33rd week of 2009 patent applcation highlights part 57 |
Patent application number | Title | Published |
20090204930 | IPHYSICAL DESIGN SYSTEM AND METHOD - A design system for designing complex integrated circuits (ICs), a method of IC design and program product therefor. A layout unit receives a circuit description representing portions in a grid and glyph format. A checking unit checks grid and glyph portions of the design. An elaboration unit generates a target layout from the checked design. A data prep unit prepares the target layout for mask making. A pattern caching unit selectively replaces portions of the design with previously cached results for improved design efficiency. | 2009-08-13 |
20090204931 | Method And Apparatus For Processing Assertions In Assertion-Based Verification of A Logic Design - Method and apparatus for processing assertions in assertion-based verification of a logic design are described. One example relates to processing an assertion during verification of a logic design. An evaluation engine is generated that encodes, using a non-deterministic finite automata (NFA) model, temporal behavior of the logic design required by the assertion for a single attempt to evaluate the assertion. The evaluation engine is implemented in first reconfigurable hardware. The logic design is simulated over a plurality of clock events. Attempts to evaluate the assertion by the evaluation engine are preformed sequentially based on input stimuli obtained from the logic design during simulation thereof. Each of the attempts results in one of the assertion passing, the assertion failing, or the assertion requiring further evaluation. | 2009-08-13 |
20090204932 | EQUIVALENCE VERIFICATION BETWEEN TRANSACTION LEVEL MODELS AND RTL AT THE EXAMPLE TO PROCESSORS - A method for formally verifying the equivalence of an architecture description with an implementation description. The method comprises the steps of reading an implementation description, reading an architecture description, demonstrating that during execution of a same program with same initial values an architecture sequence of data transfers described by the architecture description is mappable to an implementation sequence of data transfers implemented by the implementation description, such that the mapping is bijective and ensures that the temporal order of the architecture sequence of data transfers corresponds to the temporal order of the implementation sequence of data transfers, and outputting a result of the verification of the equivalence of the architecture description with the implementation description. | 2009-08-13 |
20090204933 | SINGLE EVENT TRANSIENT MITIGATION AND MEASUREMENT IN INTEGRATED CIRCUITS - A method for single event transient filtering in an integrated circuit device is described. The device comprises three sequential elements, each having a data input and a data output with each of the three data outputs coupled to one of three inputs of a voting gate. The method comprises generating first and second nominally equivalent logic signals in first and second SET domains, converting the first and second nominally equivalent logic signals into first, second and third nominally equivalent data channels, and transmitting the first, second and third nominally equivalent data channels to the data inputs of the first, second and third sequential elements. Provision is made for applying the method to logic designs implemented in programmable logic integrated circuit devices. | 2009-08-13 |
20090204934 | METHOD FOR COMPENSATING LENGTH OF DIFFERENTIAL PAIR AND METHOD FOR CALCULATING COMPENSATION LENGTH THEREOF AND COMPUTER ACCESSIBLE STORAGE MEDIA - A method for compensating length of differential pair and a method for calculating compensation length of the zigzagging type delay line thereof are provided. The method for calculating compensation length of the zigzagging type delay line includes following steps. The quantity A of hypotenuse and the quantity B of bends of the zigzagging type delay line are counted. The width W of the zigzagging type delay line is measured. The height S | 2009-08-13 |
20090204935 | Semiconductor device, design method and structure - A semiconductor device can include at least a first diffusion region formed by doping a semiconductor substrate and at least a second diffusion region formed by doping the semiconductor substrate that is separated from the first diffusion region by an isolation region. At least a first conductive line can comprise a semiconductor material formed over and in contact with the first diffusion region and the second diffusion region. A portion of the first conductive line in contact with the first diffusion region is doped to an opposite conductivity type as the first diffusion region. At least a second conductive line comprising a semiconductor material is formed in parallel with the first conductive line and over and in contact with the first diffusion region and the second diffusion region. A portion of the second conductive line can be in contact with the first diffusion region and doped to a same conductivity type as the first diffusion region. A portion of the second conductive line in contact with the second diffusion region can be doped to a same conductivity type as the second diffusion region. | 2009-08-13 |
20090204936 | Method of Performing Proximity Correction - A method of performing proximity correction of a mask layout is used during the generation of a masking structure for performing a processing step. The masking structure includes at least one opening that is delimited by a sidewall and that exposes an area that is to be processed. The method includes the steps of a) determining a value representing a flux of particles to a target portion, wherein the target portion is at least one of the group of a portion of the sidewall and a portion of the uncovered area and wherein the particles are generated during the processing of the area; and b) determining a corrected mask layout dependent on the value determined in step a). | 2009-08-13 |
20090204937 | Conversion of a First Executable Diagram Having Interconnected Nodes to a Second Executable Diagram Using an Intermediate XML Representation - A system and method for programmatically generating a graphical program in response to state diagram information. The state diagram information may specify a plurality of states and state transitions, wherein each state transition specifies a transition from a first state to a second state. A graphical program generation program (GPG program), may receive the state diagram information and automatically, i.e., programmatically, generate a graphical program (or graphical program portion) based on the state diagram information. The GPG program may programmatically include graphical source code in a block diagram of the graphical program, which may serve as a framework of the states specified by the state diagram information and the state transitions among the states. The graphical source code framework automatically generated by the GPG program may include various “placeholders” or “containers” enabling the user to easily fill in the graphical program with source code that specifies execution instructions for each state and Boolean conditions for each state transition. The specific graphical source code that is automatically generated may depend on programming features supported by a particular graphical programming development environment with which the graphical program is associated. Examples of generating graphical source code for the LabVIEW graphical programming development environment are included. In one embodiment, the graphical program may be dynamically (programmatically) updated as the state diagram is being interactively constructed by the user. I.e., as the user performs various actions in a state diagram editor, such as adding or deleting states, adding or deleting transitions, etc., the corresponding graphical program may be dynamically (programmatically) updated to reflect the change. | 2009-08-13 |
20090204938 | SYSTEM AND METHOD FOR SYSTEMATICALLY ARRANGING A SET OF DISPLAY ELEMENTS IN ASSEMBLAGES TO MEANINGFULLY REPRESENT DATA - A system, method and computer program for creating a software application specification, including arranging graphical elements to form assemblages including information displays of the graphical elements. The assemblages are classified along a layout type dimension, and a relationship metaphor dimension, are specified by attributes of a situation being studied, and are respectively associated so as to describe a behavior of the graphical elements, a software application specification is generated based thereon. Further embodiments display graphical elements, corresponding to a feature set based on a matrix, a list, a collection, a curve, a timeflow, a sequence flow, a relationship, a map, a stack or a control and a feature set based on a situation of interest, a goal, a plan, a comparison, an evaluation, a conceptual aid, a qualifier, an action, an alert or an alarm, in a consistent manner to represent information in a form useful for decision-making or problem-solving. | 2009-08-13 |
20090204939 | Methods for visual representation of macros language - Methods for investigating the source(s) and/or evaluating the source(s) that affect what is impacted by at least one variable within software code, and potential changes thereto. Identification of a variable or modification to code is associated automatically to its source for identifying the potential impact of changing a variable within source code by providing structure and connectivity or impact-based relationships throughout the code. | 2009-08-13 |
20090204940 | Conversion of a First Diagram Having States and Transitions to a Graphical Data Flow Program Using an Intermediate XML Representation - A system and method for programmatically generating a graphical program in response to state diagram information. The state diagram information may specify a plurality of states and state transitions, wherein each state transition specifies a transition from a first state to a second state. A graphical program generation program (GPG program), may receive the state diagram information and automatically, i.e., programmatically, generate a graphical program (or graphical program portion) based on the state diagram information. The GPG program may programmatically include graphical source code in a block diagram of the graphical program, which may serve as a framework of the states specified by the state diagram information and the state transitions among the states. The graphical source code framework automatically generated by the GPG program may include various “placeholders” or “containers” enabling the user to easily fill in the graphical program with source code that specifies execution instructions for each state and Boolean conditions for each state transition. The specific graphical source code that is automatically generated may depend on programming features supported by a particular graphical programming development environment with which the graphical program is associated. Examples of generating graphical source code for the LabVIEW graphical programming development environment are included. In one embodiment, the graphical program may be dynamically (programmatically) updated as the state diagram is being interactively constructed by the user. I.e., as the user performs various actions in a state diagram editor, such as adding or deleting states, adding or deleting transitions, etc., the corresponding graphical program may be dynamically (programmatically) updated to reflect the change. | 2009-08-13 |
20090204941 | IMPLICIT COMPOSITION OF COMPONENT BINDINGS - Component domains used to define a binding between various components associated with the component domain. The component domain tracks the various services to be imported by each component, and tracks the various services exported by each component. At runtime, rather than at compile time, the various interrelations between the components are bound using the service import and export data. Accordingly, depending on the components available and their characteristics, the bindings may differ. This permits applications to be much more flexible. | 2009-08-13 |
20090204942 | ITERATIVE COMPONENT BINDING - Component domains used to define a binding between various components associated with the component domain. The component domain tracks the various services to be imported by each component, and tracks the various services exported by each component. At runtime, rather than at compile time, the various interrelations between the components are bound using the service import and export data. Accordingly, depending on the components available and their characteristics, the bindings may differ. This permits applications to be much more flexible. In one implementation, the binding is performed iteratively. For example, if after one iteration of binding service imports to service exports, some components may expand the services that they export, or the services that they desire to import. | 2009-08-13 |
20090204943 | Customization creation and update for multi-layer XML customization - Embodiments of the present invention provide techniques for customizing aspects of a metadata-driven software application. In particular, embodiments of the present invention provide (1) a self-contained metadata engine for generating customized metadata documents from base metadata documents and customizations; (2) a customization syntax for defining customizations; (3) a customization creation/update component for creating and updating customizations; (4) a customization restriction mechanism for restricting the creation of new customizations by specific users or groups of users; and (5) memory and caching optimizations for optimizing the storage and lookup of customized metadata documents. | 2009-08-13 |
20090204944 | GENERIC XAD PROCESSING MODEL - Embodiments are directed to dynamically building software applications and dynamically updating software applications based on changed data values. In one embodiment, a computer system receives an indication that a software application is to be initiated. The computer system also receives an application description including tags describing software objects that are to be included in the software application, automatically maps portions of the application description identified by the tags to software objects using reflection, where the reflecting includes accessing properties associated with the software objects, and automatically binds properties of the software objects to the portions of the application description based declarative rules included in the software object properties associated with the software object. | 2009-08-13 |
20090204945 | UTILIZING INTELLIGENT AUTOMATED SCRIPTS TO TEST SOFTWARE APPLICATIONS - Embodiments of the invention provide for utilizing an intelligent automated script to test software applications. According to one embodiment, testing a software application can comprise executing a test script for testing a plurality of versions of the software application. For example, executing the test script can comprise instantiating a first instance of the test script for testing the first version of the software application. The first version of the software application can be initiated and a temporary map of the first version of the software application can be built by the test script. The first version of the software application can be tested based on the temporary map. In some cases, a second instance of the test script can be instantiated for testing a second version of the software application. In such cases, the first and second versions of the application may be tested in parallel. | 2009-08-13 |
20090204946 | INTELLIGENT SOFTWARE CODE UPDATER - A method for modifying executable logic code stored on a computing system is provided. The method comprises assessing a risk level associated with modifying a first code block and assessing an urgency level associated with modifying the first code block and then evaluating whether the first code block should be modified. | 2009-08-13 |
20090204947 | METHOD AND SYSTEM FOR CORRELATING TRACE DATA - A computer program product comprises a computer useable medium. The computer useable medium has a computer readable program such that when the computer readable medium is executed on a computer, the computer is caused to configure a calling interceptor at a service invocation point corresponding to a first component service of a software application to monitor a service invocation made by the first component service of a second component service of the software application, record a first set of correlation data represented by a first correlation indicator into a trace file, record a unique identifier into the trace file, and send the unique identifier to the second component service thought the service invocation. | 2009-08-13 |
20090204948 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR DETECTING THREAD STARVATION - Thread starvation is indicated for a program under test while the program is running. Beginning with a least frequently used thread in a list of thread tracking structures, if recorded events are currently listed for the thread, thread starvation is detected based on a percentage of the recorded events that took place while other threads were waiting a synchronization object held by the thread. If no recorded events are listed for the thread, the percentage of recorded of events that take place while other threads were waiting for synchronization object held by the thread does not exceed the predetermined percentage, and there are timestamps currently listed for the thread and the thread is currently waiting for a synchronization object, thread starvation is detected based on a percentage of time the thread has been waiting for the synchronization object. Thread starvation detection is repeated for each of the remaining threads in the list of thread tracking structure, beginning with the next to least frequently active thread. | 2009-08-13 |
20090204949 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY ADJUSTING TRACE BUFFER CAPACITY BASED ON EXECUTION HISTORY - A method, system and program product for dynamically adjusting trace buffer capacity based on execution history. The method includes receiving, by a module configured to trace, a plurality of traces pertaining to one or more trace events generated during execution of a program being traced, the trace events generated including panel data and sequence data. The method further includes determining, using trace data captured from the plurality of traces received, whether or not a path for a trace event is a new path. If the path for the trace event is determined to be a new path, the method includes dynamically adjusting, by the module, an initial size of a trace buffer configured to store the trace data captured, such that, the module increases the initial size of the trace buffer upon making a determination that the trace event is a new trace event based on execution history. | 2009-08-13 |
20090204950 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR TEMPLATE-BASED VERTICAL MICROCODE INSTRUCTION TRACE GENERATION - Method, system and computer program product for template-based vertical microcode instruction trace generation. An exemplary embodiment includes an instruction trace generation method, including generating a testcase for a millicoded instruction in an instruction trace pool, wherein the millicoded instruction is included in a parent instruction trace, processing the testcase to generate a millicode instruction trace snippet, editing the millicode instruction trace snippet to generate a templatized millimode snippet, processing the parent instruction trace, accessing the templatized millimode snippet, updating the templatized millimode snippet with a value from the parent instruction trace, and generating a millicoded instruction trace from the updated templatized millimode snippet. | 2009-08-13 |
20090204951 | Sliding Granularity Time Stamping - In a method for tracing data within an integrated circuit, a default time stamp granularity is selected for a sequence of time stamps, wherein each time stamp has a resolution of 2**N. A sequence of trace events is captured and an elapsed time is determined between each time sequential pair of trace events in the sequence of trace events. A time stamp is formed to associate with each trace event of the sequence of trace events, wherein each time stamp has an associated time stamp granularity, wherein the time stamp has the default time stamp granularity if the elapsed time between a current trace event and a sequentially prior trace event is less than 2**N time slots, otherwise the time stamp granularity is slid to a larger value such that the elapsed time can be represented by N bits, whereby a small number N of bits can accurately represent a large range of elapsed times. | 2009-08-13 |
20090204952 | METHOD OF SECURING A COMPUTER PROGRAM. AND CORRESPONDING DEVICE, METHOD OF UPDATING AND UPDATE SERVER - A method for securing use of a primary computer program driving at least one data receiving and delivery device. The method implements a secondary computer checking program, different from the primary program and capable of delivering the same output data as at least a portion of the primary program, referred to as the critical portion, in the presence of identical input data. The following steps are performed when at least one of the critical portions of the primary program is activated: executing the critical portion, delivering first output data based on input data; executing the checking program, delivering second output data based on the input data; comparing the first and second output data and generating anomaly information, if the first and second output data are different; transmitting the anomaly information to a remote server; and continuing the primary program, based on the first and second output data. | 2009-08-13 |
20090204953 | Transforming data structures between different programming languages - Transforming data structures between different programming languages is disclosed. In some embodiments, a transformation module is configured to transform objects between a first programming language and a second programming language. In some embodiments, an object defined in a first programming language is received, and data comprising the object defined in the first programming language is copied and used to create a corresponding object defined in a second programming language. | 2009-08-13 |
20090204954 | System and Method For Providing A Web-Based Operating System - A system and method for providing a web-based operating system is disclosed. A web-based operating system is downloaded from a server to a network-enabled device. The web-based operating system provides a platform from which to run web-based computer applications. Web-based computer applications are downloaded from the server onto the network-enabled device, and executed in conjunction with the web-based operating system. Those portions of the web-based operating system software and web-based computer application software are downloaded to the network-enabled device as needed. A component-based environment for the development and deployment of a web-based operating system and web-based computer applications is also provided. Components are deployed within library files as part of a component-based development model. The web-based operating system downloads those library files needed to execute the web-based computer applications. | 2009-08-13 |
20090204955 | SYSTEM AND METHOD FOR AUTOMATED DISTRIBUTION AND IMPLEMENTATION OF SECURITY FIXES - The subject application is directed to a system and method for automated distribution and implementation of security fixes. A text message is first received into data storage of a document processing device via a data network. Strings in the received text message are then parsed so as to isolate control data, which includes advisory data corresponding to the applicability of a security risk associated with a class of devices and remedy data corresponding to a solution to a vulnerability problem associated with vulnerability data. The advisory data is then tested for applicability to the device, and the remedy data is analyzed according to the advisory test. An alteration of the document processing device is then completed in accordance with the output of analysis. The acceptability of the alteration of the device is then verified, and an applied alteration of the device is undone based upon the verification output. | 2009-08-13 |
20090204956 | MULTIPLE-MODE SOFTWARE LICENSE ENFORCEMENT - A computer implemented method, for multiple-mode software license enforcement on a client, including encoding in the software at least one predetermined event that occurs prior to a validation of the software program and encoding it with different functional states. The software's resulting modification may be of reduced or increased functionality or both reduced and increased functionality. The predetermined events may be the elapsing of a predetermined length of time, the entry of a valid registration key or an act of validating. Each of these events may take place a multiple number of times. | 2009-08-13 |
20090204957 | VIRTUAL COMPUTER SERVER APPARATUS, AND UPDATE IMAGE DETECTION METHOD - A virtual computer server apparatus includes an image information memory to store image information upon dividing into pages, the page being a memory of a predetermined size, an update unit configured to update the image information stored in the image information memory in accordance with operation of the application program, an update page detection unit configured to detect an update page from the pages storing image information transmitted to the terminal and displayed by the terminal as a display area, an update image detection unit configured to detect the image information updated by the update unit from image information in the update page before updated and image information in the update page after updated. | 2009-08-13 |
20090204958 | Method for Starting a Field Device for Process Automation Engineering - A method for the startup of a field device of process automation technology uses a service program which runs on a service unit connectable with the field device and with a field device manufacturer service computer SC via a public network (e.g. Internet). The service program communicates with the field device and reads-out its serial number and software version number. Then the service program communicates with the field device manufacturer service computer and ascertains the current software version number belonging to the serial number of the field device. If the two software version numbers do not agree, a corresponding report is produced and, as required, in a third method step, the current software version is downloaded from the service computer and transferred into the field device. | 2009-08-13 |
20090204959 | METHOD AND APPARATUS FOR VIRTUAL PROCESSOR DISPATCHING TO A PARTITION BASED ON SHARED MEMORY PAGES - The present invention provides a computer implemented method, data processing system, and computer program product for mapping and dispatching virtual processors in a data processing system having at least a first partition and a second partition. The data processing system runs a first partition on a virtual processor during a first timeslice. The data processing system identifies an at least one physical page used by the first partition and the second partition. The data processing system maps the at least one physical page to the first partition and the second partition. The data processing system determines a fitness value based on the mapping. The data processing system dispatches the Virtual processor to the second partition on a second timeslice based on the fitness value, wherein the second timeslice immediately succeeds after the first timeslice, whereby the at least one physical page remains in cache during at least the first timeslice and the second timeslice. | 2009-08-13 |
20090204960 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESSING A MEMORY SPACE ALLOCATED TO A VIRTUAL MACHINE - A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential associated with a certain memory space allocated to the virtual machine; generating, in response to the request, a cryptographically signed credential; sending the cryptographically signed credential to the other virtual machine; receiving from the other virtual machine an access request to access at least one memory entry within the certain memory space; and accessing the at least one memory entry, if the access request complies with the memory credential. | 2009-08-13 |
20090204961 | SYSTEMS AND METHODS FOR DISTRIBUTING AND MANAGING VIRTUAL MACHINES - An embodiment relates generally to a method of distributing virtual machines. The method includes specifying a set of requirements for a virtual machine and instantiating a virtual machine based on a lightweight reusable profile, based on the set of requirements as described in the profile. The method also includes importing the profile to a distribution server; and distributing the profile to at least one physical machine in response to a request. Software can be added to the at least one physical machine that can manage the deployment of the physical hosts as a farm to hosting the virtual images | 2009-08-13 |
20090204962 | Saving Unsaved User Process Data In One Or More Logical Partitions Of A Computing System - Methods, systems, and products are disclosed for saving unsaved user process data in one or more logical partitions (‘LPARs’) of a computing system, the computing system having installed upon it a hypervisor for administering the LPARs, each LPAR supporting an operating system, each operating system supporting one or more user processes, that include: detecting, by the hypervisor, a predefined event that the hypervisor interprets as an indication that unsaved data of user processes for at least one LPAR should be saved; transmitting, by the hypervisor in response to detecting the predefined event, a save instruction to the operating system supported by the LPAR; and instructing, by the operating system in response to receiving the save instruction, each user process supported by the operating system to save any unsaved data. | 2009-08-13 |
20090204963 | Reducing memory usage of a data processing task performed using a virtual machine - A method of performing a processing task in a data processing apparatus is provided that reduces memory usage of the processing task. According to this method a Virtual Machine performs the steps of accessing platform-neutral program code in a function repository, executing the processing task on the Virtual Machine and analysing at a current execution point on a function-by-function basis which functions in the function repository are inactive functions. The Virtual Machine performs software-based unloading from the function repository of at least a portion of platform-neutral program code corresponding to one or more inactive functions. A corresponding virtual machine and data processing apparatus are also provided. | 2009-08-13 |
20090204964 | Distributed trusted virtualization platform - A platform architecture shifts the networked computing paradigm from PC+Network to a system using trusted mobile internet end-point (MIEP) devices and cooperative agents hosted on a trusted server. The MIEP device can participate in data flows, arbitrate authentication, and/or participate in implementing security mechanisms, all within the context of assured end-to-end security. The MIEP architecture improves platform-level capabilities by suitably (and even dynamically) partitioning what is done at the MIEP nodes, the network, and the server based infrastructure for delivering services. | 2009-08-13 |
20090204965 | USB PORT SHARED CONTROL METHOD - Virtual USB host controllers are arranged in a plurality of virtual machines constructed inside a physical machine; emulation of the unmounting and mounting of a USB device in a used physical USB port and modifications in the allocation of the USB port utilization rights of a virtual machine are carried out by means of an operation from a control terminal to make possible exclusive utilization; and the physical USB port is utilized jointly among the virtual machines. | 2009-08-13 |
20090204966 | UTILITY FOR TASKS TO FOLLOW A USER FROM DEVICE TO DEVICE - A “follow-me” utility runs on each of a plurality devices a person may typically use. This utility monitors applications running on a device and intelligently saves the state of tasks a user is performing. When the follow-me utility detects that the user has initialized another device having the follow-me utility and connectivity to the original device, the utility automatically and transparently creates an environment on the new device so that the user may continue the task at the same point as when he or she last performed the task on the original device. When the user continues a task or starts a new task, the follow-me utility automatically and transparently updates files and task states on any devices having the follow-me utility and connectivity. The follow-me utility may make intelligent task migration decisions based on conditions such as network bandwidth, security policy, location, and device capability. | 2009-08-13 |
20090204967 | Reporting of information pertaining to queuing of requests - Various approaches for capturing context data in a data processing arrangement are described. In one approach, a method controls shared access to an object for a plurality of requestors. An access control routine receives an access control request from a first routine of one of the requestors. The access control request specifies a type of control over access to the object and specifies a role descriptor that describes a processing context in the first routine of the requested access control to the object. The context is not visible to the access control routine without the role descriptor. The method determines whether the type of control can or cannot be immediately granted to the requestor. If the type of control cannot be immediately granted to the one of the requestors, the specified type of requested control and role descriptor are stored by the access control routine. | 2009-08-13 |
20090204968 | SYSTEM AND METHOD FOR MONOTONIC PARTIAL ORDER REDUCTION - A system and method for analyzing concurrent programs that guarantees optimality in the number of thread inter-leavings to be explored. Optimality is ensured by globally constraining the inter-leavings of the local operations of its threads so that only quasi-monotonic sequences of threads operations are explored. For efficiency, a SAT/SMT solver is used to explore the quasi-monotonic computations of the given concurrent program. Constraints are added dynamically during exploration of the concurrent program via a SAT/SMT solver to ensure quasi-montonicity for model checking. | 2009-08-13 |
20090204969 | TRANSACTIONAL MEMORY WITH DYNAMIC SEPARATION - Strong semantics are provided to programs that are correctly synchronized in their use of transactions by using dynamic separation of objects that are accessed in transactions from those accessed outside transactions. At run-time, operations are performed to identify transitions between these protected and unprotected modes of access. Dynamic separation permits a range of hardware-based and software-based implementations which allow non-conflicting transactions to execute and commit in parallel. A run-time checking tool, analogous to a data-race detector, may be provided to test dynamic separation of transacted data and non-transacted data. Dynamic separation may be used in an asynchronous I/O library. | 2009-08-13 |
20090204970 | DISTRIBUTED DOCUMENT HANDLING SYSTEM - Disclosed is a networked reproduction system comprising connected scanners, printers and servers. A reproduction job to be carried out includes a number of subtasks. For the execution of these subtasks, services distributed over the network are available. A service management system selects appropriate services and links them to form paths that are able to fulfill the reproduction job. The user may define additional constraints that apply to the job. A path, optimal with respect to constraints, is selected. | 2009-08-13 |
20090204971 | AUTOMATED ACCESS POLICY TRANSLATION - The use of one resource access policy to populate a second resource access policy. One of more fields of the first resource access policy are each to be used to populate corresponding one or more fields of the second resource access policy. After identifying the field(s) of the first resource access policy, and identifying their corresponding field of the second resource access policy, the information from the source fields of the first resource access policy are then used to populate the destination fields of the second resource access policy. This may be done in an automated fashion thereby allowing for at least the possibility of the transition from one type of resource access security to another. | 2009-08-13 |
20090204972 | AUTHENTICATING A PROCESSING SYSTEM ACCESSING A RESOURCE - Provided are a method, system, and article of manufacture for authenticating a processing system accessing a resource. An association of processing system identifiers with resources, including a first and second resources, is maintained. A request from a requesting processing system in a host is received for use of a first resource that provides access to a second resource, wherein the request is generated by processing system software and wherein the request further includes a submitted processing system identifier included in the request by host hardware in the host. A determination is made as to whether the submitted processing system identifier is one of the processing system identifiers associated with the first and second resources. The requesting processing system is provided access to the first resource that the processing system uses to access the second resource. | 2009-08-13 |
20090204973 | METHOD AND SYSTEM FOR PROVIDING PREEMPTIVE RESPONSE ROUTING - A computer program product comprises a computer usable medium. The computer usable medium has a computer readable program such that when the computer readable medium is executed on a computer, the computer is caused to receive a request from a calling service. Further, the computer is caused to determine reply-to endpoint information from the request. The reply-to endpoint information indicates the calling service as a calling service response endpoint. In addition, the computer is caused to monitor functionality of the calling service. The computer is also caused to update the reply-to endpoint information to indicate an alternative calling service as the calling service response endpoint if the functionality of the calling service is impaired prior to availability of response data for composition of a response. | 2009-08-13 |
20090204974 | METHOD AND SYSTEM OF PREVENTING SILENT DATA CORRUPTION - A method and system of avoiding silent data corruption in a request-response messaging system where a requester relies on tags to match request messages with response messages. The silent data corruption occurring if the requester process a response message after a tag used with the response message was reused with another request message. | 2009-08-13 |
20090204975 | PERFORMANCE INDICATOR FOR MEASURING RESPONSIVENESS OF USER INTERFACE APPLICATIONS TO USER INPUT - A method for measuring application responsiveness measures the time elapsed between receiving and processing a trailing tag message inserted into the application's message queue. The method receives a message, generates a trailing tag message associated with the message, and inserts the trailing tag message into the application's message queue. The trailing tag message includes a timestamp indicating when the trailing tag message was queued. A default message handler calculates the time elapsed between when the trailing tag message was queued and when the trailing tag message was processed. The elapsed time may then be used to calculated system responsiveness. | 2009-08-13 |
20090204976 | SYSTEM AND METHOD OF RECONSTRUCTING COMPLEX CUSTOM OBJECTS - A system and method is provided for reconstructing one or more collections of objects across platforms. More particularly, Java Annotations are used to assist a Web Services Description Language (WSDL) wizard in reconstructing a collection of objects. In implementation, the system and method parses the object types such that a wizard can recreate or reconstruct the collection of objects for use by a receiving service. The method comprises reconstructing a collection using one or more annotations that document a base object of the collection. | 2009-08-13 |
20090204977 | EVENT MANAGEMENT SYSTEM - The present invention is directed to an event management system for managing event notifications between disparate systems. Specifically, the present invention is directed to: capture event notifications from any external systems or devices capable of generating an event notification; process said event notifications through a multitude of user-configurable settings including selection of one or more other systems or devices capable of receiving an event notification through assignment of one or more event notification paths based upon one or more of the nature of the event notification, the first external system or device and the one or more other systems or devices; deliver said event notifications to any internal or external systems or devices capable of receiving an event notification; facilitate lateral communication between the device that generated an event notification and a device that received it; permanently record the details of an event notification and its life within the system for any purpose, including auditing. The present invention facilitates comprehensive and multi-tiered programming of the system settings, including the assignment of event notification paths between event-generating devices and event-receiving devices. Such settings may be applied in a static, scheduled or dynamic manner, or any combination of the three. | 2009-08-13 |
20090204978 | SYNCHRONIZING SPLIT USER-MODE/KERNEL-MODE DEVICE DRIVER ARCHITECTURE - A device driver includes a kernel mode and a user-mode module. The device driver may access device registers while operating in user-mode to promote system stability while providing a low-latency software response from the system upon interrupts. The device driver may include kernel stubs that are loaded into the operating system, and may be device specific code written. The stubs may be called by a reflector to handle exceptions caught by the stubs. A reset stub may be invoked by the reflector when the user-mode module or host terminates abruptly or detects an interrupt storm. The reset stub may also be invoked if errant DMA operations are being performed by a hardware device. The reset stub may ensure that hardware immediately stops unfinished DMA from further transfer, and may be called by the user-mode driver module. | 2009-08-13 |
20090204979 | NETWORK SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - An information processing apparatus can easily delete drivers which become unnecessary as a result of removal of a peripheral device shared on a network or cancellation of a sharing setting. A driver deletion notification including the designation of a driver is input via an external network. In response to the deletion notification, the designated driver is deleted. | 2009-08-13 |
20090204980 | Method for implementing ejection-safe API interception - A DLL that includes an API hook is injected into the address space of a target computer process called by an application program. Upon termination of the application program, computer-readable instructions describing a process for filtering exceptions returned from the target computer process are stored in memory locations accessible to the target computer process and the DLL is ejected from the address space. | 2009-08-13 |
20090204981 | CLUSTER SYSTEM, SERVER CLUSTER, CLUSTER MEMBER, METHOD FOR MAKING CLUSTER MEMBER REDUNDANT AND LOAD DISTRIBUTING METHOD - A protocol process to a reception traffic is executed by cluster members of a current use system and a backup system. The backup system discards the reception traffic subjected to the protocol process and only the current use system transfers the reception traffic to an AP. The AP makes an application process redundant in an independent method. The cluster member in charge of the protocol process to the reception traffic is determined by using a data in a lower layer and the cluster member in charge of the application process is determined by using a data in a higher layer after the protocol process. | 2009-08-13 |
20090204982 | OPTICAL DISC DEVICE - To provide an optical disc device in which an identification and a disc ejection control processing for an optical disc with a high transmitting property and an 8-cm optical disc attached to an adapter can be effected easily and positively. There are provided a body capable of receiving an optical disc therein, an insertion/ejection port capable of insertion and ejection of the optical disc relative to the interior of the body, and rollers which are provided within the body, and rotate, while holding the optical disc therebetween, so as to convey the optical disc into the interior of the body. A mechanical detector, having a contact element for contact with at least one of obverse and reverse surfaces of the optical disc to detect the optical disc, is provided within the body so that an identification and a disc ejection control processing for optical discs can be effected easily and positively. | 2009-08-13 |
20090204983 | MASTER DISK EXPOSING APPARATUS AND THE ADJUSTING METHOD THEREFOR - A master disk exposing apparatus having: a turntable for rotating a master disk; moving means for horizontally moving the turntable in at least one direction; beam irradiating means for irradiating an electron beam toward the turntable, thereby forming a beam spot onto the turntable or the master disk; beam deflecting means for deflecting the beam; and control means for controlling the moving means, the beam irradiating means, and the beam deflecting means, wherein the control means includes initializing means for executing an initial operation to drive at least either the moving means or the beam deflecting means and make an origin of the beam spot coincide with a rotational center of the turntable at the time of activation. An apparatus and a method for easily adjusting a deviation between an origin of an irradiating position of the recording beam and the rotational center of the turntable are, thus, provided. | 2009-08-13 |
20090204984 | Contents Viewing and Listening Management Apparatus, Contents Viewing and Listening Management Method, Program, and Contents Viewing and Listening Management System - With a contents viewing and listening management method using a contents viewing and listening management apparatus, a viewing and listening request of a content is made for displaying a predetermined content. Information relating to users whose viewing and listening of the relevant predetermined content is restricted, and information relating to administrators who manage viewing and listening of a content by the users are managed. If restriction is set to a content relating to the viewing and listening request, a relevant user ID is obtained. Whether or not the requested is a content of which viewing and listening has been permitted by the administrator as to each of the users is determined. If the content of which the viewing and listening has been requested is not permitted, a message which requests permission for viewing and listening of the requested content is transmitted to a second terminal possessed by the administrator. | 2009-08-13 |
20090204985 | DEVICE FOR TRANSMISSION OF SIGNAL UNITS - An arrangement for transmission of signal units to at least one receiver may include a receiver being arranged to receive a number of signal units within a frequency range, by which each signal unit includes at least one signal, and a forwarding mechanism being arranged to make possible for at least a portion of the signal units to be forwarded or at least partially be blocked with respect to the receiver. | 2009-08-13 |
20090204986 | Method of performing parental control a channel and an IPTV receiver - A method for performing parental control a channel for building a channel map in an internet protocol television (IPTV) receiver and the IPTV receiver thereof are provided. The method includes receiving a master service information (SI) table including a first element defining location of a virtual channel map table, parsing the first element in the received master SI table, receiving the virtual channel map table including a second element defining location of a virtual channel description table based on the parsed location element, parsing the second element in the received virtual channel map table, receiving the virtual channel description table, which includes a third element indicating a default parental guidance rating of a virtual channel service when present, based on the parsed second element, parsing the third element in the received virtual channel description table, and controlling to allow ratings based on the type of parental guidance system according to the parsed third element. | 2009-08-13 |
20090204987 | Secure time element - Apparatus comprising a secure time element comprising a timing device that outputs to a plurality of delay devices, wherein the delay devices have characteristic delay times which are alterable as a result of a tampering attempt to tamper therewith, and wherein a characteristic delay time of one of the delay devices changes differently from another one of the delay devices as a result of the tampering attempt. | 2009-08-13 |
20090204988 | ANNOUNCEMENT BROADCASTING SYSTEM, ANNOUNCEMENT BROADCASTING OPTICAL RECEIVER USED FOR THE ANNOUNCEMENT BROADCASTING SYSTEM, CABLE TELEVISION BROADCASTING SYSTEM, AND OPTICAL RECEIVER USED FOR THE CABLE TELEVISION BROADCASTING SYSTEM - In a subscriber's facility of an announcement broadcasting system utilizing an optical fiber cable TV network, an announcement broadcasting optical receiver receiving an optical transmission signal of audio information and outputting an audio information electric signal for an announcement broadcasting terminal is provided. The announcement broadcasting optical receiver includes: a photo-detection section for converting the optical transmission signal into the audio information electric signal; a photoelectric conversion section, which is connected to the photo-detection section, for converting the optical transmission signal that the photo-detection section receives into electric energy; and an RF signal potential transformation section, to which the electric energy obtained by the photoelectric conversion section is supplied, for potential-transforming the audio information electric signal output from the photo-detection section to one at an input voltage level appropriate to the announcement broadcasting terminal and outputting it. | 2009-08-13 |
20090204989 | METHOD AND APPARATUS FOR PRESENTING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to obtain display parameters associated with a display device, adjust a format of media content at the set top box based at least in part on the display parameters where the adjustment is of one or more portions of a display of the media content, and transmit the media content from the set top box to the display device. Other embodiments are disclosed. | 2009-08-13 |
20090204990 | METHOD FOR SWITCHING DIGITAL TV PROGRAM AND DIGITAL TV DEVICE - A method for switching a digital TV program and a digital TV device are provided. The method includes: retrieving a prestored identifier of a target VOD program and a prestored presentation position associated with the identifier of the target VOD program when a program switching from a current live program to the target VOD program is required; and performing the program switching by using the identifier of the target VOD program and the presentation position. | 2009-08-13 |
20090204991 | Systems and Methods for Sorting Programming Search Results - A set top box includes a processor. The processor is configured to identify first and second instances of a show, and retrieve feature information for the first and second instances. The processor is further configured to sort the first and second instances into a list based on the feature information according to a user defined criteria and display the list. | 2009-08-13 |
20090204992 | Method, apparatus and system for personalized broadcast media reception - The present invention advantageously provides a method, apparatus and system for personalized broadcast media content including a user interface for enabling personalization, which provides efficient use of network bandwidth and minimizes receiver device battery usage. In one embodiment, a user profile is pre-defined on a receiving device to indicate the recording interests of the user. Individual clips to be broadcast are associated with flexible metadata tags, such that when content, particularly video programs, is broadcast, the receiver device selects individual programs to record based upon content tags matching the user interests indicated in the profile. The selection process can also consider viewing statistics. | 2009-08-13 |
20090204993 | System and Method of Applying User Profiles at a Set-Top Box Device - A method of applying user profiles at a set-top box device includes receiving data associated with each of a plurality of user profiles at the set-top box device, the plurality of user profiles including a default profile and a supplemental profile. The method also includes automatically applying the supplemental profile to at least one set-top box action after a start time associated with the supplemental profile occurs. Further, the method includes automatically applying the default profile to the at least one set-top box action after an end time associated with the supplemental profile occurs. | 2009-08-13 |
20090204994 | MANAGEMENT OF TV PROGRAMS BY THEIR BUFFERED LENGTHS - Systems and methods are provided for managing a time-shift buffer (TSB) that is used for buffering video presentations. One such method includes receiving user input identifying a storage capacity for the TSB and modifying a storage capacity of the TSB such that it is at least substantially equal to the storage capacity identified by the user input. | 2009-08-13 |
20090204995 | SYSTEM AND METHOD FOR FILTERING A TELEVISION CHANNEL LIST BASED ON CHANNEL CHARACTERISTICS - A system and method for automatically managing television channel lists is disclosed. Pixel resolutions characteristics of a plurality of televisions channels are analyzed. One or more high definition television (HDTV) channels having HD pixel resolutions from the plurality of available television channels are selected. The one or more selected HDTV channels are stored in a HD channel list. | 2009-08-13 |
20090204996 | TERMINAL AND METHOD OF CONTROLLING BROADCASTING THEREIN - A terminal including a wireless communication unit configured to receive broadcast guide information, and a control unit configured to determine whether or not broadcast information included in the received broadcast guide information corresponds to an actual broadcast operation for a corresponding broadcast program, and to update the broadcast guide information when the broadcast information included in the received broadcast guide information does not correspond to the actual broadcast operation for the corresponding broadcast program. | 2009-08-13 |
20090204997 | METHOD AND APPARATUS FOR SUPPORTING MOBILITY IN A MOBILE BROADCASTING SYSTEM - A method and apparatus for supporting mobility in a mobile broadcasting system in which Electronic Service Guide (ESG) discovery is required. The mobility support is classified into three ways according to three different aspects. The first way is to provide roaming information for a local IPDC operator having a roaming partner among local IPDC operators. In the second way, a terminal transmits a query message for requesting transmission of information on a particular local IPDC operator, and receives information on the particular local IPDC operator in response thereto. The third way is to provide the terminal with type information of an ESG; an access type of which is classified according to provision of a roaming service. The roaming information, the information on the particular local IPDC operator and the type information of the ESG, which are provided to the terminal from the mobile broadcasting system, can be provided in an ESG bootstrap level. | 2009-08-13 |
20090204998 | Television channel list system and method - Example systems and methods of generating a television channel list involve scanning virtual channels contained in a transport stream supplied to a television and determining, for each scanned virtual channel, whether that channel contains decodable video or audio content. A ring list used for tuning channels in channel up/down tuning operations is generated which contains only those scanned channels determined to have decodable video or audio content. | 2009-08-13 |
20090204999 | Broadcast Receiving System - A reservation recording module registers program information in a reserved program EPG database and a restriction period in a restriction period setting information. A reserved program keyword extracting module extracts an associative keyword from the program information registered in the reserved program EPG database and registers the associative keyword in an associative keyword database. An information content analyzing module extracts a keyword group from the program information about a now-broadcasting program in electronic program guide (EPG) data. An associated information restriction period determining module specifies as a restriction target program, only a not-yet-viewed program satisfying the restriction period in the respective programs registered in the reserved program EPG database. A program related information determining module calculates, for every restriction target program, an association level between the keyword group registered in the associative keyword database and the keyword group extracted by the information content analyzing module. If there exists the restriction target program with the association level being higher than a predetermined threshold value, an alarm issuing module | 2009-08-13 |
20090205000 | SYSTEMS, METHODS, AND DEVICES FOR SCANNING BROADCASTS - The various embodiments disclosed herein provide methods, systems, and devices for capturing broadcast streams, analyzing the broadcast streams to obtain information about the media content transmitted in the broadcast streams, obtaining additional information about the media content if available, and assigning a unique event identifier specific to the instance of broadcast of the broadcast stream and/or media segment transmitted in the broadcast stream. In other embodiments, the unique event identifier is broadcasted to broadcast receiving devices. With the unique event identifier, broadcast receiving devices can access the obtained information associated with the media content. | 2009-08-13 |
20090205001 | Intelligent Disaster Recovery for Digital Cinema Multiplex Theaters - A system for a digital multiplex theater having a plurality of auditoriums includes a central server, playout servers, and an intelligent selection module. The central server has a local storage device configured to store digital cinema movies. The playout servers are each configured to playout the movies at a respective auditorium and have a respective local storage device configured to redundantly store the movies. The intelligent selection module selects a source for playing out, in an alternate auditorium in place of a scheduled auditorium, from a respective playout server in place of a scheduled playout server, a portion of a movie interrupted by a malfunction occurring at the scheduled auditorium. The selection is made from among any of the storage devices, and is based upon at least a current playing out ability of the scheduled playout server, and a playout schedule of the storage device at the alternate auditorium. | 2009-08-13 |
20090205002 | VIDEO AND AUDIO CONTENT ON DEMAND ACCORDING TO TIME OF BROADCAST - A system and method for providing a content downloading service to a user and charging the user for the content. The content consists of audio or video content that is being broadcasted on a radio or TV station. The content is downloaded by the content provider to the user upon the user's requirement. The transaction between the service provider and the user is administered by the internet by a content server and a billing server. | 2009-08-13 |
20090205003 | SYSTEM AND METHOD FOR PLAYING MEDIA OBTAINED VIA THE INTERNET ON A TELEVISION - Systems for browsing media that is accessible via the Internet are described. In many embodiments, the system includes a browsing application that identifies media within pages retrieved via the Internet by performing document analysis. The document analysis identifies pieces of media referenced by the page and, in a number of embodiments, also identifies pieces of media referenced by pages linked to by the original page. The identified pieces of media can be used to generate playlists that can then be played for a user via a television. In several embodiments, the browsing application is configured to render a playback page that shows pieces of media queued in a playlist and facilitates user navigation to other sites using a typical television remote control. One embodiment of the invention includes a server connected to a network, where the server hosts at least one page of information including embedded media, and a computing device connected to the network and to a display device, where the display device is configured to receive instructions from a remote control device. In addition, a browser application configures the computing device to retrieve a page hosted on the server, the browsing application further configures the computing device to perform page analysis, where page analysis includes identifying hyperlinks within the page, inspecting the hyperlinks to identify embedded media, and adding the embedded media to a playlist, and the browsing application further configures the computing device to generate a playback guide user interface in which the playlist of media is displayed, and to display the generated playback guide via the display device. | 2009-08-13 |
20090205004 | Dynamic Allocation Of Upstream Channel Resources Among Multiple RF Domains - In one embodiment, an “upstream resource pool” may be defined, such that certain upstream resources may be utilized, or not, depending on current traffic demands. Such a pool may include a specified number of available upstream channels. A universe of “eligible” RF domains may be associated with the pool. To provide additional capacity when traffic demands warrant it, an eligible RF domain may be enabled to request one or more upstream channels from the pool. A channel may be requested for a specified duration, or for an unspecified period of time. | 2009-08-13 |
20090205005 | DIGITAL BROADCAST RECEPTION APPARATUS AND METHOD OF PROVIDING ADDITIONAL CONTENT - Disclosed is a method of providing additional content in a digital broadcast reception apparatus, the method including receiving a locator of additional content from a broadcast server while a user watches a broadcast program, receiving an instruction to insert the additional content from the broadcast server, receiving and reproducing the additional content from a content providing server designated by the locator, and switching back to the broadcast program. Thus, it is not necessary to allocate a separate channel and/or to switch channels for providing additional content. | 2009-08-13 |
20090205006 | Method, apparatus and system for generating and distributing rich digital bookmarks for digital content navigation - A method, apparatus and system provide a user with rich digital bookmarks to navigate digital content. According to an embodiment of the invention, rich digital bookmarks may be generated for digital content and provided to a user for use to perform sophisticated trick mode actions in a user friendly manner. | 2009-08-13 |
20090205007 | Fiber-optic access network utilizing CATV technology in an efficient manner - A system is provided for combining conventional HFC plants with fiber-optic access systems (e.g., fiber-to-the-home or fiber-to-the-curb) that share a head-end and other equipment. A robust modulation format, such as QPSK, having a sufficient SNR to transmit information (e.g., data, digital audio and digital video) downstream to users' premises via a fiber-optic access system is used. Also, a method and apparatus is provided for converting a first modulation format for information received via a fiber-optic access system to a modulation format compatible with customer premises equipment. | 2009-08-13 |
20090205008 | SYNCHRONIZING PRESENTATIONS OF MULTIMEDIA PROGRAMS - Synchronization is provided for set-top boxes that display multiple instances of a single multimedia program. Embodied set-top boxes request the transmission of a multimedia program and determine the play point of a remote set-top box. Embodied set-top boxes set a local play point to correspond to the remote set-top box's play point. More than two set-top boxes may be synchronized in accordance with disclosed embodiments, and some systems implement master and slave set-top boxes for purposes of synchronization. | 2009-08-13 |
20090205009 | APPARATUS AND METHOD FOR DISPLAYING CHANNEL INFORMATION IN DIGITAL BROADCASTING RECEIVER - An apparatus and method to display channel information in a digital broadcasting receiver. The apparatus includes a first tuner to receive a signal of one of the plurality of channels, a plurality of second tuners to extract channel information and a representative image for each of the plurality of channels from a broadcasting signal during reception of the signal of the selected channel by the first tuner, and a display to display the channel information and the representative image for each channel when requested by the user. | 2009-08-13 |
20090205010 | Switched Decoding and Output of a Video Program from an Encoder to Decoder - Video processing systems and methods are disclosed. One system embodiment, among others, includes a video compression engine configured to provide reconstructed pictures corresponding to a real-time presentation of a video program and a compressed version of the real-time presentation, a display buffer of the video compression engine, the display buffer configured to store the reconstructed pictures, and a persistent storage device, wherein the video compression engine is further configured to store the compressed version of the real-time presentation to the persistent storage device while simultaneously providing the real-time presentation of the video program. | 2009-08-13 |
20090205011 | CHANGE RECOMMENDATIONS FOR COMPLIANCE POLICY ENFORCEMENT - Some embodiments of the present invention provide a system for maintaining a software system. During operation, the system obtains a compliance policy for the software system and monitors the software system for a violation of the compliance policy. If a violation is detected, the system generates a change recommendation associated with the violation using the compliance policy and provides the change recommendation to an administrator, so that the administrator can use the change recommendation to resolve the violation. | 2009-08-13 |
20090205012 | AUTOMATED COMPLIANCE POLICY ENFORCEMENT IN SOFTWARE SYSTEMS - Some embodiments of the present invention provide a system that maintains a software system. During operation, the system obtains a compliance policy for the software system and monitors the software system for a violation of the compliance policy. If such a violation is detected, the system retrieves a change package associated with the violation based on the compliance policy and automatically deploys the change package to the software system to resolve the violation. | 2009-08-13 |
20090205013 | Customization restrictions for multi-layer XML customization - Embodiments of the present invention provide techniques for customizing aspects of a metadata-driven software application. In particular, embodiments of the present invention provide ( | 2009-08-13 |
20090205014 | SYSTEM AND METHOD FOR APPLICATION-INTEGRATED INFORMATION CARD SELECTION - A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider. | 2009-08-13 |
20090205015 | Method for Forecasting Unstable Policy Enforcements - Method for forecasting instable policy enforcement, is described, wherein a behavior dynamic Bayesian network (DBN) model and a policy finite state transducers extended with tautness functions and identities (TFFST) model is analytically composed to derive predictions of the consequences of enforcing a given policy, in particular to detect flip-flop configuration changes in a system. The method comprises the steps of—translating ( | 2009-08-13 |
20090205016 | POLICY ENFORCEMENT USING ESSO - A method for enforcing policies used with a computer client, the method including receiving, at policy decision point (PDP) processor, information from a single sign-on (SSO) system indicating an occurrence of an event of interest on the computer client, performing, using the PDP processor, a policy check in response to the occurrence of the event of interest, wherein a policy check result is generated, and providing the generated policy check result to the SSO system. | 2009-08-13 |
20090205017 | APPROPRIATE CONTROL OF ACCESS RIGHT TO ACCESS A DOCUMENT WITHIN SET NUMBER OF ACCESSIBLE TIMES - An access right management system is provided, which appropriately controls an access right, to access a document, when the number of executable times is set for each kind of processing on the document managed by a policy server. The management system includes the policy server which saves the access right showing permission or inhibition of access to the document in a first file and a document management server which saves the number of accessible times in a second file. When a predetermined condition is satisfied, the document management server instructs the policy server to update the access right, and the policy server which receives the instructions executes an update of the access right such as changing a permission of access to an inhibition of access. | 2009-08-13 |
20090205018 | METHOD AND SYSTEM FOR THE SPECIFICATION AND ENFORCEMENT OF ARBITRARY ATTRIBUTE-BASED ACCESS CONTROL POLICIES - A general attribute-based access control system includes at least one resource server, at least one client module, an access control database including basic data sets and basic relations between the basic data sets, at least one server module including an access decision sub-module that computes a decision whether to grant or deny access to computer-accessible resources referenced by objects, an event processing sub-module that processes events, and an administrative sub-module that creates, deletes, and modifies elements of the basic data sets and the basic relations. | 2009-08-13 |
20090205019 | Mobile access to location-based community services - The present invention discloses a method of accessing a network service via a mobile end device of a user in a wireless network wherein a first localisation procedure is performed in order to ascertain a position of the mobile end device. The availability of the network service is determined if the mobile and device is within or is about to enter a predetermined zone in which the network service is available. Then, the number of users of said network service in said zone is determined by using a second localisation procedure. Dependent on the number of users of the network service in said zone, one or more parameters for access of the network service by the mobile end user are set. | 2009-08-13 |
20090205020 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER READABLE MEDIUM - An information processing apparatus includes a first setting section, and a second setting section. The first setting section sets, when a first user is in a first status which indicates the first user moves out from a first group, a first authority under which the first user is permitted to read out and prohibited to write into the first electronic information. The first setting section sets, when a second user is in a second status which indicates the second user moves into a second group, a second authority under which the second user is permitted to read out and prohibited to write into the second electronic information. The second setting section cancels, when the first user satisfies a first condition, the first authority. The second setting section changes, when the second user satisfies a second condition, the second authority into an authority based on the second group. | 2009-08-13 |
20090205021 | MANAGEMENT OF RIGHTS CLEARANCE NEGOTIATIONS AND BROKERING OVER A NETWORK - Managing negotiations to clear rights for using an asset. A rights requester requests approval through a broker to a rights holder, such as a film studio, to use an image or other asset in a project, such as an advertising campaign. The rights requester or broker provides initial terms, such as fee amounts, type of use, sample of use, territory, or other terms. The broker notifies the rights holder of the opportunity, and provides an interface that enables the rights holder to review, revise, forward, approve, or otherwise manipulate the opportunity. The interface also enables the rights holder to search, sort, filter, analyze, and obtain aggregated information on a number of opportunities. Based on such actions, the broker can propose additional or alternate terms or opportunities. The broker may also automatically accept a counter offer if the revised terms fall within predefined ranges. Alternatively, relays a requester's reply offer. | 2009-08-13 |
20090205022 | ADVANCED ACCESS CONTROL FOR MEDICAL AD HOC BODY SENSOR NETWORKS - A secure wireless network ( | 2009-08-13 |
20090205023 | PROVIDING COMMUNICATIONS USING A DISTRIBUTED MOBILE ARCHITECTURE - A communication apparatus is disclosed that includes a wireless transceiver and a computer readable storage medium. A mobile switching center (MSC) module is embedded in the computer readable storage medium. The MSC module includes an authentication, authorization, and accounting (AAA) module configured to support generation of a set of call detail records at the communication apparatus. A base station controller (BSC) module is also embedded in the computer readable storage medium. The communication apparatus is adapted to transmit Internet Protocol (IP) packet data received at the wireless transceiver to a second apparatus via a peer-to-peer IP connection. | 2009-08-13 |
20090205024 | SYSTEM AND METHOD FOR DYNAMIC LAYER 2 WHOLESALE - Methods and systems consistent with the present invention provide a dynamic mechanism to support wholesale access for broadband subscribers. This mechanism involves dynamically discovering a retail ISP for a subscriber, and dynamically cross-connecting a subscriber's connection to a logical connection corresponding to a retail ISP, and is equally applicable to static, PPP and DHCP-based subscribers. Furthermore, dynamic steering of subscribers can be performed at layer 2 or layer 3 of the OSI model. | 2009-08-13 |
20090205025 | Wireless apparatus and method for configuring access point with wireless terminal - A wireless apparatus and a method for configuring an access point with a wireless terminal are disclosed. The wireless apparatus comprises at least one access point with a SSID and a security key. The SSID has a default value and the security key has a null value. The access point is enabled when the wireless apparatus is in an initial status. The SSID and the security key are respectively set with predetermined values through the wireless terminal when the access point is enabled. When the setting of the SSID and the security key is done, the access point then is disabled. | 2009-08-13 |
20090205026 | File transfer system for direct transfer between computers - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 2009-08-13 |
20090205027 | Album drive - The present invention is a system and method of selectively distributing media content to consumers, the system comprising essentially of a USB-type storage device loaded with media content, a network and a user interface system. The method comprises essentially of providing a USB-type storage device loaded with media content, distributing the device to retail outlets, instructing a user to contact a network that is in electronic communication with the USB-type storage device, selectively registering the media content on the network, activating the USB-type storage device, displaying the activated media content to the consumer on a display device associated with the user interface system, and providing a means to upload media content onto the USB-type storage device in the event the media content becomes corrupted or erased. | 2009-08-13 |
20090205028 | Method and System for Mobile Device Credentialing - Methods and systems taught herein allow communication device manufacturers to preconfigure communication devices to use preliminary access credentials to gain temporary network access for downloading subscription credentials, and particularly allow the network operator issuing the subscription credentials to verify that individual devices requesting credentials are trusted. In one or more embodiments, a credentialing server is owned or controlled by the network operator, and is used by the network operator to verify that subscription credentials are issued only to trusted communication devices, even though such devices may be referred to the credentialing server by an external registration server and may be provisioned by an external provisioning server. Particularly, the credentialing server interrogates requesting devices for their device certificates and submits these device certificates to an external authorization server, e.g., an independent OCSP server, for verification. A common Public Key Infrastructure (PKI) may be used for operator and device certificates. | 2009-08-13 |
20090205029 | MANAGEMENT APPARATUS - A management apparatus comprising memory to store owner information, dependence relationship information, and authorized user information are associated with file information identifying the secret file, an authorized user determination unit to determine whether a source user of the browse request is registered as the authorized user of the browse request file, a dependent file specifying unit to specify a dependent file having a dependence relationship with the browse request file by referring to the dependence relationship information when the source user is authorized; and a browse permission response transmitting unit to transmit the browse permission response to the source user based on whether or not the source user is registered as the authorized user of the dependent file by referring to the authorized user information. | 2009-08-13 |