13th week of 2013 patent applcation highlights part 69 |
Patent application number | Title | Published |
20130081049 | Acquiring and transmitting tasks and subtasks to interface devices - Computationally implemented methods and systems include acquiring one or more subtasks that correspond to portions of a task of acquiring data requested by a task requestor, wherein the task of acquiring data is configured to be carried out by two or more discrete interface devices, transmitting at least one of the one or more subtasks to at least two of the two or more discrete interface devices, wherein the one or more subtasks are configured to be carried out in an absence of information regarding the task requestor and/or the task of acquiring data, and receiving result data corresponding to a result of an executed one or more subtasks. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2013-03-28 |
20130081050 | Acquiring and transmitting tasks and subtasks to interface devices - Computationally implemented methods and systems include acquiring one or more subtasks that correspond to portions of a task of acquiring data requested by a task requestor, wherein the task of acquiring data is configured to be carried out by two or more discrete interface devices, transmitting at least one of the one or more subtasks to at least two of the two or more discrete interface devices, wherein the one or more subtasks are configured to be carried out in an absence of information regarding the task requestor and/or the task of acquiring data, and receiving result data corresponding to a result of an executed one or more subtasks. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2013-03-28 |
20130081051 | Acquiring tasks and subtasks to be carried out by interface devices - Computationally implemented methods and systems include receiving a request to carry out a task of acquiring data requested by a task requestor, acquiring one or more subtasks related to the task of acquiring data, determining a set of two or more discrete interface devices that are configured to carry out the one or more subtasks at a particular time and in an absence of information regarding the at least one task and/or the task requestor, and facilitating a transmission of one or more subtasks to two or more of the set of two or more discrete interface devices. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2013-03-28 |
20130081052 | Acquiring tasks and subtasks to be carried out by interface devices - Computationally implemented methods and systems include receiving a request to carry out a task of acquiring data requested by a task requestor, acquiring one or more subtasks related to the task of acquiring data, determining a set of two or more discrete interface devices that are configured to carry out the one or more subtasks at a particular time and in an absence of information regarding the at least one task and/or the task requestor, and facilitating a transmission of one or more subtasks to two or more of the set of two or more discrete interface devices. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2013-03-28 |
20130081053 | Acquiring and transmitting tasks and subtasks to interface devices - A computationally implemented method includes receiving request data including a request to carry out a task of acquiring data, acquiring one or more subtasks related to the task of acquiring data, selecting two or more discrete interface devices based on at least one of a status of the two or more discrete interface devices and a characteristic of the two or more discrete interface devices, transmitting at least one of the one or more subtasks to at least two of the two or more discrete interface devices, and receiving result data corresponding to a result of at least one subtask of the one or more subtasks executed by at least one of the two or more discrete interface devices. In addition to the foregoing, other method aspects are described in the claims, drawings, and text. | 2013-03-28 |
20130081054 | Method for Enabling Sequential, Non-Blocking Processing of Statements in Concurrent Tasks in a Control Device - A method for enabling sequential, non-blocking processing of statements in concurrent tasks in a control device having an operating system capable of multi-tasking, in particular a programmable logic controller, is disclosed. At least one operating system call, which causes the operating system to interrupt the particular task according to an instruction output by the statement in favor of another task, is associated with at least one statement. | 2013-03-28 |
20130081055 | TASK PROCESSOR - A task processor includes a CPU, a save circuit, and a task control circuit. A task control circuit is provided with a task selection circuit and state storage units associated with respective tasks. When executing a predetermined system call instruction, the CPU notifies the task control circuit accordingly. When informed of the execution of a system call instruction, the task control circuit selects a task to be subsequently executed in accordance with an output from the selection circuit. When an interrupt circuit receives a high-speed interrupt request signal, the task switching circuit controls the state transition of a task by executing an interrupt handling instruction designated by the interrupt circuit. | 2013-03-28 |
20130081056 | SYSTEM AND METHOD FOR ALIGNING MESSAGES TO AN EVENT BASED ON SEMANTIC SIMILARITY - Disclosed are systems, methods, and non-transitory computer-readable storage media for analyzing an event via social media. A system configured to practice the method segments a document associated with an event based on a plurality of inferred topics to yield a plurality of segments. Next, the system assigns each message in a corpus of messages associated with the event to one of the inferred topics to yield assigned topics. The messages can include at least one of a status update, a tweet, a blog post, a tag, a chat message, a comment, and a check-in. Moreover, the messages can originate from different social networks. Based on the assigned topics, the system then associates each message in the corpus of messages with at least one of the document, a segment from the plurality of segments, and a segment of the event. | 2013-03-28 |
20130081057 | PROCESSING OPERATOR MESSAGE COMMANDS - A facility is provided to enable operator message commands from multiple, distinct sources to be provided to a coupling facility of a computing environment for processing. These commands are used, for instance, to perform actions on the coupling facility, and may be received from consoles coupled to the coupling facility, as well as logical partitions or other systems coupled thereto. Responsive to performing the commands, responses are returned to the initiators of the commands. | 2013-03-28 |
20130081058 | EXECUTING A START OPERATOR MESSAGE COMMAND - A facility is provided to enable operator message commands from multiple, distinct sources to be provided to a coupling facility of a computing environment for processing. These commands are used, for instance, to perform actions on the coupling facility, and may be received from consoles coupled to the coupling facility, as well as logical partitions or other systems coupled thereto. Responsive to performing the commands, responses are returned to the initiators of the commands. | 2013-03-28 |
20130081059 | DATA COMMUNICATIONS IN A PARALLEL ACTIVE MESSAGING INTERFACE OF A PARALLEL COMPUTER - Data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer, the parallel computer including a plurality of compute nodes that execute a parallel application, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a data communications instruction, the instruction characterized by an instruction type, the instruction specifying a transmission of transfer data from the origin endpoint to a target endpoint and transmitting, in accordance with the instruction type, the transfer data from the origin endpoint to the target endpoint. | 2013-03-28 |
20130081060 | System and Method for Efficient Concurrent Queue Implementation - A method, system, and medium are disclosed for facilitating communication between multiple concurrent threads of execution using an efficient concurrent queue. The efficient concurrent queue provides an insert function usable by producer threads to insert messages concurrently. The queue also includes a consume function usable by consumer threads to read the messages from the queue concurrently. The consume function is configured to guarantee a per-producer ordering, such that, for any producer, messages inserted by the producer are read only once and in the order in which the producer inserted those messages. | 2013-03-28 |
20130081061 | Multi-Lane Concurrent Bag for Facilitating Inter-Thread Communication - A method, system, and medium are disclosed for facilitating communication between multiple concurrent threads of execution using a multi-lane concurrent bag. The bag comprises a plurality of independently-accessible concurrent intermediaries (lanes) that are each configured to store data elements. The bag provides an insert function executable to insert a given data element into the bag by selecting one of the intermediaries and inserting the data element into the selected intermediary. The bag also provides a consume function executable to consume a data element from the bag by choosing one of the intermediaries and consuming (removing and returning) a data element stored in the chosen intermediary. The bag guarantees that execution of the consume function consumes a data element if the bag is non-empty and permits multiple threads to execute the insert or consume functions concurrently. | 2013-03-28 |
20130081062 | Scalable, Parallel Processing of Messages While Enforcing Custom Sequencing Criteria - Scalable, parallel (i.e., concurrent) processing of messages is provided from a message queue, while at the same time enforcing sequencing within a stream. Dependencies among messages can therefore be respected. The criteria for determining which messages form a stream are not required to be known to the message dispatcher, which receives a stream name and determines whether another message in that named stream is already being processed. If so, the dispatcher determines whether the invoker should wait temporarily, or should be given a different message that was previously blocked and has now become available for processing, or should be instructed to retrieve a different message from the message queue. | 2013-03-28 |
20130081063 | Scalable, Parallel Processing of Messages While Enforcing Custom Sequencing Criteria - Scalable, parallel (i.e., concurrent) processing of messages is provided from a message queue, while at the same time enforcing sequencing within a stream. Dependencies among messages can therefore be respected. The criteria for determining which messages form a stream are not required to be known to the message dispatcher, which receives a stream name and determines whether another message in that named stream is already being processed. If so, the dispatcher determines whether the invoker should wait temporarily, or should be given a different message that was previously blocked and has now become available for processing, or should be instructed to retrieve a different message from the message queue. | 2013-03-28 |
20130081064 | Application Event Handling Methods and Systems - An exemplary method includes an application event handling system 1) detecting an occurrence of an event initiated by a user and associated with an application configured to be executed by a computing device, 2) determining, in response to the detecting, that another event previously initiated by the user and associated with the application is either already being processed by the computing device or already scheduled for processing by the computing device, 3) directing, in response to the determining, the computing device to ignore the previously initiated event, 4) scheduling, in response to the determining, the event to be processed by the computing device after a delay timer expires, and 5) starting, in response to the scheduling, the delay timer. Corresponding methods and systems are also disclosed. | 2013-03-28 |
20130081065 | Dynamic Multidimensional Schemas for Event Monitoring - Mapping event data to a domain schema includes receiving ( | 2013-03-28 |
20130081066 | APPLICATION PROGRAMMING INTERFACES FOR DATA PARALLEL COMPUTING ON MULTIPLE PROCESSORS - A method and an apparatus for a parallel computing program calling APIs (application programming interfaces) in a host processor to perform a data processing task in parallel among compute units are described. The compute units are coupled to the host processor including central processing units (CPUs) and graphic processing units (GPUs). A program object corresponding to a source code for the data processing task is generated in a memory coupled to the host processor according to the API calls. Executable codes for the compute units are generated from the program object according to the API calls to be loaded for concurrent execution among the compute units to perform the data processing task. | 2013-03-28 |
20130081067 | PROXY OBJECT CREATION AND USE - Embodiments are discussed for methods, systems, and computer readable media for creating a proxy object, comprising calling a second functionality in a proxy class, creating a proxy object by the second functionality, calling a third functionality by the second functionality, calling a fourth functionality by the third functionality, creating a reference object by the fourth functionality, returning the reference object to the third functionality, associating the reference object to the proxy object by the third functionality, and returning the associated proxy object by the second functionality to a first functionality. | 2013-03-28 |
20130081068 | INFORMATION PROCESSING APPARATUS AND MEDIUM PROCESSING APPARATUS - A medium processing apparatus that performs predetermined processing on a medium introduced from an outside; a power supply that can supply a first power supply voltage to the medium processing apparatus while the information processing apparatus is operating, whereas being able to supply a second power supply voltage to the medium processing apparatus when the information processing apparatus is shut down; and a power supply controller that supplies the second power supply voltage from the power supply to the medium processing apparatus when the information processing apparatus is shut down while the medium is in the medium processing apparatus, whereas stopping the supply of the second power supply voltage to the medium processing apparatus once the medium is removed from the medium processing apparatus which has been supplied with the second power supply voltage, are provided. | 2013-03-28 |
20130081069 | DRIVING CIRCUIT FOR STEPPING MOTOR - A stepping-motor-driving circuit for an optical pickup: includes a control-signal-generating circuit to generate a plurality of control signals for supplying driving currents to driving coils having a plurality of phases during energized periods, with a de-energized period therebetween; a plurality of output circuits to supply the currents to the respective coils, in response to the signals; an induced-voltage-detecting circuit to compare a voltage generated each in the coils with a threshold voltage during the de-energized period; a threshold-voltage-setting circuit; and a determining circuit to determine whether a collision state is present where the pickup reaches an end of a movement range, based on an induced-voltage-detecting-circuit-detection result, the threshold voltage set at a voltage between a voltage generated each in the coils during the de-energized period when the stepping motor stops or rotates in the state, and a voltage generated therein in the de-energized period when no collision state is present. | 2013-03-28 |
20130081070 | DIGITAL MEDIA DISTRIBUTION SYSTEM AND METHOD - A system and method employs an online site for making stored digital video recordings available for selection and download to a wireless communications device. Upon receipt of a selection for a digital video recording, the system and method causes the selected digital video recording to be wirelessly transmitted to the wireless communications device. The selected digital video recording is also made available to a personal computer associated with the user who made the selection. At least a title of the selected digital video recording is stored in a personal storage account of the user. | 2013-03-28 |
20130081071 | ESTIMATING USER-PERCEIVED QUALITY OF AN ENCODED VIDEO STREAM - One or more embodiments herein dynamically and objectively estimate user-perceived quality of an encoded video stream in dependence on the underlying video content of that stream. Estimation processing according to these embodiments includes generating a chronological sequence of the absolute or relative sizes of encoded video frames in the stream. Processing further entails analyzing this sequence to identify a plurality of reference characteristics that are defined in a reference model. These reference characteristics are more specifically defined in the reference model as parameters that characterize or are otherwise associated with content-dependent variations in user-perceived quality. For example, the reference characteristics in some embodiments comprise reference patterns or reference statistical measures that have been determined based on analyzing frame size sequences generated for reference video streams with known qualities. Regardless, processing finally includes estimating the user-perceived quality of the stream based on the identified reference characteristics, according to the reference model. | 2013-03-28 |
20130081072 | PREEMPTIVE VIDEO DELIVERY TO DEVICES IN A WIRELESS NETWORK - Content may be preemptively delivered to mobile devices in a wireless network using multicast delivery techniques. In one implementation, a method may include analyzing network traffic of a number of users; determining, based on the analysis, whether a content item is a popular content item, as determined by requests for the content item from the users; and transmitting, a signal, in response to the determination, to schedule preemptive multicast delivery of the content item to mobile devices. The multicast delivery may be performed over one or more radio interfaces in which multiple mobile devices receive the content item over a shared radio channel. | 2013-03-28 |
20130081073 | METHOD AND APPARATUS FOR PROVIDING AND OBTAINING REWARD SERVICE LINKED WITH MEDIA CONTENTS - Provided are a method and apparatus for providing and obtaining a reward service linked with media contents. The method includes transmitting reward service information linked with the media contents to a user device, receiving check-in information authenticating that certain media contents are being played, determining whether a provision condition of the reward service is satisfied, and granting a use right with respect to the reward service to the user device when the provision condition of the reward service is satisfied. Herein, user utility with respect to media contents are improved and user information of the media contents are collected. | 2013-03-28 |
20130081074 | System and Method of Monitoring Blackout Events - Systems and methods of monitoring blackout events are provided. A particular method includes receiving a server blackout event specifying a scheduled blackout of a first media service. The method also includes receiving a client blackout event from at least one set top box affected by the scheduled blackout. The method further includes generating a compliance report indicating whether the set top box complied with the scheduled blackout. | 2013-03-28 |
20130081075 | CORRELATION OF MEDIA METADATA GATHERED FROM DIVERSE SOURCES - A DVR, server, or other agent correlates media metadata from diverse sources, like an EPG data provider and multiple video-on-demand (VOD) service providers. Metadata sets from different sources are compared in order to attempt to identify identical programs to which the metadata sets pertain. From at least one metadata set, information about the program that the other metadata set lacks is selected. A “canonical” data structure instance for the program is created. The information that is lacking from at least one of the metadata sources is inserted into that instance. For each source from which a program is available, the DVR stores the identity of that source on the DVR's persistent storage device in association with the canonical data structure instance for that program. The DVR receives search criteria from a user and then searches the stored canonical data structure instance for programs that satisfy the criteria. | 2013-03-28 |
20130081076 | System and Method to Enable Access to Broadband Services - A method includes receiving a request at a provisioning system to enable a set-top box device to function at a temporary location. The method includes authenticating the request at the provisioning system. The method includes identifying, at the provisioning system, a broadband service associated with the set-top box device that is available at the temporary location when the request is authenticated. The method also includes sending a configuration message from the provisioning system to the set-top box device to enable the set-top box device to configure the set-top box to receive the broadband service. | 2013-03-28 |
20130081077 | END-TO-END PROOF OF DISPLAY - Aspects of the invention are directed to a method and system for end-to-end proof of display. A method for according to an embodiment includes: generating a unique identifier (UID) for a triplet including an item of digital content, an identity of a playlist that includes the item of digital content, and an identity of a player on which the item of digital content is to be rendered; generating a visual identifier based on the UID and a timecode; rendering the item of digital content on a display screen; overlaying the visual identifier on the rendered item of digital content on the display screen; capturing the visual identifier on the display screen; and extracting the UID and timecode from the captured visual identifier. A match test is performed using the extracted UID to populate a match list, which is reported to a content manager to provide end-to-end proof of display. | 2013-03-28 |
20130081078 | Method for Tag Insertion and Notification for DVR Addressable Advertisement - A method and computing device that provides viewer impression data for a recorded digital video stream. The method receives a digital video stream as a series of segments, and stores it as a recorded digital video stream having a transition between two consecutive segments at a transition position. The method stores a notification tag that is associated with the transition, and that includes a tag position in the recorded digital video stream, a notification mode, and tag data. During playback of the recorded digital video stream, the method generates a play mode status event, and generates a transition notification when the playback encounters the notification tag and, based on the notification mode, the transition associated with the notification tag. The method collects viewer impression data for one of the two consecutive segments from the play mode status event and the transition notification. | 2013-03-28 |
20130081079 | AUTOMATED ENVIRONMENTAL FEEDBACK CONTROL OF DISPLAY SYSTEM USING CONFIGURABLE REMOTE MODULE - A television apparatus is described which performs automated dynamic content playback in response to environmental feedback from a plurality of real time connective and configurable remote external modules. Remote modules may be hosted on a smart device, such as cell phone, smart phone, netbook, notebook, and so forth into which a sensor application is loaded which is configured to communicate with the television. The television detects and can selectively enable external modules, the sensor information from which is analyzed in response to a user profile from which control decisions are made in selecting content to be played back. The image and video media being output by the television, and preferably also its output modes, are changed in response to the information from the external modules. | 2013-03-28 |
20130081080 | TELEVISION RECEIVER - A television receiver that allows an application to flexibly present a message regardless of a state of the television receiver, the television receiver including: an application engine that executes a first application program and a second application program; an application registration API that receives activation program information and an activation time from the executed first application program, and registers the activation program information and the activation time; and an application timer that activates the application engine at the registered activation time, wherein the application engine executes the second application program indicated by the registered activation program information, and presents a message specified by the execution of the second application program. | 2013-03-28 |
20130081081 | Least Click TV - A system for minimizing interactions with at least an input mechanism, comprising at least a management server communicatively coupled to at least a user endpoint device, the user endpoint device comprising at least a display, an input mechanism, and a transponder mechanism configured to communicate data related to interactions with the input mechanism and displayed content, at least one storage device configured to store data based on content displayed on the display, interactions with the input mechanism, and content available for viewing, and at least one processor configured to use software to process the data such that a configuration of content data is prepared for display and the configuration is derived from at least the interactions with the input mechanism and the configuration is designed to minimize additional user interactions with the input mechanism to select the prepared content data. | 2013-03-28 |
20130081082 | PRODUCING VIDEO BITS FOR SPACE TIME VIDEO SUMMARY - A computer-assisted method for producing a space time summary for one or more original videos includes automatically recognizing a key element in an original video, extracting pixels related to the key element from a series of video frames of the original video, producing a video bit comprising a series of video frames comprising the pixels and audio information extracted from the original video, wherein at least one video frame of the video bit is formed by a subset of pixels of the corresponding video frame in the original video, automatically displaying a plurality of video bits in a user interface, wherein the plurality of video bits are extracted from one or more original videos, and provide a space time summary for the one or more original videos, and allowing two of the plurality of video bits to be played simultaneously with audio and motion in the user interface. | 2013-03-28 |
20130081083 | METHOD OF MANAGING CONTENTS AND IMAGE DISPLAY DEVICE USING THE SAME - Provided are a method of managing the contents and an image display device using the same. The method includes: obtaining contents information on each of a plurality of contents sources; displaying the obtained contents information on one screen as a plurality of lists that are differently configured according a plurality of classified items; and receiving meta information on at least one content in the contents lists and displaying the received meta information in correspondence to the content. | 2013-03-28 |
20130081084 | Recommended Media Content Based Channel Surfing Methods and Systems - An exemplary method includes a media content presentation system dynamically maintaining a list of recommended media content programs for a user and available by way of a media content access device during a media content presentation session, detecting a channel surfing command provided by the user during the media content presentation session, and directing, in response to the channel surfing command, the media content access device to switch to a channel presenting a recommended media content program included in the list of recommended media content programs. Corresponding methods and systems are also disclosed. | 2013-03-28 |
20130081085 | PERSONALIZED TV LISTING USER INTERFACE - Systems, methods, and media for personalized television listing user interfaces for set top boxes, computers, tablets, mobile phones and other devices. Exemplary methods may include generating a program guide that includes a channel listing, wherein a plurality of channels in the channel listing include broadcast content. Channels in the channel listing are ranked according to preference data for an end user relative to the broadcast content. | 2013-03-28 |
20130081086 | VIRTUAL CHANNEL TABLE FOR A BROADCAST PROTOCOL AND METHOD OF BROADCASTING AND RECEIVING BROADCAST SIGNALS USING THE SAME - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. | 2013-03-28 |
20130081087 | METHOD AND APPARATUS FOR TRANSMITTING DIGITAL BROADCAST CONTENT FOR PROVIDING TWO-DIMENSIONAL AND THREE-DIMENSIONAL CONTENT, AND METHOD AND APPARATUS FOR RECEIVING DIGITAL BROADCAST CONTENT - A method of transmitting digital broadcasting content for providing 2D content or 3D content. The method includes: encoding content including at least one of the 2D content and the 3D content and generating an elementary stream including encoded data of the content; generating service additional information including electronic program guide (EPG) information of the digital broadcasting content and inserting, into the service additional information, at least one of 2D/3D content identification information representing a method of reproducing the 2D content or the 3D content, 2D/3D content link information representing a relationship between the 2D content and the 3D content, and EPG 3D reproduction information for reproducing an EPG screen, on which EPG information is displayed, in 3D; and generating a transport stream by multiplexing the elementary stream and the service additional information. | 2013-03-28 |
20130081088 | APPARATUS AND METHOD OF PLAYING BROADCAST CONTENT IN BROADCASTING SYSTEM - A method and an apparatus for playing broadcast content in a broadcasting system are provided. The method and the apparatus enable a viewer to watch an entire event by broadcasting the event through different networks in a condition that the event may not be broadcast from start to finish over a single broadcasting network. | 2013-03-28 |
20130081089 | CONTENTS SHARING METHOD AND DISPLAY APPARATUS USING THE SAME - Disclosed herein are a contents sharing method and a image display device using the same, wherein the method comprises displaying an object for sharing a content that is being reproduced with an external image display device, when the object is selected searching for external image display devices capable of sharing contents, indicating a sharing device list including at least one of the searched external image display devices, selecting at least one external image display device from the displayed sharing device list, and displaying shared state information on at least one of the image display device and the selected external image display device. | 2013-03-28 |
20130081090 | System for Mobile Phones to Provide Synchronous Broadcasting of TV Video Signals and Remote Control of TV - A system for mobile phones to provide synchronous broadcasting of television video signals and remote control of television adds a TV signal transmission module to a television and a remote control circuit, a mobile phone signal transmission module, a mode switch button and a mode switch circuit to a mobile phone. Therefore the mobile phone can function as a TV remote controller and also can synchronously broadcast TV video signals. Thus the system provides more flexibility and versatility than the conventional techniques. | 2013-03-28 |
20130081091 | Seat End Program Cache Updates for Inflight Entertainment System - An inflight entertainment system and method for use therein reduce the loading time required to preload programs identified in playlists onto seat end equipment. Loading time is reduced by retaining programs included in playlists on seat end equipment across flights and making incremental updates to such programs to account for changes in playlists, rather than updating them wholesale for each flight. Loading time is further reduced by adding programs to seat end equipment for the current flight, where possible, by copying such programs from other seat end equipment, rather than copying them from head end equipment. | 2013-03-28 |
20130081092 | INTELLIGENT DEVICE SYSTEM AND METHOD FOR DISTRIBUTION OF DIGITAL SIGNALS ON A WIDEBAND SIGNAL DISTRIBUTION SYSTEM - A plurality of intelligent device systems for use with a wideband signal distribution network, and methods for transmitting digital information and receiving digital and non-digital information onto and off of an RF carrier through a wideband signal distribution network, are disclosed. The intelligent device systems provide networks of intelligent devices that modulate and demodulate digital video, IP video/data/voice and digital wireless onto, and off of, a wideband signal distribution system, such as an analog carrier system, using existing EIA/TTA 568 standard wiring infrastructure. The methods modulate and demodulate digital video, IP video/data/voice and digital wireless onto, and off of, a wideband distribution system, such as an analog carrier system, and separate IP portions from non-IP portions. | 2013-03-28 |
20130081093 | HOSPITALITY MEDIA SYSTEM THAT AVOIDS NETWORK CONGESTION AND SERVER LOAD WHILE PROVIDING MEDIA EXPERIENCE WITHIN GUEST ROOM, AND COMPUTER SERVER AND METHOD THEREOF - A method of servicing requests for information at a server includes receiving a request for information from a client device, and determining a number of attempts of the request made by the client device. Both the client device and the server may count the number of attempts for each request. When the number of attempts is greater than a threshold, the method includes servicing the request and sending the information to the client device. When the number of attempts is not greater than the threshold, the method includes sending a service unavailable message to the client device. A retry-after delay may be calculated by the server according to a predicted time for the server to exit an overloaded state and included in the service unavailable message. The predicted time may take into account both requests currently being serviced and requests that have been scheduled to be serviced in the future. | 2013-03-28 |
20130081094 | METHOD FOR MAPPING BETWEEN SIGNALING INFORMATION AND ANNOUNCEMENT INFORMATION AND BROADCAST RECEIVER - A method for mapping signaling information to announcement information and a broadcast receiver are disclosed herein. A method of providing a Non-Real-Time (NRT) service, the method comprises extracting identification information of first signaling information and second signaling information based upon a program specific information/program and system information protocol (PSI/PSIP) table, receiving the first signaling information and second signaling information based upon the extracted identification information, constructing and displaying a service guide using the received first signaling information, acquiring first content identification information as a content selected from the displayed service guide, accessing a File Delivery over Unidirectional Transport (FLUTE) session using the received second signaling information, acquiring second content identification information matched with the acquired first content identification information from the accessed FLUTE session and receiving and storing one or more file constructing corresponding content based upon the acquired second content identification information. | 2013-03-28 |
20130081095 | SIGNAL TRANSMITTING METHOD, SIGNAL TRANSMITTING DEVICE AND SIGNAL RECEIVING DEVICE - A process of a 3D compatible terminal to which content is distributed is made convenient. | 2013-03-28 |
20130081096 | CABLE TELEVISION ENTRY ADAPTER - A cable television (CATV) entry adapter is disclosed which provides a means and method for transmitting upstream CATV requests to a CATV network without using an active upstream CATV signal path. The disclosed CATV entry adapter includes a transceiver that converts local-area network (LAN) signals to radio-frequency (RF) signals of an in-home entertainment (IHE) signal bandwidth, and vice versa. The LAN-to RF transceiver couples a LAN signal transmission path and an IHE signal transmission path within the entry adapter. The LAN-to RF transceiver converts IHE signals with encoded upstream CATV requests to LAN signals that include the upstream CATV requests. The LAN signals with upstream CATV requests can then be delivered to a cable modem for conversion into passive upstream CATV signals that include the encoded upstream CATV requests. The entry adapter can then deliver the passive upstream CATV signals with encoded upstream CATV requests to the CATV network. | 2013-03-28 |
20130081097 | BROADCASTING RECEIVING APPARATUS AND METHOD FOR PROVIDING BROADCASTING SIGNAL RELATION INFORMATION - A broadcasting receiving apparatus and a method for providing broadcasting signal relation information are provided. The broadcasting receiving apparatus, which accesses a server through a network, includes a broadcasting signal receiver which receives a broadcasting signal; a channel identifier which identifies a change of a channel of the broadcasting signal, generates a fingerprint corresponding to the broadcasting signal of the changed channel, and receives identification information of the changed channel from a matching server based on the generated fingerprint; and a relevant information provider which receives conditional information that indicates a condition for receiving relevant information of the broadcasting signal if the channel is changed, receives the relevant information based on the conditional information and displays the received relevant information. | 2013-03-28 |
20130081098 | Audio/video storage/retrieval system and method - An audio/video storage/retrieval system and method that permits efficient and cost-effective simultaneous recording of multi-channel A/V information from a variety of sources is disclosed. The system/method may be broadly described as generally incorporating baseband conversion of source RF modulated A/V information followed by analog-to-digital conversion and storage on a storage device utilizing a dual port interface that incorporates an additional computer access port to permit transparent storage access by a computer system. Retrieval of stored A/V programming from the storage device via the dual port interface permits the stored A/V data to be converted to analog and RF modulated for presentation to an A/V presentation device. Additional A/V source and/or target selectors may be incorporated into the system/method to permit recording a plethora of A/V sources such as raw A/V signaling, OTA broadcasts, clear/encrypted cable QAM broadcasts, cable set top boxes (STBs), and the like. | 2013-03-28 |
20130081099 | METHOD AND APPARATUS FOR PROVIDING ABSTRACTED USER MODELS - An approach is provided for providing abstracted user models in accordance with one or more access policies. A model platform determines an ontology for specifying a hierarchy of one or more abstraction levels for items data used in latent factorization models. The model platform further causes, at least in part, a generation of one or more user models for the one or more abstraction levels. The model platform also causes, at least in part, a selection of at least one of the one or more user models for generating one or more recommendations for one or more applications, one or more services, or a combination thereof based, at least in part, on one or more privacy policies, one or more security policies, or a combination thereof. | 2013-03-28 |
20130081100 | SYSTEM AND METHOD OF REAL-TIME CHANGE PROPAGATION AND ACTIVATION USING A DISTRIBUTED OBJECT CACHE - Embodiments of the invention provide systems and methods for using a distributed object cache to propagate and activate changes to security information across nodes of a cluster. Embodiments of the present invention can be implemented, for example, in a security product that enforces security policies, i.e., access control, etc., on resources such as web content provided by a set of servers of nodes of a computing grid and provide ways to handle data synchronization between the servers or nodes of the grid. This synchronization can be performed using a distributed object cache that provides replicated and distributed object caching services. For example, Oracle Coherence is one such distributed object cache that is built on top of a reliable, highly scalable peer-to-peer clustering protocol. However, embodiment of the present invention are not limited to use with Coherence but rather are equally applicable to other distributed object caches. | 2013-03-28 |
20130081101 | POLICY COMPLIANCE-BASED SECURE DATA ACCESS - Access control techniques relate to verifying compliance with security policies before enabling access to the computing resources. An application is provided on a client that generates verification codes using an authentication seed. Prior to granting the client the authentication seed necessary to generate a verification code, a server may perform a policy check on the client. Some embodiments ensure that the client complies with security policies imposed by an authenticating party by retrieving a number of parameter values from the client and then determining whether those parameter values comply with the security policies. Upon determining that the client complies, the authentication seed is issued to the client. In some embodiments, the authentication seed is provided such that a policy check is performed upon the generation of a verification code. The client is given access to secure information when the client is determined to comply with the security policies. | 2013-03-28 |
20130081102 | CREATING AND MAINTAINING A SECURITY POLICY - An approach for managing a security policy is provided. First, second, and third specification sets are received after being independently generated by different practitioners. The first specification set maps service-to-service communications. The second specification set maps the services to devices on which the services are placed. The third specification set maps the devices to one or more network addresses. The received specification sets are algorithmically combined to create packet filtering rule statements. The security policy is generated as packet filtering rules based on the combined specification sets and the packet filtering rule statements. An application deployment modification includes independently editing specification set(s) that are affected by the modification, without knowledge of specification set(s) that are unaffected by the modification. An updated security policy may be generated by an incremental update to an existing security policy without requiring replacement of the entire security policy. | 2013-03-28 |
20130081103 | Enhanced Security SCADA Systems and Methods - A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security monitoring and enforcement of policies throughout the SCADA system. And isolation core ensures that a system security monitor monitors and takes appropriate action with respect to untrusted applications that may impact an SSE. The system security server provides policy enforcement on all of the SSEs that exist on the system. New security policies are created that are populated to individual SSEs in the system. Biomorphing algorithms allow for system uniqueness to be derived over time further enhancing security of SSEs | 2013-03-28 |
20130081104 | MOBILE DEVICE MANAGEMENT APPARATUS AND METHOD BASED ON SECURITY POLICIES AND MANAGEMENT SERVER FOR MOBILE DEVICE MANAGEMENT - A mobile device management apparatus has a policy storage unit that receives a plurality of security policies, which are classified into a plurality of profiles assigned priorities of activation and in which operating states of functions of a mobile device are defined. A management server supplies the profiles and the security policies to the mobile device. A policy implementation unit selectively activates the profiles so that control of the mobile device functions can be carried out with minimal communication, and also in response to changing events. | 2013-03-28 |
20130081105 | PROVISIONING USER PERMISSIONS USING ATTRIBUTE-BASED ACCESS-CONTROL POLICIES - An attribute-based access control policy (e.g., XACML policy) for a set of elements depends on attributes carried by elements in one of several predefined categories. In order to evaluate such policy for a set of elements, the invention provides a method including the steps of (I) selecting a primary category; (II) partitioning the elements in the primary category into equivalence classes with respect to their influence on the policy; and (III) using the equivalence classes to replace at least one policy evaluation by a deduction. The result of the evaluation may be represented as an access matrix in backward-compatible format. The efficiency of the policy evaluation may be further improved by applying partial policy evaluation at intermediate stages, by forming combined equivalence classes containing n-tuples of elements and/or by analyzing the influence of each element by extracting functional expressions of maximal length from the policy. | 2013-03-28 |
20130081106 | BUS MONITORING SECURITY DEVICE AND BUS MONITORING SECURITY SYSTEM - A bus monitoring security device is connected to a bus, which includes a tool side bus having a tool connection terminal and an ECU side bus. The ECU side bus is coupled with an ECU, and the tool side bus is coupled with a tool capable of communicating with the ECU via the tool connection terminal. The tool side bus and the ECU side bus are separately coupled with the bus monitoring security device. The bus monitoring security device includes: a controller for determining whether the tool being to access the ECU is connected to the ECU side bus, and for restricting transmission and reception of data between the tool and the ECU when the controller determines that the tool is connected to the ECU side bus. | 2013-03-28 |
20130081107 | APPARATUS, METHOD, AND PROGRAM FOR VALIDATING USER - User validation accuracy is improved without inconveniencing a user. When an authentication request packet is received from a terminal and the authentication is successful based on a user ID and a password, an HTTP header, user-agent information, and access source IP address are extracted from the packet, and user authentication is performed by verifying the IP address and the user-agent information against usage history information where at most two sets of the IP address and the user-agent information extracted from the authentication request packet which is received from the same user previously are registered. When the set of the IP address and the UA information corresponding to the new extracted IP address and the new extracted UA information is registered in the usage history information, the authentication is successful, and the usage history information is overwritten with the new IP address and the new UA information. | 2013-03-28 |
20130081108 | Providing Operation Services for Networks via Operations Service Servers - Systems and methods of provide operations services for networks through an operations service switch. Multiple customers of the operations service may obtain operations service through the operations switch, as opposed to implementing operations services themselves. Operations service servers are in communication with the operations switch so as to be available for providing operations services to the customer accessing the operations switch. The operations switch may then establish communication links between the customer networks and the operations service servers to facilitate a centralized manner of providing operations services to the customer networks. | 2013-03-28 |
20130081109 | Multi-Tenant Agile Database Connector - A module provides an interface between a multi-tenant database and a non-tenant-specific application instance such that the application instance sends data access commands to the module as if it is communicating with a single-tenant database. The module translates the non-tenant-specific data access command from the non-tenant-aware application into a multi-tenant data access command, as needed, without needing to alter the non-tenant specific application instance in any way. In this manner, a single-tenant application could be used by multiple tenants in a multi-tenant environment. | 2013-03-28 |
20130081110 | GLOBAL ACCESS CONTROL FOR SEGMENTED STREAMING DELIVERY - Various arrangements for controlling access to streaming media assets are presented. Transmission of segments of a media asset to a first user device may be commenced. During transmission of the media asset to the first user device, beaconing data from the first user device may be received and stored as session information. The first user device may no longer be permitted to receive the media asset at least partially due to the first user device no longer being authenticated. Transmission of a remainder of the plurality of media segments to the first user device may be ceased such that the first user device does not receive the media asset in its entirety. | 2013-03-28 |
20130081111 | ENHANCED SECURITY FOR ELECTRONIC COMMUNICATIONS - Techniques are described for providing enhanced security for electronic communications, such as by including in a message sent between two services a digital signature that is generated by using secret information known to the services, so that the recipient receives assurance regarding the sender's identity if the recipient can replicate the received digital signature using the secret information known to the recipient. In some situations, the enhanced security is used in communications to and/or from an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users, such as to prevent malicious phishers from inappropriately gaining access to user information. Various services may use the enhanced security techniques when interacting with the access manager system at various times, such as to initiate sign-on for a user and/or to take subsequent action on behalf of a signed-on user. | 2013-03-28 |
20130081112 | Global Terminal Management Using 2-Factor Authentication - A terminal management system for an enterprise network, having a terminal management server functionally connected to an enterprise network. The terminal management system includes at least one network device and a secure shell client that are also functionally connected to the enterprise network. The secure shell client establishes a temporary direct connection to the network device after being validated as having an approved secure connection module. This validation is accomplished by software modules running on the terminal management server. This temporary connection may be converted to a maintained direct connection if the software modules on the terminal management server determine that the secure shell client connected to the network device is the same one validated as having an approved secure connection module. | 2013-03-28 |
20130081113 | METHODS OF AND SYSTEMS FOR REMOTELY CONFIGURING A WIRELESS DEVICE - A particular method includes transmitting a message from a first device to a second device. The message includes first information associated with identification of the first device. The first information enables the second device to obtain access data. The method also includes establishing a first communication link between the first device and the second device based on the access data. The method further includes receiving, via the first communication link, second information associated with establishment of a second communication link between the first device and a third device. The method also includes configuring the first device to establish the second communication link between the first device and the third device based on the second information. | 2013-03-28 |
20130081114 | SYSTEM AND METHOD FOR USER AUTHENTICATION - A system and method for providing authentication of a user is disclosed. The use of a non-confidential and unique user identification number and a temporary access code separates authentication of the user from transmission of any user passwords or user-identifiable data, as well as provides a ubiquitous means to authenticate the user with unrelated organizations, without any information passing between those organizations. | 2013-03-28 |
20130081115 | SERVER AND METHOD FOR PROVIDING SURVEY OF BROADCASTING PROGRAM - A survey providing apparatus includes a reception unit configured to receive a survey participation signal, from a user device, related to the broadcasting program that is being reproduced in a broadcasting device, a user authentication unit configured to authenticate a user based on identification information of the user device included in the received survey participation signal and user information that is previously stored in a database, a transmission unit configured to transmit a survey list for the broadcasting program to the user device and a survey result generation unit configured to generate a survey result based on a survey response to the survey list and the user information, wherein the transmission unit is further configured to transmit the generated survey result to the broadcasting device. | 2013-03-28 |
20130081116 | TRUSTED INTERNET IDENTITY - A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request. | 2013-03-28 |
20130081117 | PERSONAL CRITERIA VERIFICATION USING FRACTIONAL INFORMATION - A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user. | 2013-03-28 |
20130081118 | METHOD, SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM FOR ESTABLISHING A LOGIN SESSION - A method, system, and computer-readable storage medium are provided. Embodiments of the invention include receiving notification of a log-in event associated with a first login session wherein a user is authorized to access a resource of a computing system based on a credential. During the first login session and in response to determining the credential is valid, a second login session is established by granting the user access to a resource of an application associated with the computing system. During the first login session and in response to receiving information indicating an event has occurred, the second login session is terminated such that the user does not have access to the resource of the application. And during the first login session and in response to determining again that the credential is valid, a third login session is established by granting the user access to a resource of the application. | 2013-03-28 |
20130081119 | MOBILE DEVICE-BASED AUTHENTICATION - Mobile device-based authentication is disclosed. A first biometric input corresponding to a first biometric feature of the user is captured on the mobile device. A first set of biometric data is derived from the captured first biometric input. The first set of biometric data is transmitted to a remote authentication server. Thereafter, a secondary authentication instruction is transmitted to the site resource in response. Access to the site resource is permitted based upon a validation of the first set of biometric data, and a second biometric input that is captured on the site resource in response to the secondary authentication instruction received thereon. The first set of biometric data and the second set of biometric data are validated by remote authentication server substantially contemporaneously. | 2013-03-28 |
20130081120 | INCREASED SECURITY FOR COMPUTER USERID INPUT FIELDS - A computer determines whether current location information of the computer indicates that the computer is at a home location. The computer determines a minimum number of characters to be entered by a user into a userID field to cause the computer to automatically display previously entered userIDs based on whether the computer is located at a home location. If fewer than the minimum characters are entered, previously entered userIDs are not displayed. Location information can be based on one or more of: wi-fi signal strengths, cell tower signal strengths and signal arrival timing information, whether the network connection is wireless or Ethernet cable, the wireless protocol, whether a wi-fi connection is secured or public, whether the computer is a mobile device, and satellite navigation system location. | 2013-03-28 |
20130081121 | CONNECTION OF PERIPHERAL DEVICES TO WIRELESS NETWORKS - Methods and an apparatus to connect a peripheral device to a wireless network access point are provided herein. A host device associated with a wireless network access point stores and obtains a set of wireless credentials related to a wireless network formed by the wireless network access point. The host device opens a connection between the host device and the peripheral device to transmit the set of wireless credentials from the host device to the peripheral device. The host device identifies the peripheral device over the wireless network access point. | 2013-03-28 |
20130081122 | A Method, Device and System for Secure Transactions - A method for operating a security device comprises receiving a request for a transaction from a programmable device executing an application obtained from an application controlling institute, and verifying a validity of the transaction. A user is alerted, in which the user indicates an acceptance of the request. A one-time identifier is generated. The one-time identifier comprises a security device identification, a transaction number, a date and a time. The one-time identifier is communicated to the programmable device, in which the application verifies a validity of the security device identification and instructs the programmable device to communicate the one-time identifier and transaction to the application controlling institute for processing. The application controlling institute verifies validity of the one-time identifier and processes the transaction, wherein said security device, application programmable device and application controlling institute securely processes the transaction. | 2013-03-28 |
20130081123 | IP Multimedia Subsystem User Identity Handling Method and Apparatus - A method of enabling users of a third party Internet service, who are not necessarily subscribers of an IP Multimedia Subsystem, IMS, network, to access services provided by the IMS network. The method comprises registering a user with said third party Internet service via the Internet using an Internet service identity of the user, and sending to the user, from said third party Internet service and via the Internet, IMS network access information. The access information is then used to register the user with the IMS network, wherein, following IMS registration, the user is able to access IMS network services. | 2013-03-28 |
20130081124 | TRUSTING AN UNVERIFIED CODE IMAGE IN A COMPUTING DEVICE - A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key. | 2013-03-28 |
20130081125 | User Login With Redirect To Home Network - A login browser form allows a user to securely login to an account and access a web-based service at a server or server farm, referred to as a transaction node, without using a separate authentication or single sign-on server. A user is assigned to one of multiple transaction nodes as its home when the user enrolls in the web-based service. In a subsequent attempt to login, the user may land at the home transaction node or at a non-home transaction node. The transaction node serves the login browser form, including code to cause the web browser to transmit the user login id to the transaction node. If the transaction node determines that it is not the user's home, based on its records of user assignments, it identifies the home and configures the web browser to direct future communications to the home. The user's password is not sent to the non-home. | 2013-03-28 |
20130081126 | SYSTEM AND METHOD FOR TRANSPARENT SINGLE SIGN-ON - A method for transparent single sign-on authentication on computers in a networked environment. An embodiment includes receiving an authentication request from an operating system of a first computer, requesting credentials of an application making the authentication request, authenticating the credentials, storing the credentials if the authentication is successful, and transmitting the credentials to a second computer. On subsequent access requests made by the user on the second computer, the credentials can be retrieved from the secure store, eliminating the need to prompt the user to re-enter authentication information. | 2013-03-28 |
20130081127 | SMART CARD AND COMMUNICATION METHOD THEREOF - A smart card and a communication method thereof are provided. The smart card comprises a flexible electronic system and a card body. The flexible electronic system comprises a display circuit, a communication interface, a security module, code generator and a flexible display. The communication interface is used for communicating with a reader. The security module is used for transmitting security verification information to the reader. The code generator is electrically connected to the security module and used for generating a code. The flexible display is connected to the display circuit and used for displaying the code. The card body encapsulates the flexible electronic system. After an input device receives the inputted code, the reader transmits the inputted code and the security verification information to the confirmation server to confirm whether the inputted code and the security verification information are correct. | 2013-03-28 |
20130081128 | SYSTEM AND METHOD FOR PROVIDING A REST-BASED MANAGEMENT SERVICE IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for providing software administration tools, for use in administering server configurations, such as in a traffic director or other type of server environment. In accordance with an embodiment, the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. An administration server can be used to manage the traffic director, including a REpresentational State Transfer (REST) infrastructure and management service which maps REST calls to mbeans or other management components registered on the administration server, for use in managing the traffic director. | 2013-03-28 |
20130081129 | Outbound Connection Detection and Blocking at a Client Computer - A method of detecting and blocking a malicious SSL connection at a client computer. The method includes identifying, at a network firewall level, an outbound SSL connection being set up at the client computer; detecting an SSL certificate associated with the SSL connection; sending a request to a central server for reputation information on the SSL certificate; at the central server, determining reputation information in dependence upon the SSL certificate; providing said reputation information from the central server to the client computer; and using the reputation information at the client computer to determine whether or not to block the connection. | 2013-03-28 |
20130081130 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO PROVIDE FIREWALLS FOR PROCESS CONTROL SYSTEMS - Methods, apparatus, and articles of manufacture to provide firewalls for process control systems are disclosed. An example method includes analyzing a network communication to identify a first service, an address associated with the first service within a secured portion of a network, and a subset of ports used by the first service, the network communication originating from within the secured portion of the network and to be transmitted to a destination outside of the secured portion of the network, and storing an identifier of the first service, the address, and the subset of the ports when the network communication includes the identifier, the address, and the subset of the ports. | 2013-03-28 |
20130081131 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE, SERVER, AND COMMUNICATION METHOD - A communication system includes a server that matches a packet against a definition pattern, provided for determining whether the packet is an invalid packet, and discards the packet if the packet is an invalid packet and, for other packets, notifies processing content, which is applied to the packets, to a sending source; and a communication device that forwards an unknown packet to the server and, based on processing content notified from the server, processes a received packet. | 2013-03-28 |
20130081132 | APPARATUS AND METHOD FOR PROVIDING VIRTUAL PRIVATE NETWORK SERVICE BASED ON MUTUAL AUTHENTICATION - An apparatus and method for providing a virtual private network (VPN) service based on mutual authentication are provided, the apparatus including a storage unit configured to store a first public key and a second public key; an authentication unit configured to authenticate a VPN server with the first public key and to authenticate a user device with the second public key; and a tunnel management unit configured to generate a first VPN tunnel and a second VPN tunnel to relay data between the user device and the VPN server based on the authentication of the VPN server and the user device by the authentication unit. | 2013-03-28 |
20130081133 | SYSTEM AND METHOD FOR UNLOCKING AN ELECTRONIC DEVICE - A system and a method facilitating the unlocking of a locked touch screen device. In a preferred embodiment, the device is an e-reader device. The system and method provides a device unlock screen that simulates turning a page in a book rather than sliding a dead bolt lock or moving some other object from one place to another on the locked screen. | 2013-03-28 |
20130081134 | Instruction set adapted for security risk monitoring - A processor is adapted to manage security risk by updating and monitoring a taint storage element in response to receipt of taint indicators, and responding to predetermined taint conditions detecting by the monitoring. The processor can be operable to execute instructions of a defined instruction set architecture and comprises an instruction of the instruction set architecture operable to access data from a source and operable to receive a taint indicator indicative of potential security risk associated with the data. The processor can further comprise a taint storage element operable for updating in response to receipt of the taint indicator and logic. The logic can be operable to update the taint storage element, process the taint storage element, determine a security risk condition based on the processing of the taint storage element, and respond to the security risk condition. | 2013-03-28 |
20130081135 | INJECTION ATTACK MITIGATION USING CONTEXT SENSITIVE ENCODING OF INJECTED INPUT - A method for preventing malicious code being embedded within a scripting language of a web application accessed by a web browser ( | 2013-03-28 |
20130081136 | METHOD AND DEVICE FOR DETECTING FLOOD ATTACKS - Disclosed is a flood attack detection method, wherein the total number of keywords of a source packet is acquired, and the number of feature parameters corresponding to the source packet is acquired. A ratio of the number of feature parameters to the total number of keywords is compared with a preset threshold, and if the ratio is greater than or equal to the preset threshold, it is determined that a flood attack occurs. | 2013-03-28 |
20130081137 | Simultaneous Determination of a Computer Location and User Identification - An apparatus including an intrusion detection arrangement and a location identification arrangement which ties digital information (i.e. transaction events such as parameters of information, database queries, transaction ranges, etc.) submitted to a computer system with the physical characteristics of the event such as the picture of the person(s) originating the information. | 2013-03-28 |
20130081138 | RESPONDING TO IMPERMISSIBLE BEHAVIOR OF USER DEVICES - A device detects an impermissible behavior by a user device. The device further identifies a rule associated with the impermissible behavior and executes a response to the impermissible behavior based on the rule. The response restricts access of the user device to a service provided by or via a network device. The device also transmits, to the user device, a message that specifies the response. The device also verifies a termination of a cause of the impermissible behavior and restores the access of the user device to the service. | 2013-03-28 |
20130081139 | QUARANTINE NETWORK SYSTEM, SERVER APPARATUS, AND PROGRAM - A quarantine network system | 2013-03-28 |
20130081140 | METHODS AND SYSTEM FOR DETERMINING PERFORMANCE OF FILTERS IN A COMPUTER INTRUSION PREVENTION DETECTION SYSTEM - An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to deploying it to a customer site. A deep security manager and deep security agent, at the customer site, collect local confidence attributes that are used for determining the local confidence score. The local confidence score and the base confidence score are aggregated to form a global confidence score. The local and global confidence scores are then compared to deployment thresholds to determine whether the IPS filter should be deployed in prevention or detection mode or sent back to the security center for improvement. | 2013-03-28 |
20130081141 | SECURITY THREAT DETECTION ASSOCIATED WITH SECURITY EVENTS AND AN ACTOR CATEGORY MODEL - Security events associated with network devices and an actor category model are stored ( | 2013-03-28 |
20130081142 | System, Method, and Logic for Classifying Communications - In accordance with particular embodiments, a method includes intercepting a communication and extracting metadata associated with the communication. The extracted metadata comprises a plurality of different fields from communication metadata and file metadata. The method further includes determining a score, based on previous communications, for each field of the extracted metadata. The score is indicative of a likelihood that the communication is a malicious communication. The method additionally includes combining the scores to generate a combined score for the communication based on an algorithm developed from the previous communications. The method also includes generating, based on the combined score at a first time, a predicted classification as to whether the communication is a malicious communication. The method further includes receiving, at a second time subsequent to the first time, an indication of whether the communication is a malicious communication and updating the algorithm based on the indication. | 2013-03-28 |
20130081143 | INFORMATION STORING DEVICE, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An information storing device includes a storage section configured to store revocation information that is a list of an identifier of an unauthorized device, and a data processor configured to execute determination processing of unauthorized equipment in accordance with the revocation information. The data processor extracts version information enabling identification of the issue order of the revocation information from the revocation information and transmits the extracted version information to a communication counterpart device. If the data processor receives the revocation information of a new version of the issue order held by the communication counterpart device from the communication counterpart device, the data processor executes revocation information synchronization processing of substituting the received revocation information of the new version for the revocation information of an old version stored in the storage section to store the revocation information of the new version. | 2013-03-28 |
20130081144 | STORAGE DEVICE AND WRITING DEVICE - According to an embodiment, a storage device connected to an external device includes a data storage, a key storage, a random number generating unit, a random number storage, a random number transmitting unit, a data receiving unit, a calculating unit, a determining unit, and a storage control unit. The data receiving unit receives write data to be written into the data storage and first authentication information. The key storage stores a key. The calculating unit calculates second authentication information for data generated from the write data and the random number by using the key. The determining unit determines whether the first authentication information and the second authentication information are identical. The storage control unit stores the write data into the data storage when the first authentication information and the second authentication information are determined to be identical. | 2013-03-28 |
20130081145 | ANONYMOUS ASSOCIATION SYSTEM UTILIZING BIOMETRICS - Various exemplary embodiments relate to an anonymous database system. The system includes a plurality of biometric nodes in communication with one another. Each of the plurality of biometric nodes includes a biometric input that receives biometric data from a user. The system also includes at least one central database in communication with the plurality of biometric nodes; and a plurality of institution databases in communication with the plurality of biometric nodes. A first node of the plurality of biometric nodes is configured to receive a message from a second node of the plurality of biometric nodes, the message requesting authorization of data access by the second node. Various embodiments relate to a method for performing an action requiring multiple levels of authentication using an anonymous database system. | 2013-03-28 |
20130081146 | APPARATUS, SYSTEM, AND METHOD OF CONTROLLING ELECTRONIC DATA AND RECORDING MEDIUM STORING DATA CONTROL PROGRAM - A data control apparatus, a data control system, a data control method, and a data control program stored in a recording medium, are provided each of which allows a user to obtain electronic data stored in a storage apparatus in a data format compatible with a specific apparatus currently operated by the user or specific application of the electronic data that may be requested by the specific apparatus. | 2013-03-28 |
20130081147 | ANTI-KEYLOG EDITOR - Various embodiments for protecting keyboard data inputted by a user in a computer having a keyboard hardware are disclosed. According to one exemplary embodiment, a method for protecting keyboard data, where the keyboard hardware comprises an I/O port having an input buffer and an output buffer, includes: receiving scan code data based on keyboard data inputted by the user, wherein the scan code data are latched in the output buffer of the I/O port; executing an interrupt routine to fetch the scan code data from the output buffer to a CPU of the computer, wherein the latched scan code data remains in the output buffer after the latched scan code data are read from the output buffer; transmitting a control command to the keyboard hardware through the input buffer of the I/O port; and receiving from the keyboard hardware a response signal generated in response to the control command, wherein the keyboard hardware is configured to transmit the response signal to the output buffer of the I/O port. | 2013-03-28 |
20130081148 | NRIP KNOCKOUT MICE AND USES THEREOF - The present invention directs to a transgenic NRIP knockout mouse, the genome of which is manipulated to comprise a disruption of a nuclear receptor interaction protein (NRIP) gene, wherein the NRIP gene is disrupted by deletion of exon 2, the mouse exhibits a phenotype comprising abnormal muscular function. The present invention also directs to a method for making a transgenic NRIP knockout mouse whose genome comprises a homozygous disruption of the NRIP gene, the mouse exhibits abnormal muscular function. | 2013-03-28 |