47th week of 2008 patent applcation highlights part 66 |
Patent application number | Title | Published |
20080288950 | Concurrent Management of Adaptive Programs - A method for concurrent management of adaptive programs is disclosed wherein changes in a set of modifiable references are initially identified. A list of uses of the changed references is next computed using records made in structures of the references. The list is next inserted into an elimination queue. Comparison is next made of each of the uses to the other uses to determine independence or dependence thereon. Determined dependent uses are eliminated and the preceding steps are repeated for all determined independent uses until all dependencies have been eliminated. | 2008-11-20 |
20080288951 | Method, Device And System For Allocating A Media Resource - A method and system for allocating a media resource and a device for controlling a media resource. The method for allocating a media resource includes: allocating the media resource processing devices for a resource operation request based on the stored ability information of the various media resource processing devices when the resource operation request is received; and updating the stored ability information of the media resource processing device dynamically. The device for controlling a media resource includes: a memory unit adapted to store the ability information of various media resource processing devices; an allocation unit adapted to allocate media resource processing devices for the resource operation request based on the ability information stored in the memory unit; a dynamic update unit adapted to update the ability information of the media resource processing device stored in the memory unit dynamically. | 2008-11-20 |
20080288952 | PROCESSING APPARATUS AND DEVICE CONTROL UNIT - A processing apparatus including a plurality of task-processing devices includes a calculation control unit and a device control unit configured to cause the task-processing devices to perform tasks of at least one kind in parallel in accordance with control performed by the calculation control unit. The device control unit sends a command for starting task processing to each of the task-processing devices in accordance with the task group generated by and sent from the calculation control unit. The task-processing devices each execute a task issued from the device control unit, and when the task is complete, each provide a notification that the task is complete to the device control unit. The device control unit provides, in the case in which all tasks included in the task group are complete, a notification that the task group is complete to the calculation control unit. | 2008-11-20 |
20080288953 | INFORMATION PROCESSING DEVICE AND METHOD - An information processing device to execute programs performing encoding processing configured from a plurality of processes, includes: a program storage unit to store a plurality of encoding programs wherein an allocation pattern for a computation processing unit as to each of a plurality of processes comprising the encoding processes or the disposal pattern of memory utilized in the plurality of processes are each different; a program selecting unit to select an encoding program to be utilized in the event of executing encoding processing from a plurality of encoding programs stored with the program storage unit, as a utilized encoding program; and a program executing unit to execute the encoding processing employing a utilized encoding program selected with the program selecting unit. | 2008-11-20 |
20080288954 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING INFORMATION IN A DISTRIBUTED FRAMEWORK - A system, method and computer program product are provided for sharing information in a distributed system. After information is received, it is stored on a bulletin board. In use, the information is shared, in real-time, among a plurality of heterogeneous processes. | 2008-11-20 |
20080288955 | Method and System for Managing Preferences in a Client Portlet Container - A system for managing preferences in a portlet container. In response to receiving remote preferences for a portlet, the remote preferences are merged with default preferences for the portlet to form a preference set for the portlet. In response to receiving user preferences for the portlet, the user preferences are merged with the preference set to form an effective preference set for the portlet. The portlet is manipulated according to the effective preference set to form a manipulated portlet. Then, the manipulated portlet is rendered. | 2008-11-20 |
20080288956 | METHOD FOR PROCESSING OF APPLICATION TRANSACTION IN A WEB SERVICES FRAMEWORK - A system and method are provided to perform tentative updating for transactions suing the Web Services Reliable Messaging protocol. From a protocol layer of a client side web services framework persists a message from an application transaction (a reversion message) in a persistent storage unit. The web services framework forwards the reversion message as a reliable message to a transport layer to cause a recipient to revert to a state prior to the application transaction, if a triggering event occurs in the web services framework. If no triggering event occurs a confirmation message is forwarded as a reliable message to confirm receipt of the tentative update at the transport layer. Concurrently with the confirmation persisted reversion message is deleted from the persistent storage unit. | 2008-11-20 |
20080288957 | METHOD AND SYSTEM FOR OPTIMIZING COMMUNICATION IN MPI PROGRAMS FOR AN EXECUTION ENVIRONMENT - A system and method for mapping application tasks to processors in a computing environment that takes into account the hardware communication topology of a machine and an application communication pattern. The hardware communication topology (HCT) is defined according to hardware parameters affecting communication between two tasks, such as connectivity, bandwidth and latency; and, the application communication pattern (ACP) is defined to mean the number and size of bytes that are communicated between the different pairs of communicating tasks. By collecting information on the messages exchanged by the tasks that communicate, the communication pattern of the application may be determined. By combing the HCT and ACP a cost model for a given mapping can be determined. Any algorithm computing a mapping can use the HCT, ACP, and the cost model, thus the combination of an HCT, ACP, and cost model allow an automatically optimized mapping of tasks to processing elements to be achieved | 2008-11-20 |
20080288958 | Near Field Communication Host Controller Interface - Provided is a communication interface between an NFCH and an NFC device and a method for controlling an NFC HCI. In the method, a command message is transmitted from the host to the device. The command message includes one of recording data, reading data of the device, requesting the device to transmit predetermined data, and setting the device. A response message informing a performance result of a relevant command is transmitted from the device to the host in response to the command message. After that, an event message is transmitted from the device to the host when needed. | 2008-11-20 |
20080288959 | MESSAGE SENDING METHOD, MESSAGE SENDING DEVICE AND MESSAGE TRANSMISSION SYSTEM - A message sending method is disclosed includes: receiving a message containing a plurality of requested programs, the plurality of requested programs being provided by a plurality of content service systems; separating the received message containing the plurality of requested programs into a plurality of sub-messages; and sending the separated plurality of sub-messages to corresponding ones of the plurality of content service systems. The invention also relates to a message sending device and a message transmission system. | 2008-11-20 |
20080288960 | Shortcut in reliable communication - Methods and apparatus, including computer program products, are provided for messaging. In one aspect, there is provided a computer-implemented method. The method may include initiating a call from a first application to a second application. The method may determine whether the first application is local to the second application. A call may be made as a local call from the first application to the second application, when it is determined that the first and second applications are on the same computer. A call may be made as a remote call from the first application to the second application, when it is determined that the first and second applications are on separate computers. Related apparatus, systems, methods, and articles are also described. | 2008-11-20 |
20080288961 | Industry Vertical RFID Database Models - An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. A series of industry-specific data models can be built upon a common data model using an object-oriented database and relational mapping tool. Using the industry-specific data models, an object-oriented database is generated that can be used by all vertical applications that sit on top of the database. The data models can be defined using a data model service, such that query and capture interfaces can interact with the respective data model. Such an approach allows the data models to be dynamic, which is desirable as a single static data model is not appropriate for all industries. | 2008-11-20 |
20080288962 | Method and System for Dynamic Remote injection of In-process Agents into Virtual Machine based Applications - A method and system for dynamic and adaptive deployment of in-process agents to virtual machine based applications which may run on remote hosts is provided. A bootstrap agent is injected into the application, using standardized interfaces provided by virtual machine based systems like Sun Microsystems' Java or Microsoft's .NET. Said bootstrap agent establishes a network connection to a management server which provides binaries representing in-process agents in bytecode or native code format. The bootstrap agent sends data identifying its runtime environment to the management server, which determines the matching in-process agent binaries for the runtime environment of the connected agent and sends the selected binaries to the bootstrap agent. The bootstrap agent receives the binaries and installs them to its hosting virtual machine, according to their format (bytecode or native code). | 2008-11-20 |
20080288963 | Selective event registration - An apparatus, system, and storage medium that, in an embodiment, register each partition in a logically-partitioned computer to send local events to an aggregation component and register a first partition to send events associated with a group of partitions to the aggregation component. In various embodiments, the group may be all of the partitions or some of the partitions. If the connection to the first partition is unavailable, the first partition is registered to cancel sending events associated with the group, a second partition is selected, and the second partition is registered to send events associated with the group to the aggregation component. If the connection to the first partition is restored subsequent to being unavailable, a determination is made whether to change registration back to the first partition. In this way, in an embodiment, redundant reporting of events is supported while decreasing the number of events reported. | 2008-11-20 |
20080288964 | Methods and systems for centralizing an application process - Provided are methods and systems for centralizing an application process. | 2008-11-20 |
20080288965 | Application search tool for rapid prototyping and development of new applications - A code search tool greatly reduces time, cost, and other resource expenditures associated with implementing a new application. The tool is a search, navigation and visualization tool that accepts high-level processing concepts as inputs to identify, rank, and return the code of relevant existing applications. A software developer may use the relevant applications to rapidly build prototypes, identify requirements, and develop new applications. The tool provides an efficient way to improve the reuse of application logic to realize the high-level processing concepts, and more efficiently deliver proof of concept. | 2008-11-20 |
20080288966 | CALL CONTROL ENABLER ABSTRACTED FROM UNDERLYING NETWORK TECHNOLOGIES - Embodiments of the invention provide systems and methods for controlling a media session. According to one embodiment, a method for controlling a communication session can comprise receiving a request to perform a call control function from an application via a northbound interface of a call control enabler. The northbound interface can provide an abstract interface for invoking one or more of a plurality of call control functions. The call control function can be requested from a first network resource via a southbound interface of the call control enabler specific to the first network resource. In some cases, results of the call control function can be received from the first network resource via the southbound interface of the call control enabler. The results of the call control function can then be returned to the application via the northbound interface of the call control enabler. | 2008-11-20 |
20080288967 | PROCEDURE CALLING METHOD, PROCEDURE CALLING PROGRAM, AND COMPUTER PRODUCT - In a shared-memory multiprocessor having plural processors that share a shared memory, each have an address space that is respectively independent in the shared memory and are configured to be capable of inter-processor communication using a bus, a first processor makes a procedure call to a second processor by specifying an address in the address space of the second processor. In response to the procedure call, by initiating and executing the procedure located at the address specified by the first processor, the second processor initiates the procedure at a high speed. | 2008-11-20 |
20080288968 | DISK CHUCKING MECHANISM AND DISK HANDLING ROBOT - A link mechanism constructed with a first, second and third link members forms a slider crank mechanism and the third link member is rotated by a drive of a forward/rearward actuator such as an air cylinder and chucking nails provided in them are protruded perpendicularly to a longitudinal direction of the first or second link member. A rotation of the chucking nail protruded perpendicularly is stopped by engaging with a disk and a spring member is bent by further forward or rearward movement of the second link member to energize the first chucking nail in a direction for maintaining an engagement with the disk. Thus, it becomes possible to chuck the disk with a predetermined force by only drive of the forward/rearward actuator. | 2008-11-20 |
20080288969 | Unattended Data Storage System - The present invention discloses a mechanical apparatus for performing automatic and unattended data storage and retrieval tasks. The apparatus enables automating the data storage procedure of recording files on multiple compact discs (CDs) or digital versatile discs (DVDs) without relaying on the intervention of a human operator. The apparatus automatically transfers empty discs into the disc drive, removes them from the disc drive and marks them appropriately once the disc writing and reading procedures are completed. The apparatus is composed of an arm equipped with a gripping mechanism such as suction cups or mechanical grippers which can move vertically and horizontally and transfer the discs according to necessity. Two embodiments are described: in the first embodiment the horizontal movement of the arm is circular and is performed around a central axis; in the second the movement is along a straight line and the arm is positioned on a rack. | 2008-11-20 |
20080288970 | Method for Determining Whether a Same Disc is Loaded in an Optical Drive - The invention relates to a method for determining whether a same disc is loaded in an optical drive. The method comprises a step of measuring a time interval between a disc insertion event resulting from a disc insertion command and a disc ejection event resulting from a disc ejection command. It further comprises a step of comparing said time interval with a predefined value. The disc is meant as still loaded in said optical drive if said time interval is smaller than said predefined value. | 2008-11-20 |
20080288971 | Antivibration guide rail for a computer disk drive - An antivibration guide rail for a computer disk drive, in which soft elastic antivibration pads are additionally located at appropriate positions on a hard plastic guide rail, and the guide rail is fitted to two sides of a disk drive. Accordingly, the antivibration pads are able to absorb vibration produced when the disk drive is running, thereby improving read accuracy of the disk drive, and reducing noise produced by vibration when the disk drive is running. | 2008-11-20 |
20080288972 | CODED/NON-CODED PROGRAM AUDIENCE MEASUREMENT SYSTEM - An audience measurement system identifies a program which is broadcast from a signal source and to which a receiver is tuned. The audience measurement system includes a code reader for reading an ancillary code of the program to which the receiver is tuned, a channel status detector for determining channel status relating to channels to which the receiver is tuned, a memory for storing ancillary codes read by the code reading means and for storing channel status determined by the channel status determining means if ancillary codes are not readable by the code reading means, and a communicator for communicating the ancillary code and/or the channel status to a central office computer. | 2008-11-20 |
20080288973 | System and Method for Providing Advertisements for Video Content in a Packet Based Network - A system and method of providing advertisements for video content in a packet based communication system is provided. In one embodiment, the method includes storing a plurality of advertisements in a memory, wherein each of the plurality of advertisements is configured to be displayed concurrently with a video player having a perimeter and each of the plurality of video advertisements is configured to be displayed adjacent the perimeter of the video player such as, for example, around the entire perimeter of the video player. The method further comprises receiving a plurality of requests for an advertisement from a plurality of clients and wherein each of the plurality of clients is displaying one of a plurality of web pages that form part of a plurality of web sites. Each of the plurality of web pages includes a hyperlink configured to cause video content to be presented in a video player and the plurality of requests are received as a result of actuation of the hyperlink included in the plurality of web pages. The method further includes transmitting one of the plurality of advertisements to each of the plurality of clients for display adjacent the perimeter of the video player. The video content, advertisements, and web pages may be transmitted to the clients via two or more different servers. A request for data resulting from actuation of a hyperlink associated with an advertisement may be logged and redirected to a content provider such as the advertiser. | 2008-11-20 |
20080288974 | SYSTEMS AND METHODS FOR OUTPUTTING ADVERTISEMENTS WITH ONGOING VIDEO STREAMS - Systems and methods for outputting advertisements with ongoing video streams are disclosed. A method for outputting advertisements to a display in conjunction with a video stream includes outputting a video stream to a user containing embedded advertisement information for display on a display device. Displaying an advertising display module within the video stream, when a user selects an area of the video screen containing an object that has linked advertisement information. Removing the advertising display module from the video stream when at least one of a time limit expires and a user closes the advertising display module occurs. | 2008-11-20 |
20080288975 | Advertising system and method thereof - An advertising system comprises an advertising server unit and a set-top box. The advertising server unit is capable of receiving at least one advertisement from at least one external advertiser, and broadcasting at least part of the advertisement to outside in a pushing manner. The set-top box is capable of receiving TV signals from outside (e.g., from TV station or satellite TV) and the advertisement, and combining the advertisement with the TV signals, and then transmitting the combined signals to a display device (e.g., TV) for playing. The set-top box can generate at least one record according to a status of advertisement being watched by users (for example, clicking to watch detailed content of the advertisement or to buy the advertised goods), and then transmit the record back to the advertising server unit. Then, the advertising server unit generates a bill according to the record for charging the advertiser. | 2008-11-20 |
20080288976 | System and Method for Providing Advertisements for Video Content in a Packet Based Network - A system and method of providing advertisements for video content in a packet based communication system is provided. In one embodiment, the method includes storing a plurality of advertisements in a memory, wherein each of the plurality of advertisements is configured to be displayed over a video player and includes a plurality of sections that separate to reveal the video player. The method further comprises receiving a plurality of requests for an advertisement from a plurality of clients and wherein each of the plurality of clients is displaying one of a plurality of web pages that form part of a plurality of web sites. Each of the plurality of web pages includes a hyperlink configured to cause video content to be presented in a video player and the plurality of requests are received as a result of actuation of the hyperlink included in the plurality of web pages. The method further includes transmitting one of the plurality of advertisements to each of the plurality of clients for display. The video content, advertisements, and web pages may be transmitted to the clients via two or more different servers. A request for data resulting from actuation of a hyperlink associated with an advertisement may be logged and redirected to a content provider such as the advertiser. The advertisements may include two or more sections that separate vertically, horizontally, or along another linear or non-linear plane to reveal the video player. Finally, some of the plurality of advertisements may be configured to have multiple sections that come together to cover the video player subsequent to presentation of video content. | 2008-11-20 |
20080288977 | System and method of indicating video content quality - A method of indicating video content quality is disclosed that includes receiving performance data at a video content quality server from a set-top box device. The performance data may include values of a plurality of video content quality parameters. The method also includes generating a graphical user interface indicating a quality of video content received at the set-top box device. The graphical user interface may include the values of each of the plurality of video content quality parameters. Further, the method includes sending data corresponding to the graphical user interface from the video content quality server to the set-top box device. The method may include the video content quality server receiving a request from the set-top box device to send the data corresponding to the graphical user interface. | 2008-11-20 |
20080288978 | Nut Cracker - A method of providing selectable interactivity for a viewer watching a show, whereby the viewer ( | 2008-11-20 |
20080288979 | System and method for providing fast channel surfing - A system and method for enabling television watchers to “channel surf” faster and reduce the amount of bandwidth used over a network to communicate television channels to end-users. Electronic programming guide information and images associated therewith may be communicated to an end-user. An image associated with a video program may be displayed on an electronic display (e.g., television) in response to an end-user selecting a channel prior to video programming being displayed. By displaying an image prior to the video programming, the end-user may determine whether he or she wants to watch the video program prior to the video programming being displayed, which improves the speed of “channel surfing.” Because end-users can view the image when selecting a channel, a network can be configured to distribute the channels that are currently being watched rather than distributing many on a continuous basis, thereby preserving bandwidth. | 2008-11-20 |
20080288980 | Interactive computer system for providing television schedule information - The present invention provides systems and methods for providing television schedule and/or listing information to a viewer, and for allowing the viewer to link, search, select and interact with information in a remote database, e.g., a database on the internet. The television schedule and/or listing information can be displayed on a variety of viewer interfaces, such as televisions screens, computer monitors, PCTV screens and the like. The television schedule and/or listing information may be stored on the viewer's computer, television, PCTV, or a remote server (e.g., a website), or the television schedule and/or listing information may be downloaded from a remote database to the viewer's computer, television or PCTV. | 2008-11-20 |
20080288981 | RECEIVING DEVICE, INFORMATION PROVIDING DEVICE, INFORMATION PROVIDING SYSTEM, INFORMATION PROVIDING METHOD, AND PROGRAMS - There is provided an information providing device that includes a program listing information transmission portion that transmits, to a receiving device, program listing information showing a plurality of programs currently available for viewing; a related information storage portion that links to a program and stores related information in which a plurality of information items pertaining to a program have been edited to be displayed in order; a program designation information receiving portion that receives, from the receiving device, program designation information designating a program currently available for viewing; a related information extraction portion that extracts from the related information storage portion the related information being applicable to the program designated by the program designation information; and a related information transmission portion that transmits the extracted related information to the receiving device. Thus the information pertaining to the programs currently available for viewing can be effectively provided through a simple operation. | 2008-11-20 |
20080288982 | Method and Apparatus for Generating a Recommendation for at Least One Content Item - A recommender engine ( | 2008-11-20 |
20080288983 | System and Method for Providing Sequential Video and Interactive Content - A system and method of providing sequential video and contextual based content to an end user viewing video content in a video player on an end user computing device is provided. In one embodiment, the method comprises storing a plurality of videos in a memory, storing a plurality of advertisements in a memory, receiving a plurality of requests from a plurality of different clients and wherein each request includes information identifying a first video and each of the plurality of clients initiates its request from one of a plurality of web pages and wherein the plurality of web pages form part of a plurality of different web sites. In addition, the plurality of web pages may include program code configured to cause a video to be presented in the video player. The method further comprises for each received request, selecting a plurality of videos based on information of the first video; and selecting a plurality of advertisements, wherein at least one of the plurality of advertisements is selected based on information of the first video and at least one of the plurality of advertisements is selected based on information of a selected video. In addition, the method may comprise for each received request, transmitting the plurality of videos to the requesting client for sequential presentation by the client; and transmitting the plurality of advertisements to the requesting client and wherein at least some of the plurality of advertisements are configured to be presented concurrently with a received video. | 2008-11-20 |
20080288984 | MINOR CHANNEL SELECTION METHOD FOR DIGITAL TELEVISION - Disclosed herein is a minor channel selection method for digital televisions. The method comprises storing a major channel number in response to an input of the major channel number, followed by determining whether or not the major channel number is consistently input for a first preset time; determining whether or not a minor channel number is input before an elapse of a second preset time after a complete input of the major channel number, if the major channel number is consistently input for the first preset time; and selecting a minor channel corresponding to the minor channel number, if the minor channel number is input before the elapse of the second preset time. With this method, it is possible to conveniently select a minor channel since no delimiter is needed to be inputted between major and minor channel numbers to divide them from each other. | 2008-11-20 |
20080288985 | Optimally Selecting Partial Tv Programs | 2008-11-20 |
20080288986 | WIRELESS INTEGRATED SECURITY CONTROLLER - A system and method are disclosed for improved video transmission, particularly in security settings. An improved security controller combines the interfaces and functionality for high quality video delivery over often less-than-perfect wireless networks, multi-camera analog/digital video controllers and encoders, multi-frequency wireless camera support, connectivity for serial controllers, network switching, and distributed digital video recording with optional object and motion detection. The video transmission is enhanced using wireless adaptive video encoding, mobile viewing optimization, and wireless bandwidth improvement. | 2008-11-20 |
20080288987 | METHOD AND SYSTEM FOR UTILIZING A/V BRIDGING AND A/V BRIDGING EXTENSIONS TO REPLACE DISPLAY PORT, HDMI, DVI AND/OR ANALOG PORTS ON A PERSONAL COMPUTING SYSTEM - Aspects of a system for utilizing A/V bridging and A/V bridging extensions to replace Display Port and/or analog ports on a computing system may include a LAN subsystem that enables transmission of at least video data from a computing device, such as a computer workstation, to a multimedia monitor coupled to the computing device via an Ethernet interface connector. The transmission may enable rendering of the video data on the multimedia monitor. The computing device may be coupled to a docking station or to a port replicator. The docking station may be coupled to the Ethernet interface connector via an Ethernet connector. The port replicator may be coupled to the Ethernet interface connector via an Ethernet connector. The LAN subsystem may enable access to the Ethernet interface connector to enable transmission and generation of line encoded bits based on the video data via the Ethernet interface connector. | 2008-11-20 |
20080288988 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM - An information processing device which shares program information specifying a program with other devices connected through a network is disclosed. The device includes: a program information receiving means for receiving the program information the accumulation of which is allocated to the information processing device; a program information storage means for storing the program information; a search request receiving means for receiving a search request which requests program information specifying a program from which a search keyword inputted to another device has been extracted as the feature amount; a determination means for determining whether the program information requested by the search request is stored in the program information storage means; and a transmission means for transmitting program information requested by the search request to another device which has transmitted the search request when that program information requested by the search request is stored in the program information storage means. | 2008-11-20 |
20080288989 | System, Methods and Apparatus for Video Communications - A computer software product, methods and apparatus for improved video communications are provided. In one embodiment, an apparatus is provided that is configured to send v-mail messages. The v-mail messages contain a video stream that is stored on a second device on a network. In one embodiment, the second device is configured to associate multiple video streams to a thread and allow users access to stored video content and associated files. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules that allow a reader to quickly ascertain the subject matter of the disclosure contained herein. This Abstract is submitted with the explicit understanding that it will not be used to interpret or to limit the scope or the meaning of the claims. | 2008-11-20 |
20080288990 | Interactive Broadcasting System - Disclosed herein is an interactive broadcasting system. The interactive broadcasting system includes a web server, a content providing server, a streaming server, a broadcast control server, and a content control server. The web server provides a web page through the Internet and controls a web connection. The content providing server provides content. The streaming server streams the content to the mobile terminal, and receives messages transmitted from the mobile terminal. The broadcast control server manages the broadcast schedule of the content and generates details of the picture construction. The content control server generates a picture depending on the details of a picture construction, and performs picture combination by overlaying the generated picture on a content picture provided by the content providing server, and transmits the combined picture to the streaming server, thus allowing the combined picture to be streamed to the mobile terminal by the streaming server. | 2008-11-20 |
20080288991 | System and method for reducing network bandwidth for distributing video programming - A system and method for enabling television watchers to “channel surf” faster and reduce the amount of bandwidth used over a network to communicate television channels to end-users. Electronic programming guide information and images associated therewith may be communicated to an end-user. An image associated with a video program may be displayed on an electronic display (e.g., television) in response to an end-user selecting a channel prior to video programming being displayed. By displaying an image prior to the video programming, the end-user may determine whether he or she wants to watch the video program prior to the video programming being displayed, which improves the speed of “channel surfing.” Because end-users can view the image when selecting a channel, a network can be configured to distribute the channels that are currently being watched rather than distributing many on a continuous basis, thereby preserving bandwidth. | 2008-11-20 |
20080288992 | Systems and Methods for Improving Image Responsivity in a Multimedia Transmission System - The present invention relates to improved methods and systems for transmission of images overlaid on video, particularly images requiring high levels of responsivity (e.g. mouse pointers) relative to the underlying video, from a computing device to a television. In one embodiment, the present invention is directed to a method of transmitting at least one video frame with an overlaid image, comprising the steps of capturing at least one frame of video data separate from the overlaid image at a first rate, capturing the overlaid image separate from the frame of video data at a second rate, packetizing the captured frame of video data, packetizing the overlaid image, wherein the frame video data are in data packets separate from the overlaid image data packets, and transmitting separate video data packets and overlaid image data packets. | 2008-11-20 |
20080288993 | Interactive Multi-User Tv Method and System and a Tv Receiver for Using Such a Method - The invention relates to an interactive multi-user TV method and system and to a TV receiver for using such a method. The invention method consists of broadcasting a TV program ( | 2008-11-20 |
20080288994 | Method for Storing Broadcast Contents, and a Broadcast Content Storage System - The invention describes a method for storing broadcast contents and a broadcast content storage system. A plurality of content categories (KAT | 2008-11-20 |
20080288995 | Method And System For Enabling Video Communication Via Ethernet Utilizing Asymmetrical Physical Layer Operations - Signals may be communicated between a video source and a video rendering device via and asymmetrical multi-rate Ethernet physical layer (PHY). The asymmetric multi-rate PHY may support multiple rates. The asymmetrical multi-rate Ethernet PHY may handle compressed and/or uncompressed, encrypted and/or unencrypted video signals and may handle audio/video bridging. One or more of the communicated signals may be modified by an echo cancellation operation, a near end cross talk (NEXT) cancellation operation, equalization, a far end cross talk (FEXT) cancellation operation and/or a forward error correction (FEC) operation. An aggregate communication rate may be evenly or unevenly distributed among one or more links coupling the video signal source to the video rendering device. A plurality of links coupling the video signal source to said video rendering device may also be aggregrated. | 2008-11-20 |
20080288996 | METHOD AND APPARATUS FOR PROVISIONING MEDIA CONTENT IN A MULTI-USER ENVIRONMENT - A method and apparatus for provisioning media content in a multi-user environment is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a Set-Top Box having a controller element to: receive multimedia content from a communication system; configure individual access to the multimedia content among a group of users in accordance with individual user profiles, wherein each of the individual user profiles has a separate service package provided by one or more broadband providers; and provision a delivery of the multimedia content to a media device in accordance with access settings defined at least in part in the individual user profiles. Additional embodiments are disclosed. | 2008-11-20 |
20080288997 | RECORDING SYSTEM, RECEIVING APPARATUS AND RECEIVING METHOD, RECORDING APPARATUS AND RECORDING METHOD, AND PROGRAM - A recording system includes: a receiving apparatus that receives a content; and a recording apparatus that records the content received by the receiving apparatus. The receiving apparatus includes reception means for receiving the content, acceptance means for accepting a user's operation instructing to record the received content, generation means for generating a control signal for controlling a recording operation of the recording apparatus according to the accepted operation, and supply means for supplying the received content and the generated control signal to the recording apparatus, and the recording apparatus includes acquisition means for acquiring the content and the control signal supplied from the receiving apparatus, recording means for recording the acquired content, and control means for controlling the recording means according to the acquired control signal. | 2008-11-20 |
20080288998 | MULTIMEDIA SIGNAL PROCESSING SYSTEM - A multimedia signal processing system utilizes an easily manipulated, low-cost storage and display system that allows the user to view a television program and instantly review previous scenes within the program. The invention also allows the user to store selected programs while simultaneously watching or reviewing another. A versatile system architecture enables providing the invention in multiple configurations, each adapted to receive input signals from a different source. At the highest level, the system includes an input section and an output section. Across all configurations, the output section remains substantially the same, while the input section varies according to the signal type and the source. Thus, several configurations are provided, each one requiring only minor system board modifications. The system architecture thus simplifies the design and manufacturing challenge presented by producing units to serve different markets, such as digital satellite, digital cable and analog cable. | 2008-11-20 |
20080288999 | INFORMATION PROCESSING APPARATUS FOR AUTHENTICATION SETTING OF MODEL THAT REQUIRES CONFIDENTIALITY - The present disclosure provides an information processing apparatus and the like, which allow a service developer, who develops a service requiring confidentiality in a service-oriented architecture, to easily create authentication settings for the service model. The present disclosure provides an information processing apparatus for developing a service requiring confidentiality in a service-oriented architecture. The information processing apparatus includes: an input unit for inputting an annotation for a service; a storage unit for storing an Authentication Infrastructure Model of a machine node on which the service is executed; and an Authentication Policy generation unit for generating an Authentication Policy by using the annotation and the Authentication Infrastructure Model. | 2008-11-20 |
20080289000 | METHOD AND ELECTRONIC DEVICE FOR MANAGING APPLICATIONS - The present invention provides a method for managing an application at an electronic device ( | 2008-11-20 |
20080289001 | POLICY PROXY - In a system with a policy server, a first device able to communicate with the policy server and a second device able to communicate with the first device and unable to communicate with the policy server, the first device is to act as a policy proxy. The policy server may push to the first device a policy for the second device, and the first device may push the policy to the second device. | 2008-11-20 |
20080289002 | Method and a System for Communication Between a User and a System - The present invention relates to a method of communication ( | 2008-11-20 |
20080289003 | Security Between Electronic Components of a Portable Secured Electronic Unit - A portable secured electronic unit includes at least two electronic components, one of which is embodied in the form of a primary electronic component and the second in the form of an interface electronic component, wherein the two electronic components are interconnected by communication elements and at least one electronic component includes security elements for securing the communication thereof the other electronic component. | 2008-11-20 |
20080289004 | Method and Module for Protecting Against Attacks in a High-Speed Network - A method, module and computer program for protecting a target against attacks in a high-speed network. The method according to the invention comprises the steps of generating a question, after having received a request from an initiator identified by a sourceID associated to a certain node in the network, sending the question to the node identified by the sourceID, in case that an answer to the question is received, evaluating the answer, and in case that a proper answer has been received, enabling communication between the initiator and the target by sending a further message from the target to the initiator. | 2008-11-20 |
20080289005 | SYSTEM AND METHOD FOR DIGITALLY AUTHENTICATING FACILITY MANAGEMENT REPORTS - A method for generating and digitally authorizing a report indicating the performance conditions of a facility are provided. The method is intended for use in allowing facility managers to document the performance of their facilities. The present invention allows a user to generate a PDF report indicating the status of facility that can be digitally authenticated by the user. Any attempted modifications of a digitally authenticated report are documented so that the accuracy of the report can be verified. | 2008-11-20 |
20080289006 | MEDIA FILE DISTRIBUTION SYSTEM AND METHOD - A file distribution method and system for distributing media files to authorized recipients. The method and system exploit the advantages of peer-to-peer file distribution protocols, such as BitTorrent, while maintaining security and control over the file distribution. A server farm containing a plurality of servers is placed behind the security of a distribution system, preventing unauthorized client devices from accessing the media files stored on the server farm. Media files are fragmented and stored on each of the plurality of servers within the server farm. Each server on the server farm features at least one IP address and each server is pre-seeded with a complete copy of the fragmented media file. Fragments are distributed to requesting authorized clients in accordance with a peer-to-peer file distribution protocol. | 2008-11-20 |
20080289007 | System and Method for Granting Privileges Based on Location - A method grants privileges based on location. The method comprises determining a location of a mobile unit disposed within a coverage area of a network. The coverage area is separated into a plurality of zones. The method comprises determining a first zone in which the mobile unit is disposed. The method comprises granting access to a first privilege to the mobile unit, the first privilege being based on the first zone. | 2008-11-20 |
20080289008 | Method and Equipment for Controlling Access to Multicast Ip Flows - The invention relates to a method of controlling access to multicast IP flows. Following connection to a collection equipment by a user terminal, the method consists in: transmitting an access authorization request message from said collection equipment to an access control server; and, subsequently, upon successful verification of the user access right, transmitting an access authorization acceptance message comprising at least one multicast filter from the server to the collection equipment or, in the absence of a successful verification, transmitting an access refusal message from the server to the collection equipment in order to inhibit the connection of the user terminal. The invention is suitable for multicast broadcasting over an IP, Internet and/or corporate network. | 2008-11-20 |
20080289009 | Method and Apparatus for Controlling of Remote Access to a Local Network - The present invention is to ensure security of a local network, e.g., a home network from remote access while allowing remote access. In a method of the present invention, if a device on the local network is to be accessed remotely, user identifying information (and/or device identifying information) and connection information of a target device, that are accompanied by the access, are compared with information of registered allowance entries and whether to allow the access is determined based on the comparison result. According to the method, remote access to a device invoked by a user (and/or a remote device) whose remote access is not set to allowance is blocked while remote access invoked by a user (and/or a remote device) whose remote access is set to allowance is admitted. | 2008-11-20 |
20080289010 | Managing Secured Resources in Web Resources that are Accessed by Multiple Portals - A method, apparatus, and computer-readable media for authorizing users of network portals to access a secure resource hosted by a secure server comprises storing a plurality of user identifiers, each representing a user of an owning portal; storing for each of the user identifiers an access privilege to the secure resource; storing a proxy user identifier representing a guest portal and a guest access privilege to the secure resource for all of the users of the guest portal; receiving from the owning portal a first request for access to the secure resource, the first request comprising a first user identifier representing a user of the owning portal; granting to the user of the owning portal access to the secure resource according to the access privilege stored for the first user identifier; receiving from the guest portal a second request for access to the secure resource, the second request comprising a second user identifier representing a user of the guest portal and a portal identifier representing the guest portal; and granting to the user of the guest portal access to the secure resource according to the guest access privilege stored in the authorization table for the proxy user identifier. | 2008-11-20 |
20080289011 | Dualistic Microprocessor System for Purpose of Controlling Personal Computer Internet Communication Resource - A system comprising of both software on a target computer and software residing on a removable hardware device, (currently embodiment is a USB device) designed for the sole purpose of limiting and or controlling Internet (IP based network) communications, based upon the presence of the external device. The system utilizes a unique device descriptor along with a unique stored identifier of the Physical Control Node (PCN) for the purposes of enabling the target computer to discriminate devices. A unique identifier held within the computer allows the PCN to discriminate the target computer. Furthermore, allowed IP addresses are stored in the PCN and or computer for the purpose of allowing access to specific IP addresses while connected. Tertiary criteria can be stored within the PCN and or computer for the purposes of further defining system behavior i.e. calendar and time restricted behavior, while logging associated events. | 2008-11-20 |
20080289012 | SYSTEM AND METHOD FOR CREATING, EXECUTING, AND MAPPING SERVICE - A service creation system and a method thereof are provided. In creation of a new service, a combined abstract service logic is created in accordance with existing service classes in a class catalog of existing services to implement service-level reuse. A service execution system and a method thereof are also provided, and during the operation of an abstract service logic, the abstract service logic is converted into a concrete service logic, and then a service is accessed in accordance with the concrete service logic. An abstract service mapping system and a method thereof are further provided. With the invention, the efficiency and flexibility of service development can be improved, services on a service network can be developed and deployed simply and rapidly, and the normal operation of the service network can be ensured effectively. | 2008-11-20 |
20080289013 | TECHNIQUES FOR LOCAL PERSONALIZATION OF CONTENT - Techniques for the local personalization of content are presented. A content personalization service is dynamically pushed from a server environment to a client processing environment associated with a principal on demand. The content personalization service interjects itself between content that the principal attempts to view and access within the client processing environment and modifies and personalizes that content on behalf of the principal before the principal can view or access the content. | 2008-11-20 |
20080289014 | Scan-to-home method and system for the delivery of electronic documents to a user home directory - A method and system for efficiently and securely permitting a user to scan electronic documents from a remote multi-function device to a user's home directory. A user can be authenticated via the multi-function device and electronic credentials associated with the user generated, which are utilized to determine the user's home directory. The multi-function device can then produce a customized template that can be selected by the user when accessing rendering/scanning services. The user can then scan a document and electronically store such a document at the home directory via an SMB (Server Message Block) protocol. Home directories can either be determined via an LDAP (Lightweight Directory Access Protocol) or configured on a network interface via a default directory path and the user name. | 2008-11-20 |
20080289015 | Resetting of Security Mechanisms - The security mechanism of a product is realized in such a manner that the data, which is assigned thereto, cannot, in contrast to the remaining data of the product, be accessed from outside the product. The resetting is effected by deleting the data following an intervention from inside the product. The data D | 2008-11-20 |
20080289016 | SYSTEM AND METHOD FOR CONFIGURING A CUSTOMER PREMISES EQUIPMENT IN A SERVICE PROVIDER NETWORK - A system and method for authentication for configuring a customer premises equipment (CPE) in a service provider network. In a multiple dwelling unit (MDU) a customer device (e.g., voice over Internet protocol (VOIP) phone) can be configured with CPE functionality, thereby enabling the customer device CPE to support the provision of service to multiple additional customer devices in a customer premises. A dedicated CPE device is thereby eliminated from the service provider network. The customer device CPE can be designed to support a form of authentication (e.g., Layer 2, Layer 3) that would be sufficient for access by the multiple additional customer devices to various network services. | 2008-11-20 |
20080289017 | APPARATUS, METHODS, AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK - A system, method, and service associated with a computing grid or a virtual organization include a request for proposal (RFP) generator, where the RFP describes a data processing task. The RFP is provided to multiple resource providers via the computing grid where each of the resource providers is potentially suitable for performing the data processing task on behalf of the resource consumer. An RFP response processor receives and evaluates RFP responses generated by one or more of the resource providers. An exception processor accessible to the RFP response processor evaluates any exception in the RFP to determine if the exception disqualifies the RFP response. The exceptions may include, for example, job time limit exceptions, resource requirement exceptions, hardware/software platform requirement exceptions and others. Exception rules may be defined to guide the evaluation of the exception. | 2008-11-20 |
20080289018 | Security Device, Terminal Device, Gate Device, and Device - There are provided a secure device, a gate device, and a device providing a secure device such as an IC card capable of limiting an area where the card application function and the device function are realized. The secure device ( | 2008-11-20 |
20080289019 | FRAMEWORK FOR AUTOMATED DISSEMINATION OF SECURITY METADATA FOR DISTRIBUTED TRUST ESTABLISHMENT - Methods, systems, and machine-readable media for disseminating security metadata from one distributed entity to another in an automated fashion are disclosed. According to one embodiment of the present invention, a computer-implemented method for distributing security metadata comprises receiving at a first service a request for security metadata, the request being received from a process associated with a second service. The method further comprises generating an identifier and security metadata for the second service, the identifier and the security metadata being unique to the second service, and storing the identifier and the security metadata in a first memory accessible to the first service. The identifier and the security metadata are then transmitted to the process associated with the second service and stored in a second memory. The second service is configured to access the security metadata stored in the second memory to encrypt a first communication and decrypt a second communication. | 2008-11-20 |
20080289020 | Identity Tokens Using Biometric Representations - An identity system and method uses biometric representation(s) in identity tokens. When a principal requests access to a relying party, the relying party may request an identity token containing a first claim about the principal and a biometric representation of the principal. An identity provider may then create the identity token, including a digital signature. The relying party may receive the identity token through a first channel and decode it. The relying party may also receive and use biometric information about the principal received through a second channel to verify the validity of the first claim at least in part through comparison of the biometric representation to the biometric information. | 2008-11-20 |
20080289021 | SOFTWARE APPLICATION ACCESS METHOD AND SYSTEM - An access method and system. The method includes receiving from a first user, by a software application within a computing system, a request for access to the software application. The software application determines a first domain associated with a first current location of the user. The software application determines a home domain associated with the user. The software application retrieves a set of login process rules associated with a combination of the first domain and the home domain. The software application enforces the set of login process rules. The software application transmits results of enforcing the set of login process rules. | 2008-11-20 |
20080289022 | Internet business security system - An Internet business security system is disclosed. The business security system couples with a certificate issuer. The certificate issuer issues a smart card to a user. The system includes a reading apparatus for reading the smart card and generating a one-time password based on a PIN number of the user, a front process apparatus to receive the one-time password and providing service to the user when the one-time password is correct, and a rear process apparatus coupling with the front process apparatus. The rear process apparatus includes a pre-proof module to process the matter of proving the identification of the user and an authorization module to determine whether or not the one-time password is correct and then to authorize the user private data stored in the certificate issuer to a web site when the one-time password is correct. | 2008-11-20 |
20080289023 | Method and System for Peer-to-Peer Authorization - An authorization mechanism within a peer-to-peer network is presented. A central server that operates a centralized data repository search engine within a peer-to-peer network performs authentication and authorization operations with respect to users that access its services. A user at a peer node reviews peer-to-peer search results that have been gathered and returned by the centralized search engine. When the user desires to retrieve a file from another peer node, the user's peer node must obtain an authorization token from the central server, which authenticates the user or has previously authenticated the user. The user's peer node then presents the authorization token along with a request to retrieve the file from the other peer node. After verifying the authorization token, the other peer node responds with the requested file. If the other peer node cannot verify the authorization token, then the other peer node denies access to the file. | 2008-11-20 |
20080289024 | Printing Apparatus and Information Processing Apparatus - A printing apparatus is connected to a network which includes an information processing apparatus transmitting printing data and an authentication information issuance server issuing authentication information to the information processing apparatus. The printing apparatus includes a transmitting unit, a receiving unit, and a printing unit. The transmitting unit transmits, to the information processing apparatus, information showing the authentication information being required, the authentication information is required in order to perform printing based on the printing data transmitted from the information processing apparatus, and the authentication information is issued from the authentication information issuance server. The authentication information indicates permission issued from the authentication information issuance server. The receiving unit receives the authentication information issued from the authentication information issuance server and the printing data from the information processing apparatus. The printing unit performs a print job based on the printing data received by the receiving unit. | 2008-11-20 |
20080289025 | Method and an apparatus to validate a web session in a proxy server - Some embodiments of a method and an apparatus to validate a web session in a proxy server have been presented. In one embodiment, a first message authentication code is generated at a proxy server communicatively coupled between an application server and a client upon receiving a message from the application server. The message is generated by the application server in response to an authentication request from the client to initiate a web session. The proxy server then adds the first message authentication code and one or more timestamps to the message. Then the proxy server may send the message to the client, wherein the client may use the first message authentication code and the one or more timestamps to request access to predetermined content during the web session. | 2008-11-20 |
20080289026 | Firewall installer - Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative format that describes one or more rules to be implemented by the firewall, and that automatically configures the firewall. Providing a firewall installer that is capable of configuring a firewall based upon declarative input rather than procedural process-oriented input facilitates administration of a firewall by allowing an administrator to specify desired firewall configuration at a higher, declarative level and frees the administrator from the need to specify procedures for implementing configuration changes in the firewall. In one embodiment of the invention, the firewall installer can receive and store input for configuring a firewall even when the firewall is not running, such that the firewall executes on those configuration changes when it next comes online. | 2008-11-20 |
20080289027 | Incorporating network connection security levels into firewall rules - Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between devices. A firewall may thus provide greater granularity of security and integrate more closely with other security methods to provide better overall security with fewer conflicts. | 2008-11-20 |
20080289028 | FIREWALL FOR CONTROLLING CONNECTIONS BETWEEN A CLIENT MACHINE AND A NETWORK - A firewall system adapted for location outside the client machine, preferably in the same data processing device as the client machine but outside a virtual machine containing the client machine. Control logic of the firewall system receives incoming and outgoing connections from the network and client machine respectively. In response to a connection request initiating a connection between respective endpoints in the network and client machine, the control logic performs a security assessment comprising obtaining from at least one of the network and client machine information indicative of the security state of the endpoint therein, and allows or inhibits the connection in dependence on the result of the security assessment. The security assessment may be performed in accordance with a security policy of the system, and different security assessments may be performed for different connection requests in accordance with the security policy. | 2008-11-20 |
20080289029 | METHOD AND SYSTEM FOR CONTINUATION OF BROWSING SESSIONS BETWEEN DEVICES - A system and method are provided for continuing a browsing session initiated with a first client machine and a web site. The browsing session may be continued on a second client machine by tracking the navigation history associated with the browsing session of the first client machine. The navigation history comprises at least an address of a last viewed web page of the web site. Continuation of the browsing session is further facilitated by collecting at least one web cookie during the browsing session that is dependent upon the interaction between the first client machine and the web site. In this way, in order to allow switching between client machines to continue the browsing session, the navigation history and the at least one web cookie is provided from the second client machine to the web site to restore and resume the browsing session at the point that it was previously terminated. | 2008-11-20 |
20080289030 | USER-FRIENDLY MULTIFACTOR MOBILE AUTHENTICATION - A system and method for performing multifactor mobile authentication are described whereby a mobile communications device includes a contactless reader for receiving and validating a unique identifier stored in an external authenticating module prior to granting access to locally stored electronic authenticating material required to access an external resource. In one embodiment, the mobile communications device is a mobile telephone having an RFID reader for receiving the unique identifier from an RFID tag incorporated into the external authenticating module. Preferably, the external authenticating module is associated with a user, such as by being part of the user's jewelry or clothing. The mobile authentication device includes an RFID authenticator module that detects external resource access requests and checks whether the requested resource is on a list of resources that require additional user authentication prior to granting access to locally stored authenticating material. | 2008-11-20 |
20080289031 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - Access right information of a login user is acquired, and an object accessible by the login user is identifiably displayed on an area corresponding to the user. When a collaboration mode in which a plurality of users log in and make a cooperative work is set, an object accessible by each login user is identifiably displayed on an area corresponding to each user. | 2008-11-20 |
20080289032 | Computer Control Method and Computer Control System Using an Externally Connected Device - A computer system and appertaining control method allow, when an operation of a computer is controlled in accordance with an authentication result due to biological information using an externally connected device, setting up an authentication authority regarding a plurality of users, and setting up an authority per application and operation. The authentication condition on a biological authentication needed per application or operation is stored in the externally connected device along with the biological information of a plurality of users for whom biological authentication is needed. When using an external computer, it is connected to the externally connected device which performs biological authentication. When a predetermined operation requesting the biological authentication is performed in this computer, a presence of the biometrics is verified according to the authentication condition set to this operation stored in the external device, if the authentication condition is satisfied, the execution of this normal operation is permitted. | 2008-11-20 |
20080289033 | Method and system for GNSS receiver login protection and prevention - Embodiments of the present invention recite a method and system for implementing login protection and prevention to a Global Navigation Satellite System (GNSS) receiver. In one embodiment, a geospatial data collection device which is communicatively coupled with a GNSS receiver is authenticated. It is then determined that the geospatial data collection device is authorized to collect data from a geographic region in which the GNSS receiver is located. The geospatial data collection device is then permitted access to a control interface of the GNSS receiver. | 2008-11-20 |
20080289034 | METHOD AND APPARATUS FOR PROVIDING PROCESS-BASED ACCESS CONTROLS ON COMPUTER RESOURCES - A method, apparatus, and computer instructions for process-based access controls on computer resources to processes. An access mechanism is provided in which a specific invoker obtains an object access identity (ACI). Another mechanism is provided in which a specific object, such as a file system resource, requires a specific object access identity to obtain one of the forms of access denoted by an access control list. A process may “grant” an identifier that is later “required” for a system resource access. Objects may specify their own access requirements and permitted access modes. The granted identifier, ACI, is stored in the process's credentials once these credentials match a specific “grant” entry in the access control list. This identifier has no meaning outside of being used to make an access decision for a specific resource. When a process tries to access the object, the object's access control list is scanned for “required” entries. If a match occurs between the “required” entry's identifier and the ACI stored, access to the object is granted with access rights specified in the “require” entries. | 2008-11-20 |
20080289035 | METHOD AND SYSTEM FOR PREVENTING PASSWORD THEFT THROUGH UNAUTHORIZED KEYLOGGING - A method for preventing password theft through unauthorized keylogging includes detecting, from a host application, a request for a password input by a user of an input keyboard device; activating a randomly generated keyboard map uniquely associated with the host application such that a first set of keystroke values inputted by the user results in a second, converted set of keystroke values transmitted to the host application, in accordance with the randomly generated keyboard map uniquely associated therewith; and upon completion of a password entry process by the user, deactivating the randomly generated keyboard map such that subsequent keystroke values inputted by the user are no longer converted to the values according to the keyboard map. | 2008-11-20 |
20080289036 | TIME-BASED CONTROL OF USER ACCESS IN A DATA PROCESSING SYSTEM INCORPORATING A ROLE-BASED ACCESS CONTROL MODEL - Computer implemented method, system and computer usable program code for providing time-based control of user access in a data processing system utilizing a Role-Based Access Control model. A computer implemented method for providing time-based control of user access in a data processing system utilizing a Role-Based Access Control model includes providing at least one timing attribute for a role, wherein each at least one timing attribute specifies a timing condition by which a user is enabled to use the role. The user is enabled to use the role pursuant to satisfying the at least one timing attribute. | 2008-11-20 |
20080289037 | SYSTEMS AND METHODS TO SECURE RESTRICTED INFORMATION IN ELECTRONIC MAIL MESSAGES - Systems and methods are provided to secure restricted information in electronic mail messages. According to some embodiments, it is determined at a client device that an email message is being generated by a user. A security classification may be associated with the email message, and the email message may be sent toward a destination along with an indication of the security classification, wherein the email message is routed based, at least in part, on the security classification. | 2008-11-20 |
20080289038 | METHOD AND APPARATUS FOR CHECKING INTEGRITY OF FIRMWARE - Provided are a method and apparatus for checking the integrity of firmware. The method includes storing a first hash function value of unhacked firmware for determining whether actual firmware of an external processor has been hacked; reading the actual firmware via a bus; calculating a second hash function value of the actual firmware; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on the comparison result. | 2008-11-20 |
20080289039 | METHOD AND SYSTEM FOR PROTECTING A MESSAGE FROM AN XML ATTACK WHEN BEING EXCHANGED IN A DISTRIBUTED AND DECENTRALIZED NETWORK SYSTEM - A system may include an attack preventing creator module that is configured to create at least one attack preventing head block for a message having message elements in a tree structure with one or more of the message elements being signed, wherein the attack preventing header block includes structure specific information that comprises at least a digest value of a pre-order traversal list of the tree structure and for each signed message element a unique ID attribute, a depth, a parent's name and a parent's ID attribute. The system may include an attack preventing verifier module that is configured to verify the at least one attack preventing header block by comparing the structure specific information which can be derived from the message with the structure specific information carried by the first attack preventing header block. | 2008-11-20 |
20080289040 | Source/destination operating system type-based IDS virtualization - Systems and methods for virtualizing network intrusion detection system (IDS) functions based on each packet's source and/or destination host computer operating system (OS) type and characteristics are described. Virtualization is accomplished by fingerprinting each packet to determine the packet's target OS and then vetting each packet in a virtual IDS against a reduced set of threat signatures specific to the target OS. Each virtual IDS, whether operating on a separate computer or operating as a logically distinct process or separate thread running on a single computer processor, may also operate in parallel with other virtual IDS processes. IDS processing efficiency and speed are greatly increased by the fact that a much smaller subset of threat signature universe is used for each OS-specific packet threat vetting operation. | 2008-11-20 |
20080289041 | TARGET DATA DETECTION IN A STREAMING ENVIRONMENT - In embodiments of the present invention improved capabilities are described for a data stream scanner. The present invention may provide for a first data portion received in association with a data stream, and the first data portion may be analyzed to make an assessment. An identity pool may then be selected from a universe of identities based on the assessment, and identities from the identity pool may be selected in a scanning process to analyze a second data portion from the data stream. In addition, the identity pool may be altered based on information obtained during the analysis of the second data portion, wherein the information obtained during the second data portion analysis may indicate the data stream is different from that projected when making the assessment based on the analysis of the first data portion. | 2008-11-20 |
20080289042 | Method for Identifying Unknown Virus and Deleting It - A method for identifying unknown virus program, includes: getting the behavior data of the program that would be tested, determining whether the said program is a virus program or not based on the behavior data of said program and the behavior data of pre-setting typical virus program. A method for deleting the virus program, according to the behavior of the virus program, sets and performs an anti-operation which is in reversed to the virus program, and gets back the destroyed data. | 2008-11-20 |
20080289043 | Network risk analysis - Analyzing security risk in a computer network includes receiving an event associated with a selected object in the computer network, and determining an object risk level for the selected object based at least in part on an event risk level of the event received, wherein the event risk level accounts for intrinsic risk that depends at least in part on the event that is received and source risk that depends at least in part on a source from which the event originated. | 2008-11-20 |
20080289044 | Apparatus, system, and method for storing DRM licenses - An apparatus, system and method for storing licenses of digital rights management (DRM) contents are disclosed. The DRM license storing apparatus, system and method save DRM licenses in a separate location of a mobile terminal or an external server, and enable license restoration even in the case of loss or replacement of the mobile terminal. The apparatus includes a memory unit for storing DRM contents; a user identification module for storing licenses of DRM contents; and a control unit for verifying, in response to a play request for a DRM content, validity of a license associated with the play-requested DRM content through communication with the user identification module. | 2008-11-20 |
20080289045 | Method and device for encoding software to prevent reverse engineering, tampering or modifying software code, and masking the logical function of software execution - This invention prevents software from being reverse engineered. The random nature and multiple uses of atoms prevent the analysis of key processes within the software. If an attempt is made to try and duplicate or bypass the program and/or key processes, then this invention will cause the failure of the execution of the software code thereby preventing unauthorized release and/or execution of the code. | 2008-11-20 |
20080289046 | Method and device for the prevention of piracy, copying and unauthorized execution of computer-readable media - Piracy is a growing concern for digital content and intellectual property holders. Prior art technology and Digital Rights Management (DRM) have failed to provide content holders with an effective solution. Too often, DRM is compromised within days of release offering little or no protection to content owners. This invention offers a unique process and/or method for protecting computer-readable media that is fast, efficient, and economical to implement, and can be implemented with all types of content. This invention provides the means to prevent piracy, copying, and unauthorized use of content on all computer-readable media (physical or memory-based). | 2008-11-20 |
20080289047 | ANTI-CONTENT SPOOFING (ACS) - A system to prevent content spoofing by detecting phishing attacks is provided. The system checks each webpage visited by a user and determines if the page is legitimate. To determine if a page is legitimate, the system employs fingerprints to check how similar the browsed page is with respect to an original page. If the similarity between browsed page and the original page is found to be more than a preset threshold, then the browsed page is considered to be a spoofed page. Access to the spoofed page is then either denied and/or an alarm is triggered. | 2008-11-20 |
20080289048 | APPARATUS AND METHOD FOR MOVING CONTENTS AFTER MUTUAL AUTHENTICATION - A method and apparatus for moving contents are discussed. According to an embodiment, the method includes determining whether or not a content is to be moved from a first device to a second device based on copy and movement control information, the copy and movement control information indicating whether or not the content is to be moved; performing an authentication to authenticate the first and second devices with each other; and moving the content from the first device to the second device based on the determination result and the authentication result. | 2008-11-20 |
20080289049 | TECHNIQUES FOR PERSONALIZING CONTENT - Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the policy evaluation to rewrite and modify the content. The modified content is then delivered to the requesting principal to personalize the content for the principal. | 2008-11-20 |