Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


18th week of 2010 patent applcation highlights part 82
Patent application numberTitlePublished
20100115528Software Defined Radio - A method for providing a division of SDR RA into operational states is described. The method includes, in a device which including a plurality of shared device resources and a plurality of RAs, receiving, from a first RA, a request to change a state of the first RA to a requested active state. The requested active state is one of a plurality of potential active states for the first RA and each potential active state has an associated set of device resource requirements. The method also includes determining whether sufficient device resources exist for the requested active state based at least in part on currently allocated device resources. In response to a determination that sufficient device resources exist, the change to the requested active state for the first RA is approved. Apparatus and computer readable media are also described.2010-05-06
20100115529Memory management apparatus and method - A memory management apparatus and a memory management method may divide an external memory area assigned to a task into a first area and a second area, and load data stored in the first area into an internal memory of a processor while the task is performed by the processor.2010-05-06
20100115530METHOD TO TRACK APPLICATION CONTEXT AND APPLICATION IDENTIFICATION - One particular implementation may take the form of a system or method for tracking application identification and application context in a context-isolated computing environment. The method may store such application information to reduce redundant information being stored on a stack. More particularly, the embodiment may store the application information in a context-specific marker frame. The context-specific marker frame may be stored once on the stack or it may be stored separately from the stack to maintain a small stack size. In another implementation, an invocation handler method may be called to store the redundant information about the executing application. The invocation handler may store the necessary information in a well-known location for later use by the virtual machine. The invocation handler may also provide further benefits, such as synchronization to ensure thread safety on shareable objects.2010-05-06
20100115531METHOD AND SYSTEM FOR ASSOCIATING PARAMETERS OF CONTAINERS AND CONTAINED OBJECTS - A system and method for establishing associative relationships between properties of a contained object and corresponding parameters of a container application is disclosed herein. In one embodiment the present system contemplates the establishment of both mutual and unilateral associative relationships, with a particular relationship being specified via a user interface created upon instantiation of the contained object. The associative relationships may be advantageously established without modification of the code comprising the contained object.2010-05-06
20100115532Computer System with Controller Kernel and Remote Desktop - Remote desktop software for use with guest operating systems that run on a controller kernel. Also, remote desktop software that can be used to remotely view and/or manipulate multiple containerized guest operating systems that run on a single computer. The multiple, containerized operating systems preferably run on a controller kernel. Alternatively, the multiple containerized operating system may be controlled to run on the single computer by other software, such as a hypervisor.2010-05-06
20100115533Request content extraction method and apparatus - A filter object is set to combine with a driver causing a device to operate by calling entry functions from a kernel. A second function, via which the driver notifies to a first function of the kernel an entry point, a collection of memory addresses of the entry functions, and an entry point of the filter object, are defined in advance for the filter object. The filter object is caused to extract the entry point of the driver, if, upon installation of the driver, the driver is caused to call the second function defined in advance for the filter object; and to set the entry point of the filter object as an argument and call the first function of the kernel, to extract a content of a request from an application to the device, after the entry point is extracted.2010-05-06
20100115534SOFTWARE AND METHODS FOR PREVIEWING PARAMETER CHANGES FOR A GRAPHICS DISPLAY DRIVER - Software for dynamically previewing changes to hardware driver settings for a graphics adapter is disclosed. Changes to the driver settings are dynamically previewed by forcing an executable graphics program module to load hardware parameter settings as changed, and drawing a region reflecting the changes using the executable graphics program library. The graphics program module may be forced to load new settings as a result of being newly instantiated. Conveniently, a preview region reflecting changes may be drawn in place of an already existing preview region.2010-05-06
20100115535DEVICE CONTROLLER - A device controller that improves transfer speed when the total data amount to be transferred exceeds a predetermined amount, without requiring a special configuration in the device.2010-05-06
20100115536INFORMATION PROCESSING DEVICE - An information processing device communicable with an external device has a device driver installed therein to control the external device, an application installed therein, and a controller executing the device driver and the application in parallel. The device driver, when executed, causes the controller to acquire from the external device a status code corresponding to a status of the external device, show on a display device a display representing the status of the external device, based on the status code, determine whether the application is executable, execute the application when determining that the application is executable, and transmit the acquired status code to the application in execution. The application, when executed, causes the controller to receive the status code from the transmitter, and show on the display device guidance information containing more detailed information than the display based on the status code.2010-05-06
20100115537Access To A Target Object With Desired Functionality - A system and method provide access to a target object associated with a desired functionality. This is accomplished by creating an instance of a pre-existing object, replacing one or more functions of a table shared by all objects of the object's class, and triggering a call that ultimately causes the replacement functions to be called to allow access to the target object. The system includes software portions for enabling the method.2010-05-06
20100115538DISK LOADING MECHANISM - A disk loading mechanism comprises a frame and a roller mounted on a carrier. The carrier is pivotable with respect to the frame to bias the roller onto the disk. It would be advantageous to provide a disk loading mechanism in which the forces exerted on a disk to be inserted in or ejected from a drive unit by a roller providing a movement of the disk are equal for the inserting and ejecting operations. To better address one or more of these concerns it is suggested to provide a disk loading mechanism comprising reduction gears which do not transmit any other than rotational forces onto the roller. Any other forces are accommodated for by the carrier and compensate each other such that they do not have any influence on the biasing of the carrier towards the disk.2010-05-06
20100115539Optical disk drive comprising dust removing apparatus - An optical disk drive, which includes a main frame, an upper case coupled to an upper portion of the main frame, a tray slidably installed on the main frame, having a door, and adapted to carry a disk, and a front panel coupled to a front end portion of the main frame and having an aperture through which the tray passes, including an air discharging passage between the main frame and the front panel to discharge air and dust introduced into the optical disk drive through a gap between the door and the front panel to an outside of the optical disk drive.2010-05-06
20100115540System and Method to Enable Access to Broadband Services - A provisioning system includes a services management system operable to enable a set-top box device configured to receive broadband services at a first network location to access one or more of the broadband services at a second network location. The first network location is associated with a subscriber account and the second network location is not associated with the subscriber account. The broadband services include a voice service, a data service, and a video service. The provisioning system includes a subscriber authentication system operable to evaluate a request that includes subscriber authorization data, to selectively authorize access to the one or more broadband services at the second network location based on the subscriber authorization data, and to enable the set-top box device to access the one or more broadband services when the set-top box device is at the second network location.2010-05-06
20100115541Interactive Computer System for Providing Television Schedule Information - The present invention provides systems and methods for providing television schedule and/or listing information to a viewer, and for allowing the viewer to link, search, select and interact with information in a remote database, e.g., a database on the internet. The television schedule and/or listing information can be displayed on a variety of viewer interfaces, such as televisions screens, computer monitors, PCTV screens and the like. The television schedule and/or listing information may be stored on the viewer's computer, television, PCTV, or a remote server (e.g., a website), or the television schedule and/or listing information may be downloaded from a remote database to the viewer's computer, television or PCTV.2010-05-06
20100115542METHODS AND APPARATUS FOR IDENTIFYING MEDIA CONTENT USING TEMPORAL SIGNAL CHARACTERISTICS - Methods and apparatus to identify media content using temporal signal characteristics are disclosed. An example method to identify media content includes receiving a reference signal corresponding to known media content and generating a reference signature based on the reference signal. The method further includes generating a plurality of sums based on peaks in the media signal and identifying one or more signal peaks based on the generated sums. The method then generates a second signature based on a plurality of normalized curve features, wherein each normalized curve feature corresponds to a signal peak at the temporal location of the signal peak, and determining whether the media signal corresponds to the reference signal based a comparison of the reference signature and the second signature.2010-05-06
20100115543Simulcast resolution in content matching systems - An audience measurement system generates signatures of unknown pieces of content viewed by panel members, and generates reference signatures of known pieces of content. The signatures of the unknown pieces of content are stored and transmitted to a central processing site, where they are compared with the reference signatures for their identification. A scanning engine finds matches between the signatures of the unknown and the known contents, and stores matches so as to build “tracking segments”, i.e., strings of matches that indicate a coincidence between the unknown content and one or more known pieces of content for a certain period of time, and associates the unknown content to the known piece of content with the longest tracking segment.2010-05-06
20100115544SYSTEM AND METHOD FOR CONTROLLING ALTERNATIVE ACCESS TO VIDEO EVENTS ASSOCIATED WITH VIDEO BROADCAST SERVICES - A video services receiver system and related operating methods provide alternative event information to a customer who is subject to a blackout for a desired event. If the blacked out content is available via a different event on a different service, the system will find the other event and provide an appropriate notification to the customer. A method of providing access to events by a customer associated with a video services receiver begins by identifying a first event on a first service, the first event corresponding to a first presentation of content. The method continues by retrieving an alternative event identifier for the first event and using the alternative event identifier to search for a second event on a second service, the second event corresponding to a second presentation of the content. Thereafter, the method generates an alternative event notification for the customer. The alternative event notification indicates availability of the second event for access by the customer.2010-05-06
20100115545Systems and Methods for Setting a Timer via an Interactive Trigger - Systems and methods may provide for setting a timer via an interactive trigger. The interactive trigger may be combined with a video stream and detected when the video stream is to be displayed. Based on the detection, a selectable display object associated with the interactive trigger may be displayed with the display of the video stream. Selection of the selectable display object may enable a timer to be set based on the interactive trigger. The timer enabled by the interactive trigger may be a recording timer, an auto-tune timer or a reminder timer.2010-05-06
20100115546INTERACTIVE SPECIAL EVENTS VIDEO SIGNAL NAVIGATION SYSTEM - A system interactively controlled by a TV viewer remote control transmitter displays current or future programming information superimposed over the normal programming displayed on any channel accessible to the viewer's display screen. Identification signal data are accessed and generated by the computer for durations defined in the identification signal data either automatically or in response to the TV viewer remote. Information signal data are accessed and generated by the computer in response to the TV viewer remote. A signal combiner superimposes the identification signal or the information signal over the viewer usable signal of any selected channel from the tuner. The identification signal may include data defining an icon or textual matter alerting a viewer to the availability of information data. The information signal may include program descriptive data, schedule data, pricing data and/or payment authorization and recording prompt data and the like sequenced for interactive control of the computer by the viewer. The identification signal may be specially dedicated to a normal programming information channel so that the viewer can interact with respect to specific programs identified without changing from the programming information channel. Thus, the viewer is able to receive an automatic alert to availability of current and future programming and to elect to interactively exercise a variety of options with respect to such current and future programming without interruption of presently viewed programming.2010-05-06
20100115547SYSTEM, APPARATUS, AND METHOD FOR CONDITIONAL BROADCAST RECEPTION WITHOUT CABLECARD - A broadcast reception system, apparatus, and method for a Conditional Access System (CAS) function without a cablecard are provided. A security processor for performing a CAS function without using a cablecard includes a security processor for receiving Entitlement Control Message (ECM) information and Entitlement Management Message (EMM) information from a set-top box, extracting a Control Word (CW) using the ECM information and the EMM information, encrypting the CW, and transmitting the encrypted CW to the set-top box.2010-05-06
20100115548PATIENT ENTERTAINMENT SYSTEM WITH SUPPLEMENTAL PATIENT-SPECIFIC MEDICAL CONTENT - A medical information delivery system configured for operation in conjunction with an entertainment device (2010-05-06
20100115549DIGITAL MULTIMEDIA BROADCASTING APPLICATION FORMAT GENERATING METHOD AND APPARATUS THEREOF - Provided are method and apparatus for generating a digital multimedia broadcasting application format. The apparatus includes: generating metadata for DMB contents; and combining the generated metadata and the DMB contents, wherein the metadata includes copyright information for the metadata, user information for a user who consumes the DMB contents, and package table information for describing a package related to the DMB contents.2010-05-06
20100115550GRAPHICAL INTERFACE NAVIGATION BASED ON IMAGE ELEMENT PROXIMITY - A method of facilitating navigation of a graphical user interface is presented. In the method, an image associated with the graphical user interface is generated for presentation to a user. The image includes a plurality of image elements, wherein the image elements collectively occupy less than the entirety of the image. An input indicating a location not coinciding with at least one of the image elements is received. One of the image elements is selected based upon the proximity of the location with the one of the image elements.2010-05-06
20100115551Method for Transmitting Mobile Multimedia Broadcast Electronic Service Guide - A method for transmitting mobile multimedia broadcast electronic service guide, and the method comprises: a multiplexer receives the electronic service guide message; the multiplexer multiplexes the electronic service guide message into a multiplexing frame, the multiplexing payload of the multiplexing frame includes one or more multiplexing sub-frames; the multiplexer sends the multiplexing frame to a broadcast station; the broadcast station modulates and sends said multiplexing frame to the mobile user equipments. The method of the present invention could transmits the ESG data alone in the individual service multiplexing sub-frames, thus transmits a large number of ESG messages rapidly; alternatively, the relative ESG messages can be transmitted along with the audio/video data, thus the user equipments can receive the service data and this ESG messages simultaneously when the user equipments open only one time slot.2010-05-06
20100115552Method and apparatus for receiving electronic service guide by mobile communication terminal in digital video broadcasting-handheld system - A method and apparatus is provided for receiving an Electronic Service Guide (ESG) by a mobile communication terminal in a Digital Video Broadcasting-Handheld (DVB-H) system including a service provider providing a broadcast service and the mobile communication terminal receiving the broadcast service from the service provider. Upon receipt of a broadcast service request, the mobile communication terminal determines whether a first ESG about the broadcast service has been stored. When the first ESG has been stored, the mobile communication terminal requests the service provider to first transmit broadcast data among a second ESG and the broadcast data contained in the broadcast service, based on the first ESG. The mobile communication terminal receives the broadcast data first from the service provider and displays the received broadcast data.2010-05-06
20100115553AGGREGATING DISCOVERY DATA IN A DISCOVERY INTERFACE - A discovery interface presents aggregated discovery data in a discovery interface through which a user may select between television content and Internet Protocol content. In one implementation, the discovery interface includes a television channel region associated with a television channel that lists television programs. The discovery interface further includes an Internet Protocol content region associated with the television channel that lists Internet Protocol content based on user navigation within the television channel region.2010-05-06
20100115554INTELLIGENT TV MOSAIC FOR IP TV - A method of building an interactive display related to TV programs in an internet protocol television (IPTV) environment includes parsing a plurality of TV programs provided in an IPTV environment for display to a user. The step of parsing includes capturing an image in each TV program, identifying video content in each captured image, interpreting the video content, capturing audio data, identifying an audio content in each captured audio data, and interpreting the audio content for each captured audio data. The method further includes the steps of identifying a selected TV program by the user; determining a correlation level between the interpreted video and audio content of the selected TV program and the interpreted video and audio content of each of the other TV programs; determining TV programs other than the selected TV program; and building and presenting a mosaic display on a TV display including the selected TV program.2010-05-06
20100115555METHOD AND APPARATUS FOR REPRODUCING VIDEO DATA IN VIDEO DISTRIBUTION SYSTEM USING NETWORK - According to one embodiment, a video-data reproduction apparatus is connected by a network to a server that distributes moving-picture content in unit of programs. The apparatus has a browser and a monitor. The browser can reproduce moving-picture content in units of programs, each at a time on the entire screen of the monitor. The browser performs a process of switching the program being reproduced on the entire screen, to a program designated, in accordance with an instruction input at a remote controller while the apparatus remains in the full-screen reproduction mode.2010-05-06
20100115556METHOD AND APPARATUS FOR DISPLAYING VIDEO CLIPS - A television viewer uses a PIP format for display of program related information such as television program listings from a program schedule data base in the background and moving, real time or stored video clip images of a program selected from the displayed listings in the PIP window. All the text of the background information lies outside the PIP window. In one embodiment, as the viewer selects a particular program from the display of current television program listings by means of a cursor or a code number, the corresponding program automatically appears in the PIP window.2010-05-06
20100115557PRESENTING MEDIA GUIDANCE SEARCH RESULTS BASED ON RELEVANCY - Systems and methods for presenting search results based on relevancy in an interactive media guidance application are disclosed. After performing a user-initiated or automatic search for media content, the interactive media guidance application determines which of the hits are most relevant to the user. The guidance application then displays, or visually identifies, the relevant items. Some embodiments employ using different display arrangements based on the number of relevant items. Some embodiments display the relevant items in recommendation lists or hot lists.2010-05-06
20100115558METHODS AND DEVICES FOR RECEIVING AND TRANSMITTING PROGRAM LISTING DATA - The method of receiving program listing data comprises the steps of receiving program listing data, determining whether the program listing data would fit into a certain memory when stored according to a first policy and selecting a second policy for storing program listing data if the program listing data would not fit into the certain memory when stored according to the first policy, a certain field of information of at least part of the received program listing data being stored according the first policy, but not according to the second policy. The method of transmitting program listing data comprises the steps of determining a first value, the first value being useful for determining a first size of at least part of the program listing data when stored according to a first policy, determining a second value, the second value being useful for determining a second size of at least part of the program listing data when stored according to a second policy, but not useful for determining the first size, and transmitting the first value and the second value along with the program listing data. The device (2010-05-06
20100115559INTERACTIVE TELEVISION SYSTEM WITH NEWSGROUPS - An interactive television system is provided that supports newsgroup features. An interactive television application, such as an interactive television program guide, may be used to allow a user to view and post newsgroup messages to one or more newsgroup servers. The newsgroup servers may be located at a television distribution facility. The newsgroup servers may be Usenet servers accessed via the Internet. The user may use the newsgroup feature while watching television programming or while otherwise viewing other content provided by the interactive television application. Cross-referencing may be used to allow the user to access content related to a particular subject matter. Parental control features may be used to limit access to certain newsgroups. Newsgroup messages may contain links to other content made available through the interactive television application.2010-05-06
20100115560SYSTEM AND METHOD FOR INTERACTIVE TELEVISION - A system and method for interactive television (ITV) includes presenting both TV channels and “virtual channels” on an ITV. A virtual channel can be a Web page stored in memory of the ITV (or remote therefrom) and accessed by a microprocessor in the ITV when a user selects the virtual channel number using a conventional TV remote control. The particular Web page can be established based on consumer data, such as demographic data supplied by the consumer or consumer responses to prompts displayed along with a channel. The Web page associated with the virtual channel can be updated or changed by sending data to the ITV through the VBI of a TV signal or via the Internet, through a modem on the ITV.2010-05-06
20100115561METHOD AND SYSTEM FOR OPERATING A RECEIVING CIRCUIT FOR MULTIPLE TYPES OF INPUT CHANNEL SIGNALS - A receiving circuit module and method for operating the same includes a housing receiving a first signal, a first encoder disposed within the housing encoding the first signal to form a first encoded signal and a second encoder disposed within the housing encoding the first signal to form a second encoded signal having a different format than the first signal.2010-05-06
20100115562AUDIO SYSTEM AND MAIN BOX - The present invention is applied to an audio system for transmitting audio signals and video signals to each room of a house via cables installed within the walls of the house, and for reproducing these audio signals and video signals in the each room, for example, and thereby enables more improvement in usability of this kind of audio system than before.2010-05-06
20100115563AUDIO SYSTEM AND MAIN BOX - The present invention is applied to an audio system for transmitting audio signals and video signals to each room of a house via cables installed within the walls of the house and for reproducing these audio signals and video signals in the each room, and thereby expands the extensibility of this kind of audio system and expands the availability.2010-05-06
20100115564INFORMATION DEVICE - A device for obtaining, storing and displaying information from a remote server, the device has a modem for establishing communication sessions with the remote server. A memory coupled to the modem stores the obtained information, and a display is coupled to the memory for displaying the stored information. The device automatically and periodically communicates with the remote server for obtaining the information.2010-05-06
20100115565CONTENT AND CM DELIVERY SYSTEM AND CONTENT INFORMATION SERVER - In a content delivery system comprising a content information server, a content delivery server, and a terminal information server all located within a communications carrier network, the content information server obtains location information of a content requesting terminal from the location information server and generates a play list per terminal for inserting local CM content into main stream content depending on the terminal location. The content delivery server delivers the main stream content and the local CM content to the requesting terminal according to content identifiers specified in time sequential based on the play list per terminal by the content information server.2010-05-06
20100115566Fast Channel Change Request Processing - A fast channel change request is processed in a signal distribution system comprising a network element coupled between a user interface device and a fast channel change server. The network element detects a fast channel change request sent from the user interface device for processing by the fast channel change server, and takes an action based on the detected fast channel change request. The action is effective to permit alteration of at least one characteristic of a unicast transmission that would otherwise be provided to the user interface device responsive to the fast channel change request.2010-05-06
20100115567SYSTEM AND METHOD FOR PAUSING PROGRAMMING OF A TELEVISION FOR A TELEPHONE CALL - A method of controlling a television includes receiving an indication of a telephone call at a set-top box and pausing the display of television content by the set-top box in response to the received indication.2010-05-06
20100115568SYSTEM AND METHOD FOR ALTERING THE DISPLAY OF TELEVISION CONTENT IN RESPONSE TO USER PREFERENCES - A method of controlling a television includes receiving an indication of a user preference. The user preference associated with a telephone and further associated with a set-top box. The method also includes altering the display of television content by the set-top box in response to the received indication.2010-05-06
20100115569MULTIMEDIA INFORMATION RECEIVING APPARATUS - A multimedia information receiving apparatus receives multimedia information which is transmitted by a broadcast system and receives multimedia information which is simultaneously transmitted by another transmission system such as IP communications, and generates one received information by selecting elements having a few errors from elements of demodulated broadcast system information and elements of demodulated other transmission system information and then arranging the selected elements.2010-05-06
20100115570Methods and Devices For Providing Dedicated Bandwidth On-Demand - A media converter that includes a QAM modulator converts and maps packets within RF frequencies to 802.1q VLAN identifications (ID). Use of the media converter solves content delivery, bandwidth capacity issues and simplifies head end design.2010-05-06
20100115571INFORMATION DEVICE - A device for obtaining, storing and displaying information from a remote server, the device has a modem for establishing communication sessions with the remote server. A memory coupled to the modem stores the obtained information, and a display is coupled to the memory for displaying the stored information. The device automatically and periodically communicates with the remote server for obtaining the information.2010-05-06
20100115572SYSTEM AND METHOD FOR PROVIDING DIGITAL CONTENT - A method of providing access to content based upon one or more adequately-credentialed keys being proximate to a certain location, said method comprising: (a) acquiring credential information from at least one key tagged with credential information using a credential acquisition device (CAD) at said certain location; (b) confirming that said credential information meets requirements for receiving said content; and (c) providing access to said content after steps (a) and (b).2010-05-06
20100115573METHODS AND APPARATUS TO VERIFY PRESENTATION OF MEDIA CONTENT - Example methods and apparatus to verify presentation of media content are disclosed. A disclosed example apparatus for use with a set-top box (STB) and a media presentation device includes an audio input interface to receive a first audio signal associated with a program selected by a user via the STB, a microphone to receive a free-field radiating second audio signal output by at least one of the media presentation device or an audio system associated with the media presentation device, a comparator to compare the second audio signal to the first audio signal to form an output, and an output interface to provide a value indicative of whether the program selected by the user via the STB is presented at the media presentation device.2010-05-06
20100115574DIGITAL VIDEO RECORDER HAVING LIVE-OFF-DISK BUFFER FOR RECEIVING MISSING PORTIONS OF BUFFERED EVENTS - In accordance with one aspect of the invention, a method of receiving content over a content delivery system is provided. The method includes receiving a user request to initiate a rewind operation on content locally available in a live-off-disk (LOD) buffer. The content is associated with an event received over a content delivery system. If all of the event is not available in the LOD buffer, a message is communicated over the content delivery system to a headend requesting remaining content associated with an unreceived portion of the event. In response to the message, the remaining content is received from the headend over the content delivery system.2010-05-06
20100115575SYSTEM AND METHOD FOR RECORDING AND DISTRIBUTING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a digital video recording (DVR) system having a controller to record video content supplied by an interactive television (iTV) communication system, receive from a communication device of one of said users a request for a portion of the recorded video content, identify a need to transcode the requested portion of the recorded video content according to one or more operating characteristics of the communication device, transcode the requested portion of the recorded video content to conform with the one or more operating characteristics of the communication device, partition the transcoded video content into a plurality of transcoded portions, and transmit to the communication device the plurality of transcoded portions. The communication device can begin a presentation of the transcoded video content before all of the plurality of transcoded portions have been received. Other embodiments are disclosed.2010-05-06
20100115576FIRMWARE RECOVERY OF WIRELESS DEVICES - One embodiment may take the form of a method and apparatus for remotely providing firmware to a wireless device. The wireless device may be configured to detect when the device's firmware is corrupted or may need updating. The device may then transmit a request for a firmware image on a first wireless communication channel. If the request is answered by an updating device, the wireless device may establish a communication with, and begin receiving the firmware image from, the updating device. Further, the wireless device may verify transmitted data and send an acknowledgment message to the updating device for each transmitted data packet.2010-05-06
20100115577Method of Role Creation - A method and a computer program product for creating roles in an enterprise system comprising monitoring a system for instances of a change from a first normal user to a first super user; mapping said first user with a terminal; scanning said system to derive a plurality of commands executed from said terminal; mapping at least one of the plurality of command executed from said terminal to said first super user; and creating a first role comprising an authorization to execute the at least one command executed by said first super user.2010-05-06
20100115578AUTHENTICATION IN A NETWORK USING CLIENT HEALTH ENFORCEMENT FRAMEWORK - A network with authentication implemented using a client health enforcement framework. The framework is adapted to receive plug-ins on clients that generate health information. Corresponding plug-ins on a server validate that health information. Based on the results of validation, the server may instruct the client to remediate or may authorize an underlying access enforcement mechanism to allow access. A client plug-in that generates authentication information formatted as a statement of health may be incorporated into such a framework. Similarly, on the server, a validator to determine, based on the authentication information, whether the client should be granted network access can be incorporated into the framework. Authentication can be simply applied or modified by changing the plug-ins, while relying on the framework to interface with an enforcement mechanism. Functions of the health enforcement framework can be leveraged to provide authentication-based functionality, such as revoking authorized access after a period of user inactivity or in response to a user command.2010-05-06
20100115579SYSTEM AND METHOD FOR LOST DATA DESTRUCTION OF ELECTRONIC DATA STORED ON PORTABLE ELECTRONIC DEVICES - A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device communicates periodically with a server. If communications is note established between the client and the server for a selected activation interval and a subsequent grace period, the data is determined to be lost, and programmed security rules are automatically executed. Rules relating to encryption, as well as other security procedures, can be defined and entered by an administrator with access to the server, and then disseminated to each of a plurality of clients that access the server.2010-05-06
20100115580RETROSPECTIVE POLICY SAFETY NET - These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. The method comprises the further steps of submitting a second policy to the access control mechanism, comparing the log entries to the second policy, and based on the results of the comparing step, taking one of a predetermined number of actions.2010-05-06
20100115581SYSTEM METHOD AND DEVICE FOR MEDIATING CONNECTIONS BETWEEN POLICY SOURCE SERVERS, CORPORATE RESPOSITORIES, AND MOBILE DEVICES - The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.2010-05-06
20100115582SYSTEM, METHOD, AND DEVICE FOR MEDIATING CONNECTIONS BETWEEN POLICY SOURCE SERVERS, CORPORATE RESPOSITORIES, AND MOBILE DEVICES - The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.2010-05-06
20100115583METHOD FOR FAULT-TOLERANT USER INFORMATION AUTHENTICATION - A method for user information authentication which includes setting user information for a user account, such user information being the set user information; inputting user information by a user for the user account into a device, such user information being the input user information; evaluating the input user information for correspondence with the set user information according to fault-tolerant user information rules, wherein such rules evaluate the input user information for content and closeness to the set user information and noting if the input user information is a valid user information, a fault-tolerant user information, or an invalid user information; authorizing access to the user account if the input user information is a valid user information. In one embodiment of the invention, the method includes incrementing an invalid user information counter only if the user information is an invalid user information. In another embodiment of the invention, the method includes providing a message to the user if the user information is a fault-tolerant user information, the message being descriptive of the input user information's correspondence with the fault tolerant user information rules.2010-05-06
20100115584INFORMATION PROCESSING SYSTEM - An information processing system includes a client device and a server system. The client device executes an application program as a confidential process for performing processing based on confidential information. When a transmission request asking for transmission of confidential information is generated by the application program being executed, the client device transmits, to the server system, the transmission request and confidential process information indicating that the process in which the transmission request was generated is a confidential process. When the server system receives the transmission request and the confidential process information from the client device, the server system transmits stored confidential information in accordance with the received transmission request.2010-05-06
20100115585METHOD AND SYSTEM FOR SECURING A THIRD PARTY COMMUNICATION WITH A HOSTING WEB PAGE - A method and system for securing hosting web pages from malicious third party modules. The method includes uploading a third party module to a hosting web page; validating a proxy API call received from the third party module, wherein the proxy API call includes at least a payload parameter provided by the third party module; generating an engine API call including at least the payload parameter; validating the engine API call; and executing the payload parameter if the engine API call is validated.2010-05-06
20100115586MANAGING STORED DATA ON A COMPUTER NETWORK - A method and system for managing stored data on a computer network organizes data into logical volumes, and each logical volume has a friendly name associated with it. A domain controller keeps track of the friendly names of the logical volumes and associates those friendly names with the actual physical paths of the logical volumes. When a client computer on the network wishes to access a logical volume, it sends a look-up request having the friendly name to the domain controller. The domain controller may fulfill the request by sending the path of the logical volume to the client computer.2010-05-06
20100115587Authentication system and terminal authentication apparatus - After checking a receiving message appearing on an output device, a network administrator inputs an authentication result to a setting terminal using an input device, such as a keyboard. Upon receiving the authentication result from the network administrator, the setting terminal registers, if the received authentication result is permission to access a network device, a MAC address of a traveling employee's terminal that is the sender of the authentication request in the network device as an access permitted terminal. After the registering in the network device is completed, the setting terminal sends the authentication result indicative of permission to access the network device to the employee's terminal, i.e., the sender of the authentication request.2010-05-06
20100115588Prevent Unauthorised Subscriber Access Advertisement Service System - The present invent ion relates to a mobile advertisement system (2010-05-06
20100115589Apparatus for determining facsimile transmission authorizer and facsimile machine having the apparatus - In a facsimile machine having the function of authorization by the authorizer, an authorizer determining apparatus that can alleviate workload on the authorizers is provided, and a facsimile machine having such an authorizer determining apparatus is also provided. The authorizer determining apparatus for the facsimile machine includes a candidate selecting unit selecting, based on a sum of condition values of a plurality of attributes (such as sender, destination, and format of document to be transmitted) selected in advance for a facsimile transmission, a set of authorizer candidates consisting of possible authorizers having condition values not smaller than the sum, and an authorizer determining unit for determining an authorizer candidate having the lowest condition value among the set of authorizer candidates.2010-05-06
20100115590All Hazards Information Distribution Method and System, and Method of Maintaining Privacy of Distributed All-Hazards Information - An information distribution method includes: gathering all-hazards information into an information exchange from a first information source; gathering all-hazards information into the information exchange from a second information source; distributing the all-hazards information from the information exchange to a first independently-controlled alert network; distributing the all-hazards information from the information exchange to a second independently-controlled alert network.2010-05-06
20100115591METHOD AND SYSTEM FOR AUTHENTICATING USERS WITH OPTICAL CODE TOKENS - A method and apparatus are provided for authenticating users using cell phones or other mobile devices. The system finds particular application in authenticating users seeking to retrieve sensitive (e.g. personal, medical, safety, . . . etc.) information.2010-05-06
20100115592Systems and Methods to Control Access to Multimedia Content - Systems and methods to control access to multimedia are disclosed. A method includes receiving a request for multimedia content at a computing device, retrieving a destination address of a mobile communication device related to an authorized user of the computing device and determining whether the mobile communication device is located within a predetermined distance from the computing device. When the mobile communication device is located within the communicative distance from the computing device, the multimedia content is received at the computing device. When the mobile communication device is not located within the communicative distance from the computing device, an authorization-request message is transmitted via a network to the destination address of the mobile communication device, wherein the authorization-request message includes a request for authorization to receive the multimedia content at the computing device.2010-05-06
20100115593USER AUTHENTICATION CONTROL DEVICE, USER AUTHENTICATION DEVICE, DATA PROCESSING DEVICE, USER AUTHENTICATION CONTROL METHOD AND THE LIKE - This invention provides a use authentication control device, a user authentication device, a data processing device, and a user authentication control method and the like that control an authentication interval and an authentication effective period in accordance with a communication speed so as to make it possible to keep a balance between user convenience and safety. The user authentication device, which controls an authentication effective period for a user authentication device of a data processing device connected with a server device through a network, is provided with bandwidth acquiring means for acquiring a communication speed of the network and effective period determining means for determining an authentication effective period in accordance with the communication speed.2010-05-06
20100115594AUTHENTICATION OF A SERVER BY A CLIENT TO PREVENT FRAUDULENT USER INTERFACES - Protecting a user against web spoofing in which the user confirms the authenticity of a web page prior to submitting sensitive information such as user credentials (e.g., a login name and password) via the web page. The web page provides the user with an identifiable piece of information representing a shared secret between the user and the server. The user confirms the correctness of the shared secret to ensure the legitimacy of the web page prior to disclosing any sensitive information via the web page.2010-05-06
20100115595Method and Apparatus for Establishing Security Inflow Contracts - A method and apparatus for establishing a security inflow contract between a work-initiating system and a work-performing system. A portable, generic security inflow contract between an EIS/connector and an application server is provided that enables the connector to establish security information while submitting a work instance for execution to a work manager and while delivering messages to message endpoints of the application server. The security inflow contract enables all activities of a work instance that is submitted by a connector to be performed in the context of an established identity, thus insuring that all interactions between an application server and an EIS/connector are secure, and may prevent unauthorized access to application components deployed in an application server.2010-05-06
20100115596Method and System for Creating and Sharing Bookmarks of Media Content - A method for facilitating a bookmark server to create a bookmark from content associated with a content source is disclosed. The method comprises a remote device selecting a portion of the content associated with the content source, based on an input received via a user interface. The remote device then generates metadata associated with the selected portion of the content. The metadata includes information pertaining to the content source and the content. The remote device communicates with the bookmark server, which can access the content associated with the content source. The remote device sends the metadata to the bookmark server along with a request message to the bookmark server to create the bookmark based on the metadata.2010-05-06
20100115597COMPUTER READABLE MEDIUM, IMAGE PROCESSING SYSTEM, AND IMAGE PROCESSING DEVICE - The present invention is intended to optimize reference data to be used in biometric authentication, and to reduce the incidence of false authentication in actual biometric authentication compared to conventional biometric authentication. In order to achieve this, a computer readable medium on which a program causing said computer to operate as a system is stored comprising: a biometric information acquisition part 2010-05-06
20100115598METHOD AND ARRANGEMENT FOR INTEGRATION OF DIFFERENT AUTHENTICATION INFRASTRUCTURES - A method is disclosed that provides efficient integration of infrastructure for federated single sign on, e.g. Liberty ID-FP framework, and generic bootstrapping architecture, e.g. 3GPP GAA/GBA architecture. An integrated proxy server (IAP) is inserted in the path between a user and a service provider (SP). The proxy server differentiates type of access and determines corresponding operative state to act as a liberty enabled server or as a GAA/GBA network application function. A Bootstrapping, Identity, Authentication and Session Management arrangement (BIAS) leverages on 3GPP GAA/GBA infrastructure to provide an integrated system for handling Liberty Federated SSO and 3GPP GAA/GBA bootstrapping procedures at the same time. The method and arrangement provides improved use of infrastructure elements and performance for authenticated service access.2010-05-06
20100115599METHOD AND SYSTEM FOR SECURING DATA FROM A POINT OF SALE DEVICE OVER AN EXTERNAL NETWORK - A data control system allows point of sale devices (2010-05-06
20100115600METHOD AND SYSTEM FOR SECURING DATA FROM AN EXTERNAL NETWORK TO A POINT OF SALE DEVICE - A data control system allows point of sale devices (2010-05-06
20100115601Method and an apparatus for assessing a security of a component and a corresponding system - In a method and an apparatus for assessing of security of components, in particular, of components involved in safety-critical infrastructures, the assessment of security of the safety-critical component has an assessing of risks of the respective component and deriving of security measures for the component. Further, an assessing of a level of implementation for each standardized security measure is performed defined by a standard and/or requirement document for the component as well as evaluating of a resilience of the component against attacks directed to the component by performing test attacks against the component which are arranged by use of test cases defined by use of risk assessing results, and by use of implementation level assessing results for each standardized security measure. Thus, improved assessing of the security of components is enabled which can be used, e.g., for insurance of the security of safety-critical components and infrastructures.2010-05-06
20100115602METHOD AND SYSTEM FOR SECURING DATA FROM AN EXTERNAL NETWORK TO A NON POINT OF SALE DEVICE - A data control system allows non-point of sale devices (2010-05-06
20100115603METHOD AND SYSTEM FOR SECURING DATA FROM A NON-POINT OF SALE DEVICE OVER AN EXTERNAL NETWORK - A data control system prevents non-point of sale devices (2010-05-06
20100115604METHODS AND APPARATUS TO DYNAMICALLY CONTROL ACCESS FROM VIRTUAL PRIVATE NETWORKS TO NETWORK-BASED SHARED RESOURCES - Methods and apparatus to dynamically control access from VPNs to shared resources are disclosed. A disclosed example route reflector comprises a memory to implement a database, a user interface module to receive a request to permit access for a VPN to a shared resource, a BGP engine to process BGP advertisements, a network interface to receive a first BGP advertisement from a PE router associated with the VPN that includes a first RT associated with the VPN, and a shared resource access controller to update the database based on the request, to query the database to determine whether the VPN has access to the shared resource in response to the first BGP advertisement, and to direct the BGP engine to form a second BGP advertisement based on the first BGP advertisement that includes a second RT associated with the shared resource when the VPN has access to the shared resource.2010-05-06
20100115605METHODS AND APPARATUS TO DELIVER MEDIA CONTENT ACROSS FOREIGN NETWORKS - Example methods and apparatus to deliver media content across foreign networks are disclosed. A disclosed example method includes receiving a request from a subscriber of a media provider, the media provider associated with a native network and identifying a foreign network associated with a current location of the subscriber. The example method also includes identifying at least one quality of service (QoS) parameter associated with the foreign network, comparing the at least one foreign network QoS parameter with a first threshold value, and at least one of prohibiting a service delivered by the media provider when the at least one foreign network QoS parameter fails to meet the first threshold value, or enabling the service when the at least one foreign network QoS parameter meets the first threshold value.2010-05-06
20100115606System and methods for enabling customer network control in third-party computing environments - The present invention relates to a system and methods for enabling a user control in third-party computing environments or cloud computing via a virtual private network created by a control module, which contains parameters defined by the user. The system and methods are used to create a fault tolerant virtual private network that allows user control over addressing, security encryption, routing, and the enablement of multicast protocols, regardless of the prohibition set by the third-party computing environment.2010-05-06
20100115607SYSTEM AND METHOD FOR DEVICE SECURITY WITH A PLURALITY OF AUTHENTICATION MODES - A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security processing element randomly selects one of the authentication modes for presentation to the user. The user must successfully enter data corresponding to the randomly selected authentication mode. In an alternative embodiment, the security processing element can randomly select a plurality of authentication modes that are sequentially presented to the user. The user must successfully respond to each of the plurality of requested authentication modes. In another embodiment, for high security communications, the security processing element may select from a subset of authentication modes that are considered to be more robust. Conversely, the security processing element may select from a subset of randomly presented authentication modes that are considered less robust when used in a low security setting.2010-05-06
20100115608IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM FOR IMPLEMENTING THE METHOD - An image processing apparatus capable of reducing the frequency of a user's inputting work for authentication information to improve the convenience.2010-05-06
20100115609DEVICE FOR ACCESSING MEDICAL INFORMATION - A device for accessing medical information provides an emergency responder and/or emergency personnel the ability to access medical information in an emergency situation. The device can be used to access an individual's medical records for display, storage, and/or manipulation of the information on the device. The device can access an individual's medical information directly from the individual's mobile device, via removable memory, a SIM card, a port on the device, or the like. Thus, if there is no wireless access to the individual's mobile device, or the mobile device is inoperable, medical information is still obtainable.2010-05-06
20100115610METHOD AND SYSTEM FOR PROVIDING AUTHENTICATION THROUGH AGGREGATE ANALYSIS OF BEHAVIORAL AND TIME PATTERNS - A method and a system for evaluating identification of a user based on behavioral patterns and time patterns, including an analysis component for analyzing data; an authentication component for authenticating the analyzed data; and a behavioral biometric device for collecting behavioral biometric data related to the user, the authentication component and the analysis component operably connected at least with the behavioral biometric device; wherein the behavioral biometric data is matched against previously obtained or expected behavioral biometric data stored in a first database component of the analysis component in order to progressively, continuously, and incrementally evaluate the identification of the user to determine a confidence factor.2010-05-06
20100115611METHOD, DEVICE, AND SYSTEM FOR JUDGING USER AUTHENTICATION - A user authentication judging device includes a proper environment information memory unit, a proper environment judging threshold memory unit, a changed environment information collecting unit, an environment authentication judging unit, an authentication controlling unit, and a verification authenticating unit. The proper environment information memory unit stores proper environment information. The proper environment judging threshold memory unit stores a proper environment judging threshold. The changed environment information collecting unit detects a change in a use environment of an information processing device and collects changed use environment. The environment authentication judging unit determines whether to authenticate or not the changed environment based on proper environment information stored in the proper environment information memory unit. The authentication controlling unit instructs reception of living body information from an applicant, and setting of a proper environment judging threshold. The verification authenticating unit performs authentication judgment and verification of the living body information using the set proper environment judging threshold.2010-05-06
20100115612Context-Based User Authentication, Workflow Processing, and Data Management in a Centralized Application in Communication with a Plurality of Third-Party Applications - Described are computer-based methods and apparatuses, including computer program products, for providing context-based user authentication, workflow processing and data management in a centralized application in communication with a plurality of third-party applications. Changed data from a first third-party application is received by a centralized application. The changed data is processed by the centralized application. The processing comprises determining an urgency type, a second third-party application to which at least a portion of the data is applicable, mapping the data to a second third-party application data structure, and generating a request including the data structure and based on the urgency type and the second third-party application. The request is sent to the second third-party application. Data in a database associated with the centralized application is updated based on the changed data.2010-05-06
20100115613Cacheable Mesh Browsers - Methods and systems for improving the end-user experience by reducing the latency of data access across networks by accessing peer browser caches are disclosed. In one embodiment, a method of accessing a web data element includes: transmitting a first request for the web data element from a first browser to a home location of the web data element; transmitting a second request for the web data element from the first browser to one or more hosts including a second browser accessible by the first browser; receiving a cached copy of the web data element by the first browser from the second browser; and displaying the cached copy of the web data element. In another embodiment, a method of improving access to a web data element, includes: receiving a copy of the web data element at a first browser in response to a first request initiated from the first browser; storing the copy of the web data element in a cache controlled by the first browser as a cached web data element; receiving a request for the web data element from a second browser; and providing a copy of the cached web data element to the second browser.2010-05-06
20100115614DATA LOSS PROTECTION THROUGH APPLICATION DATA ACCESS CLASSIFICATION - A method and apparatus for classifying behavior of an application based on its data access pattern is described. In one embodiment, the method includes monitoring file access events associated with an application, and determining whether at least one of the file access events indicates the application's attempt to manipulate data of a file. If at least one file access event indicates the application's attempt to manipulate the data within the file, then at least one action is caused to be performed.2010-05-06
20100115615SYSTEM AND METHOD FOR DYNAMIC AND REAL-TIME CATEGORIZATION OF WEBPAGES - A system and method for categorizing content on a webpage is disclosed. The method comprises receiving a request for a webpage from a user's computer. Next, the system determines whether there is dynamic content on the webpage by analyzing the address, links, reputation, type, style and other indicators of being able to easily change the webpage. If the webpage contains content that can be changed, then the webpage is analyzed to determine a current categorization thereof. If the webpage does not have dynamic content then the categorization of the webpage will remain the same thereby freeing system resources by only analyzing dynamic webpages.2010-05-06
20100115616Storage Device and Method for Dynamic Content Tracing - A storage device and method for dynamic content tracing are provided. In one embodiment, a storage device stores content having a plurality of sequences of data, each sequence of data having original data and at least one variation of the original data. The storage device receives an identifier of a host device and, for each sequence of data, selects either the original data or one of the at least one variation of the original data based on the identifier of the host device. The storage device then assembles a version of the content from the selections and provides the assembled version of the content to the host device. The assembled version of the content is unique to the host device and therefore can be used to trace the assembled version of the content back to the host device.2010-05-06
20100115617Event Detection/Anomaly Correlation Heuristics - A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.2010-05-06
20100115618METHOD AND DEVICE FOR DETECTING UNKNOWN NETWORK WORMS - A method and device for detecting a network worm on the network allows early detection of an unknown network worm with less computational quantity based on a change of randomness occurring to network traffic without using a pattern-matching-based worm detecting method or a behavior-based worm detecting method.2010-05-06
20100115619METHOD AND SYSTEM FOR SCANNING A COMPUTER STORAGE DEVICE FOR MALWARE INCORPORATING PREDICTIVE PREFETCHING OF DATA - A method and system for scanning a computer storage device for malware is described. One embodiment keeps track of which portion or portions of each of a plurality of files on a computer storage device are requested for analysis by an anti-malware engine during a first scan of the computer storage device for malware; prefetches, during a second scan of the computer storage device for malware, the portion or portions of each of at least a subset of the plurality of files that were requested by the anti-malware engine during the first scan, the prefetched data being supplied to the anti-malware engine for analysis as requested; and takes corrective action responsive to the results of at least one of the first and second scans.2010-05-06
20100115620STRUCTURAL RECOGNITION OF MALICIOUS CODE PATTERNS - Various embodiments include an apparatus comprising a detection database including a tree structure of descriptor parts including one or more root nodes and one or more child nodes linked to from one or more parent descriptor parts chains, each of the root nodes representing a descriptor part, and each root node linked to at least one of the child nodes, each root node and each child node linked to any possible additional child nodes, wherein the possible additional child nodes include any possible successor child nodes and a descriptor comparator coupled to the detection database, the descriptor comparator operable to receive data including a plurality of logic entities, once or successively, and to continuously compare logic entities provided to the tree structure of descriptor parts stored in detection database, and to provide an output based on the comparison.2010-05-06
20100115621Systems and Methods for Detecting Malicious Network Content - A method for detecting malicious network content comprises inspecting one or more packets of network content, identifying a suspicious characteristic of the network content, determining a score related to a probability that the network content includes malicious network content based on at least the suspicious characteristic, identifying the network content as suspicious if the score satisfies a threshold value, executing a virtual machine to process the suspicious network content, and analyzing a response of the virtual machine to detect malicious network content.2010-05-06
20100115622System and method for monitoring network traffic - Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined. After the classification, a predetermined response is executed based on the classification of the traffic.2010-05-06
20100115623SYSTEM AND METHOD FOR ENABLING DISTRIBUTION OF MEDIA CONTENT USING VERIFICATION - A system and method are provided to enable distribution of media content across a network using physical verification. The system includes a media server configured to send media content across a local network. A storage device can be in communication with the media server, and the storage device may store media content having encryption and provide the media content to the media server. A media reader that is in communication with the media server can be checked by the media server to determine whether a recording of the media content on removable physical media is loaded in the media reader in order to allow the media server to distribute the media content previously stored on the storage device. An output device can be enabled to receive media content from the media server and to reproduce the media content for an end user.2010-05-06
20100115624METHOD AND SYSTEM FOR SECURING DATA FROM A POINT OF SALE DEVICE OVER A LAN - A data control system for a local area network (2010-05-06
20100115625POLICY ENFORCEMENT IN TRUSTED PLATFORMS - Embodiments of the invention relate to a trusted entity (2010-05-06
20100115626INTERACTIVE KEY CONTROL SYSTEM AND METHOD OF MANAGING ACCESS TO SECURED LOCATIONS - A security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users is managed using a searchable database that stores information on a plurality of places, a plurality of security mechanisms, and a plurality of security mechanism users. Program code provides access to the searchable database and interacts with database users using an Internet-accessible web site. The program code further authenticates each database user attempting to connect to the searchable database, and after authentication, interactively communicates a plurality of screens to database users, where each screen includes only hotlinks associated with security management operations for which those database users are authorized such that the screens do not include any hotlinks associated with security management operations for which the database users are not authorized.2010-05-06
20100115627APPARATUS AND METHOD FOR PROTECTING MEDIA CONTENT RIGHTS - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to maintain content rights parameters associated with media content and a user where the content rights parameters include limits to distribution of the media content to a plurality of communication devices associated with the user and where a portion of the plurality of communication devices use different communication protocols from another portion of the plurality of communication devices, monitor for access to the media content by one communication device of the plurality of communication devices of the user, and obtain rights control data that is adapted to allow for presentation of the media content by the one communication device of the user where the rights control data is generated based on the content rights parameters. Other embodiments are disclosed.2010-05-06
Website © 2025 Advameg, Inc.