19th week of 2011 patent applcation highlights part 60 |
Patent application number | Title | Published |
20110113399 | Methods and Systems for Optimizing Designs of Integrated Circuits - Methods and systems for optimizing and/or designing integrated circuits. One exemplary method includes routing, as part of a process of designing an integrated circuit (IC), connections on a representation of the IC using a first set of wiring resources and marking wiring resources as used once the wiring resources within the first set have been used for routing and routing, using a second set of wiring resources in the representation, connections on the IC without checking whether wiring resources within the second set have been previously used to route connections, wherein wiring resources in the second set differ, on average, in physical size, from wiring resources in the first set. Other methods and systems for optimizing and/or designing ICs are also described, and machine-readable media containing executable program instructions which cause systems to perform one or more of these methods are also described. | 2011-05-12 |
20110113400 | METHOD OF MAKING IN AN INTEGRATED CIRCUIT INCLUDING SIMPLIFYING METAL SHAPES - A method for simplifying metal shapes in an integrated circuit including receiving an incoming wire layout for at least one metal layer of an integrated circuit, the incoming wire layout for the at least one layer including a plurality of wires running in a preferred direction and a plurality of vias connected thereto. The method further includes segmenting each of the wires into a plurality of bricks according to a set of equally spaced parallel grid lines extending in direction which is perpendicular to the preferred direction such that each wire comprises a series of consecutive bricks with brick boundaries between consecutive bricks occurring at a grid line, defining each brick as a regular or complex brick based on at least one brick criteria, and defining brick groups based on one or more grouping criteria, wherein each group contains one or more consecutive bricks of a same wire and each brick belongs to only one group so that each wire comprises a series of one or more consecutive groups, and wherein groups containing at least one complex brick are defined as complex groups. | 2011-05-12 |
20110113401 | T-COIL NETWORK DESIGN FOR IMPROVED BANDWIDTH AND ELECTROSTATIC DISCHARGE IMMUNITY - A method of generating a circuit design comprising a T-coil network includes determining inductance for inductors and a parasitic bridge capacitance of the T-coil network. The parasitic bridge capacitance is compared with a load capacitance metric that depends upon parasitic capacitance of a load coupled to an output of the T-coil network. An amount of electrostatic discharge (ESD) protection of the circuit design that is coupled to the output of the T-coil network and/or a parameter of the inductors of the T-coil network is selectively adjusted according to the comparison. The circuit design, which can specify inductance of the inductors, the amount of ESD protection, and/or the width of windings of the inductors, is outputted. | 2011-05-12 |
20110113402 | REPRESENTING NON-FUNCTIONAL REQUIREMENTS (NFRS) IN UNIFIED MODELING LANGUAGE (UML) - Modeling non-functional requirements (NFRs) in a computer programming environment. In one aspect, this further comprises: identifying use case (UC) artifacts having one or more NFRs; retrieving the one or more NFRs and any data associated therewith; analysing the associated data to define a test case therefor; retrieving a UC realisation from a model to determine one or more possible program flows; and testing each possible program flow to select the test case which verifies the use case required, thereby modeling the NFR. | 2011-05-12 |
20110113403 | METHOD AND SYSTEM FOR GENERATING A SOURCE CODE FOR A COMPUTER PROGRAM - A method for the generation of a source code for a computer program for the execution or simulation of a complex process in which a multiplicity of subjects communicate with one another. In this method, the processes are described, the description of the processes is stored in a process file, and with the aid of the process file a source code for a computer program is generated, with a separate source code file being generated for each subject. Through the provision of a source code file for each subject, a complex process may be easily and therefore automatically split into several sub-programs, the source code files, which may be generated automatically. In this way it is possible to generate automatically a computer program for a very complex process. A further benefit of the method according to the invention is that it may be executed after automatic generation, i.e. it may be validated by an execution immediately after generation. | 2011-05-12 |
20110113404 | DEVICE AND METHOD FOR OPERATING COMMON MODULE IN SOFTWARE ARCHITECTURE - A device for operating a common module in a software architecture efficiently operating a software module using a closed M/G/1 queuing model of an extended form and a concept of a super-reserve module, and a method thereof are provided. The device includes a plurality of common modules for operating an application module, a plurality of backup modules for substituting for a crashed common module; and a module generating unit for substituting one of the plurality of backup modules for the crashed common module and for generating an additional plurality of backup modules when the plurality of backup modules are all substituted. | 2011-05-12 |
20110113405 | AUTOMATED METHOD AND SYSTEM FOR COLLECTING AND REPORTING API PERFORMANCE PROFILES - A method to measure the performance of an Application Programming Interface (API) includes selecting a target API and tracking memory allocation for the functional calls of the selected API to generate a list of functions called by the API. The individual functions are then called within the API in isolation and timing and memory allocation data for each are collected and recorded. The recorded results are then bucketized according to a log base 2 method and made accessible by API users to indicate the performance of specific APIs. | 2011-05-12 |
20110113406 | SYMMETRIC MULTI-PROCESSOR LOCK TRACING - A symmetric multi-processor SMP system includes an SMP processor and operating system OS software that performs automatic SMP lock tracing analysis on an executing application program. System administrators, users or other entities initiate an automatic SMP lock tracing analysis. A particular thread of the executing application program requests and obtains a lock for a memory address pointer. A subsequent thread requests the same memory address pointer lock prior to the particular thread release of that lock. The subsequent thread begins to spin waiting for the release of that address pointer lock. When the subsequent thread reaches a predetermined maximum amount of wait time, MAXSPIN, a lock testing tool in the kernel of the OS detects the MAXSPIN condition. The OS performs a test to determine if the subsequent thread and address pointer lock meet the list of criteria set during initiation of the automatic lock trace method. The OS initiates an SMP lock trace capture automatically if all criteria or the arguments of the lock trace method are met. System administrators, software programmers, users or other entities interpret the results of the SMP lock tracing method that the OS stores in a trace table to determine performance improvements for the executing application program. | 2011-05-12 |
20110113407 | Software routine fingerprints in performance data - Program profile data is used to prepare temporal cost-incurrence fingerprints, which show when a given method or method frame incurred specified cost(s) during a period of interest while a program was/is executing. Relationships between methods can be elicited by studying their temporal cost-incurrence fingerprints. Methods which are often good candidates for optimization can be automatically selected by identifying a small set of methods whose amount of cost lies within specified bounds relative to the most costly method, or in absolute terms, and whose respective fingerprints differ from one another. | 2011-05-12 |
20110113408 | PARTIAL ON-DEMAND LAZY SEMANTIC ANALYSIS - Computing responses to semantic queries. A method includes accessing a plurality of objects that represent source code for an input program. The source code is transformed into a plurality of immutable objects that are structured such that the immutable objects can be used to derive any response as defined by the semantic rules about the source code. A query is received from a requestor requesting a semantic characteristic of the input program. The semantic characteristic is calculated. The semantic characteristic is returned to the requestor. The semantic characteristic is cached in a cache. Information describing a dependency between the cached semantic characteristic and one or more of the objects in the plurality of objects is stored. | 2011-05-12 |
20110113409 | SYMBOL CAPABILITIES SUPPORT WITHIN ELF - Systems and methods for efficient compilation and execution of program code. A compiler generates a plurality of families of object files, wherein each family comprises a set of system capabilities different from a set of another family. A link-editor receives the object files and stores a symbol capabilities table in a symbol capabilities section of an object file with a new file format. A symbol is associated with one or more instances, wherein each instance is associated with a different set of capabilities. In various embodiments, system capabilities may include a particular operating system, special-function additional instructions, or otherwise. Subsequent to creation of the single object file with multiple instances of a given function, a runtime linker chooses a given instance based on the capabilities of the platform on which the code is to be executed. | 2011-05-12 |
20110113410 | Apparatus and Method for Simplified Microparallel Computation - The embodiments provide schemes for micro parallelization. That is, they involve methods of executing segments of code that might be executed in parallel but have typically been executed serially because of the lack of a suitable mechanism | 2011-05-12 |
20110113411 | PROGRAM OPTIMIZATION METHOD - A program optimization method according to the present invention includes a processing range decision step for deciding a part of a machine language program as a processing range to which a program optimization is applied based on a description included in a high-level language program, and an allocation decision step for deciding an allocation position of an instruction code in the processing range. The description specifies a correlative relation between a plurality of processing blocks of the high-level language program. In the processing range decision step, a program part equivalent to the processing blocks confirmed as having a correlative relation therebetween by a description of the machine language program is determined as the processing range. In the allocation decision step, the allocation position of the instruction code in the processing range is determined for each of the processing blocks based on the correlative relation specified by the description. | 2011-05-12 |
20110113412 | OBJECT LINKAGE DEVICE FOR LINKING OBJECTS IN STATICALLY LINKED EXECUTABLE PROGRAM FILE, METHOD OF LINKING OBJECTS, AND COMPUTER READABLE STORAGE MEDIUM STORING PROGRAM THEREOF - When a modification is applied to a statically linked executable program file, in the executable program file, an old object is replaced with a new object by adding the new object to a bottom of already-existing objects without changing the location of the old object, and the reference relationship of symbols among objects is updated and resolved and thereby a modification is applied. | 2011-05-12 |
20110113413 | Software Updates Using Delta Patching - Methods, apparatuses, and systems for software updates using delta patching are described. A first image representative of a first software stack and a second image representative of a second software stack may be combined into a compound image by a first computer. The first computer may compare the compound image and the first image to determine a difference between the compound image and the first image. The first computer may generate a file representative of the difference between the compound image and the first image, and data representative of the file representative of the difference between the compound image and the first image may be recorded to a computer-readable storage medium. | 2011-05-12 |
20110113414 | Software Updates Using Delta Patching - Methods, apparatuses, and systems for software updates using delta patching are described. A first computer may compare a first image representative of a plurality of software stacks, and a second image representative of at least one and less than all of the plurality of software stacks to determine a difference between the second image and the first image. The first computer may generate a file representative of the difference between the second image and the first image. The file may include data of instructions for removing each software stack of the plurality of software stacks represented in the first image and not represented in the second image from a second computer. Data representative of the file representative of the difference between the second image and the first image may be recorded to a computer-readable storage medium. | 2011-05-12 |
20110113415 | Multiple Invocation Points In Software Build Task Sequence - Methods, apparatuses, and systems for handling multiple invocation points in a software build task sequence are described. A computer may receive a task sequence. The task sequence may include instructions for combining a first image and a second image to form a third image, installing a first software stack on the computer from a fourth image, and installing a software component to a second software stack already installed on the computer. The computer may receive an indication of a start point to begin executing the task sequence, and may execute the task sequence beginning at the start point. | 2011-05-12 |
20110113416 | Network-Enhanced Control Of Software Updates Received Via Removable Computer-Readable Medium - Methods, apparatuses, and systems for network enhanced controls of software updates received via a computer-readable medium are described. A first computer may load data representative of an image of a software stack from a removable computer-readable storage medium. A task sequence of instructions for installing the data representative of the image of the software stack at the first computer may be requested from the first computer to a second computer. The first computer may receive the task sequence, and may access the task sequence to retrieve the instructions for installing the data representative of the image at the first computer. | 2011-05-12 |
20110113417 | Network-Enhanced Control Of Software Updates Received Via Removable Computer-Readable Medium - Methods, apparatuses, and systems for network enhanced controls of software updates received via a computer-readable medium are described. A request for identification information of an image version may be sent from a first computer to a second computer. The first computer may receive identification information of the image version. The first computer may determine whether data representing the image version is stored on a removable computer-readable storage medium. Responsive to determining that data representing the image version is stored on the removable computer-readable storage medium, the first computer may load the data representing the image version from the removable computer-readable storage medium. | 2011-05-12 |
20110113418 | Cross-Updating Of Software Between Self-Service Financial Transaction Machines - Methods, apparatuses, and systems for cross-updating of software between self-service financial transaction machines are described. A first computer may identify connection of a removable computer-readable storage medium to the first computer. The first computer may determine whether data representing a particular version of an image of a software stack for the first computer exists on the removable computer-readable storage medium. Responsive to determining that no data representing the particular version of the image of the software stack for the first computer exists on the removable computer-readable storage medium, data indicating that no data representing the particular version of the image of the software stack for the first computer exists on the removable computer-readable storage medium may be outputted, and data representing a second computer with data representing the particular version of the image of the software stack for the first computer may be outputted. | 2011-05-12 |
20110113419 | Programmatic Creation Of Task Sequences From Manifests - Method, apparatuses, and systems are described for receiving, by a computer, data representing a first manifest and a second manifest, the first manifest identifying at least some of a plurality of software components and the second manifest identifying at least some of the plurality of software components; determining a first one of the software components that is identified by the second manifest and not identified by the first manifest; generating, by the computer, a task sequence comprising instructions for installing the first one of the software components to a software stack; and recording, by the computer, data representing the task sequence to a computer-readable medium. | 2011-05-12 |
20110113420 | Distribution Of Software Updates - Methods, apparatuses, and systems for distribution of software updates are described. A first software component and a task sequence may be received at a computer. The task sequence may include instructions for installing the first software component at the computer. The computer may store the first software component and the task sequence in a computer-readable medium. The computer then may execute the task sequence to install, in the computer-readable medium, a software stack from an image of the software stack also stored in the compute-readable medium, and the first software component into the installed software stack. The task sequence may include instructions for de-installing a software component from the installed software stack. | 2011-05-12 |
20110113421 | Programmatic Creation Of Task Sequences From Manifests - Methods, apparatuses, and systems are described for receiving, by a computer, data representing a first manifest and a second manifest, the first manifest identifying at least some of a plurality of software components and the second manifest identifying at least some of the plurality of software components; determining a first one of the software components that is identified by the second manifest and not identified by the first manifest; generating, by the computer, a task sequence comprising instructions for creating a software stack from an image of the software stack, and for installing the first one of the software components to the created software stack; and recording, by the computer, data representing the task sequence to a computer-readable medium. | 2011-05-12 |
20110113422 | Programmatic Creation Of Task Sequences From Manifests - Methods, apparatuses, and systems are described for receiving, by a computer, data representing a plurality of manifests, each manifest identifying a different subset of a plurality of software components; generating, by the computer, and based on the manifests, a task sequence that indicates an order in which the plurality of software components are to be installed; and recording, by the computer, data representing the task sequence to a computer-readable medium | 2011-05-12 |
20110113423 | SYSTEM AND METHOD FOR INSTALLING SOFTWARE APPLICATIONS - An example method of installing an application onto an apparatus involves displaying an application menu screen comprising a fixed number of menu item display locations, at least one of the menu item display locations displaying a first menu item for an non-installed application. An announcement screen is displayed in response to selection of the first menu item for the non-installed application, the announcement screen comprising a selection item configured to initiate a downloading operation for the non-installed application. The downloading operation is initiated in response to selection of the selection item. The application can be installed/non-installed separately from other applications. | 2011-05-12 |
20110113424 | Distribution Of Software Updates - Methods, apparatuses, and systems for distribution of software updates are described. A first software component and a task sequence may be received at a computer. The task sequence may include instructions for installing the first software component at the computer. The computer may store the first software component and the task sequence in a logically protected region of the computer. The computer then may execute the task sequence to install the first software component in a current software stack of the computer. The task sequence may include instructions for de-installing a software component from the software stack on the computer. | 2011-05-12 |
20110113425 | Systems And Methods For Making Software Available For Download - In one embodiment, a system and method for providing software involve compiling software available for download in a database, prompting a user to select a product for which software is sought, receiving the user product selection, and presenting to the user software available for download, the software being intended for installation on the product that the user selected. | 2011-05-12 |
20110113426 | APPARATUSES FOR SWITCHING THE RUNNING OF A VIRTUAL MACHINE BETWEEN MULTIPLE COMPUTER DEVICES BELONGING TO THE SAME COMPUTER PLATFORM AND THE ASSOCIATED SWITCHING METHODS - An apparatus for managing a running virtual machine on a desktop or laptop platform includes a first computer device, a second computer device and a shared memory. The first computer device has a first switching hypervisor on which a virtual machine runs. The second computer device has a second switching hypervisor, wherein the second switching hypervisor is in communication with the first switching hypervisor. The shared memory is coupled to the first and second computer devices, and is accessible by the first and second switching hypervisors, wherein the first switching hypervisor stores status information of the virtual machine into the shared memory. When receiving a switching notification for switching the virtual machine to run on the second computer device, the first switching hypervisor halts its running of the virtual machine, and then the second switching hypervisor obtains the stored status information of the virtual machine from the shared memory and resumes the running of the virtual machine on the second computer device according to the obtained status information of the virtual machine. | 2011-05-12 |
20110113427 | VIRTUALIZATION METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A secure computing environment that prevents malicious code from “illegitimately” interacting with programs and data residing on the computing platform. While the various embodiments restrict certain programs to operate in a virtualized environment, such operation is transparent to the user from the operational point of view. Moreover, any program operating in the virtualized environment is made to believe that it has full access to all of the computing resources. To prevent a user from unknowingly or inadvertently allowing the program to adversely affect the computer, the user is also presented with “feel” that the program is able to perform all operations in the computing environment. | 2011-05-12 |
20110113428 | SCSI Protocol Emulation for Virtual Storage Device Stored on NAS Device - A virtualization technique, in accordance with one embodiment of the present invention, includes emulating the small computing system interface (SCSI) protocol to access a virtual SCSI storage device backed by a file stored on network attached storage (NAS). | 2011-05-12 |
20110113429 | INCIDENT MANAGEMENT METHOD AND OPERATION MANAGEMENT SERVER - An operation management server, including an incident-job relation specifying unit, is responsive to the occurrence of an incident generated in an business system to refer to the incident table for relating the incident to hosts and the job group definition table from a job management server in order to specify the job and job group to be executed by the host on which the incident is generated, a job execution estimation unit for specifying the job to be reexecuted due to the occurrence of the incident and the unexecuted job in the job group, and an impact on job execution calculation unit for determining the impact on job execution which is the influence by the incident on the business system by relating the incident to the specified job. | 2011-05-12 |
20110113430 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM STORING PROGRAM - An information processing system includes a setting unit, an obtaining unit, a calculating unit, a display information generating unit, and an updating unit. The setting unit sets activity schedule information indicating an activity schedule of a user in an evaluation target period on the basis of an activity which is selected from among plural activities. The obtaining unit obtains activity information specifying the activity that has been performed by at least one point of time within the evaluation target period. The calculating unit calculates a total environmental load value of the activity in the evaluation target period. The display information generating unit generates display information including the total environmental load value and a target value of an environmental load. The updating unit updates the activity scheduled in the activity schedule information. | 2011-05-12 |
20110113431 | Method and apparatus for scheduling tasks to control hardware devices - In a method of scheduling tasks for controlling hardware devices, a specified task having the execution right in a current time slice is terminated by depriving the execution right therefrom, when a time during which the execution right continues reaches the activation time given to the specified task. An identification process is performed when each reference cycle has been completed or each task has been terminated. In the identification process, i) when there remain, time-guaranteed tasks which have not been terminated in the current time slice, a time-guaranteed task whose priority is maximum among the remaining tasks is identified, and ii) when there remain no un-terminated time-guaranteed tasks in the current slice, of remaining non-time-guaranteed tasks which are not terminated yet in the current time slice, a non-time-guaranteed task whose priority is maximum is identified. The execution right is assigned to the identified task through the identification process. | 2011-05-12 |
20110113432 | COMPRESSED STORAGE MANAGEMENT - Compressed storage management includes assigning a selection priority and a priority level to multiple data units stored in an uncompressed portion of a storage resource. The management can further include compressing data units and storing the compressed data units in a compressed portion of the storage resource. The data units in the compressed portion are stored in regions, which each store data units having the same selection priority or the same selection priority level. | 2011-05-12 |
20110113433 | RESOURCE ALLOCATION METHOD, IDENTIFICATION METHOD, BASE STATION, MOBILE STATION, AND PROGRAM - Provided is a technique capable of reporting resource block allocation information with no waste when an allocated resource block is reported, because in the current LTE downlink, the waste of the amount of resource allocation information increases in some cases since a restriction is imposed such that 37-bit fixed scheduling information is transmitted. A resource block group consisting of at least one or more resource blocks continuous on the frequency axis is allocated to a terminal, and the number of controlling signals for reporting allocation information indicating the allocated resource blocks is determined. | 2011-05-12 |
20110113434 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR MANAGING COMPUTER PROCESSING FUNCTIONS - Exemplary embodiments include a system and storage medium for managing computer processing functions in a multi-processor computer environment. The system includes a physical processor, a standard logical processor, an assist logical processor sharing a same logical partition as the standard logical processor, and a single operating system instance associated with the logical partition, the single operating system instance including a switch-to service and a switch-from service. The system also includes a dispatch component managed by the single operating system instance. Upon invoking the switch-to service by standard code, the switch-to service checks to see if an assist logical processor is online and, if so, it updates an integrated assist field of a work element block associated with the task for indicating the task is eligible to be executed on the assist logical processor. The switch-to service also assigns a work queue to the work element block. | 2011-05-12 |
20110113435 | METHOD AND SYSTEM FOR IMPLEMENTING BUILT-IN WEB SERVICES ENDPOINTS - A method and system for processing Web service messages within an object oriented runtime environment is described. In one embodiment, the method includes steps for invoking a single instance of a state-less protocol for processing inbound and outbound flows of Web services messages. After determining Web services messages have been received out of order, processing of the outbound flow of any remaining messages is suspended until a complete set of messages is received. The messages are rearranged into proper order before completing processing of the outbound flows of the remaining messages. | 2011-05-12 |
20110113436 | Event Logging Application Programming Interface (API) - An event logging interface on a computer system is used to record an event when an application hosted by the computer system encounters the event. The event logging interface receives data pertaining to an event from the application. Using the event logging interface, the computer system determines a logical target of the event, and determines one or more physical destinations referenced by the logical target. The data is then dispatched to one of the physical destinations. | 2011-05-12 |
20110113437 | METHOD AND SYSTEM FOR MEDIA DISC LOSS PREVENTION - An apparatus, system and method discourage theft of a media disc. The media disc has a central aperture and is retained within a media disc case by an inner spindle that extends through the central aperture. A pin is insertable through the inner spindle. A locking clutch is operable to engage the pin. When engaged, the locking clutch secures the media disc upon the inner spindle and prevents the media disc from being removed from the inner spindle. A liquid-dispensing container is positioned between the pin and the media disc such that when a force is exerted upon the media disc to attempt to remove the disc from the inner spindle when the locking clutch is engaged, the liquid-dispensing container releases a liquid which renders the media disc unreadable. | 2011-05-12 |
20110113438 | METHOD AND SYSTEM OF DISPLAYING INFORMATION OF SPECIFIC INTEREST TO A USER ON A TELEVISION - A system and method of displaying information of specific interest to a user includes: rendering content on a television for a user and displaying first information on the television about the content, in response to a request from the user. In response to an additional request from the user, second information is displayed on the television about the first information, wherein the second information is acquired from a real time server conducted search. Purchase information is displayed on the television for products associated with the second information. In response to the user selecting the purchase information, a purchase transaction is initiated on the television. In some embodiments, a server records the purchase transactions and delivers targeted advertising to the television. | 2011-05-12 |
20110113439 | METHOD OF ELECTRONIC VOTING, DECODER FOR IMPLEMENTING THIS METHOD, AND NETWORK COMPRISING A VOTING SERVER FOR IMPLEMENTING THE METHOD - Method of electronic voting in a questionnaire, comprising:
| 2011-05-12 |
20110113440 | APPARATUS AND METHOD FOR TRANSMITTING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a computing device operative in an interactive television (iTV) network, including a controller to: receive a signal from a first communication device to start a first media evaluation session of media content and associate a first user-generated comment with the media content; receive, at a different time, a signal from at least a second communication device to start a second media evaluation session of the media content and associate a second user-generated comment with the media content; synchronize the first user-generated comment and the second user-generated comment into a single commentary timeline; and insert the synchronized user-generated comments in a temporal vicinity of the media content as an overlay for playback by a media device. Other embodiments are disclosed. | 2011-05-12 |
20110113441 | IPTV ACCESS CONTROL, PERSONALIZED ADVERTISEMENT, PERSONALIZED ELECTRONIC PROGRAM GUIDE PROVIDING METHOD AND SYSTEM USING FINGERPRINT SCANNER EQUIPPED SET-TOP BOX - Provided is a personalized program providing method and system. The personalized program providing system may provide a view restriction, a personalized advertisement, or a personalized program guide using a set-top box including a fingerprint scanner. The personalized program providing system includes a set-top box to scan a fingerprint using a fingerprint scanner to identify identification information associated with a user and to transmit the identified identification information to an Internet TV service providing server, an Internet TV service providing server to transmit a personalized program guide corresponding to the transmitted identification information to the set-top box, and an Internet TV set to provide the transmitted personalized program guide. | 2011-05-12 |
20110113442 | VIDEO CONTROL APPARATUS AND CONTROL METHOD FOR VIDEO CONTROL APPARATUS - Whether or not HDCP authentication is necessary is determined and managed for each device connected to an HDMI port. In selector control, when switching to an HDMI port to which is connected a video signal output apparatus that requires HDCP authentication, DDC access is turned off by setting an HPD signal to Low. Communication is then resumed after a predetermined amount of time has passed by setting the HPD signal to High and thereby turning the DDC access back on. When switching to an HDMI port to which is connected a video signal output apparatus that does not require HDCP authentication, the HPD signal is kept at High, and video and audio data is output without resuming the DDC access. | 2011-05-12 |
20110113443 | IP TV With DRM - A method of decrypting DRM encoded content in a DTV receiver involves receiving an encrypted license from a license server at the DTV receiver; providing a unique identifier for an integrated DTV SoC forming a part of the DTV television receiver; storing a secret key in an electronic fuse memory forming a part of the SoC, where the secret key is generated using an algorithm that utilizes the unique identifier for the SoC; where the received encrypted license is encrypted using the same secret key as is stored in the electronic fuse memory; decrypting the secret key using the key stored in the electronic fuse memory to produce a clear secret key; decrypting the encrypted license using the clear secret key to determine a content key; storing the license; and decrypting the DRM encoded content using the content key. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2011-05-12 |
20110113444 | Index of video objects - A system for indexing physical objects, locations and people, collectively referred to as video objects, which appear in videos. The system enables video object-level identification of TV and video content, and makes those video objects indexable, linkable, and searchable. | 2011-05-12 |
20110113445 | IMAGE DISPLAY APPARATUS AND METHOD - A method for operating an image display apparatus having a first display and a second display different from the first display includes displaying an image on the first display, displaying a search window on the second display, and displaying search results matching a search term entered in the search window. | 2011-05-12 |
20110113446 | METHOD AND SYSTEM FOR REMOTE TUNING AND CLOCK SYNCHRONIZATION - The disclosed embodiments relate to a system for providing remote tuning and clock synchronization in a network. The system includes a device that receives a signal that includes a plurality of channels, a device that receives a user request indicative of a desire to view at least one of the plurality of channels, and a filter that filters the received signal and transmits a user signal corresponding to the at least one of the plurality of channels to the user. An alternative embodiment of the system includes a device that receives a signal that includes a plurality of packets, at least a portion of the plurality of packets comprising an embedded time stamp, a device that detects the at least a portion of the plurality of packets containing the embedded time stamp, and a device that computes an adjusted time stamp based on the embedded timestamp and a precision local clock and incorporates the adjusted timestamp into the at least a portion of the plurality of packets containing the embedded timestamp prior to transmitting the at least a portion of the plurality of packets to the network. | 2011-05-12 |
20110113447 | IMAGE DISPLAY APPARATUS AND OPERATION METHOD THEREFOR - A method and apparatus may be provided. A plurality of thumbnail images may be generated based on received television signals, the thumbnail image being at least one of a still image or a moving image. A thumbnail list may be sent for output on the display. The thumbnail list may include a portion or all of the plurality of thumbnail images. A thumbnail image may be identified as belonging to one of a plurality of groups, each group being classified based on at least one of a prescribed setting or data of the television signal. Additionally, based on the groups, the thumbnail images belonging to one group may be differentiated based on at least one of color or icon from the thumbnail images belonging to another group. | 2011-05-12 |
20110113448 | Adaptable Programming Guide for Networked Devices - An electronic content guide is disclosed. The electronic content guide preferably includes a source field for listing content sources and output devices. The electronic content guide also includes a first content field for listing schedule data corresponding to first content data presently available for viewing from each one of the content sources and for listing display information corresponding to the first content data being displayed for viewing at a present time by each one of the output devices. Preferably, the source field and the first content field are displayable in parallel columns. The electronic content guide can also include a second content field, displayable in a column parallel to the source field and the first content field, corresponding to a second content data. In one embodiment, the first content data from each content source can be displayed simultaneously on more than one of the output devices. | 2011-05-12 |
20110113449 | Online EPG - Display features of an interactive user interface for an online environment allow a user to interact with objects and/or information within a display space. | 2011-05-12 |
20110113450 | ENHANCED TELEVISION EXTENSION - A method may include receiving an enhanced television (ETV) application in a video client over a first data path and executing the ETV application in the video client. In one embodiment, the ETV application may include an enhanced television binary interchange format (EBIF) resource. The method may also include extracting, from the EBIF resource, an identifier of an extension application and requesting the identified extension application. The method may include receiving the extension application, over a second data path different than the first data path and executing the extension application. | 2011-05-12 |
20110113451 | METHOD OF REPRODUCING FROM STORAGE MEDIUM INTERACTIVE GRAPHICS STREAM ACTIVATED IN RESPONSE TO USER'S COMMAND - A reproducing method of reproducing from a storage medium video data and graphics data for displaying a menu screen is provided. The reproducing method includes decoding graphics data, outputting the decoded graphics data when an activation command is generated by a user and the decoded graphics data is first graphics data, and outputting the decoded graphics data at a designated time when the decoded graphics data is second graphics data. The outputting of the first graphics data ends when an output finish time is reached and the first graphics data is deleted from a buffer of a decoder that performed the decoding of the graphics data. When the outputting of the first graphics data ends, an activation command generated by the user is ignored. | 2011-05-12 |
20110113452 | Terminating Enhanced Television Broadcasts - An enhanced television broadcast system may enable the transmission and reception of a real-time event when a new program is about to begin. The real-time event may control access to enhancements from the program that is ending. In some embodiments, these real-time events may constitute triggers that are included within packets transmitted in an Internet Protocol multicast. As one example, the trigger may include a Uniform Resource Locator in the form of a tv: protocol that automatically causes the television display to go to full screen television. | 2011-05-12 |
20110113453 | Methods for Displaying Video Monitoring Applications and Services Across Heterogeneous Networks - Methods for the deployment of an image servicing platform over a mobile wireless network ate described. A mobile multimedia service controller (MMSC) includes a video gateway that is capable of transcoding among different video formats supported by an imaging service platform. The MMSC can be connected over a network to a download server that provides updates to a transcoder application and a video image application. | 2011-05-12 |
20110113454 | SYSTEMS AND METHODS FOR DISTRIBUTING USER GENERATED CONTENT - A television provider receives content from a plurality of users. The user generated content is aggregated and scheduled for broadcast across a channel of the television provider. The user generated content is then broadcast at the scheduled time for reception by communication devices associated with the television provider. | 2011-05-12 |
20110113455 | System and Method for a Managed Network with Quality-of-Service - Systems and methods for establishing Parameterized QoS flows in a managed network can include a Designated Network Node (like a Network Controller or any network node) discovering a plurality of network nodes. The Designated Network Node discovering one or more of the plurality of network nodes; classifying the discovered network node or nodes based on node type; determining from the classification which node or nodes are designated for supporting Parameterized QoS flows; and invoking a request to a MoCA layer to create Parameterized QoS flows between the network node or nodes classified as designated for Parameterized QoS flows and the source nodes (like BHR and DVRs); wherein the bandwidth designated for the individual Parameterized QoS flows is either a nominal value or actual value specified by the Designated Network Node such that the actual aggregate bandwidth for the Parameterized QoS flows does not exceed the network bandwidth available for actual Parameterized QoS flows; wherein when actual bandwidth is specified for each flow, the Designated Network Node can preempt some PQoS flows in order to release PQoS bandwidth for a new PQOS flow; wherein the Designated Network Node is provisioned with a trusted device list designating nodes for supporting PQoS flows, and preemption rules that can be used for preemption. | 2011-05-12 |
20110113456 | METHOD FOR PROVIDING DIGITAL BROADCASTING SERVICE AND STREAMING SERVICE IN A PORTABLE TERMINAL - A method for providing a digital broadcasting service and a streaming service in a portable terminal is provided. The method include receiving a request for moving a play position of broadcast content provided via the digital broadcasting service, determining whether streaming content corresponding to the broadcast content is available, the streaming content being provided in the streaming service, and playing the streaming content from the moved play position in a streaming fashion. | 2011-05-12 |
20110113457 | DISTRIBUTED PLATFORM OF TELEVISION BROADCASTING SYSTEM STRUCTURE BASED ON INTERNET PROTOCOL NETWORK - A distributed interne protocol television network system is provided which can expand its bandwidth and support an unlimited number of content and program providers because encrypted and packetized video is streamed by the content and program providers directly to the end user through a broadband network and not through a network operations center that is part of the system. The video will appear to the end user as if it came from the network operating center but it does not. The network operating center has a management function that requires less bandwidth. The distributed network structure will include broad-caster servers supplied to each of the content or program providers and acting in cooperation with management software in the network operating center that supports operation of the network. | 2011-05-12 |
20110113458 | APPARATUS AND METHOD FOR PRODUCT TUTORIALS - A system that incorporates teachings of the present disclosure may include, for example, a set-top-box (STB) having a controller to present media content supplied by a content provider operating in an interactive television (iTV) network, wherein the media content comprises a tutorial for one of a product and a service, the tutorial comprising steps for utilizing one of the product and the service, access via a graphical user interface (GUI) a client program, wherein the client program presents an overlay that superimposes onto the media content, receive a user-generated comment, wherein the user-generated comment is associated with the media content by the client program, transmit the user-generated comment to a third party for analyzing the user-generated comment and determining parameters for evaluating at least one of the product and service tutorial, wherein replacement media content is generated by the third party based on the determined parameters. Other embodiments are disclosed. | 2011-05-12 |
20110113459 | System and Method for Internet Protocol Television Network Status Notifications - A method of running a network status module in a set-top box device is disclosed. A loss of a portion of a signal in an Internet Protocol television network is detected. When interference of the signal is cause over a connection between the set-top box device and the residential gateway, a first icon to indicate a first failure in a connection between the set-top box device and a residential gateway on a display device is displayed. When the interference of the signal is over the wide area network of the Internet Protocol television network, a second icon to indicate a second failure in a wide area network of an Internet Protocol television network is displayed. | 2011-05-12 |
20110113460 | Media Processing System Based on Satellite Set Top Box Platform with Telephony Downstream and Upstream Data Paths - Systems and methods that provide satellite-based media processing are described. In one embodiment, a system that exchanges media may include, for example, a communications device that may be coupled to a network and to an antenna. The communications device may provide two-way communications with the network and may provide one-way communications with the antenna. The communications may receive media content from the antenna and/or the network. The communications device may send the media content to the network | 2011-05-12 |
20110113461 | VIDEO ANALYTICS BASED CONTROL OF VIDEO DATA STORAGE - A method comprises receiving first video data at a source end, the first video data including video data relating to an event of interest captured using a video camera disposed at the source end. The first video data is retrievably stored in a memory storage device. Video analytics is performed on the first video data to identify a first portion of the first video data that is representative of the event of interest. Subsequently, portions of the first video data other than the first portion are deleted from the memory storage device. | 2011-05-12 |
20110113462 | FAILOVER WITH REDUNDANT MULTICASTS FOR SWITCHED DIGITAL VIDEO - A method and system for delivering content is provided. In one example, responsive to a request by a client device identifying a video program, the system is configured to determine different first and second network paths for delivery of the video program from a content source; deliver the video program via the first network path to the client device; and responsive to a change in status of the video program being delivered via the first network path, deliver the video program via the second network path to the client device. | 2011-05-12 |
20110113463 | Build Profile for a Set-Top Box - One embodiment of the present disclosure takes the form of a method for generating a profile of a build program for one or more set-top box platforms supported by a satellite distribution system. The one or more build profiles may maintain information about the one or more the modules and sub-modules of the build program, including but not limited to a memory address indicating the location of each module of the build program in the memory components of the set-top box. In another embodiment, the build profile may also maintain the relative offset address of each module of the build program from the beginning of the build program, an indicator of each module and sub-module and the amount of memory that each module comprises when stored in memory. | 2011-05-12 |
20110113464 | SET-TOP BOX AND ELECTRONIC DEVICE AND METHOD FOR IMPROVING MONITORING QUALITY THEREOF - A set-top box includes a receiving unit, a processing unit, a transmitting unit, and a capturing unit. The receiving unit is adapted to receive an external signal from an external signal source. The processing unit is adapted to improve the quality of the video signal in the external signal. The transmitting unit is adapted to transmit the processed external signal to a display device such that the processed external signal is reproduced by the display device. The capturing unit adapted to capture video images of a monitored area. The processing unit further improves the quality of the captured video images. | 2011-05-12 |
20110113465 | METHOD AND SYSTEM FOR IDENTIFYING SET-TOP BOX IN DOWNLOAD CONDITIONAL ACCESS SYSTEM - A set-top box identification method and system for identifying the set-top box which is currently connected to a Downloadable Conditional Access System (DCAS) based on set-top box manufacturer and/or set-top box model are provided. The set-top box identification method for the DCAS includes retrieving set-top box type information upon receipt of a set-top box information request transmitted by a DCAS headend, transmitting the set-top box information including the set-top box type information to the DCAS headend, and identifying, at the DCAS headend, the set-top box based on the set-top box information. The DCAS headend can acquire the information on the connected set-top box at any time and determine the manufacturer and model of the set-top box from the set-top box information. | 2011-05-12 |
20110113466 | Systems and Methods for Processing and Managing Object-Related Data for use by a Plurality of Applications - A computer-implemented method for indexing data for use by a plurality of applications may include receiving a data object at a first application of a plurality of applications. The method may include tokenizing the common-form data object to extract tokens from the data object and creating an index of the tokens extracted from the data object, the index being formatted to be utilized by each of the plurality of applications. The method may further include storing the index in a database that is accessible by the plurality of applications. The plurality of applications may comprise two or more application types. Various other methods and systems are also disclosed. | 2011-05-12 |
20110113467 | SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS - A method in one example implementation includes selecting at least one criterion for controlling data transmission from within a virtual machine. At least one application is included within the virtual machine, which includes a policy module. The selected criterion corresponds to at least one policy associated with the policy module. The method also includes evaluating the selected criterion of the policy to permit an attempt to transmit the data from within the virtual machine. In more specific embodiments, the policy may include a plurality of criteria with a first selected criterion permitting transmission of the data to a first application and a second selected criterion prohibiting transmission of the data to a second application. In another specific embodiment, the method may include updating the policy module through an administration module to modify the selected criterion. | 2011-05-12 |
20110113468 | ESTABLISHING AND ENFORCING SECURITY AND PRIVACY POLICIES IN WEB-BASED APPLICATIONS - Method, system, and computer code for implementing privacy protection in a web application, wherein the web application is executed in a web application language execution environment within a web server, the method containing the steps of: establishing at least one inbound tagging rule for tagging objects entering the web application language execution environment, referred to as inbound objects, according to a respective source of each of the inbound objects; assigning a tag to at least one of the inbound objects being operated on by the web application language execution environment based on the at least one inbound tagging rule; establishing at least one privacy rule for performing privacy actions on at least one object that is outbound from the web application language execution environment, referred to as outbound objects, according to a respective tag of each of the outbound objects; and performing a privacy action on the at least one outbound object being operated on by the web application language execution environment based on the at least one privacy rule. | 2011-05-12 |
20110113469 | Network synchronization system and information processing apparatus - In a network synchronization system, setting information synchronized among plural information processing apparatuses contains at least user information; user operating policy information; first equipment group information that prescribes a first equipment group to which the information processing apparatus belongs; and equipment operating policy information. The information processing apparatus includes a user authentication unit; a storage unit that stores the setting information and second equipment group information that prescribes a second equipment group to which the information processing - apparatus belongs; and an operating policy generation unit that generates an applied operating policy to be applied to a login user. The operating policy generation unit generates, when the second equipment group information is contained in the first equipment group information, the applied operating policy in accordance with the equipment operating policy information corresponding to the first equipment group information in preference to the user operating policy information corresponding to authenticated user information. | 2011-05-12 |
20110113470 | MASHUP SERVICE DEVICE AND SYSTEM, AND METHOD FOR ESTABLISHING AND USING MASHUP SERVICE - A mashup service terminal, a mashup service server, a mashup service system, a method for establishing a mashup service, and a method for using a mashup service are provided. A user terminal capability is introduced into the mashup service as a service and an information source of a mashup application, so that a user can establish and use the mashup service conveniently and flexibly, and the user experience is improved. | 2011-05-12 |
20110113471 | METHOD AND APPARATUS FOR CONTEXT-BASED CONTENT MANAGEMENT - In one embodiment, a system for context-based management of cached content includes policy and context servers. The policy server makes policy decisions controlling, e.g., usage of a content cache by a user, based on a contextualized policy that includes one or more context-dependent policy rules. The context server collects context information for the user and generates the contextualized policy by inserting the updated context-parameter(s) into the context-dependent policy rule(s). The policy server thus obtains or otherwise updates the contextualized policy responsive to a policy decision request received from a caching agent operating as a policy enforcement point, and returns a policy decision to the caching agent. In support, the context server may be configured to collect context information for the user at least in part by receiving context information from a user agent associated with the user. | 2011-05-12 |
20110113472 | Integrated Virtual Desktop and Security Management System - An integrated virtual desktop and security management system provides the virtual desktop server functionality and, more importantly, security management for computing devices and servers in the corporate data network. The computing devices include computers running virtual desktop client software and computers running a complete operating system and applications. The system in this invention can intercept data packets exchanged among the computing devices and servers and also can scrutinize virtual machine computing and networking activities, and therefore, possess the capability of analyzing, logging, reporting, and permitting or denying computing and networking activities of devices in the corporate data network. | 2011-05-12 |
20110113473 | METHOD OF ACCESSING APPLICATIONS IN A SECURE MOBILE ENVIRONMENT - A method of accessing in a mobile communication device ( | 2011-05-12 |
20110113474 | NETWORK SYSTEM SECURITY MANAGMENT - A network system loads operating system (OS) software that includes a switch role tool (SRT). The SRT provides the network system with security management capability that employs a hostname attribute within a user role definition. The user role definition provides for user restrictions to database information and other user actions within the network system. During a user login or switch role command, the security management method interrogates the login location or hostname of the login along with the user request. If that login meets the criteria that the network system stores as a user role attribute for that particular user, the network system allows the login request and action. If that login does not meet the criteria that the network system stores as a user role attribute for that user, the network system denies the login request. The network system grants the user an access privilege level that varies with the determined location or hostname from which the user attempts to login. | 2011-05-12 |
20110113475 | NODE FOR A NETWORK AND METHOD FOR ESTABLISHING A DISTRIBUTED SECURITY ARCHITECTURE FOR A NETWORK - The invention relates to a node ( | 2011-05-12 |
20110113476 | METHOD AND DEVICE FOR GENERATING A TIME-DEPENDENT PASSWORD - There is provided a system and method for generating a time-dependent password in a security device using time information. An exemplary method comprises checking whether the security device has access to an external time signal. The exemplary method also comprises requesting a user of the security device to enter the time information, if it is determined that the security device has no access to the external time signal. The exemplary method additionally comprises generating a time-dependent password using the time information entered in response to the request. | 2011-05-12 |
20110113477 | INFORMATION PROCESSING APPARATUS, INFORMATION PROVIDING SERVER, PROGRAM, COMMUNICATION SYSTEM, AND LOGIN INFORMATION PROVIDING SERVER - In one example embodiment, the communication system disclosed herein includes an information processing apparatus that acquires address information from a memory device having a free area including the address information and a secure area including account information. The information processing apparatus connects to a resource of a server using the acquired address information. The information processing apparatus causes a security server to acquire the account information from the memory device and transmit the acquired account information to the server such that the server enables a user to access the resource of the server using the account information. | 2011-05-12 |
20110113478 | METHOD OF SECURING FRANKING VIA A TELECOMMUNICATIONS NETWORK - A method of securing franking, said method comprising the following operations:
| 2011-05-12 |
20110113479 | PERSONAL TOKEN HAVING ENHANCED SIGNALING ABILITIES - The invention relates to a personal token including a microprocessor and a memory, said personal token storing and running a software entity which constitutes an end-point for communication over the internet. The software entity constitutes an end-point according to a signaling protocol over the internet and the signaling protocol is of the type intended when the session for real-time conferencing is initiated between end-points. | 2011-05-12 |
20110113480 | CARRIER-GRADE PEER-TO-PEER (P2P) NETWORK, SYSTEM AND METHOD - A computing network, including: a plurality of peer computing devices including code, which when executed by a peer computing device causes the executing peer computing device to cooperate with at least one other of the peer computing devices; at least one server including code, which when executed by the at least one server locates at least one of the peer computing devices; and at least one mediator including code, which when executed by the at least on mediator collects information from at least some of the peer computing devices; wherein, the peer computing devices, at least one sever and at least one mediator are communicatively coupled via an at least carrier-grade telecommunications network being suitable for enhancing co-operation among the cooperating ones of the peer computing devices relative to best-efforts communications among the cooperating ones of the peer computing devices. | 2011-05-12 |
20110113481 | IP SECURITY CERTIFICATE EXCHANGE BASED ON CERTIFICATE ATTRIBUTES - Architecture that provides Internet Protocol security (IPsec) certificate exchange based on certificate attributes. An IPsec endpoint can validate the security context of another IPsec endpoint certificate by referencing certificate attributes. By facilitating IPsec certificate exchange using certificate attributes rather than solely certificate roots, it is now possible to build multiple isolated network zones using a single certificate authority rather than requiring one certificate authority per zone. Moreover, the ability to use certificate attributes during the IPsec certificate exchange can be leveraged for more focused communications such as QoS (quality of service). Certificate attributes can be utilized to identify the security context of the endpoint. The IPsec certificate use can be locked down to a single IP or group of IPs. | 2011-05-12 |
20110113482 | Method And Apparatus For Automatic Filter Generation And Maintenance - Automatic filter generation and maintenance comprises detecting, from network packets, an IP address and a first MAC address; the IP address and the first MAC address are used to determine that the IP address and another MAC address that are detected in second network packets is an illegal binding and the other MAC address is different from the first MAC address; causing a network element to create, in an ARP filter, based on the IP address and the first MAC address, rules that cause the network element to prevent an address resolution protocol table from including a binding that includes only one of the IP address and the first MAC address; in response to detecting the IP address and said another MAC address in the second network packets, preventing the address resolution protocol table from including the illegal binding that includes the IP address and the other MAC address. | 2011-05-12 |
20110113483 | VIRTUAL HOST SECURITY PROFILES - Architecture that creates and applies a virtual firewall profile for each network to which a multi-homed device is connected. In one implementation, the virtual profiles can be based on address ranges of the networks. This ensures seamless concurrent connectivity of the multi-homed device to multiple networks. | 2011-05-12 |
20110113484 | UNIFIED SYSTEM INTERFACE FOR AUTHENTICATION AND AUTHORIZATION - A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication. | 2011-05-12 |
20110113485 | CREDENTIAL DEVICE PAIRING - In one or more implementations, a computing device receives an indication that a device is attempting to pair with the computing device. If a user is not currently authenticated with respect to the computing device, inputs received by the device are restricted from being used by the computing device for uses other than authenticating the user. | 2011-05-12 |
20110113486 | Credentialing User Interface for Gadget Application Access - An approach is provided to receive a selection of a displayed window from a group of displayed windows that are visible on a display. The displayed window corresponds to a software application and the displayed window is displayed at a location on the display. Another displayed window is shown visually animating and forming from the first displayed window. An authentication input dialog is displayed on the second displayed window, with the displayed authentication input dialog corresponding to the software application. Authentication data is received at the authentication input dialog and is authenticated. | 2011-05-12 |
20110113487 | ICON CARD VERIFICATION SYSTEM - An identity verification system uses a master key formed of first and second sets of symbols arranged in a one to one relationship. A distinct public key is assigned to each user of a plurality of users. A unique private key is established for each user and formed of at least some of the first symbols in the first set. The symbols of the private key for a user are placed in an arrangement where each first symbol is distinctly identifiable by a location. The first symbols in the arrangement are translated to a visual corresponding second symbol from the master key. Upon receiving the public key of one user, an identity validation challenge formed of at least two locations of the second symbols in the arrangement is presented to the user. The identity of the user is validated upon receiving the correct second symbols corresponding to the challenge locations. | 2011-05-12 |
20110113488 | ACCESS TO USER INFORMATION - A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information. | 2011-05-12 |
20110113489 | SYSTEM AND METHOD FOR MITIGATING A DENIAL OF SERVICE ATTACK IN A SUBSCRIBER NETWORK - A system and method for mitigating a denial of service attack in a subscriber network. A traffic monitor monitors bandwidth usage of a subscriber network that is directed to a particular port. The traffic monitor detects excessive traffic based on preset thresholds or algorithms. When excessive traffic is detected, the traffic monitor may obtain the source IP address from headers in the packet stream and identify the device or devices from which the packets were delivered to the network. Using the IP addresses of affected devices, a policy may be implemented to throttle packets originating from those devices that are directed to the particular port. | 2011-05-12 |
20110113490 | TECHNIQUES FOR PREVENTING ATTACKS ON COMPUTER SYSTEMS AND NETWORKS - Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions. | 2011-05-12 |
20110113491 | COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK - The present invention is a system for using a collective computing power of a plurality of network stations in a communication network in order to overcome threats generated by malicious applications. Collaboratively, a large group of simple network stations implement a vaccination mechanism, proliferating information concerning malicious applications (malwares) throughout the network in an efficient manner. | 2011-05-12 |
20110113492 | METHOD FOR CONTROLLING THE USE OF A CONDITIONAL ACCESS CONTENT AND MULTIMEDIA UNIT FOR IMPLEMENTING SAID METHOD - The present invention concerns a method for controlling the use of a conditional access content (C | 2011-05-12 |
20110113493 | SOFTWARE LICENSE MANAGEMENT IMPACT ANALYSIS - A computer implemented method, program product, and system for managing software licenses is presented. A licensing management logic executes an initial reconciliation run for an initial system. The licensing management logic detects a change to an initial subunit to create a changed subunit, and executes an impact analysis for the changed subunit. The licensing management logic identifies a subunit reconciliation section from the initial reconciliation run, and executes a subunit reconciliation run for the changed subunit to create a changed subunit reconciliation report. The licensing management logic replaces the initial subunit reconciliation report with the changed subunit reconciliation report to create an updated reconciliation report for a changed system. | 2011-05-12 |
20110113494 | Serine Hydroxymethyltransferase as Target for Herbicides - The present invention relates to serine hydroxymethyltransferase (E.C. 2.1.2.1) as novel target for herbicides, and to nucleic acid sequences encoding a polypeptide with the biological activity of a serine hydroxymethyltransferase, which, when not present, bring about growth retardation symptoms and chlorotic leaves, comprising the nucleic acid sequence SEQ ID No:3, and functional equivalents of the abovementioned nucleic acid sequence or the nucleic acid sequence SEQ ID NO:7 and functional equivalents of the abovementioned nucleic acid sequence. Moreover, the present invention relates to the use of the abovementioned nucleic acid sequences, of functional analogs of the SEQ ID NO:3 or SEQ ID NO:7 or of polypeptides encoded by one of the abovementioned nucleic acid sequences in a method for identifying herbicidally active compounds which inhibit serine hydroxymethyltransferases, and to the use of these compounds which have been identified by the method as herbicides. | 2011-05-12 |
20110113495 | SCREENING METHOD FOR AGENTS SUITABLE FOR PROPHYLAXIS AND THERAPY OF ALZHEIMER'S DISEASE (AD) - Described is a method of screening for a therapeutic agent useful in the prophylaxis or treatment of AD comprising detecting oligomers of a peptide comprising an APP-G | 2011-05-12 |
20110113496 | TRANSGENIC NON-HUMAN ANIMAL AND METHODS FOR STEM CELL ENGRAFTMENT - Transgenic immunodeficient non-human animals according to embodiments of the present invention are described which include in their genome a nucleic acid encoding xenogeneic Stem Cell Factor operably linked to a promoter. Administration of xenogeneic hematopoetic stem cells to the inventive transgenic animals results in engraftment of the xenogeneic hematopoetic stem cells and xenogeneic leukocytes are produced in the animals, without conditioning such as without conditioning by irradiation and without conditioning by a radiomimetic agent. | 2011-05-12 |
20110113497 | MONOCLONAL ANTIBODIES AGAINST GONADOTROPIN-RELEASING HORMONE RECEPTOR - Monoclonal antibodies against gonadotropin releasing hormone (GnRH) receptor induce cellular apoptosis of various cancer cells expressing this surface receptor. The monoclonal antibodies and their humanized forms, or fragments thereof, can serve as anti-cancer agents for the treatment of cancer in humans, and can function as analogs of GnRH to affect regulation of reproductive functions or fertility in humans. | 2011-05-12 |
20110113498 | SIRT1 POLYMORPHIC VARIANTS AND METHODS OF USE THEREOF - Provided herein are Sirt1 polymorphic variants having a substitution at amino acid residue 107 or nucleotide 373. In certain embodiments, the Sirt1 polypeptide variants have a L107P substitution and the nucleic acid variants have a T373C substitution. Genetic and/or biochemical testing may be performed to identify whether a patient carries one of the disclosed polymorphic variants. Based on the polymorphic variant the patient carries, a medical practitioner may administer an appropriate therapy, such as a sirtuin activator. | 2011-05-12 |