40th week of 2012 patent applcation highlights part 82 |
Patent application number | Title | Published |
20120254900 | FLOW TRACING THOUGH DIVERSE LOGICAL AND PHYSICAL APPLICATION AND INFRASTRUCTURE LAYERS/DEPENDENCIES - In various exemplary embodiments, a system and a related method and a related computer-readable medium to perform the method, for tracking numerous software calls in an enterprise environment is provided. The method includes tracking, during a runtime operation of the enterprise environment, layers through which each of the software calls passes. The tracking includes logging each of a multitude of physical components involved in each of the software calls, annotating each of the physical components with associated metadata, logging each of a multitude of logical components involved in the software calls, annotating each of the logical components with associated metadata, and logging a reliance of each of the physical components and the logical components on other physical and logical components. A dependency map is generated indicating the layers tracked in each of the software calls. | 2012-10-04 |
20120254901 | METHOD AND SYSTEM FOR RESTORING AN APPLICATION IN A DYNAMICALLY LINKED ENVIRONMENT - A method and system for executing an application on a device is disclosed. The device comprises a nonvolatile memory having a file system that stores the application. The nonvolatile memory further includes a backup memory space that stores a backup copy of the application. The system further includes a processing module configured to execute the application and an application programmers interface (API) utilized by the processing module to facilitate instructions from the application to the processing module. The processing module is further configured to retrieve the application from the file system, execute the application on the processing module; monitor interactions between the application and the processing module for an API call from the application to the processing module, and retrieve a backup copy of the application from the backup memory space based on the monitoring for the API call. | 2012-10-04 |
20120254902 | SOCIAL NETWORK APPLICATION PROGRAMMING INTERFACE - Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface. | 2012-10-04 |
20120254903 | SOCIAL NETWORK APPLICATION PROGRAMMING INTERFACE - Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface. | 2012-10-04 |
20120254904 | SOCIAL NETWORK APPLICATION PROGRAMMING INTERFACE - Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface. | 2012-10-04 |
20120254905 | SPINDLE MOTOR AND DISK DRIVE APPARATUS - A spindle motor includes a shaft, a cone, a turntable provide with a disk support portion, a cylindrical closed-top rotor holder, a rotor magnet, a stator, and a bearing mechanism. The cone includes a disk holding surface inclined radially outward and downward. The turntable further includes a resin-made table body having a disk support portion and an annular groove portion depressed upward at a lower side of the disk support portion, a plurality of balls rotatably arranged within the annular groove portion, an annular closure portion arranged between the table body and the rotor holder to close a lower opening of the annular groove portion, and a disc-shaped portion arranged radially inward of the annular groove portion of the table body, the disc-shaped portion having an upper surface bonded to the table body by an adhesive agent and a lower surface bonded to the rotor holder by the adhesive agent. | 2012-10-04 |
20120254906 | MOVIE RECOMMENDATION SYSTEM AND MOVIE RECOMMENDATION METHOD - It is provided a movie recommendation system comprising a log holding unit a movie information input unit including a movie basic information input unit and a movie extended information input unit, and a recommendation calculation unit including a simple recommendation calculation unit and an extended recommendation calculation unit. The movie recommendation system compares the number of the operation logs held in the log holding unit and a predetermined value, calculates the recommendation movies by the simple recommendation calculation unit in a case where it is determined that a small number of operation logs are held in the log holding unit, and calculates the recommendation movies by the extended recommendation calculation unit in a case where it is determined that a large number of operation logs are held in the log holding unit. | 2012-10-04 |
20120254907 | SYSTEM AND METHOD FOR SELECTING AUDIO/VIDEO CONTENT FOR PRESENTATION TO A USER IN RESPONSE TO MONITORED USER ACTIVITY - A system for providing audio/video content to a user is disclosed. The system includes a set-top box device configured to provide audio/video content to a presentation device, and at least one sensor communicatively coupled to the set-top box device, the at least one sensor configured to provide sensor data to the set-top box device. The system also includes a sensor data processing module configured to process the sensor data to determine a probable activity type for the user, and a controller coupled to the sensor data processing module. The controller is configured to select particular audio/video content for playback at the presentation device, where the particular audio/video content is influenced by the probable activity type. Related operating methods are also provided. | 2012-10-04 |
20120254908 | METHODS AND APPARATUS TO COLLECT AUDIENCE INFORMATION ASSOCIATED WITH A MEDIA PRESENTATION - Methods and apparatus to collect audience information associated with a media presentation are described herein. In an example method includes counting a first number of individuals proximate to a media presentation device, counting a second number of signals received from one or more portable devices, each of which is associated with a respective one of one or more monitored individuals, comparing the first number of individuals to the second number of signals, and determining a third number of unidentified ones of the individuals proximate to the media presentation device based on the comparison of the first number of individuals to the second number of signals. | 2012-10-04 |
20120254909 | SYSTEM AND METHOD FOR ADJUSTING PRESENTATION CHARACTERISTICS OF AUDIO/VIDEO CONTENT IN RESPONSE TO DETECTION OF USER SLEEPING PATTERNS - A method of controlling presentation of content to a user is provided. The method involves the operation of a set-top box device to present audio/video content to the user. The method collects sensor data at the set-top box device, and then determines, from the sensor data, that the user is likely to be asleep. The method continues by initiating, with the set-top box device, at least one change to presentation characteristics associated with the audio/video content. For example, the set-top box device could lower the volume of the presentation device and/or lower the brightness of the display. | 2012-10-04 |
20120254910 | SYSTEMS AND METHODS FOR REAL TIME MEDIA CONSUMPTION FEEDBACK - Systems and methods for providing users with a real time or near-real time indications of media channels or programs that are currently receiving the most usage or consumption within a defined population of users are disclosed. In an embodiment, a method receives media usage data for currently airing media while the media is being aired and creates an ordered list of media channels or programs for presentation, based at least in part on the media usage data. The method then presents the ordered list of media channels or programs while the media is being aired. In an embodiment, a system further provides the ability to easily select and tune one of the indicated channels or programs in an interactive interface. In an embodiment, the selected media channels or programs are sold on demand or as part of a service upgrade if they are not included in a user's current subscription. | 2012-10-04 |
20120254911 | METHODS, APPARATUS AND ARTICLES OF MANUFACTURE TO ESTIMATE LOCAL MARKET AUDIENCES OF MEDIA CONTENT - Example methods, apparatus and articles of manufacture to estimate local market audiences of media content are disclosed herein. An example method disclosed herein includes weighting audience measurement data associated with a first geographic area based on population data associated with a second geographic area different from the first geographic area to form weighted data, determining a factor based on the audience measurement data and tuning data associated with the second geographic area, and processing the weighted data based on the factor to determine an audience exposure metric estimating exposure to media content in the second geographic area. | 2012-10-04 |
20120254912 | System and Method for Construction, Delivery and Display of iTV Content - iTV content is created and deployed using a server component adapted to allow content developers to create applications according to an authoring specification that describes a framework for same; a transport component configured to optimize and deliver the applications to one or more clients; and a client component adapted to render the applications through a television so as to permit user interaction therewith. The authoring specification provides for the presentation of content through one or more templates defined therein, allowing application definition and behavior to remain common across multiple client device types, middleware platforms, and/or iTV operating environments. The framework for applications accommodates advertising, promotions, content placement packages and/or programming campaign definitions, so as to permit a selection of a specific advertisement, promotion or content at a time of preparation of the iTV content by the server, and/or a time of execution of the applications by the client. | 2012-10-04 |
20120254913 | CONVERTING STANDARD DEFINITION TELEVISION ADVERTISEMENTS TO HIGH DEFINITION FORMAT - A device receives a request for an advertisement from a set-top box (STB) displaying television content in a high definition format, and provides, to the STB, the advertisement in a standard definition format, where the high definition format includes a resolution higher than a resolution of the standard definition format. The device also determines whether the STB converts the advertisement from the standard definition format to the high definition format. When the STB fails to convert the advertisement from the standard definition format to the high definition format, the device generates a first error code and instructs the STB to continue to display the television content, without interruption, in the high definition format. | 2012-10-04 |
20120254914 | SYSTEM FOR PROVIDING OFFERS USING A BILLING STATEMENT - A billing statement according to one aspect of the invention includes a description of a transaction and an offer pointer associated with the transaction, wherein the offer pointer includes information that may be used to review an offer. In one example of this aspect, a telephone number or a hyperlink is provided adjacent to a total amount owed listed on a statement (e.g., an electronically-displayed billing statement). The offers reviewed may be customized, for example, based on details of the transaction such as the product purchased or the amount of the purchase, the identity of the consumer, and/or on other data. | 2012-10-04 |
20120254915 | TRANSITION FROM LOCALLY STORED VIDEO DATA TO BROADCAST FEED - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for television advertising. In one aspect, a method includes generating a first video signal from a broadcast feed and providing the first video signal for display on a television device. Selecting advertisement data for an advertisement in response to a signal in the broadcast feed indicating the broadcast contains a replaceable portion. Generating a first video signal from the selected advertisement data. In response to generating the first video signal from the ending segment of the advertisement data, generating a second video signal from the broadcast feed while continuing to generate the first video signal from the ending segment of the advertisement data. Providing the second video signal for display on the television device after generating the first video signal from the advertisement data is complete. | 2012-10-04 |
20120254916 | BROADCAST RECEIVING DEVICE AND PROGRAM SELECTING METHOD - A tuner receives broadcast data on specified channels. A channel search unit controls the tuner to search for available channels, and creates a channel map representing the available channels and a selection order thereof. A channel order setting unit changes setting about enabling/disabling of the selection and/or the selection order of the channels in the channel map. An operation input unit accepts a channel selecting operation of a user. When the user performs an operation for channel forward selection or channel reverse selection through the operation input unit, a channel switching unit changes the selection of the channel according to the channel map and causes the tuner to receive the broadcast data on the selected channel. | 2012-10-04 |
20120254917 | System and method for real-time processing, storage, indexing, and delivery of segmented video - Disclosed embodiment providing for the capture of video content. The video content is segmented in real-time into clips by topic, and those clips are delivered as customized queues of video items relevant to the consumer according to their interests as aggregated from their social graph data and manual entry. | 2012-10-04 |
20120254918 | CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION DEVICE, CONTENT PLAYBACK TERMINAL, AND CONTENT DISTRIBUTION METHOD - In a content distribution system in which a content distribution device distributes video content to a content playback terminal, the content distribution device multicasts video content added with cash control information to the content playback terminal and other content playback devices, before a user plays back video content selected from a distribution menu. The distribution playback terminal writes the video content in a temporal storage unit included in the distribution playback terminal. If the video content selected by the user is stored in the temporal storage unit, the video content is played back. On the other hand, if the video content selected is not stored in the temporal storage unit, a distribution request for the video content selected is made to the content distribution device. | 2012-10-04 |
20120254919 | METHOD FOR ACQUIRING PROGRAM CONTENT AND SET TOP BOX - The present invention discloses a method for acquiring program content and a set top box. The method comprises: an STB acquiring a downloading address corresponding to predetermined program content, wherein the predetermined program content is program content which the STB needs to download; and the STB downloading the predetermined program content according to the downloading address. The present invention solves the problem in related art that no implementation of video on demand service downloading function is provided, achieves active downloading of the STB and improves user experience. | 2012-10-04 |
20120254920 | DISTRIBUTED, INTERACTIVE TELEVISION PROGRAM GUIDE; SYSTEM AND METHOD - In an interactive network-based personal video recording system, a user interface is provided that allows viewers to search a database of program guide information according to program title, indexed program attributes such as actor and director, and key word. Viewer interaction is by way of a remote control unit. | 2012-10-04 |
20120254921 | METHOD OF SEARCHING INTERNET AND VIDEO RECEIVING APPARATUS TO USE THE SAME - A method of searching the Internet and a video receiving apparatus, such as an Internet TV, to use the same to enable currently-displayed video to be transmitted to an external apparatus, such as a remote controller, and the video received from the external apparatus to be controlled, thereby increasing user convenience. Specifically, the video captured from the video receiving apparatus is transmitted to the external apparatus which receives coordinate data and performs an operation indicated by a menu of the currently-displayed video corresponding to the coordinate data received from the external apparatus so that websites having menus requiring user control can be used without requiring redesign even if the websites are not designed for use with the video receiving apparatus. | 2012-10-04 |
20120254922 | METHOD AND APPARATUS FOR SENDING A PACKET FROM A SOURCE TO A DESTINATION NODE - A method of sending a packet from a source node to a destination node in the same broadcast domain. The packet is associated with a traffic flow directed from the source node to the destination node. The source node is connected with the destination node via a first and a second communication path. A criterion based on an attribute of the traffic flow is measured for each of the communication paths. One path is selected between the first and second communication paths based on the measured criterion and the selected communication path is assigned to the associated traffic flow. The packet is then sent via the selected communication path. | 2012-10-04 |
20120254923 | CABIN MANAGEMENT SYSTEM, AIRCRAFT OR SPACECRAFT HAVING A CABIN MANAGEMENT SYSTEM, AND METHOD - The present invention provides a cabin management system for an aircraft or spacecraft, comprising: at least one first terminal, which acts as an interface for one or more passengers; at least one second terminal, which performs safety-related functions; and at least one means set up to provide and/or receive video data to/from the first terminal and safety-related data to/from the second terminal. | 2012-10-04 |
20120254924 | METHOD CIRCUIT AND SYSTEM FOR DETECTING A CONNECTION REQUEST WHILE MAINTAINING A LOW POWER MODE - Disclosed is a method, circuit and system for communication channel scanning by a video transceiver to determine whether a connection is being requested by another video transceiver. Scanning for connections requests may be performed according to two modes: (1) a first (complete) scanning mode, and (2) a second (partial) scanning mode. The information collected and/or recorded during a scanning sequence in the first scanning mode may be used as part of one or more partial scanning sequences performed in the second scanning mode. A scanning sequence in a first scanning mode may be followed by one or more (e.g. one, two, three etc.) scanning sequences in a second scanning mode. There may be provided a scanning circuit for checking for connection requests on one of a set of channels. | 2012-10-04 |
20120254925 | COMPUTER SYSTEMS AND METHODS FOR VIDEO CAPTURING, MANAGING, AND/OR SHARING - Examples are described for capturing, managing, and/or sharing videos. The videos may be captured such that they are limited in time, such as 30 seconds or less in some examples. Enterprises may establish campaigns and capture videos associated with the campaigns. Captured videos may be displayed to users in an order selected based on the number of hits or conversions the video had previously generated. A host video system may provide embedded code for video capture and playback on an enterprise site. | 2012-10-04 |
20120254926 | CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION DEVICE, CONTENT PLAYBACK TERMINAL, AND CONTENT DISTRIBUTION METHOD - In a content distribution system, a content distribution device performs on-demand distribution of video content to a content playback terminal via a network. Before a user plays back video content from a distribution menu, the content playback terminal preliminarily receives from the content distribution device, the distributed video content to which cache control information is added, and then writes the received video content in a temporal storage device included therein. If video content selected by the user is present in the temporal storage device, that video content is played back. On the other hand, if the selected video content is not present in the temporal storage device, a distribution request for the selected video content is made to the content distribution device. | 2012-10-04 |
20120254927 | METHOD AND APPARATUS FOR AUTOMATIC SHARING AND CHANGE OF TV CHANNEL INFORMATION IN A SOCIAL NETWORKING SERVICE - According to certain embodiments, a method of sharing broadcasting channel information of a mobile device in a Social Networking Service (SNS) includes, if a user comment is posted for a broadcasting program, acquiring broadcasting program information from a Television (TV), uploading the broadcasting program information to a handover broker, acquiring access information that is configured to access the broadcasting program information from the handover broker, and uploading the access information and the user comment to an SNS server. | 2012-10-04 |
20120254928 | Broadcasting Links to Enhanced Content - A computer-implemented method includes receiving, from a secondary computing device, a request for enhanced content for a media program, the request comprising information indicative of a communication channel through which the media program is being displayed on a primary computing device; receiving broadcast information indicative of enhanced content for a plurality of communication channels; extracting, from the broadcast information indicative of enhanced content for the plurality of communication channels, broadcast information indicative of enhanced content for the communication channel through which the media program is being displayed on the primary computing device; obtaining, based on the extracted broadcast information, a link to enhanced content for the media program; and sending, to the secondary computing device, the link to enhanced content for the media program. | 2012-10-04 |
20120254929 | Content Extraction for Television Display - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a display device that, in response to receiving a network address from a personal computing device, retrieves and presents network based electronic media. In one aspect, a method includes receiving at a user device a first resource referenced by a first resource address, and the first resource includes a second resource address referencing a second resource that is content that is displayed in a content display environment in the first resource page. In response to a selection of the display of the content in the content display environment, the method provide the second resource address to the television device in response to determining that a television device in data communication with the user device has a processing capability to retrieve the content from the second resource address and display the content. | 2012-10-04 |
20120254930 | METHOD AND VIDEO DEVICE FOR ACCESSING INFORMATION - A method and video device are disclosed for accessing information. In an embodiment of the present invention, part of data included in a title, being played, read from a storage medium or extracted from a broadcast signal is extracted and sent to a server over a network, and information corresponding to the part of the data (i.e., information related to the data and complete data of the data) is received from the server and played. Rather than the part of the data, information related to a position of the data, (e.g. a time point at which the playing of the data starts within the title or a radial position or a physical address at which the data is located in the storage medium) may be sent. The data may be data that forms audio, a frame-shaped video clip or a frame-shaped picture included in the title. | 2012-10-04 |
20120254931 | Content Extraction for Television Display - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a display device that, in response to receiving a network address from a personal computing device, retrieves and presents network based electronic media. In one aspect, a method includes receiving at a user device a first resource referenced by a first resource address, and the first resource includes a second resource address referencing a second resource that is content that is displayed in a content display environment in the first resource page. In response to a selection of the display of the content in the content display environment, the method provide the second resource address to the television device in response to determining that a television device in data communication with the user device has a processing capability to retrieve the content from the second resource address and display the content. | 2012-10-04 |
20120254932 | SYSTEM AND METHOD FOR INTERACTIVE VIDEO CONTENT PROGRAMMING - The present invention is directed to a system and method for interacting with video by displaying one or more interface links associated with video content being displayed, pausing the video content when an interface link is interacted with, allowing the user to view ancillary content the interface link is linked to over a network, and un-pausing the video content after the user elects to continue viewing the video content. In one or more embodiments, the ancillary content may permit e-commerce, display additional video or other images, and/or include links to additional ancillary content. The present invention also includes a method for creating an interactive video. | 2012-10-04 |
20120254933 | NETWORK VIDEO SERVER AND VIDEO CONTROL METHOD THEREOF - A network video server and a video control method thereof receive multiple sets of streaming data respectively transmitted from multiple network cameras connected with the network video server. Each set of streaming data has a piece of first streaming data having a first image resolution and a piece of second streaming data having a second image resolution being lower than the first image resolution. The network video server decodes the piece of first streaming data from one of the network cameras into a frame of video data and outputs the frame of video data during a full-screen mode, and combines the decoded pieces of second streaming data from all network cameras into a frame of video data and outputs the frame of video data during a split-screen mode. Accordingly, the sharpness and smoothness of video frames can be secured during the full-screen mode and the split-screen mode. | 2012-10-04 |
20120254934 | Group Performance Monitoring System And Method - The present invention provides group performance monitoring systems and methods. In one exemplary embodiment, a system for monitoring a plurality of individuals engaged in an activity includes a base station, a plurality of individual monitors configured to communicate wirelessly with the base station, a plurality of sensors, each sensor in communication with an individual monitor, each configured to be coupled to an individual, and each configured to sense a characteristic of the individual and to transmit, during the activity, data indicative of the characteristic to the individual monitor, and a group monitoring device configured to communicate wirelessly with the base station, wherein each individual monitor is configured to transmit, during the activity, the data to the base station, wherein the base station is configured to receive the data and to transmit, during the activity, a metric based on the data to the group monitoring device, and wherein the group monitoring device is configured to display a representation of the metric. | 2012-10-04 |
20120254935 | AUTHENTICATION COLLABORATION SYSTEM AND AUTHENTICATION COLLABORATION METHOD - An authentication collaboration server of an authentication collaboration system performs a secrecy calculation process using authentication information as input for an authentication process, generating secret authentication information for each piece of the authentication information. An authentication information verification server obtains and compares sets of the combination of secret authentication information generated by the authentication server, and a user ID identifying a user of a user terminal using the authentication information that is a source of the secret authentication information. The authentication information verification server extracts the plurality of pieces of authentication information that have been applied. The authentication collaboration server approves a service, when a user authentication state is removed as authentication results constituting the user authentication state satisfies the policy for the service, after an authentication result in which application of the authentication information has occurred. A collaboration service is achieved including multiple low cost Web services. | 2012-10-04 |
20120254936 | APPARATUS AND METHOD FOR SECURITY AND NETWORK MANAGEMENT BASED ON FLOW - There are provided an apparatus and method for security and network management based on flows. The flow-based security and network management apparatus generates data flows from network packets, and performs network management in connection with security management based on the generated data flows. Accordingly, it is possible to maximally guarantee traffic fairness between users against attack or intrusion traffic. | 2012-10-04 |
20120254937 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2012-10-04 |
20120254938 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2012-10-04 |
20120254939 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2012-10-04 |
20120254940 | AUTHENTICATING ONLINE USERS WITH DISTORTED CHALLENGES BASED ON TRANSACTION HISTORIES - A method for authenticating a user by a service provider includes providing at least one network, providing at least one processor, and using the at least one network and processor to receive user identification data from the user, generate and display to the user a Captcha-like challenge based on at least one previous transaction involving and known by the user and the service provider, receive a response to the challenge from the user, and determine whether the user is authentic based on the response. | 2012-10-04 |
20120254941 | Providing particular level of access to one or more items in response to determining primary control of a computing device - A computationally implemented system and method that is designed to, but is not limited to: determining which of a plurality of users detected in proximate vicinity of a computing device has primary control of the computing device; and providing a particular level of access, via the computing device, to one or more items, the particular level of access to be provided to the one or more items being in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254942 | CONNECTION DESTINATION DETERMINATION DEVICE, CONNECTION DESTINATION DETERMINATION METHOD, AND SERVICE COLLABORATION SYSTEM - A connection destination determination device includes a control unit for performing an approval determination process to determine that a user authentication state in a connection destination request is approved if the user authentication state satisfies the user authentication state corresponding to a collaboration service. If the user authentication state is determined to be approved in the approval determination process, the control unit responds to a source of the connection destination determination request with the connection destination of service corresponding to the collaboration service which is the search key. If the user authentication state is not determined to be approved in the approval determination process, the control unit responds to the source of the connection destination determination request with the connection destination of authentication service, in order to obtain the user authentication state that does not satisfy the user authentication state corresponding to the collaboration service which is the search key. | 2012-10-04 |
20120254943 | METHODS FOR CONTROLLING A TRAFFIC OF AN AUTHENTICATION SERVER - A method for controlling the traffic of an authentication server and an authentication access apparatus, wherein a local area network token bucket including a high priority token bucket and a low priority token bucket is set according to the capability of the authentication server in processing the request message, and the request message sent by the authentication client is redirected to the authentication server after allocating a token to the authentication client, thus the traffic of the authentication server is controlled, so that the authentication server will not receive more request messages than it can handle. Meanwhile, the tokens in the high priority token bucket are reserved specially for authentication clients of a high priority, and they cannot be used by authentication clients that are not of a high priority, so the quality of service for authentication clients of a high priority is improved. | 2012-10-04 |
20120254944 | METHOD AND APPARATUS FOR PROVIDING SECURE REMOTE ACCESS TO ENTERPRISE NETWORKS - The invention includes a method and apparatus for providing secure remote access to enterprise networks. An apparatus includes a network interface module adapted for maintaining a secure network connection with a network device independent of a power state of a host computer associated with the apparatus a storage module for storing information associated with the secure connection, and a processor coupled to the network interface and the memory where the processor is adapted for automatically initiating the secure connection without user interaction. | 2012-10-04 |
20120254945 | ENFORCING WEB SERVICES SECURITY THROUGH USER SPECIFIC XML SCHEMAS - A method of enforcing web security, by: (a) receiving an incoming request; (b) applying a plurality of XML customized schemas to the incoming request, and thereby: (c) simultaneously validating the incoming request and determining whether the incoming request is authorized; and then, (d) (i) processing the incoming request if the incoming request is both valid and authorized, (ii) sending the incoming request to an authenticator if the incoming request is valid but not authorized, or (iii) ceasing operation on the incoming request if the incoming request is not valid. | 2012-10-04 |
20120254946 | ESTABLISHING PRIVILEGES THROUGH CLAIMS OF VALUABLE ASSETS - A service accessible by a set of entities may be provided to each entity at a different service level (e.g., with a different set of privileges) based on the privilege level of the entity. However, many users may attempt to perform malicious activities through the service, and may do so with impunity if the penalties of detection are inconsequential. Instead, privilege levels of entities may be established based on the claims of assets having identifiable value. Such claims may be established by submitting an asset identifier to the service, such as proof of a software license identified by the submission of a license key purchased at a substantial cost. The penalties of malicious activities performed by such users may include the invalidation of such asset identifiers. Establishing the privilege levels of respective entities in this manner raises the penalties, and hence the deterrence, of attempted malicious use of the service. | 2012-10-04 |
20120254947 | Distributed Real-Time Network Protection for Authentication Systems - Information about security events detected by a group of protected web-connected resources is centrally managed in order to detect distributed attacks and slow paced attacks by providing to a plurality of web-connected resources a deployment component which couples to a native authorization service of each web-connected resource; receiving a plurality of security event reports from one or more of the deployment components by a command and control center computer; based on collected information from the plurality of security event reports, determining a threat level indicator across the plurality of web-connected resources using one or more analyses and metrics; and transmitting the threat level indicator to each of the web-connected resources. | 2012-10-04 |
20120254948 | METHODS AND SYSTEMS FOR AUTHENTICATING ONE OR MORE USERS OF A VEHICLE COMMUNICATIONS AND INFORMATION SYSTEM - In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated. | 2012-10-04 |
20120254949 | METHOD AND APPARATUS FOR GENERATING UNIQUE IDENTIFIER VALUES FOR APPLICATIONS AND SERVICES - An approach is provided for adapting and regenerating identifiers for use in connection with applications and services available to a device. An identification generation platform receives a request to generate one or more identifiers associated with a device, a user of the device, or a combination thereof. At least one seed value associated with the device, the user of the device, or a combination thereof is determined. The platform then processes at least one seed value to cause, at least in part, a generation of the one or more identifiers. | 2012-10-04 |
20120254950 | Delivery control for messages communicated among end user communication devices - An exemplary method implemented by a first end-user communication device originates an electronic communication. User input is received to create information to be conveyed by the transmission of a digital packet having a header segment and a user data segment. The user data segment contains a user message and an acknowledgement command where the acknowledgement command conveys a request to a recipient device to authorize the sending of an acknowledgement reply message. Authorization of the sending of the reply acknowledgement message serving as a condition precedent to the recipient being able to view the corresponding received user message. Displaying a composition screen by which the user inputs the user message and can insert the acknowledgement command in a command field in the user data segment prior to transmission of the digital packet. The digital packet with the user data segment that contains the user message and the acknowledgement command is transmitted to a recipient device. Another embodiment includes a method implemented by a first end-user communication device that receives and processes such electronic communication. | 2012-10-04 |
20120254951 | PROVIDING PROTECTION AGAINST UNAUTHORIZED NETWORK ACCESS - A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation. | 2012-10-04 |
20120254952 | INTERFACE DEVICE FOR AN INTELLIGENT ELECTRONIC DEVICE AND METHOD OF OPERATING AN INTERFACE DEVICE - The present invention relates to a system comprising an interface device ( | 2012-10-04 |
20120254953 | METHOD FOR PROVIDING AND OBTAINING CONTENT - In a data providing server, whether or not specified compressed content data generated by means of a specified compression coding method corresponding to terminal identification information has been stored in a content database is detected, according to content specifying data transmitted from a portable dedicated terminal. If the specified compressed content data has been stored, the data providing server reads and transmits this to the portable dedicated terminal. And if the specified compressed content data has not been stored, the data providing server generates the specified compressed content data by means of the specified compression coding method, and transmits this to the portable dedicated terminal. | 2012-10-04 |
20120254954 | SYSTEM FOR MULTIMEDIA VIEWING BASED ON ENTITLEMENTS - An advertising control method is described. The method includes receiving an advertisement identification message (AIM) ( | 2012-10-04 |
20120254955 | PERSONAL AUTHENTICATION METHOD, PERSONAL AUTHENTICATION SYSTEM, AND PORTABLE-TYPE COMMUNICATION TERMINAL - A personal authentication system includes a terminal enabled to perform a predetermined information processing process, a USB memory enabled to perform near field communication with a cell phone having an e-mail function through Bluetooth, and an authentication server. When the USB memory is loaded onto the terminal, USBID is read, and then transmitted from the terminal to the authentication server. The authentication server authenticates the USBID, and transmits an authentication key corresponding to the USBID to the corresponding cell phone if the USBID is authentic. The cell phone transmits the authentication key to the USB memory via Bluetooth. The received authentication key is transmitted from the terminal to the authentication server via the USB memory. The authentication server performs personal authentication by comparing the transmitted authentication key with the received authentication key to check for identification. | 2012-10-04 |
20120254956 | Securely Managing Password Access to a Computer System - A method, system or computer usable program product for providing initial access Lo the computer system in response to a user providing a first password, and upon detecting a condition meeting a predetermined criteria, providing subsequent access to the computer system in response to the user providing a second password wherein the first password has stronger security than the second password. | 2012-10-04 |
20120254957 | User impersonation/delegation in a token-based authentication system - A “trusted service” establishes a trust relationship with an identity provider and interacts with the identity provider over a trusted connection. The trusted service acquires a token from the identity provider for a given user (or set of users) without having to present the user's credentials. The trusted service then uses this token (e.g., directly, by invoking an API, by acquiring another token, or the like) to access and obtain a cloud service on a user's behalf even in the user's absence. This approach enables background services to perform operations within a hosted session (e.g., via OAuth-based APIs) without presenting user credentials or even having the user present. | 2012-10-04 |
20120254958 | METHOD TO ACHIEVE COEXISTENCE OF MULTIPLE WIRELESS NETWORKS USING UNIQUE NETWORK IDENTIFIERS - The techniques of this disclosure generate a random network identifier to a network device to set up a wireless network. The generated random network identifier may be compared to network identifiers of other wireless networks within the range of the network device. If the generated network identifier matches any of the network identifiers within the range, a new random network identifier may be generated, until a generated network identifier does not match any of the network identifiers within the range. The network device may then assign the generated unique network identifier as the wireless network's network identifier and send the network identifier to all the devices that wish to join the wireless network. | 2012-10-04 |
20120254959 | IDENTITY MANAGEMENT ON A WIRELESS DEVICE - A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP) associated with the wireless device. The local web server and/or local OP may be implemented on a security module, such as a smartcard or a trusted execution environment for example. The local OP and/or local web server may be used to implement a provisioning phase to derive a session key, associated with a service provider, from an authentication between the wireless device and the network. The session key may be reusable for subsequent local authentications to locally authenticate a user of the wireless device to the service provider. | 2012-10-04 |
20120254960 | Connecting mobile devices, internet-connected vehicles, and cloud services - A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle system, such that the mobile device can securely connect to, and obtain status information and/or control the Internet-connected vehicle system, through the cloud-based service. | 2012-10-04 |
20120254961 | Method of Distributing Information Regarding One or More Electrical Devices and System for the Same - Some embodiments concern a method of distributing information regarding one or more electrical devices using a first server. Each of the one or more electrical devices can have unique identification information, an internal IP address, and an external IP address. The method can include: receiving in the first server a first request to register a first electrical device of the one or more electrical devices, the first request to register comprises the unique identification information, the internal IP address, and the external IP address of the first electrical device of the one or more electrical devices; storing in the first server the unique identification information, the internal IP address, and the external IP address of the first electrical device of the one or more electrical devices using the first server; receiving in the first server from a first client computer a first request for information regarding the first electrical device of the one or more electrical devices; using the first server to determine the external IP address of the first electrical device of the one or more electrical devices; redirecting the first request for the information to a first gateway device if an external IP address of the first client computer is identical to the external IP address of the first electrical device of the one or more electrical devices; and returning the external IP address of the first electrical device of the one or more electrical devices if the external IP address of the first client computer is different from the external IP address of the first electrical device of the one or more electrical devices. Other embodiments are disclosed. | 2012-10-04 |
20120254962 | MANAGEMENT SYSTEM, A MANAGEMENT PROCESS, AND A QUICK ACCESS METHOD OF INFORMATION CONTENT FOR A DIGITAL NETWORKING DEVICE - The present invention discloses a method of information content quick access for a digital networking device. The method comprises the steps of: inputting an executing code in a terminal quick access system assembled at the digital networking device and opening an information content corresponding to the executing code by the terminal quick access system. The method further comprises the steps of: connecting the terminal quick access system to a cloud server system, acquiring an information content access website address corresponding to the executing code, connecting to the website address, and downloading an information content. The present invention further discloses an information content management system for executing the method of in formation content quick access. The information content management system comprises a cloud server system and at least one terminal quick access system. | 2012-10-04 |
20120254963 | DYNAMIC PIN DUAL FACTOR AUTHENTICATION USING MOBILE DEVICE - The present invention provides cost efficient two way authentication method in which the authentication module can be provided as a Plug and Play (PnP) architecture enabling dual layer security with reduced cost where the actions are initiated by a server and user input is received through an audio session for added security. The second level authentication can be carried out with mobile as client device making it cost efficient. The invention can be hosted as an independent service or can be integrated with existing authentication mechanisms, making it elegant for usage. | 2012-10-04 |
20120254964 | METHOD AND SYSTEM FOR GENERATING A TOUCH CAPTCHA - The present invention provides a method and system for automated test for human presence at a client device capable of receiving touch sensitive response. At a server, the method includes receiving and storing user profile information. Receiving request from client device to access a resource on a server. Generating a query based on the user profile information and the query requiring user to generate a touch sensitive response. Receiving the user generated response and authenticating the user if the touch sensitive response matches a predefined response for the query stored on the server. | 2012-10-04 |
20120254965 | METHOD AND SYSTEM FOR SECURED DISTRIBUTED COMPUTING USING DEVICES - A method for secured distributed computing is disclosed. The method includes identifying a computing task for processing, authenticating user and device with a distributed computing network, receiving a unique security code having an end-of-session expiration, requesting that the computing task be executed over the distributed computing network, receiving a one-time task code, selecting a device to process the computing project from among a plurality of devices based upon device location and at least one associated operating state of the device, sending the identified computing task and the one-time task code to the selected device over the distributed computing network for processing and authentication, and receiving results of computing task from the selected device. | 2012-10-04 |
20120254966 | APPARATUS FOR SECURED DISTRIBUTED COMPUTING - An apparatus for distributed computing is disclosed. The apparatus includes a semiconductor memory, a biometric device for receiving biometric data, a connector for establishing communication between the apparatus and the host device, and a processor for performing distributed computing methods. The distributed computing method includes identifying a computing task for processing, authenticating user and device with a distributed computing network, receiving a unique security code having an end-of-session expiration, requesting that the computing task be executed over the distributed computing network, receiving a one-time task code, selecting a device to process the computing project from among a plurality of devices based upon device location and at least one associated operating state of the device, sending the identified computing task and the one-time task code to the selected device over the distributed computing network for processing and authentication, and receiving results of computing task from the selected device. | 2012-10-04 |
20120254967 | EXTERNAL DEVICE HAVING AT LEAST ONE MEMORY - The invention relates to an external device ( | 2012-10-04 |
20120254968 | SYSTEMS AND METHODS FOR IMPLEMENTING SECURITY SERVICES - Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication. | 2012-10-04 |
20120254969 | SYSTEMS AND METHODS FOR IMPLEMENTING SECURITY SERVICES - Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication. | 2012-10-04 |
20120254970 | METHOD AND APPARATUS FOR PROVIDING RECOMMENDATION CHANNELS - An approach is presented for providing recommendation channels. A recommendation platform receives an input for creating at least one recommendation channel, the input specifying at least one category. Next, the recommendation platform determines one or more tokens based, at least in part, on the at least one category, wherein at least one of the one or more tokens represents context information. Then, the recommendation platform determines to create the at least one recommendation channel based, at least in part, on the one or more tokens. | 2012-10-04 |
20120254971 | CAPTCHA METHOD AND SYSTEM - A CAPTCHA method executed by a CAPTCHA system is provided, comprising: receiving a CAPTCHA request comprising category information of an application service from an application server; responding to the application server with a token identifying the CAPTCHA request and a CAPTCHA image comprising a distorted advertisement word associated to the category information and a series of randomly generated and distorted characters, both the advertisement word and the characters being a CAPTCHA text intended to be typed by a user via a user equipment connected to the application server; receiving from the application server the token and a CAPTCHA answer submitted from the user equipment by the user; and verifying the token and the answer and returning to the application server a result of the verification. This provides an improved CAPTCHA system and method with better advertising effects and security. | 2012-10-04 |
20120254972 | TRUST SYSTEM - An illustrative embodiment of a computer-implemented process for delegating access to private data receives a request at a trusted server, forwards the received request to an untrusted third party application and invokes a transaction on a secure data store. The computer-implemented process further tokenizes data received from the secure data store by the trusted server, returns the tokenized data to the untrusted third party application, modifies the tokenized data by the untrusted third party application, requests the trusted server to send results to a requester and sends the results from the trusted server to the requester for display. | 2012-10-04 |
20120254973 | DATA PROTECTION DEVICE FOR COMPUTERS - A data protection device includes a storage unit, a hard disk drive (HDD) controller, a switch, a network card; and a main control unit. The main control unit prevents the network card from communicating with communication networks when the first switch connects the HDD controller to the storage unit, and directs the first switch to disconnect the HDD controller from the storage unit when the network card is allowed to communicate with the communication networks. | 2012-10-04 |
20120254974 | Local Data Appliance for Collecting and Storing Remote Sensor Data - A system for providing local access by means of a local data appliance to data collected from remote monitors and sensors is described. The system includes a plurality of remote monitors and sensors, the remote monitors and sensors reporting data over a wide area communications network, and a data collection center receiving the data from the remote monitors and sensors, the data collection center operable to process the data and generate customer defined reports based on the data. A local data appliance placed in the customer's network operates to receive the data from the data collection center, and to process the customer data, generate reports based on the data and send instructions to the remote monitors and sensors. The appliance resides behind the customer's firewall but is separate from the customers network and data center equipment. | 2012-10-04 |
20120254975 | SYSTEM AND METHOD FOR AUTOMATICALLY REGULATING MESSAGES BETWEEN NETWORKS - A system, method, and profiler for regulating access between a remote network and a host network. The profiler includes a processor for executing a set of instructions and a memory for storing the set of instructions. The set of instructions are executed to determine one or more target devices for the host network, determine authorized content for messages from one or more remote networks to the one or more target devices, analyze the messages to determine whether the messages comply with message thresholds for the remote networks, and communicate the messages between the host network and the one or more remote networks in response to compliance with the message thresholds and the authorized content. | 2012-10-04 |
20120254976 | DIRECTORY SERVER FOR AUTOMATIC NETWORK INFORMATION ACCESS SYSTEMS - Systems, apparatus and methods are described for providing information access to network devices. A directory server registers identification information about a first network device coupled to a first network. The first network and the directory server may be coupled to a second network, which may include a wide area network, public network, or the Internet. The identification information may include a network address of the first network device on the first network, or a network address of the first network on the second network. The directory server may receive and process requests for identification information about registered network devices, and may selectively reply to the requests based on status information of the first network device. | 2012-10-04 |
20120254977 | METHOD, DEVICE, AND SYSTEM FOR NETWORK ATTACK PROTECTION - The present invention discloses a method for network attack protection, a device, and a system thereof. The method includes: receiving information about attack source, in which the information about the attack source carries address information about an attacker; obtaining address information about a gateway corresponding to the attacker according to the address information about the attacker and a preset mapping relationship between the attacker and the gateway corresponding to the attacker; and sending a first control message to the gateway corresponding to the attacker according to the address information about the gateway corresponding to the attacker, wherein the first control message instructs the gateway corresponding to the attacker to control traffic of the attacker. The present invention may be used on a communications network to prevent the attacker from attacking victim hosts on the network from the root, avoid blockage on the upstream network of the victim hosts. | 2012-10-04 |
20120254978 | POLICY-BASED CONTENT FILTERING - Methods and systems for processing application-level content of network service protocols are described. According to one embodiment, a network connection is redirected by a networking subsystem implemented within a kernel of an operating system of a firewall device to a proxy module within the firewall device that is configured to support a network service protocol associated with the network connection. The proxy module retrieves one or more content processing configuration schemes associated with a matching firewall policy for the network service protocol and the network connection. The content processing configuration schemes each include multiple content processing configuration settings for each of one or more network service protocols. Application-level content of a packet stream associated with the network connection is then processed by the proxy module reassembling the application-level content from multiple packets of the packet stream and scanning the application-level content based on the retrieved content processing configuration schemes. | 2012-10-04 |
20120254979 | UNATTACKABLE HARDWARE INTERNET PACKET PROCESSING DEVICE FOR NETWORK SECURITY - Hardware internet packet processing device for network security constructed in such a manner that packet data is packet processed by hardware without a receiving memory or MCU and interruption of internet packets for network security is implemented by hardware construction. | 2012-10-04 |
20120254980 | Switching hub, a system, a method of the switching hub and a program thereof - A switching hub, system and method for restricting a communication between terminals within a second network isolated form a first network. The terminals are connected to the first network or the second network, wherein a terminal with sufficient security level is connected to the first network and a terminal with insufficient security level is connected to the second network. And a communication between the terminals within the second network is restricted. | 2012-10-04 |
20120254981 | Access restriction in response to determining device transfer - A computationally implemented method includes, but is not limited to: determining that a computing device used by a first user has been transferred from the first user to a second user; and restricting access via the computing device to one or more items in response to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254982 | SYSTEM AND METHOD FOR PROTECTING AND SECURING STORAGE DEVICES USING BELOW-OPERATING SYSTEM TRAPPING - In one embodiment, a system for securing a storage device includes an electronic device comprising a processor, a storage device communicatively coupled to the processor, and a security agent. The security agent is configured to execute at a level below all of the operating systems of the electronic device, intercept a request to access the storage device, identify a requesting entity responsible for initiating the request, and utilize one or more security rules to determine if the request from the requesting entity is authorized. In some embodiments, the security agent is configured to determine whether the request involves a protected area of the storage device. If the request involves a protected area of the storage device, the security agent may be configured to allow the request if the requesting entity is authorized to access the protected area of the storage device. | 2012-10-04 |
20120254983 | Selective item access provision in response to active item ascertainment upon device transfer - A computationally implemented method includes, but is not limited to: determining that a computing device used by a first user has been transferred from the first user to a second user; ascertaining, in response to said determining, which of one or more items that are at least conditionally accessible through the computing device are active; and providing one or more selective levels of access to the one or more items based, at least in part, on said ascertaining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254984 | Selective item access provision in response to active item ascertainment upon device transfer - A computationally implemented method includes, but is not limited to: determining that a computing device used by a first user has been transferred from the first user to a second user; ascertaining, in response to said determining, which of one or more items that are at least conditionally accessible through the computing device are active; and providing one or more selective levels of access to the one or more items based, at least in part, on said ascertaining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254985 | Providing greater access to one or more items in response to determining device transfer - A computationally implemented method includes, but is not limited to: determining that a computing device associated with a first user and that was in possession of a second user has been transferred from the second user to the first user; and providing at least greater access via the computing device to one or more items in response to determining that the computing device has been transferred from the second user to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254986 | Providing particular level of access to one or more items in response to determining primary control of a computing device - A computationally implemented system and method that is designed to, but is not limited to: determining which of a plurality of users detected in proximate vicinity of a computing device has primary control of the computing device; and providing a particular level of access, via the computing device, to one or more items, the particular level of access to be provided to the one or more items being in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254987 | Pairing and authentication process between a host device and a limited input wireless device - Disclosed is an apparatus and method to perform a pairing process with a limited input wireless device. A host device includes a transceiver and a processor. The processor may be configured to execute instructions to: receive from the transceiver a pairing process request from the limited input wireless device, wherein the pairing process request includes a private code based upon a physical user action implemented with the limited input wireless device; and implement a pairing process to validate the limited input wireless device for a particular host device function associated with the private code. | 2012-10-04 |
20120254988 | Providing greater access to one or more items in response to verifying device transfer - A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254989 | Providing greater access to one or more items in response to verifying device transfer - A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254990 | AUTHENTICATION OF AN END USER - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 2012-10-04 |
20120254991 | Access restriction in response to determining device transfer - A computationally implemented method includes, but is not limited to: determining that a computing device used by a first user has been transferred from the first user to a second user; and restricting access via the computing device to one or more items in response to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254992 | Providing greater access to one or more items in response to determining device transfer - A computationally implemented method includes, but is not limited to: determining that a computing device associated with a first user and that was in possession of a second user has been transferred from the second user to the first user; and providing at least greater access via the computing device to one or more items in response to determining that the computing device has been transferred from the second user to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-10-04 |
20120254993 | SYSTEM AND METHOD FOR VIRTUAL MACHINE MONITOR BASED ANTI-MALWARE SECURITY - A system for securing an electronic device includes a memory, a processor, one or more operating systems residing in the memory for execution by the processor, a resource of the electronic device communicatively coupled to the operating system, a virtual machine monitor configured to execute on the electronic device at a level below all of the operating systems of the electronic device accessing the resource, and a security agent configured to execute on the electronic device at a level below all operating systems of the electronic device accessing the resource. The virtual machine monitor is configured to intercept a request of the resource made from a level above the virtual machine monitor and inform the security agent of the request. The security agent is configured to determine whether the request is indicative of malware. | 2012-10-04 |
20120254994 | SYSTEM AND METHOD FOR MICROCODE BASED ANTI-MALWARE SECURITY - A system for securing an electronic device includes a processor comprising microcode, a resource coupled to the processor, and a microcode security agent embodied the microcode. The microcode security agent is configured to intercept a communication and determine whether the communication is indicative of malware. The communication includes a request made of the resource or information generated from the resource. | 2012-10-04 |
20120254995 | SYSTEM AND METHOD FOR BELOW-OPERATING SYSTEM TRAPPING AND SECURING LOADING OF CODE INTO MEMORY - A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to trap an attempted access of a resource of the electronic device, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic device accessing the memory. The attempted access includes attempting to write instructions to the memory and attempting to execute the instructions. | 2012-10-04 |
20120254996 | DNS RESOLUTION, POLICIES, AND VIEWS FOR LARGE VOLUME SYSTEMS - Systems and methods for resolving domain name system (DNS) queries are provided herein. Methods may include receiving a DNS query from a DNS client via a DNS server, responsive to the DNS query, generating the DNS response utilizing the at least one policy associated with the view, providing the DNS response to the DNS client from which the DNS query was received, and storing the DNS response in a shared cache, the shared cache including previously generated DNS responses that are available to the DNS server, wherein previously generated DNS responses may be provided to DNS clients upon receiving a DNS query corresponding to at least one of the previously generated DNS responses. | 2012-10-04 |
20120254997 | METHODS AND APPARATUSES FOR AVOIDING DAMAGE IN NETWORK ATTACKS - Methods and apparatuses in a client terminal ( | 2012-10-04 |
20120254998 | METHOD FOR BLOCKING THE EXECUTION OF A HACKING PROCESS - The present invention discloses a method of blocking the execution of a hacking process. In the method, a security process selects a process to be tested. The security process extracts the pattern of the process to be tested and compares it with hack diagnosis references. If the pattern of the process to be tested is included in the hack diagnosis references, the security process determines that the process to be tested is a hacking process. The security process calculates the unique hash value of the hacking process and compares it with hack blocking references. If the unique hash value of the hacking process is included in the hack blocking references, the security process blocks the execution of the hacking process, and, if the unique hash value of the hacking process is not included in the hack blocking references, the security process does not block the execution of the hacking process. | 2012-10-04 |
20120254999 | SYSTEMS AND METHOD FOR REGULATING SOFTWARE ACCESS TO SECURITY-SENSITIVE PROCESSOR RESOURCES - A method for protecting an electronic device against malware includes consulting one or more security rules to determine a processor resource to protect, in a module below the level of all operating systems of the electronic device, intercepting an attempted access of the processor resource, accessing a processor resource control structure to determine a criteria by which the attempted access will be trapped, trapping the attempted access if the criteria is met, and consulting the one or more security rules to determine whether the attempted access is indicative of malware. The attempted access originates from the operational level of one of one or more operating systems of the electronic device | 2012-10-04 |