embodiment is disclosed that determines media content received by a set-top box and the media content selected for display by a first member of a social network, determines a social notification preference associated with a second member of the social network and the social notification preference has a social notification rule to monitor the media content received by the set-top box and sends a social notification to a recipient based on the social notification preference. Another embodiment is disclosed that determines media content received by a set-top box and the media content selected for display by a first member of a social network, determines a social notification preference associated with a second member of a social network and the social notification rule comprises at least one descriptor of media content, queries a database for usage information for the first member of the social network in accordance with the social notification rule, and sends a social notification to a recipient based on the social notification preference. | 2010-03-04 |
20100058448 | METHODS AND A DEVICE FOR ASSOCIATING A FIRST DEVICE WITH A SECOND DEVICE - Methods for associating a first and a second device. Each device broadcasts an identity, the first device stores new identities and counts them. Upon user instruction and if there just one new identity, the first device sends a request for association to the second device that acknowledges this. The second device then sends, upon user instruction, a confirmation to the first device that verifies that the confirmation was sent by the second device and acknowledges this. The method is particularly suitable for use on devices that are unable to display identities of other devices. | 2010-03-04 |
20100058449 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - An authentication system includes a plurality of personal authentication servers, a client terminal, a replacing portion and a renewing portion. The plurality of personal authentication servers store at least a part of enrolled data different from each other for user personal authentication and perform authentication with stored enrolled data according to authentication request from a client terminal. The client terminal stores identification information for specifying the personal authentication server storing each enrolled data, and requests an authentication to the personal authentication server specified with the identification information. The replacing portion replaces at least a part of the enrolled data between the plurality of personal authentication servers according to the authentication request condition to the plurality of personal authentication servers from the client terminal. The renewing portion renews the identification information according to the replacing result of the replacing portion. | 2010-03-04 |
20100058450 | PASS CODE PROVISION - A device includes a processor and a computer-readable medium including computer-readable instructions. Upon execution by the processor, the computer-readable instructions cause the device to receive a first request from a second device, where the first request is for a pass code. The first request includes an identification of a coded system for which the pass code is requested. The computer-readable instructions also cause the device to provide a second request to a third device, where the second request includes the identification of the coded system. The computer-readable instructions also cause the device to receive a plurality of pass code segments from the third device. The computer-readable instructions further cause the device to provide the plurality of pass code segments to the second device for assembly into the pass code. | 2010-03-04 |
20100058451 | LOAD BALANCING FOR SERVICES - The present invention extends to methods, systems, and computer program products for load balancing for services. Embodiments of the invention facilitate load balancing between instances of a service based on affinitization of messages, based on content of the message. For example, messages in the same session can be dispatched to the same service instance. A sequence or series of related messages associated with long running and/or stateful services are more likely to be dispatched to the same instance of the service. Thus, if the service instance has persisted client state, there is an increased likely of utilizing the persisted client state and not having another service instance recreate the client state. | 2010-03-04 |
20100058452 | METHODS AND A DEVICE FOR ASSOCIATING A FIRST DEVICE WITH A SECOND DEVICE - A method and device for device association. A user enters login and password on a first device that searches for reachable devices. The first device asks the reachable devices if they know the login, preferably by sending a salted hash of the login. The devices that know the login respond positively and the first device lists the responding devices. The first device then successively performs Secure Remote Authentication (SRP) with each device on the list until an authentication succeeds or there are no further devices on the list. The SRP authentication makes sure that the first device knows the login and that the other device knows a password verifier without transmitting any knowledge that allows recuperation of this info by an eavesdropper. The authenticated devices then establish a secure channel over which a community secret key is transferred, and the first device also calculates and stores the password verifier. | 2010-03-04 |
20100058453 | IDENTIFICATION PROCESS OF APPLICATION OF DATA STORAGE AND IDENTIFICATION HARDWARE WITH IC CARD - The present invention relates to an identification process of application of data storage and identification hardware with IC (Integrated Circuit) card, and particularly to an IC card and within identification ICCID and GLN, which can be installed in a USB compatible flash memory, as identification hardware device. This can be as a useful authorization process of records companies or intellectual property owners. The hardware can also be used as storage media. Use non-duplication code in IC card and encryption system to ensure user authentication and data confidentiality on Internet or any other information system of computer. As using normal private key the invention is easy and convenient to use. | 2010-03-04 |
20100058454 | COLLECTING ANONYMOUS AND TRACEABLE TELEMETRY - Aspects of the subject matter described herein relate to collecting anonymous and traceable telemetry. In aspects, a telemetry source may obtain a certificate or other data from an escrow certificate issuer. The certificate includes information usable by a certificate collector to verify that the certificate is valid, but does not include information usable to identify the telemetry source to the telemetry collector. | 2010-03-04 |
20100058455 | METHODS AND SYSTEMS FOR AUTOMATIC REMOVAL AND REPLACEMENT OF CONNECTIONS IN A POOL RENDERED STALE BY A FIREWALL - This disclosure describes, generally, methods and systems for managing connections within a connection pool. The method includes initializing a plurality of connections. The plurality of connections are configured to pierce a firewall. The method further includes placing the plurality of connections in a connection pool, and storing creation times for each of the plurality of connections. The method then determines the firewall's connection teardown time period and, based at least in part on the firewall's connection teardown time period, setting the connection pool's connection teardown time period to be at least less than the firewall's connection teardown time period. | 2010-03-04 |
20100058456 | IDS Sensor Placement Using Attack Graphs - Embodiments of the present invention identify locations to deploy IDS sensor(s) within a network infrastructure and prioritize IDS alerts using attack graph analysis. An attack graph that describes exploitable vulnerability(ies) within a network infrastructure is aggregated into protection domains. Edge(s) that have exploit(s) between two protection domains are identified. Sets that contain edge(s) serviced by a common network traffic device are defined. Set(s) that collectively contain all of the edge(s) are selected. The common network traffic device(s) that service the selected sets are identified as the location(s) to deploy IDS sensor(s) within the network infrastructure. | 2010-03-04 |
20100058457 | Methodology, Measurements and Analysis of Performance and Scalability of Stateful Border Gateways - Methods and apparatus for testing of Internet-Protocol packet network perimeter protection devices, e.g., Border Gateways such as Session Border Controllers, including 5 dynamic pinhole capable firewalls are discussed. Analysis and testing of these network perimeter protection devices is performed to evaluate the ability of such device to perform at carrier class levels. The efficiency of state look table functions as well as call signaling processing capacity, implemented in a particular perimeter protection device, are determined and evaluated. Proper performance and efficiency of such perimeter protection devices are evaluated as a function of incoming call rate and as a function of total pre-existing active calls. Various different network perimeter protection devices, e.g., of different types and/or from different manufactures, can be benchmarked for suitability to carrier class environments and comparatively evaluated. Test equipment devices, e.g., enhanced Integrated Intelligent End Points (IIEPs), for fault testing, 15 evaluating and stressing the network perimeter protection devices in a system environment are described. Typically these specialized test devices are used in pairs, one on each side of the firewall under test. These test equipment devices include a heavy duty traffic generator module, monitoring and analysis capability including a utilization analysis module, and a graphical output capability. | 2010-03-04 |
20100058458 | SYSTEM AND METHOD FOR PROVIDING A SECURE CONNECTION BETWEEN NETWORKED COMPUTERS - Embodiments disclosed herein provide a system, method, and computer program product for establishing a secure network connection between two computers, a client and a server. The client may send a connection request over a public network to the server. In response, the server may generate a set of credentials, select a controller to automatically run on the client, and send the controller and the set of credentials to the client. The controller automatically executes on the client and utilizes the set of credentials from the server to establish a secure network connection with the server without user intervention. The set of credentials is valid until the secure network connection between the client and the server is severed. | 2010-03-04 |
20100058459 | NETWORK INTERFACE CARD WITH PACKET FILTERING FUNCTION AND FILTERING METHOD THEREOF - A network interface card with a packet filtering function and a filtering method thereof are applicable to realize packet filtering through both software and hardware manners. The network interface card includes a connection port, a first filtering module, a second filtering module, and a storage unit. The connection port is used to receive a packet data from Internet. The first filtering module is connected to the connection port, and is used to detect the packet data according to a content address memory (CAM) table. The detecting process is executed by a firmware of the network interface card. The second filtering module is connected to the first filtering module, and executes a packet content detecting procedure for detecting a content of the packet data, thereby detecting the packet data by using software/firmware respectively, and thus a working efficiency of the network interface card is enhanced. | 2010-03-04 |
20100058460 | SYSTEM AND METHOD FOR AUTHENTICATING AN END USER - A method for authenticating an end user. The method comprising receiving a first userID and a first password from an end user. Next, attempting to authenticate the end user using the first userID and the first password provided. Finally, sending an error message to the end user in response to failing to authenticate the end user using the first userID and the first password wherein the error message comprises a first option and a second option. The first option comprising a first key combination that if entered would allow the end user to enter a second password and authenticate using the first userID and the second password. The second option comprising a second key combination that if entered would allow the end user to enter a second userID and a third password and authenticate using the second UserID and the third password. | 2010-03-04 |
20100058461 | EMBEDDED SYSTEM WITH AUTHENTICATION, AND ASSOCIATED AUTHENTICATION METHOD - An embedded system with authentication includes: a system read only memory (ROM), a processing circuit and an authentication circuit. The system ROM is arranged to store a boot code. In addition, the processing circuit is arranged to process at least according to the boot code in order to perform operations of the embedded system. Additionally, the authentication circuit is arranged to perform authentication on a command script in order to determine whether the command script is authenticated, and is arranged to prevent the command script from being executed by the processing circuit when the authentication circuit determines that the command script is not authenticated, wherein the command script is received from outside a chip where the system ROM, the processing circuit and the authentication circuit are positioned. | 2010-03-04 |
20100058462 | MULTIPLE USER ACCOUNTS FOR MANAGING STORED INFORMATION IN AN IMPLANTABLE MEDICAL DEVICE SYSTEM - Techniques for managing stored information in an implantable medical device system using multiple user accounts are described. An implantable medical device system may provide a general user account and a set of authenticable user accounts. In some examples, the general user account does not require a user of a programmer in an implantable medical device system to enter user identity information to manage information stored in the implantable medical device system. The general user account may be permitted to perform a subset of actions available to an authenticable user account. In some examples, an authenticable user account may rollback changes made to the stored information by the general user account. An authenticable user account may also be able to synchronize changes made to the stored information across all or some of the user accounts. | 2010-03-04 |
20100058463 | METHOD OF EXCHANGING DATA BETWEEN TWO ELECTRONIC ENTITIES - A method of exchanging data between a first electronic entity and a second electronic entity includes the following steps:
| 2010-03-04 |
20100058464 | Implementing a Process-Based Protection System in a User-Based Protection Environment in a Computing Device - A computing device having a security model based on user permissions is provided with an ability to emulate a security model based on process capabilities by providing each executable program on the device with a separate user identity. | 2010-03-04 |
20100058465 | SECURE VIRTUAL TAPE MANAGEMENT SYSTEM WITH EARLY READ SUPPORT OPTIONS - A secure virtual tape management system with early read support options. The system includes at least two mainframe hosts having a catalog storing tape related information. A primary virtual tape emulation system includes an adaptor and includes software for facilitating remote configuration and utilization of the virtual tape management. A virtual tape system catalog storing tape related information is attached to the virtual tape management. Remote data storage devices may be in communication with the virtual tape management central processing unit. Software resident on the catalog monitors tape related information on the primary virtual tape emulation system for criteria matching a virtual tape to be made available to a secondary host and initiates immediate transfer of that data allowing it to be read in a paced manner by the secondary host before the primary host has completed its series of tape writes. | 2010-03-04 |
20100058466 | SYSTEMS AND METHODS FOR PROVIDING SECURITY FOR SOFTWARE APPLICATIONS - The described embodiments relate generally to methods and systems for providing computer security. In one embodiment, a security system is provided for use with a core application configured to interact with at least one add-in module, and the add-in module being configured to provide at least one privilege. The security system includes a privilege registry configured to identify the at least one privilege and its corresponding add-in module and a privilege assignments table identifying a privilege assignment type for the at least one privilege and corresponding to at least one assignee. | 2010-03-04 |
20100058467 | EFFICIENCY OF ACTIVE CONTENT FILTERING USING CACHED RULESET METADATA - A start offset and an end offset can be identified within unfiltered content that is to be filtered. This unfiltered content can include HTML content. A corresponding start offset and an end offset of the unfiltered content can be matched against a set of content objects contained in a content cache. Each of the content objects can be associated with rule metadata. At least one filter rule can be extracted from metadata of a matching cache object. A programmatic action can be performed based upon the extracted filter rule. Computer readable output can result from the programmatic action. The output can include content that has been filtered in accordance with the extracted filter rule. | 2010-03-04 |