Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


14th week of 2012 patent applcation highlights part 52
Patent application numberTitlePublished
20120084747PARTITIONED ITERATIVE CONVERGANCE PROGRAMMING MODEL - Methods and systems for iterative convergence include performing at least one global iteration. Each global iteration includes partitioning input data into multiple input data partitions according to an input data partitioning function, partitioning a model into multiple model partitions according to a model partitioning function, performing at least one local iteration using a processor to compute sub-problems formed from a model partition and an input data partition to produce multiple locally updated models, and combining the locally updated models from the at least one local iteration according to a model merging function to produce a merged model.2012-04-05
20120084748SYSTEM AND A METHOD FOR GENERATING A DOMAIN-SPECIFIC SOFTWARE SOLUTION - A method for generating a domain-specific software solution may include receiving a request for a solution model to accomplish one or more tasks. A domain model may be selected in response to the request for the solution model. The solution model may be configured based on the selected domain model. The solution model may be configured by selecting a set of candidate technical assets for each task of the solution model. The solution model may also be configured by determining for each candidate technical asset if the one or more requirements of the task of the solution model are satisfiable by the candidate technical asset. The solution model may be further configured by selecting a technical asset for each task to be included in a solution implementation.2012-04-05
20120084749PROGRAMMING LANGUAGE SUPPORT FOR REACTIVE PROGRAMMING - Program language support is provided to facilitate reactive programming. Code can be provided that initiates conversion between a first-class pattern and a second-class pattern, wherein the patterns operate with respect to push-based data. Support is also provided for producing and consuming push-based data in accordance with an iterator pattern, for example.2012-04-05
20120084750Method for Efficiently Managing Property Types and Constraints In a Prototype Based Dynamic Programming Language - Methods and systems for managing property types, constraints, and other property validations in prototype-based dynamic programming languages, such as the JavaScript® programming language, are presented. A property definition is created for a target class by a programmer, and a properties class is automatically generated for the target class along with get and set methods to access and validate properties in the properties class. A properties class of a parent class can be automatically determined to exist and added such that the target class properties class inherits from the parent class properties class.2012-04-05
20120084751Automated Call Center Software Build Generator - A call center (CC) generator includes generator software (GSW) executing on a computerized appliance from a machine-readable physical medium, an input interface for receiving a CC configuration, access to a data repository storing CC software components, a function relating configuration parameters to individual ones of the stored CC software components, and an output interface for delivering a CC SW suite. The CC generator, executing the GSW, considers the CC configuration, applies the relating function, selects CC software components to copy from the data repository, and builds the CC SW suite for output.2012-04-05
20120084752IMAGE ASSET LIFECYCLE MANAGEMENT IN A COMPUTING ENVIRONMENT - Lifecycles of virtual image assets are managed as follows. A set of assets including a set virtual image assets and a set of software bundle assets are analyzed. At least a portion of relationship data between one or more of the virtual image assets and one or more of the software bundle assets is determined. The at least a portion of relationship data is stored in a memory. At least one of one or more virtual image assets and one or more software bundle assets are determined to be associated with a set of changes. At least one virtual image asset that is related to the one or more virtual image assets and/or one or more software bundle assets associated with the set of changes is identified. The at least one virtual image asset that has been identified is updated based on the set of changes.2012-04-05
20120084753DEBUGGER LAUNCH AND ATTACH ON COMPUTE CLUSTERS - Launching a debugging process. A method includes at a compute node on a cluster private network, receiving a debug job via a scheduler of a head node from a client on a public network. The head node is connected to both the cluster private network and the public network. The public network is external to the cluster private network. The method further includes beginning processing the debug job, and as a result initiating debugging by starting one or more debugger remote agents at the compute node. The method further includes beginning processing a user job in the presence of the started debugger remote agents at the compute node. The client is informed that the one or more debugger remote agents are ready to debug the user job. A debugger client at the client is connected to the one or more debugger remote agents.2012-04-05
20120084754Streamlining Unit Testing Through Hot Code Swapping - Methods and systems are described for testing methods and other functions by swapping external functions for mock functions. A test case definition is entered by a programmer, which can specify the expected number of arguments and argument values of external function or method calls, the context state, the return value, and any expected error conditions. The test case definition is used by a function tester to automatically create mock functions, modify the target function so that it calls the mock functions, execute the target function with specified arguments and a test context, and then compare the results to expected results.2012-04-05
20120084755CONFIDENCE-BASED STATIC ANALYSIS - Systems, methods and program products are provided for confidence-based static analysis, including initiating a static analysis of computer software, associating a confidence value with a first element of the static analysis, determining a current state of the static analysis, calculating an adjusted confidence value in accordance with a confidence adjustment function as applied to the current state and the confidence value associated with the first element, associating the adjusted confidence value with a second element of the static analysis resulting from a transition from the first element, and eliminating the second element from the static analysis if the adjusted confidence value meets elimination criteria.2012-04-05
20120084756ACCURATE IDENTIFICATION OF SOFTWARE TESTS BASED ON CHANGES TO COMPUTER SOFTWARE CODE - Consistent with the present disclosure, a block of software code or “software code block” that is executed while particular tests are carried out is assigned a software code block identifier, which is associated with test identifiers, which, in turn, identify the tests that were performed. The software code block identifiers and corresponding test identifiers are then stored in a database. When a portion of the software code block is later modified, either by a change to one or more lines of the code or by deleting or adding code, the corresponding software code block identifier is determined or selected, and then used to access the corresponding test identifiers from the database. The test identifiers are then used to generate a report, for example, that lists each test to be performed in order to determine whether the modified software code block operates properly. The above processes of assigning and storing software code block identifiers and test identifiers may be automated, thereby increasing the likelihood that a complete set of correct tests are performed on the modified software code block. As a result, reliability of the software is improved.2012-04-05
20120084757COMPUTER-READABLE, NON-TRANSITORY MEDIUM SAVING DEBUGGING SUPPORT PROGRAM, DEBUGGING SUPPORT DEVICE, AND DEBUGGING SUPPORT METHOD - A computer-readable, non-transitory medium saving a debugging support program representing a sequence of instructions, the program which is executable by a target computer to perform receiving a connection request for remotely debugging a process, of which an identifier is designated for the remote debugging, using a host computer; searching a plurality of processes activated in the target computer for the process having the designated identifier; and connecting the target computer to the host computer to enable remotely debugging the searched process having the designated identifier.2012-04-05
20120084758Collaborative Software Debugging In A Distributed System With Client-Specific Variable Evaluation - In a distributed system that includes a debug server and debug clients coupled for data communications through a data communications network, where the debug server includes a debug administrator, a message router, a back-end debugger, and a debuggee, collaborative software debugging includes receiving, by the debug server from the debug clients asynchronously during a debug session of the debuggee, a plurality of application-level messages; routing, by the message router in accordance with an application-level message passing protocol, the application-level messages among the debug clients, the debug administrator, and the back-end debugger, including providing distributed control of the back-end debugger to the debug clients with application-level messages routed to the back-end debugger; and returning, by the debug server to the debug clients in response to the application-level messages routed to the back-end debugger, client-specific debug results.2012-04-05
20120084759SYSTEM AND METHOD FOR IN-VIVO MULTI-PATH ANALYSIS OF BINARY SOFTWARE - A system and method for in-vivo multi-path analysis and testing of binary software including binary device drivers is disclosed. The system and method may be used to test a binary software system and may comprise a virtual machine, a symbolic execution engine and a modular plugin architecture. In addition, a device driver testing system is also disclosed wherein symbolic execution may be used to explore the device driver's execution paths and check for device driver behavior.2012-04-05
20120084760TRANSACTIONAL DEBUGGER FOR A TRANSACTIONAL MEMORY SYSTEM - Various technologies and techniques are disclosed for providing a debugger for programs running under a transactional memory system. When running a particular program using the debugger, the system detects when a conflict occurs on at least one conflictpoint that was set in the particular program. A graphical user interface is provided that displays information related to the detected conflict. The graphical user interface can display transactional state and/or other details independently of a conflict. A conflictpoint can be assigned to one or more regions of source code in one or more transactions in the particular program. A conflictpoint can also be assigned to a particular variable in the particular program. When running the particular program in a debug mode, execution is stopped if a conflict occurs on any of the conflictpoints.2012-04-05
20120084761Interprocedural Exception Method - An interprocedural exception analysis and transformation framework for computer programming languages such as C++ that (1) captures the control-flow induced by exceptions precisely, and (2) transforms the given computer program into an exception-free program that is amenable for precise static analysis, verification, and optimizations.2012-04-05
20120084762FINE-GRAINED PERFORMANCE CONFIGURATION OF APPLICATION - A method, system and computer program product for performance configuration of an application by setting at least one performance preference for a performance-sensitive class in the application, specifying performance preference propagation policy of the class in the application based on the at least one performance preference, and calling the class to perform performance configuration for application according to the performance preference propagation policy.2012-04-05
20120084763IDENTIFYING CODE THAT WASTES TIME SWITCHING TASKS - A method of detecting portions of code of a computer program that protect resources of a computer system unnecessarily can include identifying threads and synchronization objects that are used by a computer program during execution, determining the number of threads that have accessed each resource while it has been consistently protected by a particular synchronization object, and indicating whether the resource is suited for protection according to the number of threads that have accessed the resource.2012-04-05
20120084764METHOD AND SYSTEM FOR VERSION INDEPENDENT SOFTWARE RELEASE MANAGEMENT - A system for assembling an update for a software release is described, comprising a processor and memory configured to define classes of software components, each class having a plurality of instances, each instance having a unique identifier (UID) and representing a software component having a plurality of versions; for each version of the software component, assign time stamps and indicator identifying release status of the version; introduce a flexible coupling between versions of software components and instances of classes using a pointer between a version of the software component and a UID associated with the version; select versions of software components from which pointers originate; for each instance of the class, to which the pointer points, select one version of the software component based on the assigned indicator; and assemble the selected versions of software components into the update of the software release. A corresponding method is also provided.2012-04-05
20120084765METHOD FOR DELIVERY OF SOFTWARE UPGRADE NOTIFICATION TO DEVICES IN COMMUNCAITON SYSTEMS - Systems and methodologies are described that facilitate providing software upgrade notifications to user devices that utilize unicast and multicast communication techniques in a wireless communication environment. Bandwidth and power consumption is minimized by permitting determination to be made regarding whether a given software update is relevant to the user device prior to attempting a download or receiving a notification thereof. Additionally, evaluation of version number and software identity facilitates determining whether to employ a unicast software check-up protocol or a multicast software check-up protocol. Software upgrade information may also be transmitted over a multicast channel for a predetermined time period, after which a user device may initiate a unicast check-up protocol to receive software upgrade information.2012-04-05
20120084766METHOD FOR UPDATING AN APPLICATION PROGRAMS ON WIRELESS TERMINALS IN A CONTROLLED MANNER - A method for updating an application program on a wireless terminal in a controlled manner is disclosed. When, a server receives an inquiry from a wireless terminal for updating an application program, the server determines whether there is an updated program available for updating the application program based on information included in the inquiry from the wireless terminal. The server also determines whether updating the application program of the wireless terminal which sent the inquiry is permitted or not at the time of receiving the inquiry based on the information included in the inquiry and criteria information stored in the server. When the server determines that updating the application for the wireless terminal is available and is permitted, the server sends information necessary for updating the application program to the wireless terminal. Then, the wireless terminal updates the application program.2012-04-05
20120084767TERMINAL DEVICE AND PROGRAM - A terminal device configured to be connectable with a plurality of accessory devices and a server configured to store a firmware package, may include a processor, and a memory storing computer readable instructions that, when executed, cause the terminal device to perform functions. The functions may include a function of receiving the firmware package from the server, a function of storing the firmware package received from the server into the memory, a function of providing the stored firmware package to a first one of the plurality of accessory devices to install the firmware package therein, and a function of providing the stored firmware package to the other of the plurality of accessory devices to which the same firmware package is applied as the first one, to install the firmware package therein.2012-04-05
20120084768Capturing Multi-Disk Virtual Machine Images Automatically - A plurality of virtual disk images are established on a virtual machine. The virtual machine identifies corresponding network address translations for a plurality of disks, each having a corresponding plurality of data sets. The virtual machine installs the corresponding plurality of data sets to the plurality of virtual disks using the corresponding network address translations. An image of the plurality of disks is created, wherein the image contains the plurality of virtual disks with the plurality of data sets.2012-04-05
20120084769SEMANTICALLY RICH COMPOSABLE SOFTWARE IMAGE BUNDLES - A composable software bundle is created by retrieving a semantic representation of a set of software modules. A functional representation of a set of operations is retrieved. Each operation in the set of operations is to be performed on the set of software modules during at least one virtual image life-cycle phase in a set of virtual image life-cycle phases. A set of artifacts including a set of executable instructions associated with the set of operations is identified. The semantic representation, the functional representation, and the set of artifacts, are stored in a composable software bundle.2012-04-05
20120084770Installing Analytical Content - A computer program product is tangibly embodied in a computer readable storage medium and comprises instructions that when executed by a processor perform a method including: presenting business category identifiers to a user in a computer system, each business category identifier representing one of multiple reporting content bundles for configuring a transactional application and an analytical application; receiving, in the computer system, a selection by the user of at least one of the business category identifiers; and installing in the computer system, from the selected reporting content bundle, at least one transactional content object in the transactional application, and at least one analytical content object in the analytical application.2012-04-05
20120084771Communication Device and Management Method - A communication device includes a communication module, an installation module and an storage module. The communication module is configured to communicate with an external device based on a certain communication protocol. The installation module is configured to install a first application that performs communication using the communication module. The storage module is configured to store first information about the certain communication protocol and second information about the first application in a storage medium while associating the first information and the second information with each other when the first application is installed.2012-04-05
20120084772METHOD AND SYSTEM FOR DEPLOYING APPLICATION COMPONENTS IN A PARTIAL DEPLOYMENT - A method is provided for deploying an application component in a multi-component deployment configuration. An application component and integration topology is acquired for a multi-component deployment configuration. An additional application component is selected. A predefined integration is enabled associating the additional application component with a deployed application component in the application component and integration topology. The additional application component and the predefined integration are deployed on to a target machine.2012-04-05
20120084773USER TERMINAL DEVICE AND SERVICE PROVIDING METHOD THEREOF - A method for providing a service in a user terminal device, in which the user terminal device downloads a service hub program, installs the service hub program, generates an icon container corresponding to the service hub program, displays the icon container, receives an input selecting the icon container, displays an application icon included in the icon container, and deletes a program and data installed in the user terminal device according to a change in status of the user terminal device2012-04-05
20120084774Techniques For Load Balancing GPU Enabled Virtual Machines - Exemplary techniques for balancing 3D graphical processor unit use among virtual machines are herein disclosed. In an exemplary embodiment, a virtualization platform can load an instance of a graphics rendering module for a virtual machine; select a GPU for the graphics rendering module to run on; and configure the virtual machine to render to the selected GPU. In addition to the foregoing, other aspects are described in the detailed description, claims, and figures.2012-04-05
20120084775Techniques for Streaming Virtual Machines from a Server to a Host - Techniques for configuring a commodity server to host virtual hard disks are disclosed herein. In an exemplary embodiment, a virtual hard disk file can be split into a plurality of differencing VHD files and one or more of the files can be downloaded to a virtualization host as it runs off the VHD files stored on the server. After the one or more VHD files are downloaded, the virtualization host can be configured to use the local copy instead of the copy on the commodity server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.2012-04-05
20120084776VIRTUAL MACHINE STAGE DETECTION - A computer implemented method, system and computer program product for categorizing a virtual machine stage. A data processing system starts a virtual machine. It sets factor-stage ranges, wherein for each combination factor and stage, a corresponding range is present, and wherein each range is as broad as a reset range. It sets a frequency for sampling virtual machine metrics and samples virtual machine metrics to form a plurality of virtual machine metrics for each factor. It applies a value to each range satisfied by each virtual machine metric, to form a plurality of stage-qualifying values corresponding to a range, and sums all stage-qualifying values for each stage, to form a stage likelihood. The data processing system further selects a stage corresponding a highest stage likelihood. The data processing system determines if the current range is different from a former range. The system expands each range corresponding to the current stage.2012-04-05
20120084777Virtual Machine and/or Multi-Level Scheduling Support on Systems with Asymmetric Processor Cores - Different processor cores in a computing device can support different features. In one or more embodiments, the features supported by each of multiple physical processor cores of a computing device are identified. A set of one or more features of the multiple physical processor cores to make available to virtual processor cores of the virtual machine are determined based at least in part on both the one or more features supported by each of the multiple physical processor cores and a number of virtual processor cores of the virtual machine. In additional embodiments, a multi-level scheduling model is used. An operating system level scheduler of an operating system schedules multiple applications for execution on multiple processor cores, and a user level scheduler of an application schedules application threads of that application for execution on one or more of the multiple processor cores.2012-04-05
20120084778MANAGING EXECUTION OF MIXED WORKLOADS IN A SIMULTANEOUS MULTI-THREADED (SMT) ENABLED SYSTEM - A kernel of a SMT enabled processor system facilitates construction of an exclusive set of processors to simulate an ST mode for handling the tasks of the ST workload, wherein the ST workload runs more efficiently on single threaded processors. The kernel schedules the ST workload on the exclusive set of processors by selecting one hardware thread per processor within said exclusive set of processors to handle a separate one of the tasks of the ST workload, while requiring the remaining hardware threads per processor within the exclusive set to idle. As a result, the ST workload is executed on the SMT enabled processor system as if the exclusive set of processors run in ST mode, but without actually deactivating the remaining idle hardware threads per processor within the exclusive set of processors.2012-04-05
20120084779TRACKING REQUESTS THAT FLOW BETWEEN SUBSYSTEMS - The present invention extends to methods, systems, and computer program products for tracking requests that flow between subsystems. Embodiments of the invention facilitate following a user interaction/transaction from the point of entry through any subsystems that are called until the interaction/transaction is fulfilled. Generated information (e.g., log data) regarding a transaction can be aggregated across all subsystems, such as, for example, in a central repository. When failures occur, log and trace levels can be automatically increased for subsequent calls.2012-04-05
20120084780Mechanism for Customized Monitoring of System Activities - A mechanism for performing monitoring system activities using a performance monitor. A method of embodiments of the invention includes identifying a plurality of monitoring tools to monitor activities of a plurality of system components at the computer system, and each monitoring tool monitors activities of at least one system component of the plurality of system components. The method further includes generating a monitoring template to include monitoring capabilities of each of the plurality of monitoring tools, and customizing, via the monitoring template, the performance monitor to serve as a universal monitoring tool to facilitate the plurality of monitoring tools to monitor the activities of the plurality of system components.2012-04-05
20120084781JOB DISTRIBUTION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE AND COMPUTER-READABLE MEDIUM - An information processing device includes an image forming device, an execution sub-job determining unit, a sub-job execution destination determining unit and an execution instructing unit. The image forming device is designated as a destination and executes at least a sub-job executed N-th as the last sub-job out of N sub-jobs in a case where a job is divided into N sub-jobs. The execution sub-job determining unit determines a sub-job other than the executed N-th sub-job within a range of the occupiable time of the image forming device in a case where there is an available capacity in the image forming device. The sub-job execution destination determining unit determines the execution destination of each sub job. The execution instructing unit instructs a calculation resource to execute the first to (i−1)-th sub-jobs and instructs the image forming device to execute the i-th to N-th sub-jobs.2012-04-05
20120084782Method and Apparatus for Efficient Memory Replication for High Availability (HA) Protection of a Virtual Machine (VM) - High availability (HA) protection is provided for an executing virtual machine. At a checkpoint in the HA process, the active server suspends the virtual machine; and the active server copies dirty memory pages to a buffer. During the suspension of the virtual machine on the active host server, dirty memory pages are copied to a ring buffer. A copy process copies the dirty pages to a first location in the buffer. At a predetermined benchmark or threshold, a transmission process can begin. The transmission process can read data out of the buffer at a second location to send to the standby host. Both the copy and transmission processes can operate substantially simultaneously on the ring buffer. As such, the ring buffer cannot overflow because the transmission process continues to empty the ring buffer as the copy process continues. This arrangement allows for smaller buffers and prevents buffer overflows.2012-04-05
20120084783AUTOMATED OPERATION LIST GENERATION DEVICE, METHOD AND PROGRAM - Selection of operations in a desired order and, as necessary, input of processing parameters by the user are received. Based on each operation corresponding to the received input, operation information, which classifies the operation corresponding to the input into a non-routine operation, which requires input of a processing parameter during execution of an automated operation list, or a routine operation other than the non-routine operation in advance, is obtained. Then, an automated operation list is generated based on the obtained operation information by registering, if the operation corresponding to the input is a routine operation, the operation corresponding to the input in the automated operation list with associating, as necessary, a necessary processing parameter for the operation with the operation, and registering, if the operation corresponding to the input is a non-routine operation, the operation corresponding to the input in the automated operation list.2012-04-05
20120084784SYSTEM AND METHOD FOR MANAGING MEMORY RESOURCE(S) OF A WIRELESS HANDHELD COMPUTING DEVICE - A method and system for managing one or more memory resources of a wireless handheld computing device is described. The method and system may include receiving a request to initiate a web browser module and receiving input for a web address. The method and system may also include receiving a file corresponding to the web address and reviewing one or more objects present within the file. The method and system may determine if an object already exists in the one or more memory resources. And if the object does not exist in the one or more memory resources, then the method and system may calculate a priority for the object. The priority of the object may then be assigned and stored. It may also be determined if the current object will exceed the threshold of the one or more memory resources, and discarding other objects with lower priority as needed.2012-04-05
20120084785RESOURCE RESERVATION - Technologies are generally described for systems and methods for requesting a reservation between a first and a second processor. In some examples, the method includes receiving a reservation request at the second processor from the first processor. The reservation request may include an identification of a resource in communication with the second processor, a time range, first key information relating to the first processor, and a first signature of the first processor based on the first key information. In some examples, the method includes verifying, by the second processor, the reservation request based on the first key information and the first signature. In some examples, the method includes determining, by the second processor, whether to accept the reservation request.2012-04-05
20120084786JOB EXECUTING SYSTEM, JOB EXECUTING DEVICE AND COMPUTER-READABLE MEDIUM - An image forming device includes a monitoring service performing unit and a service process performing instructing unit. The monitoring service performing unit acquires operation state information including index data that represents a service processing function mounted in the corresponding server and an operation state of the corresponding server from each server by starting a monitoring service when an accepted job is performed. The service process performing instructing unit instructs a low-load server to start a corresponding service processing function when the load on a server in which the service processing function used for executing the job is mounted is determined to be high. The server acquires the corresponding service processing function from the server in which the corresponding service processing function is mounted when being instructed to start an operation and thereafter performs the corresponding service process in accordance with the performance instruction transmitted from the image forming device.2012-04-05
20120084787APPARATUS AND METHOD FOR CONTROLLING A RESOURCE UTILIZATION POLICY IN A VIRTUAL ENVIRONMENT - An apparatus and method for controlling a resource utilization policy in a virtual environment are provided. The apparatus may increase network throughput by dynamically adjusting the resource utilization policies of a driver domain that can directly access a shared device, and a guest driver that cannot directly access the shared device. In addition, the apparatus may improve the efficiency of the use of CPU resources by appropriately adjusting the CPU occupancy rates of the driver and guest domains.2012-04-05
20120084788COMPLEX EVENT DISTRIBUTING APPARATUS, COMPLEX EVENT DISTRIBUTING METHOD, AND COMPLEX EVENT DISTRIBUTING PROGRAM - A server calculates correlations between complex event processing processes performed by virtual machines (VMs) so as to detect events from streams using condition expressions for identifying the events. The server obtains the load status of each of the VMs. The server then detects a VM having a processing load exceeding a predetermined level based on the load status thus obtained. When a VM having a processing load exceeding a predetermined level is detected, the server distributes the complex event processing processes to the respective VMs based on the calculated correlations between the complex event processing processes.2012-04-05
20120084789System and Method for Optimizing the Evaluation of Task Dependency Graphs - One embodiment of the present invention is a technique for optimizing a task graph that specifies multiple tasks and the dependencies between the specified tasks. When optimizing the task graph, the optimization engine performs multiple iterations of runtime optimization operations on the task graph. At each iteration, an optimized task graph is generated based on a different task aggregation topology. The optimized task graph is then compiled and executed. Runtime statistics related to the execution are collected, and, in subsequent iterations, the task graph is further optimized based on the collected statistics. Once the optimization process is complete, the most optimal task graph topology that was identified during the process is used to generate an optimized task graph for execution.2012-04-05
20120084790SCHEDULING THREADS IN A PROCESSOR - Guiding OS thread scheduling in multi-core and/or multi-threaded microprocessors by: determining, for each thread among the active threads, the power consumed by each instruction type associated with an instruction executed by the thread during the last context switch interval; determining for each thread among the active threads, the power consumption expected for each instruction type associated with an instruction scheduled by said thread during the next context switch interval; generating at least one combination of N threads among the active threads (M), and for each generated combination determining if the combination of N threads satisfies a main condition related to the power consumption per instruction type expected for each thread of the thread combination during the next context switch interval and to the thread power consumption per instruction type determined for each thread of the thread combination during the last context switch interval; and selecting a combination of N threads.2012-04-05
20120084791Cross-Environment Communication Framework - A mobile computing device with a mobile operating system and desktop operating system running concurrently and independently on a shared kernel without virtualization. The mobile operating system provides a user experience for the mobile computing device that suits the mobile environment. The desktop operating system provides a full desktop user experience when the mobile computing device is docked to a secondary terminal environment. Applications of the desktop operating system communicate with applications and services of the mobile operating system through a cross-environment communication framework. The cross-environment communication framework may include interfaces to remotable objects allowing processes in the mobile operating system and processes in the desktop operating system to share memory in a thread-safe manner. The mobile computing device may be a smartphone running the Android mobile operating system and a full desktop Linux distribution on a modified Android kernel.2012-04-05
20120084792CROSS-ENVIRONMENT COMMUNICATION USING APPLICATION SPACE API - A mobile computing device with a mobile operating system and desktop operating system running concurrently and independently on a shared kernel without virtualization. The mobile operating system provides a mobile user while the desktop operating system provides a full desktop user experience when the mobile computing device is docked to a secondary terminal environment. Applications of the desktop operating system communicate with applications and services of the mobile operating system through a cross-environment communication framework. The cross-environment communication framework may include application programming interfaces through which categories of applications can communicate across a multiple operating system computing environment through category-specific remote communication calls. The mobile computing device may be a smartphone running the Android mobile operating system and a full desktop Linux distribution on a modified Android kernel.2012-04-05
20120084793CROSS-ENVIRONMENT EVENT NOTIFICATION - A mobile computing device with a mobile operating system and desktop operating system running concurrently and independently on a shared kernel without virtualization. The mobile operating system provides a user experience for the mobile computing device that suits the mobile environment. The desktop operating system provides a full desktop user experience when the mobile computing device is docked to a second user environment. Cross-environment notification and event handling allows the user to be notified of and respond to events occurring within the mobile operating system through the user environment associated with the desktop operating system. Events that may trigger cross-environment notification may be local events and/or remote events. The mobile computing device may be a smartphone running the Android mobile operating system and a full desktop Linux distribution on a modified Android kernel.2012-04-05
20120084794Systems and Methods Providing Intelligent Routing of Data Between Software System - Disclosed are systems and methods which provide an interface for software applications which provides intelligent routing of data between the software applications. Embodiments provide an interface between software applications using multiple adapters, wherein at least one adapter is associated with each end of a software application information communication link. Information communicated between software applications is routed based upon analysis of the information and/or associated transactions to provide dynamic interfacing between software applications. Information may be routed based upon content, transaction type, historical information, etcetera. Routing of information of embodiments establishes an itinerary for scheduling communication of information between a plurality of software applications.2012-04-05
20120084795MODEL, SERVICE AND IMPLEMENTATION SEPARATION - Embodiments are directed to combining service operations with various managed system objects to form a new dynamic programming interface combination and determining valid dynamic programming interface combinations. A computer system determines which service operations are offered by a selected managed system. The selected managed system is configured to provide various services comprising multiple different service operations. The computer system determines that managed system objects of the managed system are to be combined with at least one of the service operations. The computer system also combines the service operation with the managed system object, so that a new dynamic programming interface combination is created. The new dynamic programming interface combination is configured for use by the services offered by the managed system.2012-04-05
20120084796EVENT TRIGGERED ACTIONS BASED ON MEDIA ACTION TABLE - Generating event-triggered actions, including: detecting at least one event occurring on a mobile device; generating and presenting an event action parameter for the at least one event; and receiving and processing the event action parameter using a media action table to generate at least one action instruction.2012-04-05
20120084797TRANSACTION IN MEMORY OBJECT STORE - Techniques for rating and committing events in an event processing system are provided. Events can be rated at a rating system according to information that is stored locally on the rating system. Rated events can be stored in a database system with these rated events being utilized to, among other things, restore information that is stored locally on the rating system.2012-04-05
20120084798CROSS-ENVIRONMENT REDIRECTION - Cross-environment rendering and user interaction support provide a seamless computing experience in a multi-operating system computing environment. The multi-operating system computing environment may include a mobile operating system and a desktop operating system running concurrently and independently on a mobile computing device. Full user interaction support is provided for redirected and/or mirrored applications that are rendered using an extended graphics context. An extended input queue handles input events from virtual input devices for remotely displayed applications. Remotely displayed applications are mapped to separate motion spaces within the input queue. The mobile computing device may be a smartphone running the Android mobile operating system and a full desktop Linux distribution on a modified Android kernel.2012-04-05
20120084799SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TERMINATING A HIDDEN KERNEL PROCESS - A system, method, and computer program product are provided for terminating a hidden kernel process. In use, a hidden kernel process structure associated with a hidden kernel process is identified. In addition, the hidden kernel process structure is inserted into an active process list. Further, the hidden kernel process is terminated.2012-04-05
20120084800INFORMATION PROCESSING APPARATUS AND POWER CONTROL METHOD - According to one embodiment, an information processing apparatus includes: an optical disk device; an optical disk device controller which opens a tray provided in the optical disk device; a receiver which receives a command for instructing to open the tray; a detector which detects a movement of the information processing apparatus which incorporates the optical disk device; a power controller which controls supply of power to each component of the information processing apparatus; and a power determining module which determines whether the information processing apparatus is connected to an external power supply. The power controller starts the supply of power to the optical disk device if the command is received while stopping the supply of power to the optical disk device and if the movement is not detected and the information processing apparatus is connected to the external power supply.2012-04-05
20120084801System and Method for Providing Real Time Television Viewing Information and Popularity to Viewers - A method providing real-time popularity information regarding TV programs, performed during a short period of time at a server with one or more processors and memory. The server receives current TV viewing information from a plurality of distinct households. The current TV viewing information for a household identifies one or more TV programs that are now showing at the household. The server aggregates the current TV viewing information, thereby identifying one or more currently popular TV programs. The currently popular TV programs have more household viewers than less popular TV programs. The server receives a request from a household seeking identification of currently popular TV programs. The server selects one or more of the currently popular TV programs identified during the aggregation, and sends information to the household. The information identifies the selected one or more currently popular TV programs.2012-04-05
20120084802RECEPTION APPARATUS, RECEPTION METHOD, TRANSMISSION APPARATUS, TRANSMISSION METHOD, PROGRAM, AND BROADCASTING SYSTEM - A reception apparatus for receiving transmitted AV (Audio/Video) content includes: an extraction section configured to extract trigger information associated with control of an application program transmitted with the AV content to be executed in cooperation with the AV content; and a control section configured to control processing associated with the application program in accordance with a command indicated by the extracted trigger information, wherein the application program in an active status started up in accordance with the command indicated by the extracted trigger information executes at least one of processing of generating view status information indicative of a user view status and processing of uploading the view status information to a predetermined server.2012-04-05
20120084803MEDIA CONVERGENCE PLATFORM - Device capabilities, media rights, and content are managed using a convergence platform to allow seamless consumption of content across disparate devices. Media content can be paused on one device having a particular set of capabilities and rights and resumed on a different device having another set of capabilities and rights. A user can play media on a mobile device, continue playing the media on a desktop computer, and subsequently move to a large screen television and capabilities and rights are automatically identified to seamlessly provide the most appropriate authorized content. Personalized media content information can be provided based on maintained information for user playback stoppage events and the user can resume playback of any number of media streams.2012-04-05
20120084804AUTHENTICATED CONTENT DISCOVERY - Embodiments are disclosed herein that relate to facilitating the discovery of authenticated content from a variety of sources. One embodiment provides a method comprising receiving a plurality of authentication tokens from the media presentation device, where each of the plurality of authentication tokens represents an established authenticated relationship between a user and a corresponding content source. The method further comprises receiving a request from the media presentation device for an electronic programming guide and sending the electronic programming guide to the media presentation device, where the electronic programming guide comprises a listing of content from a plurality of content sources corresponding to the plurality of authentication tokens.2012-04-05
20120084805CUSTOMIZING BROADCAST TRANSMISSIONS TO VIEWER PREFERENCES - Systems and methods allow users to customize content of broadcast transmissions. A parent might, for example, wish to remove or replace profanity from an audio portion of the movie or violence from audio and video portions of the movie so that it is more suitable for younger viewers. The method comprises receiving at a viewing station a broadcast transmission, performing, via the viewing station, a search to identify specified material in the broadcast transmission, and, in response to identifying the specified material in the broadcast transmission, modifying the broadcast transmission to suppress the specified material so that the broadcast transmission can be presented via the viewing station without the specified material.2012-04-05
20120084806Key Derivation for Secure Communications - A security system is disclosed in which a device-specific key value is provided to a security processing device, and then used to derive additional derived keys for use in secured communications. In response to identifying a compromise of the derived keys, the system can be instructed to derive new or replacement derived keys for use in the secured communications. In some embodiments, the security system can be used in a video reception device, to decrypt encrypted video content.2012-04-05
20120084807System and Method for Integrating Interactive Advertising Into Real Time Video Content - A system and method for interactive video advertising comprising advertising overlays that are displayed on a video screen to prompt user interaction. User interaction causes additional advertising content to be made available in a user interface that may be accessed immediately or at a later time point. Advertising content that populates the user interface is chosen based on marketing and behavioral data and parameters. The user interface allows users to access advertising material, send advertising materials to other users and networks such as social networks, social media, telephone networks, wireless telephone networks, cellular telephone networks, computer networks, cable television networks, satellite television networks, video game system networks, the internet, individuals, or combinations thereof. The types of data and advertising materials that may be shared are videos, pictures, photographs, text messages, sweepstakes, contests, emails, telephone calls, popularity indicators, and combinations thereof.2012-04-05
20120084808System and Method for Bypassing an Emergency Alert Break-In for a Recorded Event - Embodiments of the disclosed invention include a system and a method for bypassing an emergency alert break-in for a recorded event. For example, in one embodiment, a set top box is disclosed that includes a memory component for storing computer executable instructions; a communication interface for receiving media content data from a cable service provider; a decoder module for decoding the received media content data; an emergency alert break-in monitoring module for identifying an emergency alert break-in from the received data; a digital video recorder controller module for determining whether the identified emergency alert break-in affects a recording of a program on a recorded channel; and an emergency alert break-in bypass module for bypassing the identified emergency alert break-in for enabling the digital video recorder controller module to record the program without the identified emergency alert break-in.2012-04-05
20120084809SYSTEM AND METHOD ENABLING VIEWERS TO SELECT BETWEEN A PLURALITY OF SCHEDULED ADVERTISEMENTS - A method and interactive advertisement selection system for enabling a television viewer to select between a plurality of advertisements scheduled for an advertising block of time. The viewer utilizes an advertisement selection mechanism such as a television remote control or other computing device to indicate the desire to skip an advertisement currently being shown. An advertisement selection server receives the skip indication, stops the current advertisement, selects a next advertisement from a list of advertisements scheduled for the advertising block, and starts the next advertisement. The server ensures selected advertisements will fit within the advertising block. Records are maintained of which advertisements were viewed in their entirety, partially viewed, or skipped.2012-04-05
20120084810System and Method for Integrating Interactive Region-Based Advertising Into Real Time Video Content - A system and method for interactive video advertising comprising advertising overlays displayed on a video screen to prompt user interaction. Advertising overlays directly and substantively relate to video content and promote advertising content. Advertising overlays highlight a particular region of the video content for which an advertiser wishes to promote user interaction. Such overlays notify the user that a particular portion of the video content is related to advertising content that may be stored and viewed in a user interface.2012-04-05
20120084811System and Method for Integrating E-Commerce Into Real Time Video Content Advertising - A system and method for interactive video advertising comprising advertising overlays that are displayed on a video screen to initiate user interaction and allow e-commerce. Advertising overlays may promote highlight any video content with which an advertiser wishes to promote user interaction. User interaction with advertising overlays are recorded and displayed in a user interface. The user interface allows for access to an e-commerce interface wherein purchases of items related to advertising overlays may be initiated. Payment account information is stored in the system and automatically transmitted to vendors. User interaction data are saved by the system and used to send suggestions to individuals, social media, and mobile media outlets.2012-04-05
20120084812System and Method for Integrating Interactive Advertising and Metadata Into Real Time Video Content - A system and method for interactive video advertising comprising advertising overlays displayed on a video screen to prompt user interaction and e-commerce. Advertising overlays specifically highlight a particular region of the video content for which advertising or marketing is appropriate. Software is used to associate advertisement tags with video content, and to associate metadata with the advertisement tag. Payment account information is stored in the system and automatically transmitted to vendors. Purchase suggestions are sent to individuals, social media, and mobile media outlets.2012-04-05
20120084813TARGETED VIDEO ADVERTISING - A computer-implemented method of providing targeted video promotional material includes transmitting a promotional item for display on a video terminal, determining whether the promotional item was skipped, and updating a profile corresponding to the promotional item or a viewer of the promotional item based on whether or not the promotional item was skipped.2012-04-05
20120084814SYSTEMS AND METHODS FOR PROVIDING REMOTE ACCESS TO INTERACTIVE MEDIA GUIDANCE APPLICATIONS - Methods and systems for remotely accessing user equipment implementing an interactive media guidance application are provided. In particular, a method includes the steps of receiving user equipment identification information and receiving a user request from a user device indicating instructions for the user equipment. The user request is cross-referenced with an action request in a user equipment format selected from a plurality of formats to be compatible with the user equipment. The action request is transmitted for receipt by the user equipment for enabling execution of the indicated instructions.2012-04-05
20120084815METHOD FOR PROVIDING MULTICAST SERVICES - It is provided a method for providing a service guide in a network providing a plurality of multicast services, said network comprising at least one client device connected to an intermediate a first device, wherein a subset of said plurality of multicast services is being multicast to said at least one client device via said intermediate first device, and the service guide provides a list of the plurality of multicast services in a second order; and at the side of a client device, the method comprises the steps of determining a list of the plurality of multicast services in a first order, wherein the order is changed from the second order to the first order based on the multicast services of the subset; and presenting said list of multicast services in said first order.2012-04-05
20120084816EPG HAVING PIP WINDOW HISTORY AND SAMPLE VIEW FUNCTIONALITY - The present invention provides an electronic program guide system associated with a broadcast receiver in a broadcast system, said electronic program guide system comprising: receiving means for receiving at least one electronic program guide corresponding to the broadcast system; first display generation means for generating display of said electronic program guide in a first display area of a display unit associated with said broadcast receiver; selecting means for selecting a desired program from said electronic program guide; tuning means for controlling a tuner of the associated broadcast receiver to tune to the selected program; second display generation means for generating display of the selected program in a second display area of said display unit; and storage means for storing parameters identifying said selected program.2012-04-05
20120084817RECOMMENDING BROADCAST TRANSMISSIONS OF INTEREST TO A VIEWER - Systems and methods identify broadcast transmissions of interest to a user by comparing a user's interest profile to characteristics, such as topic phrases, associated with available broadcast transmissions. The method comprises receiving from a viewing station via a communication network an interest profile associated with a user. The interest profile includes data representing a plurality of topics of interest to the user that relate to broadcast transmissions. After receiving the interest profile, a text-based search is performed to identify available broadcast transmissions that match at least one topic of interest included in the interest profile, and a list of one or more of the available broadcast transmissions that match at least one topic of interest included in the interest profile are transmitted to the viewing station so that one or more of the available broadcast transmissions can be selected from the list and presented via the viewing station.2012-04-05
20120084818Intelligent System and Methods of Recommending Media Content Items Based on User Preferences - A system and method for making program recommendations to users of a network-based video recording system utilizes expressed preferences as inputs to collaborative filtering and Bayesian predictive algorithms to rate television programs using a graphical rating system. The predictive algorithms are adaptive, improving in accuracy as more programs are rated.2012-04-05
20120084819SYSTEM AND METHOD FOR PROVIDING SERVICE SEARCH - Disclosed herein is a method and system for providing service search. The system for providing service search includes an index formation unit, a container configuration unit, a guide configuration unit, and a transmission and reception unit. The index formation unit forms an index structure including an index list area, an index area, and a sub-index area. The container configuration unit configures an integrated container by integrating service information, schedules, and program information for each of service identifiers (IDs) included in the sub-index area. The guide configuration unit configures an Electronic Program Guide (EPG) including the index structure. The transmission and reception unit provides the EPG using a service ID corresponding to information desired by the terminal, together with the index structure.2012-04-05
20120084820METHOD AND APPARATUS FOR NOTIFICATION AND INTERACTION OF MULTI-SCREEN SERVICE IN COMMUNICATION SYSTEM - A uniform multi-screen service request command template is defined by using an OMA interactive media document so that a notification of a network device about a multi-screen service and a request command of a user for multi-screen service content are compatible with the OMA standard. With the multi-screen service request command template defined in the OMA interactive media document in the invention, the user can create a request command in the uniform format simply and rapidly to thereby greatly reduce the probability of an input error of the user. Furthermore, it is not necessary to set up a connection in advance, thus greatly shortening a delay and reducing the probability of an error and hence greatly improving a quality of experience of the user.2012-04-05
20120084821Demand-Based Edge Caching Video Conten System and Method2012-04-05
20120084822Interactive Television Network And Method Including Content Searching - The present invention is directed to content searching of various databases in an interactive television network; caching programming for rebroadcasting to interactive television network subscribers; and interactively offering goods and services referred to in broadcast programming to interactive television network subscribers.2012-04-05
20120084823CONTENT PLAYING SYSTEM - A content playing system 2012-04-05
20120084824INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD AND PROGRAM - An information processor includes: a content acquisition section adapted to acquire linked content that includes a plurality of scenarios, each made up of content data and control information used to control the reproduction of the content data; a control information acquisition section adapted to acquire the control information; and a reproduction control section adapted to control the reproduction of the linked content by reproducing the content data according to the control information, wherein the control information acquisition section acquires, as an event adapted to allow a move from the current scenario to another scenario, the control information including an absolute time-of-day event that occurs at a specific date and time on the scenario time axis, and the reproduction control section allows a move from the current scenario to another scenario if the absolute time-of-day event occurs.2012-04-05
20120084825PROVISIONING AN ENHANCED TELEVISION (ETV) APPLICATION - A method includes detecting, from an Enhanced Television (ETV) Integrated Signaling Stream (EISS), an indication that an ETV application is available to be downloaded; downloading, in response to the indication, the ETV application from a video stream identified by the indication, where the ETV application does not conform to an ETV Binary Interchange Format (EBIF) standard; detecting, from the EISS, another indication that the ETV application is to be started; executing, in response to the other indication, the ETV application to generate an ETV page, where the ETV page includes information that is not permitted by the EBIF standard; and displaying the ETV page on a video display device to enables a user to interact with the ETV page.2012-04-05
20120084826Channel switching processing method, system, and related devices - A channel switching processing method, system, and related devices are provided. The method includes: receiving, by a switching server, a channel switching request sent by a receiving end; and when the switching server determines that current switching resource information does not meet a switching condition according to the channel switching request, performing, by the switching server, an exception handling procedure, and sending channel switching instruction information to the receiving end, in which the channel switching instruction information is configured to instruct the receiving end to perform a channel switching operation corresponding to the channel switching instruction information. A channel switching processing system and related devices are also provided. Therefore, the channel switching efficiency may be effectively improved.2012-04-05
20120084827Image Display Apparatus and Sound Output Control Method - According to one embodiment, an image display apparatus including, a communication processing module configured to receive sound and an image over a network, an image processing module configured to output an image signal, a sound processing module configured to output a sound signal, a converting module configured to convert the sound signal output by the sound processing module to an analog signal, and an adjusting module configured to adjust a time difference to be provided to the sound signal input to the converting module by the sound processing module in accordance with the image signal when the image signal output by the image processing module is an image signal input via the communication processing module.2012-04-05
20120084828System and Method for Linking Web Browsing with Television Viewing - A server receives an IP address associated with an account of a TV subscriber using a TV service. The IP address is associated with a set top box employed by the TV subscriber to display TV content provided by the TV service. The IP address is also associated with computers of a household corresponding to the TV subscriber. The computers use web browsers to view Internet content. The server receives information on TV viewing, including the IP address. The server also receives information on web browsing activity in the household associated with the IP address. The information includes the IP address. The server maintains a TV log of the TV viewing and maintains an Internet log of the web browsing activity in the household associated with the IP address. The server associates entries in the TV log with entries in the Internet log(using IP address), and stores the associations.2012-04-05
20120084829CONTENT SUPPLYING APPARATUS, CONTENT SUPPLYING METHOD, CONTENT REPRODUCTION APPARATUS, CONTENT REPRODUCTION METHOD, PROGRAM AND CONTENT VIEWING SYSTEM - Disclosed herein is a content supplying apparatus for supplying a video content to a content reproduction apparatus, including: a production section adapted to produce a video switch command for causing the content reproduction apparatus to execute a process regarding changeover of a video content to be reproduced; a broadcasting section adapted to broadcast a video content, in which the produced video switch command is embedded, through a broadcasting network; and a delivery section adapted to deliver the video content through the Internet.2012-04-05
20120084830NETWORK POLICY CONTROLLER - The invention concerns a network policy controller coupled to a computer network and including a communications interface (2012-04-05
20120084831METHOD AND APPARATUS FOR PROVIDING PRIVACY MANAGEMENT IN MACHINE-TO-MACHINE COMMUNICATIONS - A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy.2012-04-05
20120084832Time Managed Challenge-Response Test - A method of generating a time managed challenge-response test is presented. The method identifies a geometric shape having a volume and generates an entry object of the time managed challenge-response test. The entry object is overlaid onto the geometric shape, such that the entry object is distributed over a surface of the geometric shape, and a portion of the entry object is hidden at any point in time. The geometric shape is rotated, which reveals the portion of the entry object that is hidden. A display region on a display is identified for rendering the geometric shape and the geometric shape is presented in the display region of the display.2012-04-05
20120084833Launching a Cached Web Application Based on Authentication Status - In general, the subject matter described in this specification can be embodied in methods, systems, and program products for receiving a request to retrieve electronic resources that correspond to a first network address. The resources are retrieved from a cache. The retrieved resources are responsive to the received request, correspond to the first network address, and are configured to activate a first web application. Activation of the first web application requires that the computing device be authenticated. Instructions that are in the retrieved resources and are for activating the first web application are executed. The execution includes determining that the computing device is not authenticated to activate the first web application, and requesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application. Activation of the second web application does not require that the computing device be currently authenticated.2012-04-05
20120084834SYSTEM FOR COMMUNICATING WITH A MOBILE DEVICE SERVER - A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile device server that has computer instructions to execute a web server application at the mobile device server. The web server application can be operable to detect a media resource center while roaming in a communication zone of the media resource center and to transmit a pairing key to the media resource center responsive to acquiring communication access to the communication zone. The web server application can be further operable to receive from the media resource center an indication that a roaming charge will be applied to a subscriber account associated with the mobile device responsive to the media resource center identifying from the pairing key that the mobile device server is a guest device. Other embodiments are disclosed.2012-04-05
20120084835Launching a Cached Web Application Based on Authentication Status - In general, the subject matter described in this specification can be embodied in methods, systems, and program products for receiving a request to retrieve electronic resources that correspond to a first network address. The resources are retrieved from a cache. The retrieved resources are responsive to the request, correspond to the first network address, and are configured to activate a first web application. Activation of the first web application requires that the computing device be authenticated. Instructions that are in the retrieved resources and are for activating the first web application are executed. The execution includes determining that the computing device is not authenticated to activate the first web application, and requesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application. Activation of the second web application does not require that the computing device be currently authenticated.2012-04-05
20120084836Providing access levels to services based on mobile device security state - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server.2012-04-05
20120084837Method and apparatus to implement secured, event-based layered logout from a computer system - A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of varying sensitivity, with each security level having a set of permissions associated therewith and that are enforced upon occurrence of an event. A succeeding security level in the set of security levels is reached upon occurrence of an event associated with that level, in which case the set of permissions associated with the security level are then enforced against at least one managed object while the user session continues. As each next security level is reached, the set of permissions associated with the security level are then enforced (with respect to the managed object or against one or more other managed objects), once again while the user session continues. Each of the objects preferably is managed independently of at least one other object; thus, the layered logout may enforce different permissions with respect to different managed objects while at the time maintaining the user session. If the user takes no action, and as a result of the occurrence of the events, eventually a final security level of the set of security levels will occur, at which point the user session is finally terminated.2012-04-05
20120084838METHODS AND SYSTEMS FOR MANAGING CONCURRENT UNSECURED AND CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS - An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a computing system including a programmable circuit operatively connected to a memory and a communication interface, the communication interface configured to send and receive data packets via a data communications network. The endpoint also includes a filter defined in the memory of the computing system, the filter configured to define one or more access lists, each access list defining a group of access permissions for a community of interest. The community of interest includes one or more users, and an access list from among the one or more access lists defines a set of clear text access permissions associated with a community of interest. The endpoint also includes a driver executable by the programmable circuit, the driver configured to cooperate with the communication interface to send and receive data packets via the data communications network. The driver is also configured to selectively split and encrypt data into a plurality of data packets to be transmitted via the data communications network based at least in part upon the contents of the one or more access lists.2012-04-05
20120084839SURVEILLANCE NETWORK SYSTEM - Embodiments of a sensor network system provide surveillance capabilities in multiple contexts/environments (e.g., military, commercial, scientific, civic, urban, wilderness, etc.). Network nodes may include devices such as sensors, network routers, network controllers, etc. Network sensors may be configured so that power management objectives are maximized. Network sensors (both individually and as a group) may be capable of intelligent and cooperative information gathering, so that the output of the sensor network does not contain high levels of irrelevant information. The network nodes may communicate among one another via one or more communication links, and in some cases, multiple routes between any two network nodes may be available. The sensor network may include aspects of both high data rate and low data rate network features. One or more network controllers may provide various network management capabilities, including management of network routing, information collection, information exportation, network configuration, etc.2012-04-05
20120084840TERMINAL CONNECTION STATUS MANAGEMENT WITH NETWORK AUTHENTICATION - A network relay device includes a communication unit, an authentication processing unit, a DHCP snooping processing unit, and a terminal search processing unit. The authentication processing unit creates first information specifying an authenticated terminal device according to web authentication, and manages whether relay of communication data between a terminal device and a node on the specified network is permissible based on the first information. The DHCP snooping processing unit executes snooping of DHCP communication data between a terminal device and a DHCP server, and creates second information specifying a layer 3 address allocated to each terminal device. The terminal search processing unit specifies an authenticated terminal device based on the first information, specifies a layer 3 address allocated to the specified authenticated terminal device based on the second information, and causes the communication unit to send, to the specified layer 3 address, confirmation communication data.2012-04-05
20120084841WEB-BASED SYSTEM FOR PUBLISHING OWNER CONFIGURABLE WEB SITES - A web-based system allows for publishing a website with features and access configured on a user-by-user basis by the website owner to present personal data as well as social network feeds in a single interface. The website owner can update and manage his/her social media from the same page, as well as organize private data if desired. The system includes a messaging function, in accordance with which users can drop a message into the message service of a site owner, and it gets delivered to the site owner in exactly the manner specified by the site owner.2012-04-05
20120084842CONFIGURABLE ELECTRONIC MESSAGING SYSTEM THAT MAINTAINS RECIPIENT PRIVACY - A messaging service allows message senders to reach a web site owner in the way the owner wants. Users authorized by the owner drop a message into the message service of a site owner, and it gets delivered to the site owner in exactly the manner specified by the site owner. The site owner can organize incoming messages by time, calendar, user, viewing method, etc. The site owner can receive messages in the way she wants, but all her friends need to know is one address, the owner's site address.2012-04-05
20120084843CONVERGED LOGICAL AND PHYSICAL SECURITY - A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management. An exemplary aspect of the invention also relates to physical and logical security management and information technology/network security management, with a credential issuance and integrity checking system as well as associated readers and printers of the credential. Still further aspects of the invention relate to obtaining, assembling and analyzing one or more of data, video information, image information, biometric information, sensor information, terrorist information, profile information, and/or other types of information to provide a comprehensive platform for all aspects of security management. A toolkit is also provided that allows complete management, integration, scalability, interoperability and centralized control of all aspects of security including personnel credentialing, personnel management, personnel tracking, task management, security system integration, security information exchange and scalability.2012-04-05
20120084844FEDERATION CREDENTIAL RESET - Techniques for federated credential reset are presented. A principal requests a credential reset with a first service. The first service provides a link to a third party service previously selected by the principal. The principal separately authenticates to the third party service and cause the third party service to send a federated token to the first service. When the federated token is received by the first service, the first service permits the principal to reset an original credential to a new credential for purposes of accessing the first service.2012-04-05
20120084845FIXED CLIENT IDENTIFICATION SYSTEM FOR POSITIVE IDENTIFICATION OF CLIENT TO SERVER - A tamperproof ClientID system to uniquely identify a client machine is invoked upon connection of a client application to a backend. Upon initial connection, the backend issues a unique ClientID containing a checksum. The client application prepares at least two different scrambled versions of the ClientID and stores them in respective predetermined locations on the client machine. Upon subsequent connection to the backend, the client application retrieves and unscrambles the values at the two locations, verifies the checksums and compares the values. If the checksums are both correct and the values match, the ClientID value is sent to the backend, otherwise the client application sends an error code.2012-04-05
20120084846IMAGE-BASED KEY EXCHANGE - This disclosure is directed for improved techniques for configuring a device to generate a secondary password based at least in part on a secure authentication key. The techniques of this disclosure may, in some examples, provide for capturing, by a computing device, an image of a display of another computing device. The captured image includes at least one encoded graphical image, such as a barcode, that includes an indication of the content of a secure authentication key. The computing device may use the secure authentication key to generate a secondary password to be used in conjunction with a primary password to gain access to a password-protected web service.2012-04-05
Website © 2025 Advameg, Inc.