Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


31st week of 2012 patent applcation highlights part 62
Patent application numberTitlePublished
20120198442Virtual Container - A virtual container includes an application computer program and metadata representing the operating system requirements. The virtual container is stored on a computer-readable storage medium for delivery to an end user for copying to a target computing device. The virtual container is equivalent to a virtual appliance minus an operating system. The virtual container is executable on an existing logical partition (LPAR) of the target computing device that provides a virtual operating system for the application of the virtual container, where the virtual container is specifically executable within a workload partition (WPAR) of the LPAR. The virtual container is also executable on a new LPAR of the target computing device, where the end user provides a guest operating system to run within the new partition for the virtual container, such that addition of the guest operating system to the virtual container renders the virtual container as a virtual appliance.2012-08-02
20120198443STORAGE RECLAMATION SYSTEMS AND METHODS - Efficient and effective storage reclamation systems and methods are presented. In one embodiment, a storage reclamation method comprises: receiving an indication from a virtual machine that a reclamation opportunity for reclamation of a physical storage resource is available; and performing a reclamation process of the physical storage resource in accordance with the indication from the virtual machine that the reclamation opportunity is available, wherein the reclamation process is performed while the virtual machine is running. The indication can be received from a virtual communication protocol (e.g., can include an in-band communication protocol, out-of band communication protocol, a socket based communication protocol or a serial character device communication protocol).2012-08-02
20120198444PLAYING TELEVISION PROGRAM IN VIRTUAL ENVIRONMENT - In a virtual environment, a virtual machine (VM) host includes a host screen and a first host window displayed in the host screen. AVM guest is instantiated on the VM host. The VM guest includes a guest screen that is presented in the first host window. The VM launches a television player application and instructs the television player application to play a television program in the guest screen. The VM host registers a content server with a content receiver via a network. The content receiver receives one or more content items from the content server. The VM host creates a second host window displayed in the host screen and display the one or more content items in the second host window.2012-08-02
20120198445PLAYING TELEVISION PROGRAM IN VIRTUAL ENVIRONMENT - In a virtual environment, a virtual machine (VM) host includes a host screen and a first host window displayed in the host screen. A VM guest includes a guest screen presented in the first host window. The VM launches a television player application and instruct the television player application to play a television program in the guest screen. The VM host registers a VoIP service provider, create a second host window displayed in the host screen, and present a VoIP user interface in the second host window. When the VM host receives a dial-up number input by a user from the VoIP user interface, the VM host establishes a conversation channel between the VM host and a target client associated with the dial-up number input. The VM host and the target client thus may exchange voice data packets over the conversation channel.2012-08-02
20120198446Computer System and Control Method Therefor - A hypervisor records error device information in a virtual PCI bridge, and makes error information in a device consistent with error information in a PCI bridge. A computer system includes a CPU, memory, and physical device PCI tree. In the memory, virtual machines capable of mutually independently acting, and a hypervisor that manages the virtual machines are existent. The physical device PCI tree includes physical bridges and devices. The physical bridge has a register in which information specifying the device is recorded. The virtual machine includes a virtual CPU, virtual memory, and virtual device PCI tree. The virtual device tree includes virtual bridges and virtual devices. The virtual bridge has a virtual memory space in which information specifying the virtual device in which an error has occurred is recorded. The hypervisor includes an interrupt handling program that is a virtual bridge modification program which modifies information in the virtual bridge.2012-08-02
20120198447DETERMINING AN ALLOCATION CONFIGURATION FOR ALLOCATING VIRTUAL MACHINES TO PHYSICAL MACHINES - An information processing apparatus having a prediction section that determines the predicted peak usage amount of physical resources for each time interval for individual clusters each including a plurality of virtual machines having the same function; a setting section sets a constraint that ensures that, for individual combinations of a first physical machine, a second physical machine, and a time interval, the total predicted peak usage amount of a physical resource predicted for the first physical machine if the second physical machine stops during the time interval does not exceed a physical resource amount prepared for the first physical machine; and an allocation-configuration deriving section derives an allocation configuration by calculating, in accordance with the constraint, a solution to an optimization problem for minimizing, as an objective function, the sum total of the physical resource amounts of all of physical machines to which the virtual machines are allocated.2012-08-02
20120198448STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host.2012-08-02
20120198449Saving Unsaved User Process Data In One Or More Logical Partitions Of A Computing System - Methods, systems, and products are disclosed for saving unsaved user process data in one or more logical partitions (‘LPARs’) of a computing system, the computing system having installed upon it a hypervisor for administering the LPARs, each LPAR supporting an operating system, each operating system supporting one or more user processes, that include: detecting, by the hypervisor, a predefined event that the hypervisor interprets as an indication that unsaved data of user processes for at least one LPAR should be saved; transmitting, by the hypervisor in response to detecting the predefined event, a save instruction to the operating system supported by the LPAR; and instructing, by the operating system in response to receiving the save instruction, each user process supported by the operating system to save any unsaved data.2012-08-02
20120198450Method to Dynamically Provision Additional Computer Resources to Handle Peak Database Workloads - A method to handle peak database workloads may include requesting resources, receiving virtual-machine information in response to the requesting, allocating first and second portions of a workload according to the virtual-machine information, processing the first portion on a virtual machine to generate a first result, creating a cloned virtual machine with a virtualization layer, and cloning with the virtualization layer a storage allocated to the virtual machine to create a cloned storage.2012-08-02
20120198451PREPROVISIONING VIRTUAL MACHINES - According to one aspect of the present disclosure, a method and technique for preprovisioning virtual machines is disclosed. The method includes analyzing requests for a plurality of different virtual machine (VM) configurations where each VM configuration has a plurality of configuration attributes. The method also includes determining a request frequency corresponding to each requested VM configuration, determining a configuration of each provisioned VM, and responsive to determining the configuration of each provisioned VM, determining a configuration for a preprovisioned VM based on a request frequency of the different VM configurations and the configurations of the provisioned VMs. The method further includes creating the preprovisioned VM.2012-08-02
20120198452CONTROLLING DEPTH AND LATENCY OF EXIT OF A VIRTUAL PROCESSOR'S IDLE STATE IN A POWER MANAGEMENT ENVIRONMENT - A mechanism is provided in a logically partitioned data processing system for controlling depth and latency of exit of a virtual processor's idle state. A virtualization layer generates a cede latency setting information (CLSI) data. Responsive to booting a logical partition, the virtualization layer communicates the CLSI data to an operating system (OS) of the logical partition. The OS determines, based on the CLSI data, a particular idle state of a virtual processor under a control of the OS. Responsive to the OS calling the virtualization layer, the OS communicates the particular idle state of the virtual processor to the virtualization layer for assigning the particular idle state and wake-up characteristics to the virtual processor.2012-08-02
20120198453VIRTUALIZATION OF STORAGE BUFFERS USED BY ASYNCHRONOUS PROCESSES - The amount of host real storage provided to a large guest storage buffer is controlled. This control is transparent to the guest that owns the buffer and is executing an asynchronous process to update the buffer. The control uses one or more indicators to determine when additional host real storage is to be provided.2012-08-02
20120198454ADAPTIVE SPINNING OF COMPUTER PROGRAM THREADS ACQUIRING LOCKS ON RESOURCE OBJECTS BY SELECTIVE SAMPLING OF THE LOCKS - In the dynamic sampling or collection of data relative to locks for which threads attempting to acquire the lock may be spinning so as to adaptively adjust the spinning of threads for a lock, an implementation for monitoring a set of parameters relative to the sampling of data of particular locks and selectively terminating the sampling when certain parameter values or conditions are met.2012-08-02
20120198455SYSTEM AND METHOD FOR SUPPORTING SERVICE LEVEL QUORUM IN A DATA GRID CLUSTER - A system and method is described for use with a data grid cluster, for supporting service level quorum in the data grid cluster. The data grid cluster includes a plurality of cluster nodes that support performing at least one service action. A quorum policy, defined in a cache configuration file associated with the data grid cluster, can specify a minimum number of service members that are required in the data grid cluster for performing the service action. The data grid cluster uses the quorum policy to determine whether the service action is allowed to be performed, based on a present state of the plurality of cluster nodes in the data grid cluster.2012-08-02
20120198456REDUCING THE NUMBER OF OPERATIONS PERFORMED BY A PERSISTENCE MANAGER AGAINST A PERSISTENT STORE OF DATA ITEMS - Method, apparatus, and computer program product for reducing the number of operations performed by a persistence manager against a persistent store of data items. A plurality of requests from an application are received. Each request is mapped into a transaction for performance against the persistent store, each transaction having at least one operation. Transactions are accumulated and preprocessed to reduce the number of operations for performance against the persistent store.2012-08-02
20120198457Method and apparatus for triggering workflow deployment and/or execution - A system and method for triggering deployment of a workflow are provided. The method includes issuing, to a first device (e.g., a server) from application software executing on a second device (e.g., a client computer), an instruction to execute a workflow previously deployed at the first device. The workflow is formed as a function of information associated with a graphical representation of the workflow. The application software may be, for example, software for one or more word-processing, spreadsheet, database, email, instant messenger, presentation, browser, calendar, organizer, media, image-display applications; file management programs and/or operating system shells. Alternatively, the application software may be or include a module associated with such application software. This module may include or be formed as or from one or more plug-ins, add-ons, applets, shared libraries, and/or extensions.2012-08-02
20120198458Methods and Systems for Synchronous Operation of a Processing Device - Embodiments of the present invention provide a method of synchronous operation of a first processing device and a second processing device. The method includes executing a process on the first processing device, responsive to a determination that execution of the process on the first device has reached a serial-parallel boundary, passing an execution thread of the process from the first processing device to the second processing device, and executing the process on the second processing device.2012-08-02
20120198459ASSIST THREAD FOR INJECTING CACHE MEMORY IN A MICROPROCESSOR - A data processing system includes a microprocessor having access to multiple levels of cache memories. The microprocessor executes a main thread compiled from a source code object. The system includes a processor for executing an assist thread also derived from the source code object. The assist thread includes memory reference instructions of the main thread and only those arithmetic instructions required to resolve the memory reference instructions. A scheduler configured to schedule the assist thread in conjunction with the corresponding execution thread is configured to execute the assist thread ahead of the execution thread by a determinable threshold such as the number of main processor cycles or the number of code instructions. The assist thread may execute in the main processor or in a dedicated assist processor that makes direct memory accesses to one of the lower level cache memory elements.2012-08-02
20120198460Deadlock Detection Method and System for Parallel Programs - A deadlock detection method and computer system for parallel programs. A determination is made that a lock of the parallel programs is no longer used in a running procedure of the parallel programs. A node corresponding to the lock that is no longer used, and edges relating to the lock that is no longer used, are deleted from a lock graph corresponding to the running procedure of the parallel programs in order to acquire an updated lock graph. The lock graph is constructed according to a lock operation of the parallel programs. Deadlock detection is then performed on the updated lock graph.2012-08-02
20120198461METHOD AND SYSTEM FOR SCHEDULING THREADS - A method for scheduling a new thread involves identifying a criticality level of the new thread, selecting a processor group according to the criticality level of the new thread and an existing assigned utilization level of the processor group to obtain a selected processor group, increasing an assigned utilization level of the selected processor group based on the new thread, and executing the new thread by the selected processor group.2012-08-02
20120198462WORKFLOW CONTROL OF RESERVATIONS AND REGULAR JOBS USING A FLEXIBLE JOB SCHEDULER - A scheduler receives at least one flexible reservation request for scheduling in a computing environment comprising consumable resources. The flexible reservation request specifies a duration and at least one required resource. The consumable resources comprise at least one machine resource and at least one floating resource. The scheduler creates a flexible job for the at least one flexible reservation request and places the flexible job in a prioritized job queue for scheduling, wherein the flexible job is prioritizes relative to at least one regular job in the prioritized job queue. The scheduler adds a reservation set to a waiting state for the at least one flexible reservation request. The scheduler, responsive to detecting the flexible job positioned in the prioritized job queue for scheduling next and detecting a selection of consumable resources available to match the at least one required resource for the duration, transfers the selection of consumable resources to the reservation and sets the reservation to an active state, wherein the reservation is activated as the selection of consumable resources become available and has uninterrupted use of the selection of consumable resources for the duration by at least one job bound to the flexible reservation.2012-08-02
20120198463PIPELINE NETWORK DEVICE AND RELATED DATA TRANSMISSION METHOD - A pipeline structure having a plurality of pipelines with varying data rates is used for transmitting data between different layers in a network device. Important data is transmitted by a faster pipeline, while less important data is transmitted by a slower pipeline. The size of each pipeline may be dynamically adjusted according the transmission status of each pipeline for improving the overall data efficiency.2012-08-02
20120198464SAFETY CONTROLLER AND SAFETY CONTROL METHOD - The present invention relates to time partitioning to prevent a failure of processing while suppressing execution delay of interrupt processing even when the interrupt processing is executed. A safety controller includes: a processor; a system program for controlling allocation of an execution time of the processor to a safety-related task, a non-safety-related task, and an interrupt processing task; and an interrupt handler. Upon generation of an interrupt, the processor executes the interrupt handler to reserve execution of the interrupt processing task as an execution reserved task, and executes the system program to schedule the tasks in accordance with scheduling information on a safety-related TP to which the safety-related task belongs, a non-safety-related TP to which the non-safety-related task belongs, and a reservation execution TP to which the execution reserved task belongs. When execution of a task in a previous TP is finished before the period of the previous TP prior to the execution reservation TP has expired, the execution time in the previous TP is allocated to the execution reserved task.2012-08-02
20120198465System and Method for Massively Multi-Core Computing Systems - A system and method for massively multi-core computing are provided. A method for computer management includes determining if there is a need to allocate at least one first resource to a first plane. If there is a need to allocate at least one first resource, the at least one first resource is selected from a resource pool based on a set of rules and allocated to the first plane. If there is not a need to allocate at least one first resource, it is determined if there is a need to de-allocate at least one second resource from a second plane. If there is a need to de-allocate at least one second resource, the at least one second resource is de-allocated. The first plane includes a control plane and/or a data plane and the second plane includes the control plane and/or the data plane. The resources are unchanged if there is not a need to allocate at least one first resource and if there is not a need to de-allocate at least one second resource.2012-08-02
20120198466DETERMINING AN ALLOCATION OF RESOURCES FOR A JOB - A job profile describes characteristics of a job. A performance parameter is calculated based on the job profile, and using a value of the performance parameter, an allocation of resources is determined to assign to the job to meet a performance goal associated with a job.2012-08-02
20120198467System and Method for Enforcing Future Policies in a Compute Environment - A disclosed system receives a request for resources, generates a credential map for each credential associated with the request, the credential map including a first type of resource mapping and a second type of resource mapping. The system generates a resource availability map, generates a first composite intersecting map that intersects the resource availability map with a first type of resource mapping of all the generated credential maps and generates a second composite intersecting map that intersects the resource availability map and a second type of resource mapping of all the generated credential maps. With the first and second composite intersecting maps, the system can allocate resources within the compute environment for the request based on at least one of the first composite intersecting map and the second composite intersecting map.2012-08-02
20120198468METHOD AND SYSTEM FOR COMMUNICATING BETWEEN ISOLATION ENVIRONMENTS - A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.2012-08-02
20120198469Method for Managing Hardware Resources Within a Simultaneous Multi-Threaded Processing System - A method for managing hardware resources and threads within a data processing system is disclosed. Compilation attributes of a function are collected during and after the compilation of the function. The pre-processing attributes of the function are also collected before the execution of the function. The collected attributes of the function are then analyzed, and a runtime configuration is assigned to the function based of the result of the attribute analysis. The runtime configuration may include, for example, the designation of the function to be executed under either a single-threaded mode or a simultaneous multi-threaded mode. During the execution of the function, real-time attributes of the function are being continuously collected. If necessary, the runtime configuration under which the function is being executed can be changed based on the real-time attributes collected during the execution of the function.2012-08-02
20120198470COMPACT NODE ORDERED APPLICATION PLACEMENT IN A MULTIPROCESSOR COMPUTER - A multiprocessor computer system comprises a plurality of nodes, wherein the nodes are ordered using a snaking dimension-ordered numbering. An application placement module is operable to place an application in nodes with preference given to nodes ordered near one another.2012-08-02
20120198471FAIR SCALABLE READER-WRITER MUTUAL EXCLUSION - Implementing fair scalable reader writer mutual exclusion for access to a critical section by a plurality of processing threads is accomplished by creating a first queue node for a first thread, the first queue node representing a request by the first thread to access the critical section; setting at least one pointer within a queue to point to the first queue node, the queue representing at least one thread desiring access to the critical section; waiting until a condition is met, the condition comprising the first queue node having no preceding write requests as indicated by at least one predecessor queue node on the queue; permitting the first thread to enter the critical section in response to the condition being met; and causing the first thread to release a spin lock, the spin lock acquired by a second thread of the plurality of processing threads.2012-08-02
20120198472TASK SWITCHING WITH STATE PRESERVATION FOR PROGRAMS RUNNING ON AN ELECTRONIC DEVICE - A method and system providing switching between a plurality of installed programs in a computer system. Embodiments include a jump function comprising the steps: (1) determining a jump program that is to be the next program to be run, possibly from a plurality of possible choices; (2) creating input data for the jump program based on data in the current program; (3) storing the program state of the currently running program into a context packet and saving the context packet to memory; (4) releasing temporary memory that is used by the program, so as to allow other programs to use the memory; (5) calling the jump program with the created input data as input and terminating the currently running program.2012-08-02
20120198473COLLABORATIVE WORK OF APPLICATIONS - A method for collaborative work of applications can include reading a rule for defining a data transmission among collaborative working applications; initiating applications related to the rule; acquiring progress identifiers of the applications; and registering the progress identifiers of the applications.2012-08-02
20120198474APPLICATION ASSOCIATING BASED ON CRYPTOGRAPHIC IDENTIFICATION - As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.2012-08-02
20120198475VXML Browser Control Channel - A system to allow external applications to interact with an operating VXML browser include a VXML browser operating on a processor having a VXML interpreter. A control is operably interconnected between the external application and the VXML interpreter using a communication channel. The control inserts the commands into the VXML interpreter, which are processed by the VXML browser in a conventional manner to allow the external application to interact with the operating VXML browser.2012-08-02
20120198476EVALUATING PERFORMANCE OF AN APPLICATION USING EVENT-DRIVEN TRANSACTIONS - An event-driven performance measurement technique provides a set of transaction definitions that specify transaction actions that correspond to start and end points of a transaction. Events associated with execution of an application are received by a processor-based machine. The machine uses the events to generate transactions in accordance with the set of transaction definitions. The transactions can be used to evaluate performance of the application.2012-08-02
20120198477EVENT OVERFLOW HANDLING BY COALESCING AND UPDATING PREVIOUSLY-QUEUED EVENT NOTIFICATION - An event notification method for distributed processing systems provides reduction of queue space and event processing bandwidth associated with duplicate events such as a particular event that is duplicated and results in multiple event notifications propagated for multiple consumers. When a duplicate event notification is received at an input to an event notification queue, rather than queuing the duplicate event notification, a sequence number of the event notification already in the queue is updated to indicate to the event consumer, exactly how many duplicate events have been received. The timestamp of the updated event notification may also be set to the timestamp of the most recently received duplicate event notification.2012-08-02
20120198478SELECTIVE REGISTRATION FOR REMOTE EVENT NOTIFICATIONS IN PROCESSING NODE CLUSTERS - An event notification method for distributed processing systems provides remote and local node event notification in systems that require local registration of an event consumer in order produce an event notifications. To provide notification of an event occurring on a remote node, either event consumers on all nodes in the cluster register locally to receive event notifications and specify that the event is a cluster event, in which case the nodes send notification of their locally-occurring events to all nodes, or remote registrations are accepted at nodes and if a local consumer for the event is not present, a listener thread registers as an event consumer. The listener thread sends the event notifications to the remote nodes registered as consumers for the event by observing communication between the event producer and the local consumer, or receiving the event notifications directly if there is no local consumer.2012-08-02
20120198479METHOD AND APPARATUS FOR OPERATING SYSTEM EVENT NOTIFICATION MECHANISM USING FILE SYSTEM INTERFACE - A method and structure for OS event notification, including a central processing unit (CPU) and a memory including instructions for an event notification mechanism for monitoring operating system events in an operating system (OS) being executed by the CPU. The OS includes a kernel having a plurality of kernel subcomponents that provide services to one or more applications executing in the OS in a user mode, using system calls to the kernel. The OS event notification mechanism is capable of monitoring events within the kernel, at a level below the user mode level. The OS event notification mechanism includes Application Program Interfaces (APIs) that are standard for the OS.2012-08-02
20120198480INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND RECORDING MEDIUM OF CONTROL PROGRAM - An information processing apparatus includes a processor to execute a procedure, the procedure including executing first processing based on a first operating system and also executing second processing based on a second operating system; determining whether or not to perform a switching by the first processing based on the first operating system when input information processed into the first processing accords with a switching condition defined in the first operating system; and controlling subsequent input information to be processed into the second processing when performing the switching is determined.2012-08-02
20120198481OFF-PREMISE AND CODELESS PROCESS-CENTRIC BUSINESS MASHUP TO INTEGRATE BPEL BASED PROCESSES AND WEB 2.0 WIDGETS - Business application logic corresponding to a business is generated according to requirements of the business. The business application logic includes Web services and Widgets. The Widgets in the business application logic are mashed up to create a Widget mashup application. An adaptation relationship is established between the Web services and the Widgets in the Widget mashup application. An executable business process is generated for the business based on the business application logic and the adaptation relationship. An executable mashup Widget application is generated based on the Widget mashup application and the adaptation relationship.2012-08-02
20120198482Distributed Multi-System Management - A method, including arranging multiple digital information devices having respective memories to communicate within a network, and assigning within each of a subset of the respective memories a respective memory region dedicated only to management of a respective subgroup of the multiple devices, the subset and the subgroup each having a cardinality of at least two. The multiple digital information devices are then managed by exchanging information stored in the respective memory regions among the digital information devices over the network.2012-08-02
20120198483METHOD AND APPARATUS FOR EXECUTING APPLICATION INSTALLED IN REMOTE DEVICE - Provided herein are methods and apparatuses for expanding a remote procedure call (RPC) shared service between devices to an application level, in which a controlled device transmits to a controller device a list of shared applications which are remotely executable from among applications installed in the controlled device, and parameter information which is related to the shared applications, and the controller device remotely executes at least one of the shared applications by using the parameter information.2012-08-02
20120198484Optical Element Adjustment Structure and Optical Pickup - The optical element adjustment structure is provided with a rotating side including an optical element to be rotationally adjusted, and a non-rotating side where the rotationally adjusted optical element is securely arranged. The rotating side includes a tapered distal end section, and a contact section provided in an end section on a side opposite the distal end section and adapted to be contacted by an adjustment jig. The non-rotating side includes a recessed section for engaging the distal end section. The adjustment jig contacting the contact section is moved, whereby the rotating side rotates, the distal end section engaged in the recessed section being used as a fulcrum, and the optical element is rotationally adjusted.2012-08-02
20120198485LASER HOLDER AND OPTICAL PICKUP PROVIDED WITH SAME - A laser holder is used for holding a semiconductor laser, and is obtained by working of a metal sheet. The laser holder is provided with a step formed by folding of a metal sheet; and a positioning holding section capable of holding the semiconductor laser in a positioned state using the step, the positioning holding section provided on the metal sheet.2012-08-02
20120198486MEDIA PROCESSING DEVICE AND CONTROL METHOD FOR A MEDIA PROCESSING DEVICE - A media processing device does not execute a media transportation process if the height of media stacked in a media storage unit is at an over capacity level, and reliably prevents problems such as damage to the media transportation mechanism caused by collision with the stacked media. If in the media processing device 2012-08-02
20120198487CONTENT RECOMMENDATION SYSTEM - It is provided a content recommendation system comprising a unit of storing the related information of the content; a history with respect to the content; determination information indicating whether to validate processing of extracting the recommendation content, which uses the each piece of the related information; and an effective period from a last use date, in which the determination information indicates “valid”; a unit of extracting the last use date of the each piece of the related information from the operation history, and, the determination information of the each piece of the related information to indicate “invalid” if a number of days elapsed since the last use date exceeds the effective period; and a unit of extracting the recommendation content by using at least one of the each piece of the related information of the content having the determination information thereof set to indicate “valid” and the operation history.2012-08-02
20120198488METHOD FOR PROVIDING REMOTE CONTROL SERVICE AND IMAGE DISPLAY APPARATUS THEREOF - A system for servicing a display device is performed remotely through a network server. The server establishes a connection with the display device, transmits a first signal through the connection to instruct the display device to automatically perform a predetermined function, receives a captured image derived from a screen of the display device after performance of the predetermined function, and transmits a second signal through the connection to control at least one feature of the display device.2012-08-02
20120198489DETECTING FRAUD USING SET-TOP BOX INTERACTION BEHAVIOR - A processor can receive user interaction data indicative of interactions between a user and a set-top box device. The processor can compare a behavior pattern in the received user interaction data and a behavior pattern in previously stored data contained within a user profile for a human. The processor can generate a score indicative of a likelihood that the behavior pattern in the received data matches the behavior pattern in the previously stored data. Responsive to the generated score being below a threshold, the processor can generate an indication of a possible fraudulent action due to the user having a high likelihood of not being the human.2012-08-02
20120198490METHOD AND APPARATUS FOR SELECTIVELY RENDERING A CONTENT ITEM - A content item comprising a plurality of segments is selectively rendered by selecting at least one segment of a content item having objectionable content, step (2012-08-02
20120198491TRANSPARENTLY VERIFIYING USER IDENTITY DURING AN E-COMMERCE SESSION USING SET-TOP BOX INTERACTION BEHAVIOR - A set-top box device can detect a user interaction associated with a remote control proximate to the set-top box device. The set-top box device can store the user interaction within a storage device as user interaction data. The set-top box device can convey the user interaction data to a remotely located server. The set-top box device can receive a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile. The response can verify the identity of the user.2012-08-02
20120198492Stitching Advertisements Into A Manifest File For Streaming Video - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for combining advertisements into a manifest file for streaming video content. A system configured to practice the method identifies an advertising slot in a media presentation and retrieves an advertisement corresponding to the advertising slot. Then, the system divides the media presentation into a set of media chunks and divides the advertisement into a set of advertising chunks. The system inserts the set of advertising chunks into the set of media chunks at the advertising slot to yield an updated set of media chunks, and generates a manifest file corresponding to the updated set of media chunks, such as an m3u8 file that contains a series of links to each chunk in the updated set of media chunks. The system optionally transmits the manifest file to a media playback device for playback.2012-08-02
20120198493HYBRID AUDIO/VIDEO ENTERTAINMENT SYSTEM - A television entertainment system that combines the visual imagery of television entertainment and transmission with the audio of radio entertainment and transmission to create a new synthesis system for therapeutic benefit designated as Hybrid Radio Television. Each segment (video/audio) of the system can be viewed or heard/listened to on its own, however, it is designed to be viewed and heard/listened to as an integrated whole, as selected by a viewer.2012-08-02
20120198494SYSTEM AND METHOD FOR PRESENTING PROGRESSIVELY DOWNLOADED MEDIA PROGRAMS - A system and method for presenting progressively downloaded media programs is disclosed. A system that incorporates teachings of the present disclosure may include, for example, obtaining an estimated length of a media program where the estimated length is based on a plurality of different reported lengths of the media program in reported media program information, presenting at a display device a portion of the media program while it is being delivered by a media delivery system via a progressive download, and enabling active trick play functions for the media program based on the estimated length of the media program until a true time index is generated using an index file at an end of the progressive download of the media program. Other embodiments are disclosed.2012-08-02
20120198495Recommendation Comparison Display - A method for consolidating and comparing recommendations in selecting TV content for viewing by compiling and displaying recommendation and rating values for the same TV content from Sony and a number of other recommendation and ratings providers. Presenting all recommendation values on a single visual display and providing the preferred Sony recommendation in the most prominent display position and font, and allowing the viewer to select the Sony recommendation value to select that content for viewing.2012-08-02
20120198496Video Related Tag Generating Apparatus, Video Related Tag Generating Method, Video Interacting Method, Video Interacting System and Video Interacting Apparatus - A video related tag generating apparatus, a video related tag generating method, a video interacting method, a video interacting system and a video interacting apparatus are provided. The video interacting method includes the following steps. A video broadcast program is received via a video signal receiver, and a video related tag is received via a network interface. The video related tag relates to a target object, and the video broadcast program includes a video frame having the target object. A synchronous information, an object position and object information are generated according to the video related tag. A triggering region is generated according to the object position. The triggering region is synchronously overlapped on the video frame according to the synchronous information. A key-press signal is received to select the triggering region, such that the object information is overlapped on the video frame.2012-08-02
20120198497LIVE MEDIA CONTENT DISCOVERY AND MANAGEMENT - Mechanisms are provided for allowing a user to linearly or non-linearly discover and navigate media content including live events. A smart timeline includes panels of event information, previews, images, etc. Moving ahead allows discovery of future live media content and events and uncovers mechanisms for setting notifications and reminders. Moving back in time allows discovery of past events and mechanisms for replaying past video and audio content. Event navigation mechanisms can be integrated with calendaring applications to post and select events discovered using event navigation mechanisms.2012-08-02
20120198498CHANNELS AND SERVICES DISPLAY - The availability of a new information service is publicized by displaying an icon in an EPG when the presence of a new information service is detected. A list of new services is then displayed responsive to a user command. When one of the new services is displayed instead of the list.2012-08-02
20120198499SYSTEM AND METHOD FOR ADAPTIVELY CONTROLLING THE RECORDING OF PROGRAM MATERIAL USING A PROGRAM GUIDE - A system and method for displaying an electronic program guide (“EPG”), the EPG allowing for the controlling of recording functionality of an appliance and/or playing of media. The displayable EPG includes a listing of playable media from which the user may select a program of interest for recording or playing. The EPG may also include a display of prior recorded media for playing. Options may be presented to allow for a selection of a rendering device on which selected media is to be played.2012-08-02
20120198500TOUCH SCREEN VIDEO PRODUCTION AND CONTROL SYSTEM - The present invention is a video production and control system that uses a touch screen display and user interface, managed by a controller, for video source control and video switching. The video source control component may include a set of touch screen windows that display feeds from sources of video information. For a selected feed window, the system displays a set of representations of preset configurations of the video source, which might be a camera, a video recorder, a handheld device, a storage device, a computer, or other source of video data. The representations may be thumbnail images of a view through the video source when it has the corresponding configuration. Selecting a different thumbnail using the touch screen will cause a controller to send control data through an output port that directs the video source to assume the newly chosen preset configuration. Some combination of controls in the touch screen user interface and control panel allow a user to manually reconfigure a video source, and optionally create a new corresponding preset thumbnail. The video switching component is used to select Preview and Program video feeds from a set of video input feeds. The video source configuration for some of the feeds may have been selected using touch screen video source control technology. Over time, the user can use the touch screen controls to switch which feeds are then designated as the Preview and Program feeds. The evolving Program signal is sent to a Program output connection for consumers of the Program, possibly after some reformatting. The current Program feed may be promoted from the current Preview feed. User controls determine the type of transition, such as cut or crossfade, that will apply to a transition from Preview to Program.2012-08-02
20120198501Method and device for hierarchical transmission and reception in mobile multimedia broadcasting system - The disclosure discloses a method for hierarchical transmission in a mobile multimedia broadcasting system, including: dividing a video stream in a video service into a basic layer code stream and at least one enhanced layer code stream; encapsulating them in different multiplexing subframes of a broadcasting channel frame according to respective layers to which they belong; and sending the location information of the multiplexing subframes to a receiving terminal. The disclosure further discloses a method for hierarchical reception in a mobile multimedia broadcasting system, including: monitoring, by the receiving terminal, the location information of the multiplexing subframes of a broadcasting channel frame, code streams of a plurality of layers of a video stream of a video service being encapsulated in said multiplexing subframes, receiving only the basic layer code stream or both the basic layer code stream and the corresponding enhanced layer code stream, decoding only the basic layer code stream or both the basic layer code stream and the corresponding enhanced layer code stream, and outputting the video data of the basic layer code stream or that generated by combining the basic layer code stream with the corresponding enhanced layer code stream. The disclosure further discloses a device implementing the methods above. The disclosure is simple to implement and is practical.2012-08-02
20120198502METHOD AND APPARATUS FOR DATA RATE CONTROLLER FOR A CODE BLOCK MULTIPLEXING SCHEME - A receiver is used with third code blocks based on first code blocks, second code blocks, and a planning code block. The first code blocks are associated with a first sequence number and modulated with a first modulation scheme. The second code blocks are associated with a second sequence number and modulated with a second modulation scheme. The planning code block associates the third code blocks with the first code blocks and the second code blocks. The receiver includes a de-multiplexing portion, which includes a code block selector and a look up table, that outputs a de-multiplexed signal based on the third code blocks. The code block selector selects a code block from the third code blocks to output as the de-multiplexed signal based on entries in the look up table. The receiver also includes a recovery portion that outputs received code blocks based on the de-multiplexed signal.2012-08-02
20120198503System and Method for Domestic Multimedia Playing - The present invention relates to a system and method for domestic multimedia playing. The method comprises a transmitter receives audio and video data outputted by a plurality of multimedia devices; the transmitter analog-to-digital converts the audio and video data respectively; the transmitter encodes and compresses the converted audio and video data; the transmitter transmits the encoded and compressed audio and video data to a receiver by a means of 2.4G radio frequency; the receiver receives the audio and video data from the transmitter by a means of 2.4G radio frequency; the receiver decompresses and decodes the received audio and video data; the receiver digital-to-analog converts the decompressed and decoded audio and video data and drives a display screen and a power amplification module to play the converted audio and video data. When implementing present invention, the user can carry the receiver and watch multimedia program at any time and anywhere.2012-08-02
20120198504NETWORK DEVICE AND METHOD OF TRANSMITTING CONTENT FROM A FIRST NETWORK DEVICE TO A SECOND NETWORK DEVICE - The invention relates to a first network device outputting content, the first network device retrieving an address of a second network device using a contactless interface from a third device, and the first network device transmitting the content, which was output at the time of retrieving said address, to the second network device.2012-08-02
20120198505METHOD AND APPARATUS FOR REPRODUCING AUDIO AND/OR VIDEO DATA FOR USE IN AT LEAST ONE CHECKOUT ENVIRONMENT - The invention involves a procedure and a system for reproducing or alternatively creating audio and/or video data in a location (2012-08-02
20120198506MULTICAST ADAPTIVE STREAM SWITCHING FOR DELIVERY OF OVER THE TOP VIDEO CONTENT - Multicast adaptive stream switching for delivery of video content over an IP-based packet network is provided. A network device obtains multiple synchronized multicast streams of the same video content, where each of the multiple synchronized multicast streams includes a different bit-rate encoding. The network device receives, from a user device, a request to join a multicast group for one of the multiple synchronized multicast streams and provides, to the user device, the one of the multiple synchronized multicast streams corresponding to the requested multicast group. The user device detects a congestion level associated with the current multicast stream. The network device receives, from the user device, a request to join a different multicast group for a different one of the multiple synchronized multicast streams and provides, to the user device, the different one of the multiple synchronized multicast streams corresponding to the requested different multicast group.2012-08-02
20120198507Multichannel Video Player System - An example multichannel video player includes a digital processor, random access memory coupled to the digital processor, a plurality of video outputs coupled to the digital processor and non-volatile memory coupled to the digital processor. The non-volatile memory includes program instructions which are transferrable to the random access memory and are executable on the digital processor. The non-volatile memory also includes a plurality of multichannel video tracks. An example method for providing a multichannel video system includes storing on a server a plurality of video tracks, where each video track includes a plurality of synchronized video segments, transferring at least one video track from the server to a player computer over the Internet and storing the at least one video track in non-volatile memory of the player computer.2012-08-02
20120198508MULTIPLE DEVICE IPTV CLOUD-BASED RECORDING AND PLAYBACK - A cloud-based internet protocol television (IPTV) system is described here. In this invention, the cloud acts as a personal video recorder for recording and playback of audio, video, and other content. Communications to and from the cloud are transmitted over IPTV. An allowance for resolution and refresh rate conversion allows for high bandwidth content to be converted into lower bandwidth content. In this way, content stored from a high definition television may be converted to a content stream playable by a smart phone of limited capabilities. By using the cloud as storage, local devices may play only the IPTV streams, without the substantial storage capacities required for high definition video. IPTV-based menus are used to select media for recording and playback.2012-08-02
20120198509SYSTEMS AND METHODS FOR MANAGED VIDEO SERVICES AT EDGE-OF-THE-NETWORK - Systems and methods for managing video delivery to mobile device clients. Videos are assimilated for transmission to clients, a playout lead is estimated for each video and the videos are transmitted to the clients.2012-08-02
20120198510Return Data Path in an HFC Network - Described herein are devices and methods for facilitating the transmission of an upstream data signal from at least one subscriber in a communications network. The device is operable to receive a radio frequency (RF) signal from one or more subscribers. The RF signal includes at least one upstream data signal. The RF signal is demodulated into the upstream data signal by a RF demodulator in the device, which is then converted into an optical signal by an optical transducer in the device for transmission over a fiber optic link in the network.2012-08-02
20120198511WEB SERVICE SECURITY COCKPIT - A first configuration object identifies attributes of a configuration of a first web service. Security setting data is identified defining a security setting rules for the computing system. The failure of the first attribute to satisfy at least one security setting rule is determined. A second configuration object is identified that identifies attributes of a configuration of a second web service. The failure of the second attribute to satisfy at least one security setting rule is determined. A service security cockpit is presented identifying that configurations of at least the first and second web services are unsecure, based at least in part on the determination that the first and second attributes fail to satisfy security setting rules. User input is received, through the cockpit, identifying a resolution action directed to resolve the first attribute failing to satisfy at least one security setting rule. The identified resolution action is then initiated.2012-08-02
20120198512SYSTEM AND METHOD FOR COMBINING AN ACCESS CONTROL SYSTEM WITH A TRAFFIC MANAGEMENT SYSTEM - A system and method for handling a request from a client device to access a service from a server. The method comprises receiving a request from a user using a client device to access a service from a server. The request is received by a network traffic management device having a local external access management (EAM) agent. The EAM agent directly communicates with an EAM server that provides authentication policy information of a plurality of users able to at least partially access the server. User credential information is sent from the EAM agent to the EAM server, whereby the EAM agent receives access policy information of the user from the EAM server. The system and method selectively controls access of the user's request to the server in accordance with the received access policy information at the network traffic management device.2012-08-02
20120198513SECURE SOCIAL WEB ORCHESTRATION VIA A SECURITY MODEL - A method includes receiving, by a first computer, input from a first user. The method further includes creating, by the first computer, a hierarchical class tree implementing security profiles based on the input from the user. The hierarchical class tree identifies data, actions, and behaviors pertaining to content, and the security profiles restrict access and use of that user's content. The method also includes transmitting, by the first computer, a portion of the hierarchical class tree to a second computer.2012-08-02
20120198514Methods and Apparatuses for User-Verifiable Trusted Path in the Presence of Malware - An apparatus and method for establishing a trusted path between a user interface and a trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The method includes measuring an identity of the hypervisor; comparing the measurement of the identity of the hypervisor with a policy for the hypervisor; measuring an identity of the driver shim; comparing the measurement of the identity of the driver shim with a policy for the driver shim; measuring an identity of the user interface; comparing the measurement of the identity of the user interface with a policy for the user interface; and providing a human-perceptible indication of whether the identity of the hypervisor, the identity of the driver shim, and the identity of the user interface correspond with the policy for the hypervisor, the policy for the driver shim, and the policy for the user interface, respectively.2012-08-02
20120198515FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS - A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.2012-08-02
20120198516Inspecting Code and Reducing Code Size Associated to a Target - Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system.2012-08-02
20120198517RULE-BASED CONTEST HANDLING - An embodiment of a method includes receiving a content request including a first set of attribute values, using at least one of the attribute values from the first set of attribute values to determine a second set of attribute values, traversing a hierarchy of decision nodes, wherein each decision node implements business logic based on one of the attribute values from the first set of attribute values or the second set of attribute values, and generating a decision from a last node in the hierarchy, wherein the decision dictates how to respond to the content request.2012-08-02
20120198518OBSERVABLE MOMENT ENCRYPTION - A method, system and apparatus for encrypting a consumer identification number contained in a portable consumer device by gradually changing a consumer identification number when an observable moment is observed is disclosed. Observable moments can be exposure to light or an electromagnetic field, use of the portable consumer device or a change in temperature. A pattern or history of how the consumer identification number is gradually changed is used to authenticate the portable consumer device or the consumer.2012-08-02
20120198519Restricting Network Access While Connected to an Untrusted Network - In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network.2012-08-02
20120198520Machine-To-Machine (M2M) Call Flow Security - Systems, methods, and instrumentalities are disclosed to provide secure operations in an M2M device. An M2M device may receive an indication that an operation to be performed is security sensitive. The M2M device may determine that the operation is to be performed in a secure environment on the M2M device. The secure environment may be a logically distinct portion of the M2M device. The determination may be made in in accordance with a policy. For example, the M2M device may determine that the operation meets a requirement specified in the policy indicating that the operation is to be performed in the secure environment. The M2M device may perform the operation in the secure environment on the M2M device. The M2M device may store a result relating to the operation in the secure environment.2012-08-02
20120198521COMMUNICATION APPARATUS, COMMUNICATION APPARATUS SYSTEM, AND METHOD CONTROLLING RELAY APPARATUS - A service cooperation system is provided with a multi-function apparatus and a relay apparatus. The service cooperation system changes a disclosure condition of an album in which an electronic file is categorized and stored, for an electronic file storing service offered by the service provider. Without the need for a terminal apparatus such as a personal computer having a fulfilling web browser function, an image reading apparatus itself can perform uploading process, setting of an album of an upload destination and security setting/changing for an album, while notifying the user, who is authorized to a limited disclosure and to view the album, that the album has been updated.2012-08-02
20120198522Method for Information Editorial Controls - A method comprises the steps of submitting at least one comment regarding an editorially-controlled content to be published with the editorially-controlled content. The published comment is authored by a contributing member of an online community. A rating of the published comment is entered. The rating is determined by at least one reviewing member of the online community. Points are assigned within a predefined range for ratings of the published comment that exceeds a predetermined level. The points are assigned to the contributing member by an editor of the online community in which the points identify subject matter expertise for the contributing member. Awarded points are received in which the awarded points received by the contributing member comprise the points capped by a maximum number assigned to the editorially-controlled content.2012-08-02
20120198523APPARATUS AND METHOD FOR MANAGING ACCESS AMONG DEVICES - Provided are a method, system, and computer storage device for managing zone information for devices in a network. A zone table includes entries indicating whether devices in at least one zone are permitted to communicate. An attributes table has attributes of the devices indicated in the zone table. A determination is made of attributes from the attributes table for devices indicated in the zone table entries as being permitted to communicate. The entries in the zone table indicating that devices can communicate are verified by determining whether the attributes for the devices indicated as permitted to communicate in the entries in the zone table are consistent with the determined devices being able to communicate. Information is outputted indicating whether the entries in the zone table indicating that devices can communicate are in error.2012-08-02
20120198524RESUMABLE PRIVATE BROWSING SESSION - A resemble private browsing session is activated on a network computing device communicatively coupled via a network to other network computing devices. The private browsing session restrictedly saves one or more network browsing memories corresponding to activity between the network computing device and other network computing devices. The one or more network browsing memories are restrictedly saved under protection of a private credential. After the private browsing session has ended, access to the private browsing session is blocked unless a received credential submission matches the private credential. If the received credential submission matches the private credential, the private browsing session is resumed with access to the one or more network browsing memories.2012-08-02
20120198525SERVER RESERVATION METHOD, RESERVATION CONTROL APPARATUS AND PROGRAM STORAGE MEDIUM - An information processing device including a communication interface that exchanges data with a first device and a second device; and a processor that performs authentication of the first device; receives content data from the first device via the communication interface; and controls the communication interface to send the content data in real time to the second device based on an access control setting, which indicates a restriction on sending the content data.2012-08-02
20120198526SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR MESSAGE AUTHENTICATION TO SUBSCRIBERS OF AN INTERNET SERVICE PROVIDER - An internet service provider (ISP) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for the web pages to be treated as originating from the ISP, the ISP provides a shared secret in the browser message. The shared secret may be a secret not derivable by viruses or trojans in the subscriber computer, such as a MAC address of the subscriber modem.2012-08-02
20120198527IP Multimedia Security - A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second media plane network nodes. The method comprises sending session set-up signalling from said first end point towards said second end point, said session set-up signalling including a session key generated by said first end point. The set-up signalling is intercepted at a first signalling plane network node and a determination made as to whether or not a signalling plane key has already been established for securing the signalling plane between said first end point and said first signalling plane network node. If a signalling plane key has already been established, then a media plane key is derived from that signalling plane key, and the media plane key sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node. If a signalling plane key has not already been established, then an alternative media plane key is derived from said session key and sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node.2012-08-02
20120198528METHODS AND SYSTEMS TO DETECT ATTACKS ON INTERNET TRANSACTIONS - A method and system are disclosed for detecting interference with a remote visual interface, such as a HTML webpage, at a client computer, particularly to determine if a malicious attack such as at HTML attack has occurred. When the web server receives a request for a page, a script is embedded in the page, and as a consequence the client computer requests at least one session key and at least one one time password from an enterprise server. The client computer also performs a check of the HTML interface present on the client computer, which an attack of this type would change. The result of the interface check, encrypted with the session key and one time password, is sent to the enterprise server, so that a comparison with the expected value for the website can be performed.2012-08-02
20120198529BLACKLISTING OF FREQUENTLY USED GESTURE PASSWORDS - A method of maintaining a blacklist for gesture-based passwords is provided. A data store of index values corresponding to gestures is maintained on a blacklist server. Upon receiving a new gesture based password, an electronic device converts the password to an index value and forwards that index value to the blacklist server. The blacklist server increases an occurrence of the received index value by one in a data store and if the increase results in a blacklist threshold being exceeded, the index value is inputted to the blacklist. A notification can be sent back to the electronic device if the forwarded index value is on the blacklist or is inputted to the blacklist.2012-08-02
20120198530REAL TIME PASSWORD GENERATION APPARATUS AND METHOD - A method and apparatus for generating a password in real time by creating at least one password map during creation of an account associated with a user, and generating and providing a random password hint sequence grid to the user in real time, authenticating the user for accessing the account using a password created by the user, where the password is created by the user using the random password hint sequence grid and the at least one password map.2012-08-02
20120198531MULTI-DEVICE SESSION PAIRING USING A VISUAL TAG - One or more techniques and/or systems are disclosed for joining two or more devices in a multi-device communication session. A request is received from a first device, such as at a session hosting service on a remote server, to initiate a multi-device communication session, such on the session hosting service. A visual tag is sent to the first device, such as from the session service, where the visual tag comprises device-session pairing information, such as session service identification and session authorization. A multi-device communication session joining request is received from a second device, where the request from the second device comprises the device-session pairing information retrieved from the visual tag displayed by the first device, and captured by the second device.2012-08-02
20120198532User Authentication for Social Networks - Systems and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender. Verification can be performed, for example, by reference to biometric templates stored during the user enrollment process. The biometric templates can also be used to authenticate users logging into the social network to prevent user impersonation. The ability of some users to communicate to other users of the social network can be limited to only certified users, and even to those certified users that match a criterion, such as gender or age.2012-08-02
20120198533METHODS FOR REMOTE MONITORING AND CONTROL OF HOME DEVICES OVER A COMPUTER NETWORK - Methods are provided to access of home devices over the Internet and to control and/or set states of devices over the Internet. One method includes providing, at a server connected to the Internet, code for enabling access to networked devices at a remote location using a networked computing device. The method can enable receiving a status request to view status of one or more of the networked devices. The method can also enable receiving a control request at the server, via the networked computing device, to operate one or more utility controls at a remote location. The utility controls can be used for any of a variety of purposes. The method is operable for any computing device that has access to the Internet, including wireless hand-held networked devices.2012-08-02
20120198534INFORMATION PROCESSING SYSTEM, APPARATUS, METHOD, AND PROGRAM STORAGE MEDIUM - An information processing system includes a plurality of information processing apparatuses, each apparatus including a transmission unit and a verification unit, and a plurality of authentication servers connectable to the plurality of information processing apparatuses via one or more networks. When one information processing apparatus, used as a receiving apparatus, receives a request of executing a processing at the receiving apparatus from other information processing apparatus, used as a requesting apparatus, the transmission unit of requesting apparatus transmits information to the receiving apparatus, and the verification unit of receiving apparatus determines whether the requested processing can be executed at the receiving apparatus for a user of the receiving apparatus based on a comparison of the information transmitted from the requesting apparatus and information settable for the receiving apparatus by using the authentication server useable for user verification of the information processing apparatuses.2012-08-02
20120198535SYSTEM AND METHOD FOR EMBEDDED AUTHENTICATION - Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface.2012-08-02
20120198536UTILIZING A DISPERSED STORAGE NETWORK ACCESS TOKEN MODULE TO STORE DATA IN A DISPERSED STORAGE NETWORK MEMORY - A method for storing data begins with determining, by a computing device, where to store the data and continues with managing, by a dispersed storage network (DSN) access token module, a pairing between the DSN access token module and the computing device. The method continues with sending, by the computing device, at least a portion of the data to the DSN access token module and encoding, by the DSN access token module, the at least a portion of the data using a dispersed storage error encoding function to produce one or more sets of encoded data slices. The method continues with sending, by the DSN access token module, the one or more sets of encoded data slices and storage information to the computing device and sending, by the computing device, the one or more sets of encoded data slices to the DSN memory for storage therein.2012-08-02
20120198537UTILIZING A DISPERSED STORAGE NETWORK ACCESS TOKEN MODULE TO RETRIEVE DATA FROM A DISPERSED STORAGE NETWORK MEMORY - A method begins by a computing device determining that data is stored in dispersed storage network (DSN) memory and sending a data retrieval request to a DSN access token module regarding the data. The method continues with the DSN access token module generating a plurality of sets of data slice read requests and sending the plurality of sets of data slices read requests to the computing device. The method continues with, for a set of data slices read requests, the computing device sending the set of data slices read requests to the DSN memory, receiving data slices from the DSN memory, and sending the data slices to the DSN access token module. The method continues with the DSN access token module decoding the data slices to produce a decoded data segment and sending the decoded data segment to the computing device.2012-08-02
20120198538MULTI-ENCLAVE TOKEN - A security token has multiple independent application enclaves, on which different application providers can install encryption keys and/or other data to authenticate a user of the token to their respective applications.2012-08-02
20120198539Service Access Method, System and Device Based on WLAN Access Authentication - The present application discloses a service access method based on the WLAN access authentication, which includes: in the process of performing the WLAN access authentication, a WLAN portal server transmits a first Cookie to a terminal, which has passed the WLAN access authentication; the terminal requests to access the service of the application system, and the service authentication center associated with the application system determines the terminal has passed the WLAN access authentication according to the first Cookie; the associated service authentication center obtains the identity token of the terminal through the first Cookie; the associated service authentication center transmits the obtained identity token of the terminal to the application system; and according to the identity token of the terminal, the application system provides the service access for the terminal. By the method, after the terminal passes the WLAN access authentication, it can access the service provided by several application systems without the service authentication, thus improving the user experience and reducing the system overhead of the application system.2012-08-02
20120198540Internet-based fill-level measurement value and diagnostic information polling system - An Internet-based fill-level measurement value and diagnostic information polling system includes several field devices, a central server and a processing unit that is connected to the server by way of the internet. In response to a user inquiry the server generates a certificate and an associated data object that characterizes the data that may be polled by the user. In response to an inquiry by the user, with which inquiry the certificate is sent along to the server, the server automatically transmits the requested data to the user if a check of the certificate shows that the user is authorized to receive this.2012-08-02
20120198541METHODS AND APPARATUS FOR PREVENTING NETWORK INTRUSION - In one configuration, a non-volatile memory is provided having computer readable instructions configured to instruct a computer or controller to run a setup wizard to obtain setup and filtering module configuration rules from a user; reload the computer or controller with the settings obtained by the setup wizard; configure filtering module rules including rules for an industrial protocol filter; and filter received and/or transmitted packets in accordance with the filtering module rules. The configuration may also include instructions to further parse and analyze packets containing industrial protocols to determine whether to allow or deny ingress and/or egress of such packets.2012-08-02
Website © 2025 Advameg, Inc.