22nd week of 2013 patent applcation highlights part 61 |
Patent application number | Title | Published |
20130139130 | SYSTEM AND METHOD FOR PERFORMANCE ASSURANCE OF APPLICATIONS - A method for assuring performance of applications is described herein. According to an implementation, the method includes obtaining at least one performance requirement associated with an application in a pre-development phase of a development lifecycle of the application. The performance requirement is mapped with one or more of functional requirements associated with the application and the performance requirement is analyzed based at least on an operational load expected to be handled by the application during operation. Further, the application is developed based on the performance requirement and the mapping. At least one performance characteristic associated with the application is determined, to compare against the performance requirement assuring performance of the application during operation. | 2013-05-30 |
20130139131 | SOURCE CODE PROCESSING METHOD, SYSTEM AND PROGRAM - A method, system, and computer readable article of manufacture to enable parallel execution of a divided source code in a multiprocessor system. The method includes the steps of: inputting an original source code by an input device into the computing apparatus; finding a critical path in the original source code by a critical path cut module; cutting the critical path in the original source code into a plurality of process block groups by the critical path cut module; and dividing the plurality of process block groups among a plurality of processors in the multiprocessor system by a CPU assignment code generation module to produce the divided source code. The system includes an input device; a critical path cut module; and a CPU assignment code generation unit to produce the divided source code. The computer readable article of manufacture includes instructions to implement the method. | 2013-05-30 |
20130139132 | METHOD AND SYSTEM FOR PROGRAM BUILDING - An improved method for program building uses predefined source files and predefined build scripts comprising a sequence of build commands; wherein each build command comprises an origin command line interpretable by an operating system and addressed to at least one compiling tool. | 2013-05-30 |
20130139133 | INFORMATION PROCESSING APPARATUS AND PROGRAM AND METHOD FOR ADJUSTING INITIAL ARRAY SIZE - An adjustment apparatus includes a storage device, an execution target program, an execution unit, a first API, a second API, a profiler, and a dynamic compiler. The execution unit interprets the program, and calls and executes a function of an API in response to the API description. The first and second API are callable by the execution unit, to respectively allocate an array of a predetermined size, and extend the array. The first and second APIs are converted into code to store an array allocation call context of the pre-extension array into a profile information storage area of the allocated array. The profiler profiles access to arrays. The dynamic compiler inline-expands an array allocation call context included in a code part to be dynamically compiled and embeds an array size determined based on context based access information, as an allocation initial size of the array, into the code part. | 2013-05-30 |
20130139134 | SERIALIZATION OF PRE-INITIALIZED OBJECTS - An illustrative embodiment for serialization of pre-initialized objects receives a source code definition of a class, identifies a set of constants associated with the class in the source code to form a set of identified constants, creates a result object corresponding to each constant in the set of identified constants, and compiles the source code into a compiled form of the class. The illustrative embodiment further serializes each result object into a resource file associated with the class to form a set of serialized objects and replaces, in the compiled form of the class, each reference to a respective constant associated with the class from the set of identified constants with a corresponding dynamic instruction using a respective serialized object in the set of serialized objects. | 2013-05-30 |
20130139135 | OPTIMIZATION METHOD FOR COMPILER, OPTIMIZER FOR A COMPILER AND STORAGE MEDIUM STORING OPTIMIZING CODE - The invention pertains to an optimization method for a compiler, comprising providing a model of inter-operand constraints of physical registers of a target-platform of a compilation; and a) providing an intermediate representation of a source code using virtual registers; b) grouping the virtual registers of the intermediate representation based on the model of inter-operand constraints into two or more groups, each group comprising at least one virtual register; c) if for at least one group at least one interference of virtual registers within the group occurs, amending the intermediate representation to resolve at least one interference and jumping to step b); otherwise d) providing a representation of a group interference graph of interferences between the groups; and e) allocating virtual registers to physical registers using a coloring scheme on the representation of the group interference graph. The invention also refers to a corresponding optimizer for a compiler and a computer-readable storage medium storing optimizing code. | 2013-05-30 |
20130139136 | ELIMINATING REDUNDANT FUNCTION CALLS - A computer-implemented method for removing redundant function calls in a computer program includes identifying a first set of equivalent function calls appearing in the computer program. For each of the equivalent function calls, the method identifies whether the function call is partially available or partially anticipable. When a function call is identified as being partially anticipable, a result of the function call is stored in a temporary variable. When a function call is identified as being partially available, the function call is removed and replaced with use of the temporary variable. | 2013-05-30 |
20130139137 | Systems and Methods for Customizing Optimization/Transformation/ Processing Strategies - A method for tailored compiler optimization is provided. The method includes extracting kernels from an application program, performance tuning the kernels to determine a tailored optimization strategy for each of the kernels, the tailored optimization strategy different than a default optimization strategy of a compiler for each of the kernels, and annotating the application program, using a computer, to identify the tailored optimization strategy determined for each of the kernels. In an embodiment, the method also includes the design and implementation for adjusting a compiler to customize optimization strategies for different kernels. | 2013-05-30 |
20130139138 | SYSTEMS AND METHODS FOR DETERMINING TIMES TO PERFORM SOFTWARE UPDATES ON RECEIVING DEVICES - A monitoring system determines when a receiving device is in stand-by mode by monitoring usage of the receiving device on a daily basis. Periodic status checks are performed (e.g., every minute) and based on these status checks, it is determined what mode the receiving device was in for each half hour (or other selected interval) of the day. The middle of the longest period of the day the receiving device was determined to be in stand-by mode is determined as a desired time of day for software updates or other automated actions to occur. This process repeats every day and these determined times of day for software updates are averaged over the number of days the usage data was collected to use as the time of day going forward (based on a moving average) for software updates or other automated actions to be performed on the receiving device. | 2013-05-30 |
20130139139 | AUTOMATIC UPDATING OF AN APPLICATION OR A DRIVER ON A CLIENT DEVICE USING A DEPLOYMENT CONFIGURATION FILE - The automatic updating of an application or a driver on a client device is described. At least one deployment configuration file, including a deployment entry corresponding to a package for updating an application or a driver, is obtained at the client device. The deployment configuration file is stored on the client device in a memory location that is exempt from a write-filter restriction, wherein the write-filter restriction prohibits a file stored with the write-filter enabled from persisting across a reboot of the device. A check is performed to determine whether the deployment entry identifies an application or driver that is installed on the client device, and identifies a version of the application or driver that is higher than a version installed on the client device. The application or driver corresponding to the deployment entry is then updated on the client device using the package, while the write-filter is disabled. | 2013-05-30 |
20130139140 | Method and Apparatus for Mobile Mesh Network Vehicular Software Updating - A computer implemented method includes wirelessly receiving data from a proximate vehicle computing system, the data comprising at least a portion of a complete software process. The method also includes storing the received data and evaluating whether the stored data, in conjunction with any previously stored data, constitutes the entire complete software process. The method further includes executing the entire complete software process, conditional on the evaluating. | 2013-05-30 |
20130139141 | SERVER RACK SYSTEM - A server rack system module is provided. Each rack internal device at least includes a control chip, and the rack internal devices include a plurality of servers. An integrated management module (IMM) is respectively coupled to the control chips, where the IMM stores integrated management firmware, and the integrated management firmware has latest version firmware of the control chip integrated therein and records latest version serial numbers of the latest version firmware. When the server rack system is started, the IMM reads a current version serial number of currently installed firmware of each control chip, and compares the current version serial number with the corresponding latest version serial number, so as to determine whether to update the currently installed firmware. | 2013-05-30 |
20130139142 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEM - An information processing apparatus includes a storage unit that stores combination information relevant to combinations of different types of first programs that can be installed in a device, the combination information including memory consumption amounts of the combinations; a receiving unit that receives an install target first program and device information relevant to the device; and a determining unit that determines validity of installing the install target first program in the device by determining, by referring to the combination information, a predicted memory consumption amount corresponding to a first combination including the install target first program and an existing first program that is installed in the device and indicated in the device information, and by comparing the predicted memory consumption amount with a device memory consumption amount of the device indicated in the device information. | 2013-05-30 |
20130139143 | METHOD AND DEVICE ARRANGEMENT FOR MANAGING THE USE PROFILE OF A TERMINAL DEVICE - A server, terminal device, and a non-transitory data storage medium for supporting wireless terminal devices of a cellular network for implementing program updates are described. The server includes a memory, a processor which receives instructions from the memory for execution, programs utilized in the wireless terminal devices, a receiver, and a transmitter. The receiver is configured to receive a message from a wireless terminal device requesting installation of a program to the wireless terminal device. The installation is caused by a change of an activated use profile of the wireless terminal device to another use profile, when the wireless terminal device is in an operating state with power on. The activated use profile and the another use profile include dissimilar lists of programs required in certain use situations of a user. The transmitter is configured to send the program to the wireless terminal device as an over-the-air message. | 2013-05-30 |
20130139144 | INCREMENTALLY UPDATABLE SYSTEM SOFTWARE INFRASTRUCTURE FOR SENSOR NETWORKS - Systems and techniques for incrementally updating a software stack are described. The software stack can be stored on a flash memory device on a target device. A server computer can receive a modification to a function that is part of the software stack, wherein additional memory is allocated on the flash memory device to allow the function increase in size via a software update. Next, a new memory layout can be determined for storing functions in the software stack based on the modification to the function. The server computer can then determine changes to a set of memory pages on the flash memory device based on the new memory layout. Next, the server computer can send the changes to the set of memory pages to the target device. | 2013-05-30 |
20130139145 | Risk Mitigation for Installation Wizards - A mechanism is provided in a data processing system for installing a software product in a data processing system using a debug mode of an installation wizard. The mechanism separates an installation wizard for installing a software product in a data processing system into a plurality of installation code portions. Each of the plurality of installation code portions corresponds to a state. The mechanism associates each of the plurality of installation code portions with a display panel. The mechanism initializes execution of the installation wizard. For a given installation code portion within the plurality of code portions, the mechanism presents a display panel associated with the given installation code portion to a user, receives user input associated with the given installation code portion, and proceeds to the next installation code portion. The mechanism then completes the installation wizard to install the software product in the data processing system. | 2013-05-30 |
20130139146 | Optimized SCA CORBA descriptor for SCA CORBA descriptor files - A preparsers tool is provided for converting SCA XML files into CORBA structures usable by an SCA Core Framework (CF). The preparsers tool retrieves a set of target environment implementation definitions (TEID) that define at least one characteristic of a target environment to which a CORBA CDR file is provided. For each component in the target environment, at least one of the component instantiation implementation software device dependencies, usesdevice dependencies, and deployment dependencies, are merged together into an implementation device dependencies list having a first part comprising visible device dependencies and a second part comprising external device dependencies. The parsed set of XML files is converted into a CORBA structure type, the conversion based at least in part on the TEID, such that the conversion of the parsed set of XML files results in a CORBA structure having a type and precedence order that is correct for the target environment. | 2013-05-30 |
20130139147 | SYSTEM FOR PERFORMING REMOTE SERVICES FOR A TECHNICAL INSTALLATION - A system is provided for performing remote services for a technical installation comprising a first remote service system having a first tunnel connection for transmitting data between a first device at a distance from the installation and a first device internal to the installation, and a second remote service system having a second tunnel connection for transmitting data between a second device at a distance from the installation and a second device internal to the installation, wherein the second tunnel connection runs through the first tunnel connection. Performing a plurality of remote services in an installation can thereby be enabled at a high level of IT security and a high level of operational reliability of the installation, wherein the administrative effort on the part of the installation operator call be kept small. | 2013-05-30 |
20130139148 | DISTRIBUTION OF CONTENT AND BEHAVIOR TO DISPARATE PLATFORMS - The invention generally relates to the delivery of content to devices of disparate platforms in executable format. The invention provides a way to create and deliver content and functionality to a number of different electronic devices having different platforms. In certain aspects, the invention provides an apparatus configured to receive a client application and a content application including functionality. | 2013-05-30 |
20130139149 | Method and system to remotely flash an external module - A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to partially install the external module to a vehicle, to extract the key data from a device securing the vehicle, to transfer the key data to a computer, to analyze and process the key data with a computer program generating a new computer program allowing the external module to communicate with the security device, to transfer the generated computer program to the external module, to complete the installation of the external module to the vehicle. | 2013-05-30 |
20130139150 | Platform Specific Payload Management - A computer-implemented method, program product and apparatus for platform specific payload management. The method receives a request containing an OS override value, calls a set of selection bundles using the OS override value and receives true for all selection bundles in the set of selection bundles applicable to the OS override value to form applicable selections and false for all selection bundles not applicable to the OS override value. The computer-implemented method further identifies OS specific payloads using the applicable selections, selects an OS specific payload as a deployable image from a repository, downloads the deployable image to a target system from the repository and unpacks the deployable image on the target system to form an installed image. | 2013-05-30 |
20130139151 | Streaming Optimized Virtual Application Images - Embodiments provide an optimized virtual application or suite of virtual applications, but are not so limited. In an embodiment, components of a system are configured to generate an optimized virtual package that can be used in a virtual application streaming environment. Components of the system can provide bits of the optimized virtual package based in part on scenario mappings associated with a user action and/or an application or application feature. In one embodiment, a client virtualization handler can operate to download byte ranges of an optimized virtual package including re-prioritizing byte range download operations as part of streaming virtual application functionality over a computing network. | 2013-05-30 |
20130139152 | CLOUD PROVISIONING ACCELERATOR - High level characteristics are extracted from a virtual machine provisioning request stream for a cloud computing environment. A plurality of prediction models are generated for a plurality of different types of virtual machines. A regression-correlation ensemble is applied to appropriate ones of the prediction models to predict future virtual machine demand for the cloud computing environment. | 2013-05-30 |
20130139153 | CONFIGURING A GUEST OS - A host controller system monitors virtual machine hosts for a tuning event. Upon detecting a tuning event, the host controller system identifies at least one virtual machine potentially affected by the tuning event, and determines whether a corresponding guest operating system should be tuned (e.g., whether configuration parameters should be adjusted). If so, the host controller system obtains configuration data for the corresponding guest operating system and provides the configuration data to the corresponding guest operating system. | 2013-05-30 |
20130139154 | MODIFYING AN OS INSTALLER TO ALLOW FOR HYPERVISOR-SPECIFIC ADJUSTMENT OF AN OS - An installer installing an operating system on a host computer system detects that the operating system is to be run under a hypervisor, and causes at least one configuration parameter of the operating system to be adjusted based on the hypervisor. A migration tool migrating a virtual machine from one hypervisor to another hypervisor, identifies the types of the two hypervisors, the operating system used by the virtual machine, and causes at least one configuration parameter of the operating system to be adjusted based on the target hypervisor. | 2013-05-30 |
20130139155 | Adjustment During Migration to a Different Virtualization Environment - An installer installing an operating system on a host computer system detects that the operating system is to be run under a hypervisor, and causes at least one configuration parameter of the operating system to be adjusted based on the hypervisor. A migration tool migrating a virtual machine from one hypervisor to another hypervisor, identifies the types of the two hypervisors, the operating system used by the virtual machine, and causes at least one configuration parameter of the operating system to be adjusted based on the target hypervisor. | 2013-05-30 |
20130139156 | APPLICATION-DRIVEN SHARED DEVICE QUEUE POLLING IN A VIRTUALIZED COMPUTING ENVIRONMENT - Methods and systems for application-driven polling of shared device queues are provided. One or more applications running in non-virtualized or virtualized computing environments may be adapted to enable methods for polling shared device queues. Applications adapted to operate in a polling mode may transmit a request to initiate polling of shared device queues, wherein operating in the polling mode disables corresponding device interrupts. Applications adapted to operate in a polling mode may be regulated by one or more predefined threshold limitations. | 2013-05-30 |
20130139157 | APPARATUS AND METHOD FOR AUTOMATIC PARA-VIRTUALIZATION OF OS KERNEL - An automatic para-virtualization apparatus of an OS kernel is provided. The automatic para-virtualization apparatus includes a kernel profiler that detects profile information from a native OS kernel, and a virtualization unit that automatically generates a para-virtualized OS kernel that operates on a para-virtualization virtual machine monitor by combining the native OS kernel and the profile information. | 2013-05-30 |
20130139158 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 2013-05-30 |
20130139159 | APPARATUS AND METHOD THEREOF FOR EFFICIENT EXECUTION OF A GUEST IN A VIRTUALIZED ENVIRONMENT - A method for efficient execution of a guest in a virtualized computing environment is provided. The method comprises causing an execution of at least one virtual machine on a computing hardware, the virtual machine executes a hypervisor in a first security ring; and causing an execution of a single guest program on one of the at least one virtual machines, the single guest program comprises a kernel being executed in the first security ring and at least one application being executed in a second security ring. | 2013-05-30 |
20130139160 | SYSTEM AND METHOD FOR AUTOMATIC STORAGE LOAD BALANCING IN VIRTUAL SERVER ENVIRONMENTS - Methods and systems for periodically analyzing and correcting storage load imbalances in a storage network environment including virtual machines are described. These methods and systems account for various resource types, logical access paths, and relationships among different storage environment components. Load balancing may be managed in terms of input/output (I/O) traffic and storage utilization. The aggregated information is stored, and may be used to identify and correct load imbalances in a virtual server environment in order to prevent primary congestion and bottlenecks. | 2013-05-30 |
20130139161 | VIRTUAL MACHINE SYSTEM, MEMORY MANAGEMENT METHOD, MEMORY MANAGEMENT PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A virtual machine system for duplicating a first virtual machine to generate one or more second virtual machines is provided with a management unit that manages each memory area accessible by the first virtual machine so that after generation of the second virtual machines, every virtual machine is permitted to perform a read access to the memory area until any virtual machine performs a write access to the memory area, a determination unit that determines whether each memory area is a specific memory area, a detection unit that detects, after detecting a write access to a specific memory area, that a virtual machine other than the virtual machine performing the write access is attempting access to the specific memory area, and a memory allocation unit that acquires and allocates a new memory area to the virtual machine detected to be attempting access to the specific memory area. | 2013-05-30 |
20130139162 | SYSTEM AND METHOD OF PROVIDING SYSTEM JOBS WITHIN A COMPUTE ENVIRONMENT - The invention relates to systems, methods and computer-readable media for using system jobs for performing actions outside the constraints of batch compute jobs submitted to a compute environment such as a cluster or a grid. The method for modifying a compute environment from a system job comprises associating a system job to a queuable object, triggering the system job based on an event and performing arbitrary actions on resources outside of compute nodes in the compute environment. The queuable objects include objects such as batch compute jobs or job reservations. The events that trigger the system job may be time driven, such as ten minutes prior to completion of the batch compute job, or dependent on other actions associated with other system jobs. The system jobs may be utilized also to perform rolling maintenance on a node by node basis. | 2013-05-30 |
20130139163 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD FOR RECOMMENDING APPLICATION PROGRAMS - An information processing apparatus includes a communication section that acquires application programs from an external apparatus, a memory that stores an application program and information relevant to the application program, and an application execution section that executes the application program stored in the memory. The information processing apparatus also includes a control section that determines other application programs to be recommended, during execution of the application program by the application execution section. The other application programs to be recommended are determined based on the information relevant to the application program, which includes first relevant information and second relevant information. | 2013-05-30 |
20130139164 | Business Process Optimization - The present disclosure involves systems, software, and computer implemented methods for optimizing business processes. One process includes identifying a process model to be compiled, the process model including a plurality of process steps for performing a process associated with the process model, identifying at least two sequential process steps within the process model for inclusion within a single transactional boundary, combining the identified at least two sequential process steps within the single transactional boundary, and compiling the identified process model with the identified at least two sequential process steps combined within the single transactional boundary. In some instances, the process model may be represented in a business process modeling notation (BPMN). Combining the identified sequential process steps within the single transactional boundary can include modifying the process model to enclose the sequential process steps into the single transactional boundary. The transactional boundary may be a transactional sub-process in BPMN. | 2013-05-30 |
20130139165 | SYSTEM AND METHOD FOR DISTRIBUTING PROCESSING OF COMPUTER SECURITY TASKS - In a computer system, processing of security-related tasks is delegated to various agent computers. According to various embodiments, a distributed computing service obtains task requests to be performed for the benefit of beneficiary computers, and delegates those tasks to one or more remote agent computers for processing. The delegation is based on a suitability determination as to whether each of the remote agent computers is suitable to perform the processing. Suitability can be based on an evaluation of such parameters as computing capacity and current availability of the remote agent computers against the various tasks to be performed and their corresponding computing resource requirements. This evaluation can be performed according to various embodiments by the agent computers, the distributed computing service, or by a combination thereof. | 2013-05-30 |
20130139166 | DISTRIBUTED DATA STREAM PROCESSING METHOD AND SYSTEM - Embodiments of the present application relate to a distributed data stream processing method, a distributed data stream processing device, a computer program product for processing a raw data stream and a distributed data stream processing system. A distributed data stream processing method is provided. The method includes dividing a raw data stream into a real-time data stream and historical data streams, processing the real-time data stream and the historical data streams in parallel, separately generating respective results of the processing of the real-time data stream and the historical data streams, and integrating the generated processing results. | 2013-05-30 |
20130139167 | Identification of Thread Progress Information - Embodiments relate to a method, apparatus and program product and for capturing thread specific state timing information. The method includes associating a time field and a time valid field to a thread data structure and setting a current time state by determining a previous time state and updating it according to a previously identified method for setting time states. The method further includes determining status of a time valid bit to see if it is set to valid or invalid. When the status is valid, it is made available for reporting. | 2013-05-30 |
20130139168 | Scaleable Status Tracking Of Multiple Assist Hardware Threads - A processor includes an initiating hardware thread, which initiates a first assist hardware thread to execute a first code segment. Next, the initiating hardware thread sets an assist thread executing indicator in response to initiating the first assist hardware thread. The set assist thread executing indicator indicates whether assist hardware threads are executing. A second assist hardware thread initiates and begins executing a second code segment. In turn, the initiating hardware thread detects a change in the assist thread executing indicator, which signifies that both the first assist hardware thread and the second assist hardware thread terminated. As such, the initiating hardware thread evaluates assist hardware thread results in response to both of the assist hardware threads terminating. | 2013-05-30 |
20130139169 | JOB SCHEDULING TO BALANCE ENERGY CONSUMPTION AND SCHEDULE PERFORMANCE - A computer program product including computer usable program code embodied on a computer usable medium, the computer program product comprising: computer usable program code for identifying job performance data for a plurality of representative jobs; computer usable program code for running a simulation of backfill-based job scheduling of the plurality of jobs at various combinations of a run-time over-estimation value and a processor adjustment value, wherein the simulation generates data including energy consumption and job delay; computer usable program code for identifying one of the combinations of a run-time over-estimation value and a processor adjustment value that optimize the mathematical product of an energy consumption parameter and a job delay parameter using the simulation generated data for the plurality of jobs; and computer usable program code for scheduling jobs submitted to a processor using the identified combination of a run-time over-estimation value and a processor adjustment value. | 2013-05-30 |
20130139170 | JOB SCHEDULING TO BALANCE ENERGY CONSUMPTION AND SCHEDULE PERFORMANCE - An energy-aware backfill scheduling method combines overestimation of job run-times and processor adjustments, such as dynamic voltage and frequency scaling, to balance overall schedule performance and energy consumption. Accordingly, some scheduled jobs are executed in a manner reducing energy consumption. A computer-implemented method comprises identifying job performance data for a plurality of representative jobs and running a simulation of backfill-based job scheduling of the jobs at various combinations of run-time over-estimation values and processor adjustment values. The simulation generates data including energy consumption and job delay. The method further identifies one of the combinations of values that optimizes the mathematical product of an energy consumption parameter and a job delay parameter using the simulation generated data for the plurality of jobs. Jobs submitted to a processor are then scheduled using the identified combination of a run-time over-estimation value and a processor adjustment value. | 2013-05-30 |
20130139171 | METHOD AND APPARATUS FOR GENERATING METADATA FOR DIGITAL CONTENT - A method and an apparatus for generating metadata for digital content are described, which allow to review the generated metadata already in course of ongoing generation of metadata. The metadata generation is split into a plurality of processing tasks, which are allocated to two or more processing nodes. The metadata generated by the two or more processing nodes is gathered and visualized on an output unit. | 2013-05-30 |
20130139172 | CONTROLLING THE USE OF COMPUTING RESOURCES IN A DATABASE AS A SERVICE - A method and apparatus controls use of a computing resource by multiple tenants in DBaaS service. The method includes intercepting a task that is to access a computer resource, the task being an operating system process or thread; identifying a tenant that is in association with the task from the multiple tenants; determining other tasks of the tenant that access the computing resource; and controlling the use of the computing resource by the task, so that the total amount of usage of the computing resource by the task and the other tasks does not exceed the limit of usage of the computing resource for the tenant. | 2013-05-30 |
20130139173 | MULTI-CORE RESOURCE UTILIZATION PLANNING - Techniques for multi-core resource utilization planning are provided. An agent is deployed on each core of a multi-core machine. The agents cooperate to perform one or more tests. The tests result in measurements for performance and thermal characteristics of each core and each communication fabric between the cores. The measurements are organized in a resource utilization map and the map is used to make decisions regarding core assignments for resources. | 2013-05-30 |
20130139174 | DYNAMIC RUN TIME ALLOCATION OF DISTRIBUTED JOBS - A job optimizer dynamically changes the allocation of processing units on a multi-nodal computer system. A distributed application is organized as a set of connected processing units. The arrangement of the processing units is dynamically changed at run time to optimize system resources and interprocess communication. A collector collects metrics of the system, nodes, application, jobs and processing units that will be used to determine how to best allocate the jobs on the system. A job optimizer analyzes the collected metrics to dynamically arrange the processing units within the jobs. The job optimizer may determine to combine multiple processing units into a job on a single node when there is an overutilization of interprocess communication between processing units. Alternatively, the job optimizer may determine to split a job's processing units into multiple jobs on different nodes where the processing units are over utilizing the resources on the node. | 2013-05-30 |
20130139175 | PROCESS MAPPING PARALLEL COMPUTING - A method of mapping processes to processors in a parallel computing environment where a parallel application is to be run on a cluster of nodes wherein at least one of the nodes has multiple processors sharing a common memory, the method comprising using compiler based communication analysis to map Message Passing Interface processes to processors on the nodes, whereby at least some more heavily communicating processes are mapped to processors within nodes. Other methods, apparatus, and computer readable media are also provided. | 2013-05-30 |
20130139176 | SCHEDULING FOR REAL-TIME AND QUALITY OF SERVICE SUPPORT ON MULTICORE SYSTEMS - In a first embodiment of the present invention, a method of assigning tasks in a multicore electronic device is provided, the method comprising: receiving a set of tasks; ordering the tasks in non-increasing order of a utilization value of each task; partitioning the ordered tasks using a schedulability-centric algorithm; repartitioning the partitioned ordered tasks by reordering the partitioned ordered tasks in non-decreasing order of the utilization value of each task and partitioning the partitioned reordered tasks using a load-balancing-centric algorithm; and assigning the repartitioned tasks to one or more cores of the multicore electronic device based on results of the repartitioning. | 2013-05-30 |
20130139177 | METHOD AND SYSTEM FOR GENERATING CONNECTION SCOPED TEMPORARY COLOR DEVICES - A method and system for creating temporary color devices in a color management module. The color management module is configured to identify the registration of a color device by a management subsystem via a message communication system connection, wherein the registration comprises color device information. The color management module monitors the connection to identify a termination event associated with the subsystem, and removes the color device information automatically in response to the identification of the termination event. | 2013-05-30 |
20130139178 | CLUSTER MANAGEMENT SYSTEM AND METHOD - A cluster management system and method are disclosed in the disclosure. The system includes: a storage module configured to store process identifiers of more than one process and communication addresses of the more than one process; more than one cluster management module in one-to-one correspondence with the more than one process, wherein each one of the more than one cluster management module is configured to obtain the communication addresses of other processes except the process corresponding to the cluster management module itself in the more than one process, and obtain services included in other processes by the communication addresses of other processes; more than one service management module in one-to-one correspondence with the more than one cluster management module, wherein each one of the more than one service management module is configured to obtain the services included in other processes from the cluster management module corresponding to the service management module itself, and call the services included in other processes. The disclosure can ensure normal use of services and improve management capacity of network management. | 2013-05-30 |
20130139179 | METHOD AND SYSTEM FOR TIME-BASED CORRELATION OF EVENTS - A method includes receiving event information corresponding to an event associated with the operation of a system. The method also includes identifying related event information corresponding to a plurality of events that occurred before the event, wherein the event is related to the plurality of events. The method also includes storing the event information and the related event information as a group of events. The method further includes determining whether the group of events occurred within a first specified amount of time by identifying a time window ending at the occurrence of the event and beginning the first specified amount of time before the occurrence of the event and determining whether each event of the group of events occurred during the identified time window. The method further includes identifying an incident associated with the group of events upon determining that the group of events occurred within the first specified amount of time. | 2013-05-30 |
20130139180 | SERVER APPARATUS, PROGRAM, AND INFORMATION TERMINAL - A server apparatus which may include an event-information receiver configured to receive information from an information terminal, in which the information may identify an event in which a user of the information terminal wishes to join. The server apparatus may further include an application recommending unit configured to recommend, when receiving the information identifying the event, to the user of the information terminal that the information terminal execute one or more event-related applications at timings when the event-related applications are available, respectively, in which the one or more event-related applications may relate to the event in which the user wishes to join. | 2013-05-30 |
20130139181 | Transactional Environments for Event and Data Binding Handlers - Disclosed are apparatus and methods for executing software applications with an actual environment. Handlers for a software application are registered. Each handler can be executed upon receiving an indication of a triggering event. A determination is made that a triggering event for the software application has occurred. In response to the triggering event: a handler environment for the triggering event is determined based on the actual environment, triggered handlers of the registered handlers are determined to be executed, at least a respective portion of the handler environment is made available to each triggered handler, executing the triggered handlers, where at least one triggered handler updates its respective portion of the handler environment during execution, determining an updated-handler environment based on the handler environment and the portions of the handler environments after execution of the triggered handlers, and updating the actual environment based on the updated-handler environment. | 2013-05-30 |
20130139182 | Integrating An Application Into Operating System Components Of A Mobile Computing Platform - The subject disclosure is directed towards integrating an application into an operating system component of a mobile computing platform. The application communicates registration information to an extension mechanism within the mobile computing platform. The extension mechanism registers the application and modifies the operating system component to provide interoperability with the application based on the registration information. The extension mechanism couples the operating system component with content from a counterpart application to the application, which corresponds to information presented on the operating system component. | 2013-05-30 |
20130139183 | CREATION OR INSTALLATION OF A DISK IMAGE FOR A TARGET DEVICE HAVING ONE OF A PLURALITY OF HARDWARE PLATFORMS - The installation of a disk image onto a client device having a hardware platform of a particular class is described, where the disk image includes a driver-store having a plurality of drivers for a plurality of hardware platforms. The disk image is stored on the client device, and at least one driver from the driver-store is installed on the client device based on the hardware platform of the client device. A device driver configuration file is retrieved, wherein the device driver configuration file identifies one or more drivers associated with a class of hardware platforms, and identifies one or more common drivers shared by two or more of the plurality of hardware platforms. Drivers identified in the device driver configuration file and that are neither associated with the class of the client device, nor associated with the platform of the client device, are removed from the driver-store. | 2013-05-30 |
20130139184 | METHOD FOR EMBEDDING A HOST DRIVER WITHIN A DEVICE - The present invention is directed to a method of operation of a host system by which the host system obtains a driver necessary for running a device (ex.—peripheral device, such as a USB stick, printer, etc.) connected to the host system in an operating system of the host system. In the method(s) disclosed herein, the driver (ex.—host driver) is embedded within in an on-board memory of the device itself. The host system queries the device to determine if and where within the device the driver is located and uploads the driver from the peripheral device. This promotes improved efficiency since the host does not have to store drivers it may not need, but can just obtain the driver from the peripheral device once the peripheral device is connected to the host. | 2013-05-30 |
20130139185 | INTERCEPTING AND TRACING INTERFACE ROUTINE TRANSACTIONS - A tandem interposer-logger approach exploits the interface of a DLL routine that is exposed to client software modules that interoperate with each other through the DLL routine. The DLL routine may also be used to interact with other resources on a computer, including hardware resources. The interposer routine exposes the same interface as the DLL routine. Transparently to the client software, an interposer routine is substituted for the DLL routine such that the client software modules call the interposer routine instead of the DLL routine. When a client software module calls an interface function, the interposer's respective function is called, which collects tracing information to transmit to a daemon process referred to as a logger. The logger process stores the tracing information in a log. Tracing information can then be viewed by human users. The logger process is also used to manage operation of the interposer routine. | 2013-05-30 |
20130139186 | APPLICATION PROGRAMMING INTERFACE FOR PROVIDING NATIVE AND NON-NATIVE DISPLAY UTILITY - Methods for controlling complementary dual displays for use with an electronic device are presented including: receiving an input for display on a non-native display, where the input includes a native user interface (UI) input and a non-native UI input, and where the non-native display is a bistable, low frame rate display; if the input is the native UI input, sending the first native UI input to a corresponding application, processing the native UI input by the corresponding application, calling a non-native API for forwarding the processed native UI input to a non-native display driver, and sending a non-native display signal to the non-native display; receiving another native UI input for display on a native display, where the native display is a refresh-based, high frame rate display; and sending the other native UI input to the corresponding application. | 2013-05-30 |
20130139187 | Information Processing Apparatus and Drive Control Method - According to one embodiment, an information processing apparatus includes a main body, an optical disc drive provided in the main body, and a drive management module provided in the main body. The optical disc drive is configured to output an eject signal to an outside in response to an operation of an eject button. The drive management module is configured to supply power to the optical disc drive when the eject signal is received from the optical disc drive which is in a power-off state, to determine, after supplying the power to the optical disc drive, whether the optical disc drive is in a ready state or not, and to send to a signal instructing opening of a tray of the optical disc drive when it is determined that the optical disc drive is in the ready state. | 2013-05-30 |
20130139188 | ELECTRONIC DEVICE - An electronic device with multi-phase mechanism including a host, a storage device and a carriage is provided in the present invention. The storage device is slidably disposed in the host and adapted to be pulled out from the host. The carriage is slidably disposed in the storage device and adapted to be pulled out from the storage device. Through the storage device slidably disposing in the host and being adapted to be pulled out from the host, it facilitates the user to take or replace a content from the storage device. When the carriage is moved out from the storage device in a first phase and then the storage device is pulled out from the host in a second phase, the content in the storage device is taken out. | 2013-05-30 |
20130139189 | DISK DRIVE DEVICE - A disk drive device that can prevent warping deformation in upward and downward directions of a disk tray and can prevent vibration in a warping deformation mode without producing a rattle vibration is provided. A disk drive device has a casing and a disk tray on which the spindle motor and the pickup are mounted; and a pair of parallel first and second guide mechanisms that slidably supports the disk tray so as to eject the disk tray from the casing to the outside. In the disk drive device, in a center part in a width direction along the disk mount surface of an introduction side distal end part of the disk tray, an introduction side abutment part having a groove section or a protruding portion is formed, and an inner part abutment part formed on an elastic member is installed on an inner side inner wall part. | 2013-05-30 |
20130139190 | PATTERN TRANSFER MEDIUM MANUFACTURING APPARATUS, PATTERN TRANSFER MEDIUM MANUFACTURING METHOD, DISC-SHAPED PATTERN TRANSFER MEDIUM, AND PATTERN TRANSFER MEDIUM - Provided is a pattern transfer medium manufacturing apparatus including a disc injection compression molding unit that forms a disc-shaped pattern transfer medium by an injection compression molding using a disc molding die and a disc-shaped stamper and a cutting unit that performs cutting the periphery of a concave and convex pattern portion on the disc-shaped pattern transfer medium, which is formed due to a transfer by the injection compression molding, as a target object. | 2013-05-30 |
20130139191 | CONTENT RECOMMENDATION FOR A UNIFIED CATALOG - A method includes identifying a unified catalog of content. The unified catalog of content includes digital content available to order and physical content available to order. The method includes identifying a digital content identifier for each asset of the digital content available to order from the unified catalog. The method also includes identifying a physical content identifier for each asset of the physical content available to order from the unified catalog. An indication of user activity from a user device is received. The method further includes determining one or more content recommendations based on the unified catalog and the indication of user activity. The one or more content recommendations are provided to the user device. A content selection based on the one or more content recommendations is received. The method also includes routing an order for the selected content based on an identifier associated with the selected content. | 2013-05-30 |
20130139192 | MONETIZING THIRD-PARTY RECOMMENDED VIDEO CONTENT - A method for monetizing third-party recommended content is provided. The method includes receiving a programming feed from a recommender, receiving information regarding one or more items of advertising content from one or more advertising publishers, scheduling recording of video content identified in the programming feed for a user that follows the programming feed, sending the information regarding the one or more items of advertising content to a client device of the user, and receiving information regarding user playback actions that occurred during presentation of the video content identified in the programming feed and the advertising content. | 2013-05-30 |
20130139193 | METHOD AND APPARATUS FOR PROVIDING PERSONALIZED CONTENT - A system that incorporates teachings of the present disclosure may include, for example, receiving reaction information from one or more sensors located at a second location that is representative of a reaction by a second user at the second location to the presentation of the personalized content, analyzing the reaction information to determine a response based at least in part on trait information associated with different first users, selecting a second portion of the recorded segments based on a comparison of the determined response with a context identified for each of received recorded segments, and adjusting personalized content to include the selected second portion of the recorded segments. Other embodiments are disclosed. | 2013-05-30 |
20130139194 | SYSTEMS AND METHODS TO DETERMINE EXPECTED VIEWERSHIP OF FUTURE TELEVISION BROADCASTS USING RECORDING TIMER DATA - Systems, devices and methods are described to predict the viewership of a television broadcast before the broadcast occurs. Viewers select future broadcasts to record on a digital or other personal video recorder (DVR/PVR), or on any sort of remote storage video recorder (RSDVR). Data describing recordings selected by multiple viewers is provided to a data processing system that determines an expected program viewership based upon the received data. | 2013-05-30 |
20130139195 | Method for More Efficient Collecting of Information - Apparatus and processes for locating and processing QR codes or other Scannable Icons (SI's) in video or television signals. A number of client elements (which may correspond to users) may be in communication of one or more control elements; the client elements may be found in user set top boxes, digital video recorders or other equipment employed to receive video or television signals. The control elements may be found in software in server platforms or such user equipment. The client elements may locate and decode SI's according to various areas of interest of users. The control elements may control which client elements monitor various video or television signals; receive information related to decoded SI's; and report information to client elements so that (among other things) users can be aware of SI's in far more video or television signals than their own client elements are able to monitor. | 2013-05-30 |
20130139196 | AUTOMATED AUTHORIZATION FOR VIDEO ON DEMAND SERVICE - Providing for automated network-related user authentication in conjunction with video on demand streaming media services is described herein. A network-enabled media playback device, such as a television, can be configured to initiate a network process in response to being powered-on. The network process can facilitate access to a network data store, where stored data indicative of authorization status of one or more user accounts can be obtained, and used for loading account preferences associated with a user. Where no accounts are authorized, a login and authorization message is sent to a communication account associated with the network-enabled playback device to facilitate authenticating and logging a user into the network-enabled playback device. Particular aspects provide for filtering media content based on user preferences and account profile information, and displaying a subset of preferred content, or automatically initiating playback of a selected media program for the user account. | 2013-05-30 |
20130139197 | Systems and Method of Controlling Access to Media Content - A system and method of controlling access to media content are disclosed. In one embodiment, the method includes receiving a viewing request at a set-top box device at a user premises. The method also includes retrieving a permission policy stored at the set-top box device and identifying a wireless device associated with the permission policy. Further, the method includes fulfilling the viewing request when the wireless device is present at the user premises and is within a first relative proximity to the set-top box device, and not fulfilling the viewing request when the wireless device is present at the user premises and is within a second relative proximity to the set-top box device. | 2013-05-30 |
20130139198 | DIGITAL TRANSPORT ADAPTER REGIONALIZATION - A method, a digital content consumption device, and a conditional access system are disclosed. A network interface may receive in a digital content consumption device a public key message that includes an encrypted key. A processor may decrypt the encrypted key using a secret key to produce the transmitted public key, identify a region descriptor in the public key message, and determine the secret key based on the region descriptor. | 2013-05-30 |
20130139199 | METHOD FOR TRANSMITTING AND RECEIVING BROADCAST SIGNALS, AND BROADCAST RECEPTION DEVICE USING SAID METHOD - Disclosed are a method and device for transmitting and receiving broadcast signals. The disclosed reception method comprises a step for extracting second programme table information which indicates the association properties between a plurality of programmes, the programmes being obtained by using a broadcast stream which comprises at least one programme, programme table information which indicates the broadcast stream, and at least one broadcast service, from a received broadcast signal. The method further comprises a step for parsing the broadcast stream by using the extracted programme table information; and a step for acquiring information about the groups to which the plurality of programmes belong by using the extracted second programme table information. | 2013-05-30 |
20130139200 | APPARATUS, SYSTEMS AND METHODS FOR A THUMBNAIL-SIZED SCENE INDEX OF MEDIA CONTENT - Scene-based program accessing systems and methods are operable to present a program at a scene corresponding to a selected thumbnail-sized image. An exemplary embodiment selects a plurality of image frames from a program based upon a scene separation duration; generates a thumbnail-sized image from each of the selected image frames, and presents the plurality of thumbnail-sized images on a scene index. The scene index is configured to present the plurality of thumbnail-sized images in a time ordered sequence corresponding to a subject matter presentation sequence of the program, and each of the selected image frames are temporally separated from each other by the scene separation duration. | 2013-05-30 |
20130139201 | INTERACTIVE USER INTERFACE FOR TELEVISION APPLICATIONS - An iTV user interface includes a navigable menu area through which a user can select from among a variety of services and a content display area in which formatted data associated with a selected menu service are displayed to the user. The formatted data is displayed in a rotating or ticker fashion having both a passive mode, in which the formatted data is displayed in a sequence independent of any selection operations by a television viewer, and active mode, in which the formatted data is displayed in a sequence that depends on selection operations by the television viewer. Advertisements and/or promotions may be interspersed among the content items. The navigable menu area and the content display area may be displayed to the viewer at the same time as television programming is displayed on the television. | 2013-05-30 |
20130139202 | ACTIVE CHANNEL FOR INTERACTIVE TELEVISION SERVICES - An interactive home video channel displayed on a monitor is enclosed. A channel in accordance with the present invention comprises a plurality of video cells presenting at least video information, a text box, a menu comprising menu choices, each menu choice and each video cell associated with a programming subject, and a cursor, which can be moved between the plurality of video cells and the menu, for selecting at least one of the video cells and the menu choices, which presents additional information about the programming subject associated with the selected video cell or menu choice upon selection with the cursor. | 2013-05-30 |
20130139203 | APPARATUS AND METHOD FOR SEARCHING MULTIMEDIA CONTENT - A multimedia content searching apparatus includes: an image receiving unit that receives an image having additional information from an external device; an additional information reading unit that reads the additional information from the image received from the image receiving unit; a multimedia content searching unit that recommends a multimedia content to a user by searching for the multimedia content which is related to the additional information using the additional information read by the additional information reading unit; and an information comparing unit that compares the additional information read by the additional information reading unit with multimedia content information provided from a content provider, and the multimedia content searching unit searches for the multimedia content related to the additional information based on the result of the comparison by the information comparing unit. | 2013-05-30 |
20130139204 | BROADCAST SIGNAL RECEIVING APPARATUS AND CONTROL METHOD THEREOF - A broadcast signal receiving apparatus including a broadcast receiving unit that receives a broadcast signal; a communicating unit that performs communication with a mobile apparatus; a signal converting unit that converts the received broadcast signal; and a controller that controls the signal converting unit to convert the broadcast signal into a format corresponding to the mobile apparatus, and controls the communicating unit to transmit the converted broadcast signal to the mobile apparatus | 2013-05-30 |
20130139205 | METHOD AND APPARATUS FOR SYNCHRONIZING DATA STREAMS CONTAINING AUDIO, VIDEO AND/OR OTHER DATA - Several data streams contain video, audio and/or other data. Some of the data streams are pre-recorded in a multiplex on a storage medium while other data streams are located out of the data stream multiplex on the storage medium. The data streams are synchronized using a navigation file (List_of_PlayItems), which comprises descriptors (Play-Items, SubPlayItems) pointing to parts of said data streams, wherein said descriptors define the arrangement in time for said data streams by means of data sub stream paths. | 2013-05-30 |
20130139206 | TRANSMISSION METHOD FOR PUSH TYPE VIDEO ON DEMAND PROGRAMS AND ASSOCIATED DECODER - Transmission method for VOD “Push” programs, comprising the steps of: transmission of a stream containing VOD “Push” programs from a remote server over a broadcasting network to a destination of multiple decoders, storage of program units in the memory by each decoder; the stream containing a first program unit comprising a first audio/video content, a second program unit comprising a second audio/video content, and a third program unit comprising a list containing at least the identifiers of the first and second units, according to which, when the decoder receives a command for playing the third program unit, it proceeds to displaying on the screen successively the first and the second audio/video contents, depending on the data present in a field of metadata of the third program unit. | 2013-05-30 |
20130139207 | METHODS AND APPARATUSES FOR PROGRAMMING USER-DEFINED INFORMATION INTO ELECTRONIC DEVICES - A device for programming user-defined information into an electronic device is provided. The programmer allows a user to program customized information, such as user-selected audio, video, or Internet access information into his or her programmable device. Such electronic devices include wireless telephones, pagers, and personal digital assistants. The programmer allows a user to, among other things, customize the device to suit his or her particular taste. | 2013-05-30 |
20130139208 | Systems and Methods for Processing Media Content Requests - A method includes sending a unicast transmission including at least a portion of media content to a media device in response to determining, at a media distribution computing device, that a request for a media stream to be provided to the media device does not indicate a scheduled recording of the media content associated with the media stream and joining the media device to a multicast group associated with the media stream without sending the unicast transmission to the media device in response to determining, at the media distribution computing device, that the request indicates the scheduled recording of the media content. | 2013-05-30 |
20130139209 | Context Relevant Interactive Television - Methods, systems and computer readable medium with program instructions for providing contextually relevant information for multimedia content streaming through a rendering device, includes detecting a selection of the multimedia content for rendering on the rendering device. An audio signal of the multimedia content is retrieved and analyzed to generate an audio fingerprint. The generated audio fingerprint is used to identify the multimedia content that is selected for rendering. Contextually relevant content for a portion of the multimedia content being rendered on the rendering device is dynamically retrieved from one or more sources and mapped to data associated with the portion of the multimedia content. The mapping results in the rendering of the relevant content during the rendering of the portion of the multimedia content and provides additional information that is contextually relevant to the portion of the multimedia content that is currently being rendered on the rendering device. | 2013-05-30 |
20130139210 | MULTICASTING IN A WIRELESS DISPLAY SYSTEM - This disclosure relates to techniques to establish a multicast communication session between a source device and multiple sink devices in a Wireless Display (WD) system. Two or more sink devices may be interested in receiving the same media data from the source device. According to the techniques, the source device establishes a multicast session with the sink devices in the WD system, and sends a single copy of multicast media data for the multicast session to the interested sink devices using a receiving multicast port. The source device selects a receiving multicast port number as a destination identifier for each multicast session. The sink devices interested in receiving the media data of a given multicast session bind on the receiving multicast port for the multicast session. This disclosure describes several exemplary multicast subscription procedures to ensure correct binding on the receiving multicast port at each of the sink devices. | 2013-05-30 |
20130139211 | Linking and Browsing Media on Television - Techniques for linking and browsing media on a television (TV) are provided. A selected program, which is associated with a channel of the TV, is detected and additional content, which is associated with that channel and/or the selected program, is dynamically acquired from one or more external sources. The additional content is formatted as links and simultaneously presented within a display of the TV along with the selected program that continues to play on the TV. Furthermore, activation of any link results in the additional content being dynamically acquired and presented within the display. | 2013-05-30 |
20130139212 | INFORMATION PROCESSING APPARATUS, BROADCAST RECEIVING APPARATUS AND SOFTWARE START-UP METHOD - An apparatus using a software start-up method, selects execution-targeted software data to be used for starting execution of the start-up processing, out of software data stored in a first storage device; starts the execution of the start-up processing by using the execution-targeted software data; searches for another software data other than the execution-targeted software data, from software data stored in the first storage device; determines whether the another software data is changed from its initial-state; and, if the another software data is changed, selects initial-state software data as the initial state of the another software data from said at least one software data stored in a second storage device, reads the initial-state software data from the second storage device, and replaces the another software data stored in the first storage device with the read initial-state software data by overwriting. | 2013-05-30 |
20130139213 | MONITORING AND CONTROLLING ELECTRONIC ACTIVITY USING THIRD PARTY RULE SUBMISSION AND VALIDATION - Concepts and technologies are disclosed herein for monitoring and controlling electronic activity. A policy service can be called for policies for controlling electronic activity occurring at one or more managed devices. The policies can include a number of rules, each of which can include a number of variables. The rules can be defined by a manager device and/or received from third parties. Third party rule submissions can be validated. If electronic activity at the managed device deviates from a rule, the manager device can be notified and the electronic activity can be blocked. The manager device can update the policy and/or issue exceptions, if desired. | 2013-05-30 |
20130139214 | MULTI DIMENSIONAL ATTACK DECISION SYSTEM AND METHOD THEREOF - A method and system for protecting a protected entity using a multi-dimensional protection surface. The method comprises detecting at least one potential attack against the protected entity in incoming data traffic directed to the protected entity; detecting a type of each attack tool committing the at least one potential attack; generating a multi-dimensional protection surface by correlating a plurality of inputs related to the at least one detected attack, wherein the plurality of inputs include at least a first input identifying the at least one detected attack and a second input identifying each attack tool that performs the at least one detected attack, wherein the protection multi-dimensional surface includes at least one protection point that defines at least one attack mitigation action to mitigate the at least one detected attack; and executing the at least one attack mitigation action defined in the multi-dimensional protection surface. | 2013-05-30 |
20130139215 | METHOD AND APPARATUS FOR MASTER PRIVACY POLICY MECHANISM IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing a master privacy policy in a communications network are disclosed. For example, the method receives a privacy control parameter to configure a master privacy policy, stores the master privacy policy in the communications network, and applies the master privacy policy to configure a third party service provider privacy policy for a third party service provider based upon the master privacy policy. | 2013-05-30 |
20130139216 | Method and Computer Device to Control Software File Downloads - A computer device includes a download unit which downloads one or more files into a storage device. A file logging unit records a resource locator identifying a source network location of the file, when the file is downloaded, and associates the resource locator with a first fingerprint of the file. A system policy unit stores the resource locator associated with a process control policy relevant to the file. A process control unit is arranged to obtain a second fingerprint of the file upon launching a process in a runtime execution environment, retrieve the resource locator from the file logging unit by matching the second fingerprint with the first fingerprint, retrieve the process control policy from the system policy unit according to the retrieved resource locator, and selectively apply process execution privileges which determine execution of the process in the runtime execution environment according to the retrieved process control policy. | 2013-05-30 |
20130139217 | METHOD AND APPARATUS FOR EXECUTING SECURITY POLICY SCRIPT, SECURITY POLICY SYSTEM - Embodiments of the present invention provide a method and an apparatus for executing a security policy script as well as a security policy system. The method includes: verifying a signature of a security policy script to be executed, where the security policy script to be executed corresponds to a unique signature, and the signature is used to verify validity of the security policy script; and invoking a script engine to execute the security policy script to be executed after verifying that the signature of the security policy script to be executed is correct, so as to improve security of the security policy script effectively. | 2013-05-30 |
20130139218 | SOFT METHOD FOR LOCAL SECURE CONNECTION TO A DEVICE - A system for pairing two devices includes a monitoring system and a server. The monitoring system receives a request made by a local submitter, such as servicing device or a technician operating the servicing device, for accessing diagnostic data of the monitoring system. The monitoring system initiates a request made to the server for connecting the monitoring system with the servicing device. The server generates pairing information and transmits the pairing information to the monitoring system. The server determines that a pairing key is received as input at the servicing device and/or monitored device and determines if the pairing key matches the pairing identification. If the server determines that there is a match, the server relays diagnostic data received from the monitoring system to the servicing device. | 2013-05-30 |
20130139219 | METHOD OF FENCING IN A CLUSTER SYSTEM - A method of fencing in a cluster system including network devices and a management network device is disclosed. Each network device may run an application program and comprises a fence device. A first network device receives a fence operation command from the management network device. The fence operation command contains information of a target network device and information of a target application. The first network device may determine a fence device on the first network device that corresponds to the fence operation command and activates the determined fence device such that the fence device performs a fence operation on the target application program according to the fence operation command. | 2013-05-30 |
20130139220 | Systems and Methods for Using A Domain-Specific Security Sandbox to Facilitate Secure Transactions - Computer systems, methods, and computer readable media for facilitating a secure transaction are provided in which a client application is executed on a client computer. The client application initiates a request to a first domain comprising (i) a credential for the client application, (ii) a transaction identifier that uniquely identifies the request, and (iii) optionally, an identification of a user of the client application. Responsive to this request, the client receives a validated transaction module from the first domain. The client application loads the validated transaction module into a separate domain security sandbox that is segregated from memory space in which the client application is run. The validated transaction module conducts a validated transaction between the second domain and the validated transaction module. Separately, through the client application, a determination is made as to whether the transaction is complete by querying the first domain. | 2013-05-30 |
20130139221 | Web Authentication Support for Proxy Mobile IP - Techniques are provided for performing web authentication of mobile wireless devices that roam from a wireless wide area network to a wireless local area network. A redirect rule is invoked when a request is received from the mobile wireless device for world wide web access in order to obtain authentication for the mobile wireless device before permitting world wide web access. When a world wide web access request is received from the mobile wireless device, it is redirected to an authentication portal to allow a user of the mobile wireless device to enter user credentials to allow for world wide web access using the IP address. | 2013-05-30 |
20130139222 | AUTHENTICATION OF MOBILE DEVICE - Disclosed are systems and techniques that generate one-time passwords in a banking server in order to authenticate a mobile device for transactional functions related to a user account. At least two one-time passwords are generated at the banking server and communicated to the mobile device via different communication pathways. A first communication pathway is encrypted and a second pathway is non-encrypted. | 2013-05-30 |
20130139223 | SECURE NETWORK SYSTEM REQUEST SUPPORT VIA A PING REQUEST - Methods and systems for secure network system request (sysrq) via Internet Control Message Protocol (ICMP) are described. A remote computing system sends a query over a network to a target computing system and determines whether the target computing system is non-responsive to the query. When the target computing system is non-responsive to the query, the remote computing system sends an ICMP request to the target computing system over the network. The ping request includes a command to be performed by the target computing system and a key to verify authorization to perform the command. | 2013-05-30 |
20130139224 | System and Method for Registering Users for Communicating Information on a Web Site - A system and method blocks or removes user accounts or complex information of user accounts that has or have a correspondence with complex information of other accounts or complex information on a blacklist. | 2013-05-30 |
20130139225 | COMMUNICATION APPARATUS - A communication apparatus is configured to communicate with a service providing server. The service providing server provides a data upload service and, for each user, associate and stores authentication information for a user and an e-mail address for the user. The communication apparatus includes: a storage control unit storing specific authentication information for a specific user in a memory; an acquisition unit which, when an upload instruction for uploading target data to the service providing server is input from the specific user, uses the specific authentication information in the memory to acquire a specific e-mail address, which is stored in association with the specific authentication information, from the service providing server; and an upload unit that transmits a specific e-mail including the target data and the specific e-mail address as a transmission destination address, for uploading the target data to the service providing server. | 2013-05-30 |
20130139226 | Secure Authorization - Various embodiments provide an authorization approach that performs a safe and generally untraceable way that allows a user to complete an authorization securely. Various embodiments utilize a visual presentation that displays items, which can include symbols, letters, characters, numbers, logos, pictures, and the like. Throughout authorization, in at least some embodiments, the visual presentation is modified and the locations of items, such as touch-selectable items, are changed such that a pre-defined authorization sequence of items does not have the same serialized pattern of selection for purposes of authorization. | 2013-05-30 |
20130139227 | Security Architecture For A Process Control Platform Executing Applications - A security component within a supervisory process control and manufacturing information system comprising a set of user roles corresponding to different types of users within the information system, a set of security groups defining a set of security permissions with regard to a set of objects, wherein each security group includes an access definition relating the security permissions to at least one of the set of user roles, and a set of user accounts assigned to at least one of the defined roles thereby indirectly defining access rights with regard to the set of objects having restricted access within the system. The security permissions within the supervisory process control and manufacturing information system are assigned at an object attribute level. | 2013-05-30 |
20130139228 | INFORMATION PROCESSING APPARATUS EQUIPPED WITH WIRELESS COMMUNICATION FUNCTION, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus capable of effectively preventing an unauthorized access in a manner cooperatively associated with a predetermined security setting of a wireless communication. An information processing apparatus is capable of wireless communication with an external apparatus, receives a job request therefrom, and executes job processing according to the job request. A CPU sets a management setting for managing users who use the information processing apparatus. The CPU receives the job request from the external apparatus via a wireless LAN interface. The CPU determines, when the job request is received, whether or not the wireless communication has been set to a predetermined security setting, and performs control, when it is determined that the wireless communication has not been set to the predetermined security setting, so as to refuse to accept the job request, unless the management setting has been set. | 2013-05-30 |
20130139229 | SYSTEM FOR SHARING PERSONAL AND QUALIFYING DATA WITH A THIRD PARTY - A method for users to share personal and qualifying information with a plurality of third parties. Authenticated users may share personal and qualifying information obtained from a plurality of data repositories comprising of credit data, motor vehicle data, insurance data, criminal data, sex offender data, occupancy data and employment data. The personal and qualifying information may be viewed by a plurality of third parties until the user revokes access at any time. Neither user nor third parties are allowed to alter data. However, users have the option to supply supplemental explanations for data. The method facilitates the development of trust necessary for transactions between two parties comprising of securing housing, obtaining loans, securing employment, etc. | 2013-05-30 |