48th week of 2009 patent applcation highlights part 49 |
Patent application number | Title | Published |
20090293042 | APPARATUS, METHOD, AND SYSTEM OF ASSISTING SOFTWARE DEVELOPMENT - An apparatus, method, and system of assisting a user in the process of developing software having a function to access a web service are disclosed. A determination result is generated, which indicates whether an operation test of determining whether the software under development properly operates should be performed by a first test module or a second test module. Based on the determination result, the operation test is performed by a selected one of the first test module and the second test module. | 2009-11-26 |
20090293043 | DEVELOPMENT ENVIRONMENT INTEGRATION WITH VERSION HISTORY TOOLS - Instructions within an instruction set (such as source code for a software application) may be documented within many separate tools, such as a development environment, a version control system, and a bug report database. However, it may be inefficient to search for such information in many locations and through many interfaces while investigating the version history of an instruction. Instead, the development environment may be configured to retrieve relevant information (such as bug reports, versioning, and version release notes) and to display the version history information for a selected instruction together within the development environment. | 2009-11-26 |
20090293044 | Graphical Program Code Coverage - System and method for analyzing a graphical program. A graphical program is provided that includes a plurality of interconnected nodes that visually indicate functionality of the program. The graphical program includes a plurality of block diagrams arranged in a hierarchical manner, including a top-level block diagram and one or more sub-block diagrams, where each block diagram includes a respective subset of the plurality of interconnected nodes. At least one of the block diagrams includes a node that includes at least one of the sub-block diagrams. When a block diagram executes, all the respective nodes of the block diagram execute. Each node in the plurality of interconnected nodes is configured to provide graphical code coverage information when executed. The graphical program is executed, thereby generating graphical code coverage information for the graphical program indicating which nodes executed, which is then stored. | 2009-11-26 |
20090293045 | Dynamic collection attribute-based computer programming language methods - Simplified handling of dynamic collections having a variable number of elements at run time is achieved by providing for specification of collective properties of dynamic collections by a programmer. Such collective properties are distinct from type-member properties of the collection that follow from the types and type qualifiers of its members. Preferably, such dynamic collections are attributes (i.e., members) of an application defined type. | 2009-11-26 |
20090293046 | Notification-based constraint set translation to imperative execution - A method is provided for translating sets of constraint declarations to imperative code sequences based on defining an instantiatable object per set, inserting calls to a notification callback mechanism on state modification and defining calls in the constraint context as imperative code sequences that, in response to these callbacks, take actions to maintain these constraints. | 2009-11-26 |
20090293047 | Reducing Runtime Coherency Checking with Global Data Flow Analysis - Reducing runtime coherency checking using global data flow analysis is provided. A determination is made as to whether a call is for at least one of a DMA get operation or a DMA put operation in response to the call being issued during execution of a compiled and optimized code. A determination is made as to whether a software cache write operation has been issued since a last flush operation in response to the call being the DMA get operation. A DMA get runtime coherency check is then performed in response to the software cache write operation being issued since the last flush operation. | 2009-11-26 |
20090293048 | Computer Analysis and Runtime Coherency Checking - Compiler analysis and runtime coherency checking for reducing coherency problems is provided. Source code is analyzed to identify at least one of a plurality of loops that contains a memory reference. A determination is made as to whether the memory reference is an access to a global memory that should be handled by at least one of a software controlled cache or a direct buffer. A determination is made as to whether there is a data dependence between the memory reference and at least one reference from at least one of other direct buffers or other software controlled caches in response to an indication that the memory reference is an access to the global memory that should be handled by either the software controlled cache or the direct buffer. A direct buffer transformation is applied to the memory reference in response to a negative indication of the data dependence. | 2009-11-26 |
20090293049 | METHOD FOR CONSTRUCTING DYNAMIC CALL GRAPH OF APPLICATION - A method of generating a dynamic call graph of an application is disclosed. The method includes collecting information on what program code pages are accessed during each sampling period, defining parts of an executable program code which are accessible during each sampling period according to the collected information, defining a set of functions within the defined parts of the executable program code, generating dynamic call graphs using the defined set of functions for each sampling period, and generating dynamic call graphs for an observation period by combining accurate dynamic call graphs of each sampling period. | 2009-11-26 |
20090293050 | SYSTEM AND METHOD FOR CHANGING VARIABLES AT RUNTIME - A system and associated method for changing the initial size of a variable where intermediate code contains a static method class which in turn contains the initial size of variable. Comparing a statistic with the initial size of the variable, the statistic being derived from all current instances of the variable contained in located in dynamic memory, the comparing being performed in response to an event having occurred. Then modifying the initial size of the variable located in the intermediate code. The modification being in such a way as to change the initial size of variable in dependence of the statistic and all current instances of the variable located in the dynamic memory. Finally, repeating the comparing and changing steps for all variables contained in the dynamic memory. | 2009-11-26 |
20090293051 | MONITORING AND DYNAMIC TUNING OF TARGET SYSTEM PERFORMANCE - Methods and systems for remotely monitoring and tuning the performance of one or more target systems are provided. According to one embodiment, a separate tuning server receives data, such as profiling data, that has been collected regarding a target system. Then, if based on the data it is determined that performance attributes of the target system can be improved, the performance of the target system is dynamically tuned. Depending upon the circumstances, the target system may be caused to replace an application component of a program being executed by the target system with a new application component, which may be contained within an image chosen from a set of pre-built images or built and compiled by the tuning server specifically for the target system. In some cases, the dynamic tuning of the performance of the target system may involve making a change to a configuration file on the target system. | 2009-11-26 |
20090293052 | APPARATUS AND METHOD FOR PORT ADAPTOR FOR PERIPHERAL DEVICE SOFTWARE AND DATA - An adaptor for a peripheral device port includes non-volatile memory attached to the port using a port splitter or hub. The non-volatile memory is typically used for storage of peripheral device specific information such as device drivers and users' guide. Said adaptor provides necessary software as well as reference documents without any additional connection. A host computer sees an additional storage device in addition to a target peripheral device. This eliminates the need for CD or DVD devices for software installations or reference documents. Said adaptor can be easily integrated into a target device or cable for simpler usage. | 2009-11-26 |
20090293053 | Method and system for dynamic generation of computer system installation instructions - An automated system generates installation instructions for software installation on a multiple machine cluster system. Pre-configured instruction modules gather information about the components on the system to be installed. From this information, an instruction installation scenario is created for each machine in the cluster system. From this scenario, the system determines which installation instructions are to be performed for each cluster machine. This system also determines the ordering of the instruction installations within a specific machine and between the machines. The invention tracks the installation process and notes the completion of each installation or installation event within the installation process. Also, a written or electronic document of the installation steps can be made available to a system user. | 2009-11-26 |
20090293054 | Streaming Virtual Disk for Virtual Applications - A sparsely populated, streaming virtual disk may be used with a virtual application to enable fast launching of a virtual application from a network server. The virtual disk may be configured and populated in blocks, enabling those blocks that are used at a particular time to be downloaded and stored in the virtual disk. As other blocks are requested by the virtual application, those blocks may be fetched from the network server. Each block may be validated using a hash tree or some other function so that the recipient may verify authenticity and completeness. In some embodiments, a virtual application may be configured and deployed as a single file, enabling simple version control among other things. | 2009-11-26 |
20090293055 | Central Office Based Virtual Personal Computer - A virtual personal computer is implemented in a communication system comprising a plurality of central offices each of which communicates with a plurality of client devices over a corresponding access network. A given one of the central offices comprises at least one compute server and at least one storage server. The virtual personal computer is configured by allocating physical processing resources of the compute server and physical storage resources of the storage server to that virtual personal computer. User access is provided to the virtual personal computer via one of the client devices. The virtual personal computer can be dynamically reconfigured by altering the allocation of at least one of the physical processing resources and the physical storage resources to the given virtual personal computer responsive to particular applications selected by the user to run on the given virtual personal computer. | 2009-11-26 |
20090293056 | METHODS AND SYSTEMS FOR AUTOMATIC SELF-MANAGEMENT OF VIRTUAL MACHINES IN CLOUD-BASED NETWORKS - A cloud management system can insert a self-management module in virtual machines. The self-management module can be configured to automatically perform management functions on the virtual machine in which it is inserted. The management functions can include activation, suspension, or termination of the virtual machine. The management functions can also include tracking and monitoring the virtual machine. The management functions can also include providing messages to the cloud management system regarding the status and usage of the virtual machine. | 2009-11-26 |
20090293057 | System and method for managing code isolation - A computing system is configured to use a trampoline to isolate sensitive code in a virtual environment and in other applications. An import table may describe the entry points of a privileged code module or driver that generates privileged code. A system and method loads a shadow kernel to facilitate isolating the linkage between drivers and the rest of the system. The shadow kernel may be a copy of the operating system kernel that does not have the same integral position in the operation of the computing device. The shadow kernel may be used as a template for creating a jump table to redirect more critical privileged resource access requests from specially loaded kernel mode drivers to the PVM. All requests may pass through the PVM, which redirects non-critical functions to the original kernel. Multiple copies of a given driver or code module may be loaded in a given session. | 2009-11-26 |
20090293058 | VIRTUAL SYSTEM AND METHOD OF RESTRICTING USE OF CONTENTS IN THE VIRTUAL SYSTEM - Provided is a method of restricting use of contents in a virtual system comprising at least one virtual machine implemented by applying virtualization technology to a predetermined device. The method includes: reading a first device identifier from the device in order to identify the device; reading a second device identifier, which is a device identifier allocated to the at least one virtual machine, from the at least one virtual machine; determining whether the first device identifier is identical to the second device identifier; and selectively restricting use of contents in the at least one virtual machine based on a result of the determining. | 2009-11-26 |
20090293059 | AUTOMATICALLY CONNECTING ITEMS OF WORKFLOW IN A COMPUTER PROGRAM - A workflow design system receives a set of parameters that are to be used in a workflow, as well as an indication of a function that is to be performed in the workflow. The workflow design system uses a mapping component to map the parameters to inputs of the identified function. The workflow design system then outputs suggested mappings of the parameters to the function inputs, and optionally waits for user confirmation. Once user confirmation is received (if it is required), either the workflow design system or the mapping component automatically generates the connections between the parameters and the function inputs. | 2009-11-26 |
20090293060 | METHOD FOR JOB SCHEDULING WITH PREDICTION OF UPCOMING JOB COMBINATIONS - A method for scheduling different combinations of jobs simultaneously running on a shared hardware platform is disclosed. Schedules may be created while executing the current set of jobs, for one or more possible sets of jobs that may occur after a change in the current set of jobs. In at least one embodiment, the present invention may be implemented in a SDR system where the jobs may correspond to radios in the SDR system. The possible combinations of radios that may occur after a change in the set of currently running radios may be determined at run time by adding or removing one radio at a time from the set of currently running radios. | 2009-11-26 |
20090293061 | Structural Power Reduction in Multithreaded Processor - A circuit arrangement and method utilize a plurality of execution units having different power and performance characteristics and capabilities within a multithreaded processor core, and selectively route instructions having different performance requirements to different execution units based upon those performance requirements. As such, instructions that have high performance requirements, such as instructions associated with primary tasks or time sensitive tasks, can be routed to a higher performance execution unit to maximize performance when executing those instructions, while instructions that have low performance requirements, such as instructions associated with background tasks or non-time sensitive tasks, can be routed to a reduced power execution unit to reduce the power consumption (and associated heat generation) associated with executing those instructions. | 2009-11-26 |
20090293062 | Method for Dynamically Freeing Computer Resources - A method dynamically frees computer resources in a multitasking and windowing environment by activating a GUI widget to initiate pausing of an application, pausing CPU processing of the application code, maintaining data of the application in main memory, storing state information for the application code and a process of the application in mass storage, removing the application code from main memory to mass storage, when another application requires additional memory, activating another GUI widget to resume running of the application, restoring the state information for the code and the process to main memory before the application resumes running, and resuming the CPU processing of the application. | 2009-11-26 |
20090293063 | MINIMIZATION OF READ RESPONSE TIME - A method, system and computer program product for minimizing read response time in a storage subsystem including a plurality of resources is provided. A middle logical block address (LBA) is calculated for a read request. A preferred resource of the plurality of resources is determined by calculating a minimum seek time based on a closest position to a last position of a head at each resource of the plurality of resources, estimated from the middle LBA. The read request is directed to at least one of the preferred resource or an alternative resource. | 2009-11-26 |
20090293064 | SYNCHRONIZING SHARED RESOURCES IN AN ORDER PROCESSING ENVIRONMENT USING A SYNCHRONIZATION COMPONENT - An order processing system including an order processing container, a factory registry, a relationship registry, and synchronization function component. The order processing system can handle orders, which are build plans including a set of tasks. The tasks can specify programmatic actions which may include creation, deletion, and modification of resources and resource topologies. The order processing container can be central engine that programmatically drives order processing actions. The factory registry can support a creation and deletion of resource instances in a resource topology defined by at least one order. The relationship registry can maintain relationships among resources. The synchronization function component can permit transparent usage of shared resources in accordance with shared usage resource topology parameters specified within processed orders. | 2009-11-26 |
20090293065 | EMULATING A HOST ARCHITECTURE IN GUEST FIRMWARE - Systems and methods provide for emulating a host architecture in guest firmware. One aspect of the systems and methods comprises determining whether an emulated instruction would cause a transition into a legacy mode. A current execution context is converted into a legacy mode context, and the firmware emulator proceeds to a group of legacy mode instructions in a native mode for the processor. The firmware emulator detects an end instruction and converts the legacy context back to the guest firmware context. | 2009-11-26 |
20090293066 | SYSTEMS AND METHODS FOR REMOTING CALLS ISSUED TO EMBEDDED OR LINKED OBJECT INTERFACES - Described are methods and systems for transmitting calls issued by container applications to linked and embedded objects from one computing machine to another. An object module manager can launch a proxy server application in response to the activation of an object associated with the proxy server application. The proxy server application can then intercept a call issued by a container application, transmit the intercepted call to a proxy container application executing on a remote computing machine and receive a response generated by a server application executing on the remote computing machine. The proxy container application issues the call to the server application causing the server application to generate the response transmitted to the proxy server application. Upon receiving the response, the proxy server application can forward the response to the container application. | 2009-11-26 |
20090293067 | COMPUTER SYSTEM EVENT DETECTION AND TARGETED ASSISTANCE - Technologies are described herein for detecting computer system events, providing notification, and providing targeted assistance. A computer event is detected and a notification is displayed. If a dialog box corresponding to the computer event triggered the event detection, then the dialog box is modified to include further details of the event and an assistance control that links to a search engine Web page. If a dialog box did not trigger the event detection, then a dialog box is displayed with the event details and assistance control. Upon selection of the assistance control, the search engine Web page is displayed with event details pre-populated in the search term field. Targeted advertisements are displayed according to bidding on a unique descriptor associated with the specific computer event. | 2009-11-26 |
20090293068 | DATA TRANSFER APPARATUS, MOBILE TERMINAL APPARATUS, DATA TRANSFER METHOD, AND DATA TRANSFER PROGRAM - A communication apparatus | 2009-11-26 |
20090293069 | METHOD AND APPARATUS FOR SYNCHRONIZING DATA BETWEEN TERMINALS - A method and apparatus for synchronizing data between terminals are disclosed. The method includes these steps: a user sends data to a server through a terminal that corresponds to a certain access mode; the server sends a notification message to terminals that correspond to other access modes of the user, and the terminals that correspond to other access modes obtain the data through the server. The apparatus includes a data receiving module, a notification message sending module, and a data sending module. The present invention may enable terminals that correspond to other access modes of the user to know the data status of the server and perform data synchronization in time after the user sends data to the server through a terminal that corresponds to a certain access mode. | 2009-11-26 |
20090293070 | DEVICE DISPLAY OBJECT INFRASTRUCTURE - Multi-function devices expose multiple functions to device drivers or other lower-level software. Device function providers can interface with such drivers or lower-level software and can provide information, including device identifiers regarding such functions, to a device display object infrastructure. A device display object can then be created that encompasses one or more functions such that, in one embodiment, the device display object corresponds to a single, physical multi-function device. Alternatively, any combination of functionality from one or more physical devices can be combined into a single device display object representing a virtual multi-function device. Properties of the device display object can be set with reference to user-specified settings, remotely maintained metadata, locally available metadata, and information associated with each function. Functions can be ranked such that, if there is a conflict, information from more highly ranked functions is used to set the properties of the device display object. | 2009-11-26 |
20090293071 | Computer interface controller - The computer interface controller of this invention connects a peripheral device with a computer device through the computer communication interface provided in the computer device and comprises a central controller device, a computer interface controller device, a driver program memory, an audio output device, an audio input device, a virtual optical disc drive controller device and a driver program selection device. The optical disc drive controller device announces to the computer device that the computer interface controller is an optical disc drive and provides a driver program stored in the driver program memory to the computer device according to an operation system selected by the user, to enable the computer device to drive the peripheral device. | 2009-11-26 |
20090293072 | SYSTEM HAVING PLURALITY OF HARDWARE BLOCKS AND METHOD OF OPERATING THE SAME - A system having a plurality of hardware blocks and a method of operating that system where power to each hardware block is independently controlled according to whether or not the respective hardware block is needed for use. A counter is provided in the respective device driver of each hardware block, the counter being configured to be incremented each time a task requests use of the respective hardware block and to be decremented each time a task ceases use of the respective hardware block. The value of the counter is used to control whether or not to power up or power down the respective hardware block. | 2009-11-26 |
20090293073 | AUTOMATING ASYNCHRONOUS PROGRAMMING IN SINGLE THREADED SYSTEMS - Various technologies and techniques are disclosed for automating asynchronous programming in single threaded systems. A wrapper is automatically generated around an original function. When metadata indicates the wrapper should be utilized for asynchronous data retrieval, the wrapper calls a data retrieving function asynchronously. Asynchronous retrieval of data is initiated from the data retrieving function using a direct callback. A specially marked exception is thrown to cause control to leave and get caught by a special exception in the wrapper. When the direct callback function is called because the data has been retrieved, the data is saved. The wrapper is called again in a synchronous fashion, which causes the wrapper, original function, and data retrieving function to be called again. When the data retrieving function is called again, data that was saved by the direct callback function is retrieved, and then returned to the calling function through the callback function. | 2009-11-26 |
20090293074 | Systems and methods for generating a swimlane timeline for task data visualization - The Swimlane Timeline application for task data visualization utilizes the Microsoft Visio Application Programming Interface (API) to visualize user specified task data. The task data includes one or more of: task name, task outline number, task start date, and/or task finish date. The application solicits, interprets, and visualizes the data by mapping the user selected top-level outline number “n” as the parent task that defines the timeline and title, the “n.n” child tasks to swim lane rows, and the “n.n.n . . . ” lower level tasks to intervals and milestones within the swim lanes. Task analysis and reporting are enhanced with features including task drill-in, task filtering, and other user visualization preferences. | 2009-11-26 |
20090293075 | MASS DATA STORAGE DEVICE CARTRIDGE FLEXIBLE INTERCONNECT - This disclosure includes a portable data storage device comprising a mass data storage device, a cartridge housing enclosing a mass data storage device, and a flexible interconnect. The flexible interconnect includes an external electrical connector mechanically coupled to the cartridge, an internal electrical connector mechanically and electrically coupled to a data port of the mass data storage device, and a set of flexible electrical conductors electrically coupling the external electrical connector to the internal electrical connector. The flexible electrical conductors are routed within the cartridge such that no portion of the set of flexible electrical conductors lies in a volume defined by the space between the external electrical connector and the internal electrical connector. | 2009-11-26 |
20090293076 | Tray Control Method for a Disk Drive - A tray control method for a disk drive including a tray for carrying a disk, a detect switch movable to different inclined positions for detecting different positions of the tray during tray ejection and retraction operation, a firmware for receiving signals transmitted by the detect switch upon reaching the different inclined positions so as to adjust a voltage applied to a DC motor and the speed for moving the tray to the different positions such that the tray moves stably when retracting into and ejecting from the disk drive. | 2009-11-26 |
20090293077 | OPTICAL DISK DEVICE - An optical disk device in which the thickness of the device is not increased, and interference between the bottom surface of an optical pickup unit (OPU) and a bottom case of the device is prevented upon emergency ejection of an optical disk without moving the optical pickup unit to an outermost peripheral position of the disk in the event of abnormality such as power shutdown during an operation in the optical disk device. A support mechanism having a coil spring is provided at shaft-holders in three of four positions of a guide main shaft and a guide sub shaft to support an OPU, to perform skew adjustment. In another position, a support mechanism having a plate spring is provided such that, upon emergency ejection, the interference between the bottom surface of the OPU and the bottom case is mitigated. | 2009-11-26 |
20090293078 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR REPORTING INTERNET PROTOCOL TELEVISION RELATED DATA COLLECTED FROM APPLICATION AND DEVICE DATA - Methods and computer program products for reporting application and device data retrieved from within an Internet Protocol Television (IPTV) network environment are provided. IPTV system usage data is retrieved from at least one IPTV device and normalized into a predetermined data format. The IPTV system usage data is parsed according to predetermined criteria. The parsed IPTV system usage data is delivered to a dedicated data mart for storage, the IPTV system usage data that is stored within at least one dedicated data mart is accessed, and the IPTV system usage data that is stored at the at least one dedicated data mart is used to generate a report. | 2009-11-26 |
20090293079 | METHOD AND APPARATUS FOR PROVIDING ONLINE SOCIAL NETWORKING FOR TELEVISION VIEWING - An approach is provided for extending social networking to television viewing. A community of a plurality of users is created, wherein each user is logged in a device configured to present audio-video content. Presence information of one of the users in the community is determined and transmitted to a corresponding device of another one of the users. | 2009-11-26 |
20090293080 | Systems and Methods for Measuring Interest Levels of Audience in Broadcast Program and Providing Information Based On the Interest Levels - Systems and methods for measuring interest levels of audience in a broadcast program and providing extra information based on the interest level. The methods include receiving an AV signal of a broadcast program and supplementary content which contains broadcast program related information and a tag identifying the broadcast program. The supplementary content is combined with the AV signal to form a data-augmented signal which is subsequently modulated with a carrier signal to form a transmit signal for broadcasting to receivers. Each receiver includes a decoder for extracting the supplementary content and means for computing interest levels and providing extra information based on the interest levels. | 2009-11-26 |
20090293081 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR PERFORMING SEARCHES AT A PLURALITY OF CONTENT STORING LOCATIONS - Locating content by performing a search at a plurality of content storing locations is provided. A search query is received requesting content. A search is performed for the requested content at a plurality of content storing locations including at least a user content storage device and a network accessible content storage device. If the search locates the requested content, and if the requested content is not stored on the user content storage device, then digital rights management protection is applied to the requested content and the requested content is streamed from the network accessible content storage device to the user content storage device. Digital rights management protection denies access to the requested content until a payment authorization is received. | 2009-11-26 |
20090293082 | VIDEO PROCESSING SYSTEM WITH KEY TABLE AND METHODS FOR USE THEREWITH - A video processing system includes a video decoder that decodes a first video signal based on at least one first conditional access code. A video control module maintains a key table that includes the at the at least one first conditional access code and at least one second conditional access code for use in conjunction with a second video signal. | 2009-11-26 |
20090293083 | VIDEO PROCESSING SYSTEM WITH CONDITIONAL ACCESS MODULE AND METHODS FOR USE THEREWITH - A video processing system includes a video device that generates a request corresponding to video content. A conditional access module generates a video signal for transmission to the video device during a first time period, and terminates transmission of the video signal when the request is not authenticated during the first time period. In a further embodiment, the conditional access module generates a video signal for unscrambled transmission to the video device during a first time period, terminates the unscrambled transmission of the video signal at the expiration of the first time period, and continues with scrambled transmission of the video signal after the first time period. | 2009-11-26 |
20090293084 | Location detector for digital television appliances - A method of auditing operation of a television appliance consistent with certain embodiments involves detecting an event that triggers an audit; generating a fingerprint value, wherein the fingerprint value is function of the television network characteristics at an authorized installation location; comparing the fingerprint value with a stored reference value; if the fingerprint value is within specified limits of the stored reference value, permitting the television appliance to carry out a normal operational function; and if the fingerprint value is outside of specified limits of the stored reference value, inhibiting the television appliance from carrying out a normal operational function. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2009-11-26 |
20090293085 | Remote fed advertising system for point-of-sale - Advertising content is received over a channel and displayed on the same terminal that displays the point of sale information. | 2009-11-26 |
20090293086 | System and methods for network tv broadcasts for out-of-home viewing with targetedadvertising - A television broadcasting system and methods that manages the insertion of targeted advertisements and other messages into live satellite or Internet broadcasts or other types of broadcasts into out-of-home locations such as health clubs. The insertion of targeted advertisement and other messages are accomplished by a satellite service provider purchasing live network broadcasting feeds with a license to strip out existing commercial advertisements and replace them with targeted advertisements to match the demographics of the viewing audience at health clubs and other non-home locations nationally, regionally and locally where the viewer is unable to change or delete the targeted advertisements while viewing the live broadcast programming from the networks. | 2009-11-26 |
20090293087 | BACKWARDS COMPATIBLE REAL-TIME PROGRAM GUIDE CAPACITY INCREASE - A system and method for transmitting program guide information describing a second set of programs to subscribers is disclosed. In one embodiment, the method is implemented in a network broadcasting a first signal having a first set of programs and a second signal having a second set of programs. The method comprises the steps of broadcasting first program guide information describing the first set of programs to the subscribers on a first service channel on a first signal and broadcasting second program guide information describing the second set of programs to a subset of the subscribers on the first service channel on a second signal, wherein a fundamental signal characteristic of the second signal differs from the fundamental signal characteristic of the first signal. In another embodiment, the method comprises the steps of receiving first program guide information describing the first set of programs on a first service channel on a first signal; and receiving second program guide information describing the second set of programs on the first service channel on a second signal, wherein a fundamental signal characteristic of the second signal differs from the fundamental signal characteristic of the first signal. | 2009-11-26 |
20090293088 | Systems and Methods for Remote Access to Programming Information - A method for remotely accessing selected content can include receiving a list of content separate from a video stream. The list of content can include content previously recorded according to a user-defined recording schedule. The method can further include sending a request for content selected from the list of content, receiving the content through a network, and displaying the content. | 2009-11-26 |
20090293089 | Method and Apparatus for Analyzing Program Data - A system identifies a television program selected to be recorded. The identified television program has a scheduled start time and is associated with a program series. A program guide is searched to locate television programs associated with the same series as the identified television program. The program guide is searched for television programs that have a start time within a predetermined period of time of the scheduled start time of the television program selected to be recorded. | 2009-11-26 |
20090293090 | MOBILE VIDEO DEVICE HAVING UNICAST AND MULTICAST MODES AND METHODS FOR USE THEREWITH - A mobile video device includes a transceiver module that receives navigation data corresponding to a plurality of video programs including at least one unicast video program and at least one multicast video program, that transmits selection data and that receives a video signal in response thereto. An interface module receives interface data in response to actions of a user. A video display device generates a selection display based on selection display data in a video selection mode and that generates a video display in a video display mode based on the video signal. A video application module generates the selection display data based on navigation data, that generates selection data based on user interface data. | 2009-11-26 |
20090293091 | Media Content for a Mobile Media Device - Various embodiments enable a user of a mobile media device to select one or more channels to load onto the device. Each channel comprises a collection of media content files, such as video content, audio content, and so on. Each collection of media content files can be associated with a particular genre (or genres) of media content. A channel can be managed such that its collection of media content can be rearranged, augmented, and/or otherwise edited to produce a refreshed version of the channel. The refreshed version of the channel can be provided to the mobile media device for playback. Thus, a channel associated with a particular genre of media content can provide a user with a dynamic user experience without requiring the user to manipulate specific media content files. | 2009-11-26 |
20090293092 | ADAPTIVE TIMESHIFT SERVICE - An adaptive timeshift service is described. In embodiment(s), television content can be distributed from a live content server to television client devices, and the television content that is distributed from the live content server can be recorded at a timeshift server. Recorded television content can then be distributed from the timeshift server when requested by a television client device. An additional timeshift server can be allocated, and both the television content from the live content server and the recorded television content from the timeshift server can be written to a buffer of the additional timeshift server. | 2009-11-26 |
20090293093 | CONTENT SERVER, INFORMATION PROCESSING APPARATUS, NETWORK DEVICE, CONTENT DISTRIBUTION METHOD, INFORMATION PROCESSING METHOD, AND CONTENT DISTRIBUTION SYSTEM - A content server according to the present invention includes a plurality of encoders for encoding a video/audio content and for generating multiple compressed data streams from the video/audio content, where the video/audio content is encoded in such a manner that the positions of video frames corresponding to reference compressed video data and the time points of distribution of the reference compressed video data are different for the respective multiple compressed data streams, and a plurality of distribution sections for respectively acquiring from a separate encoder the compressed data stream generated by the encoder and for distributing the acquired compressed data stream, the plurality of distribution sections being assigned individual network addresses. | 2009-11-26 |
20090293094 | MOBILE COMMUNICATION TERMINAL, CHANNEL INFORMATION PROVIDING MODULE, METHOD OF AUTOMATICALLY ACCESSING TO DMB, AND METHOD OF PROVIDING CHANNEL ACCESS INFORMATION - A mobile communication terminal to automatically access to DMB includes a broadcast receiving unit that receives and demodulates a DMB signal, extracts and processes a video signal and an audio signal from the DMB signal, and outputs the video signal and the audio signal to a display unit and an audio output unit; a channel information acquisition unit that processes an audio signal inputted from a microphone in an automatic channel access mode, generates and transmits to a channel information providing server a channel access information request message that includes the audio signal and time information concerning the time when the audio signal is input, and receives and outputs a channel access information response message; and a broadcast control unit that outputs a channel tuning control signal to the broadcast receiving unit according to the channel access information inputted from the channel information acquisition unit. | 2009-11-26 |
20090293095 | VIDEO TRANSMISSION SYSTEM HAVING UNICAST AND MULTICAST MODES AND METHODS FOR USE THEREWITH - A video transmission system includes a video server module that selectively operates in a unicast mode and a multicast mode, wherein the video server module generates a video signal that includes a unicast video signal when the video server module is in the unicast mode and that includes a multicast video signal when the video server module is in the multicast mode. A wireless access device transmits the video signal to at least one mobile video device. | 2009-11-26 |
20090293096 | METHOD AND SYSTEM FOR ELECTRONIC DEVICE AUTHENTICATION - A method and system for authentication an electronic device is provided. One implementation involves obtaining a set of authentication parameters; prioritizing the authentication parameters into: express-parameters defining one or more express check points, and post-parameters defining one or more post-check points; authenticating each express check point; upon successful authentication of each express check point, commencing authentication of the post-check points; wherein the electronic device is authenticated when all the express check points and post-check points are successfully authenticated. | 2009-11-26 |
20090293097 | TV SLIDESHOW - A system may include a set-top box to detect a trigger and capture a first snapshot from a first television channel in response to detecting the trigger and based on a set of slideshow configuration parameters. The system may further provide the first snapshot to a display as a part of a television slideshow. | 2009-11-26 |
20090293098 | SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR SEARCHING FOR UNSCHEDULED PROGRAMS AND RELATED PROCESSING - Systems, methods and computer products for DVR searching, scheduling and recording for unscheduled programs and programs outside an electronic programming guide. Exemplary embodiments include an unscheduled program searching, scheduling, and recording method, including receiving program data related to a currently unscheduled program, receiving a recording request for scheduling recording of the currently unscheduled program at a date when the currently unscheduled program becomes available as a scheduled program, storing the recording request for the currently unscheduled program and in response to the currently unscheduled program becoming available as the scheduled program, scheduling the scheduled program for recording. | 2009-11-26 |
20090293099 | INSIGHT DISTRIBUTION - The present invention relates to using authorization information provided by an asserting agent to control insight-related interactions between a receiving agent and an insight agent. The insight may be information that relates to an entity with whom or a device with which the asserting agent is associated. Such insight is generally referred to as insight of the asserting agent. An insight source maintains the insight of the asserting agent, and the insight agent provides controlled access to the insight by the receiving agent through the insight-related interactions. For others to gain access to at least certain of the asserting agent's insight, the asserting agent must authorize the insight agent to provide the asserting agent's insight to the receiving agent. Upon obtaining the proper authorization, the insight agent will interact with the receiving agent and distribute the asserting agent's insight to the receiving agent. | 2009-11-26 |
20090293100 | APPARATUS AND METHOD FOR CHECKING PC SECURITY - Provided are an apparatus and method for checking Personal Computer (PC) security. The apparatus includes a check module for checking a security configuration of a PC on the basis of a check policy received from a security check server and outputting check results, and a control module for changing the security configuration of the PC on the basis of a control policy received from the security check server and the check results received from the check module. According to the apparatus, a security check agent installed in each PC performs security check and changes a security configuration according to a control policy, such that the security configurations of PCs in a network can be managed collectively. | 2009-11-26 |
20090293101 | INTEROPERABLE RIGHTS MANAGEMENT - Techniques for interoperable rights management are provided. Content is packaged with declarations defining access rights. The packaged content is delivered to a target resource in accordance with a distribution policy. When the content is accessed the access rights are enforced against the target resource within the target environment in accordance with a local access policy. | 2009-11-26 |
20090293102 | REMOTE DOM ACCESS - A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead. | 2009-11-26 |
20090293103 | FEDERATING TRUST IN A HETEROGENEOUS NETWORK - A check of a processing device is performed. A device may receive a network access request to access a network from a first processing device. A security check may be caused to be performed on the first processing device. Whether to grant the network access request to the first processing device is based on a result of the security check. | 2009-11-26 |
20090293104 | System and method for comprehensive management of company equity structures and related company documents withfinancial and human resource system integration - A system comprises business logic operable for managing and administering company entities, records, documents, equity instruments, and stakeholders, a database storing data associated with the business logic, integration logic operable to integrate the business logic and its associated data with existing enterprise systems and data associated therewith, and a graphical user interface presenting a hierarchical tree view of the company entities, records, documents, equity instruments, and stakeholders. | 2009-11-26 |
20090293105 | ACCESS CONTROL SYSTEM AND ACCESS CONTROL METHOD - An access control system and method is disclosed. The access control system and method includes a terminal and a server. The terminal determines whether to allow access to a requested website and generates a request to the server to download information from the requested website if the terminal determines to allow access. The server determines whether to allow the terminal access to the requested website and provides information from the requested website to the terminal. The server examines the request to determine whether or not the terminal has made a determination whether to allow access to the requested website. The terminal and server work in combination to determine whether to grant access to the requested website. And the server's determination whether to allow the terminal access is dependent on the server's determination of whether or not the terminal has made a determination whether to allow access to the requested website. | 2009-11-26 |
20090293106 | METHOD AND APPARATUS FOR CONTROLLING WIRELESS NETWORK ACCESS PRIVILEGES BASED ON WIRELESS CLIENT LOCATION - An access point through which a wireless device attaches to a wireless network determines the access privileges that will be accorded to the device based on a criteria set, such as the ID and physical location of the device requesting network access, the access point through which the device is connected to the network and user credentials. The location of the device is determined by a location determination system using the signal strength of the device signal. The location information and ID information is provided to an access server that uses the criteria set to retrieve access privileges from a privilege database. The retrieved access privileges are then applied to the wireless device by means of the access point and other devices in the wireless network. | 2009-11-26 |
20090293107 | Transfer server of a secure system for unattended remote file and message transfer - A method for automatically transferring a data file from a network drive of a client controlled local area network to a transfer server over the Internet comprises using a first workstation to configure event parameters within event tables of the transfer server. An unattended interface module executed by a processor of a second workstation obtains, from the transfer server, the event parameters stored in the event tables. The event parameters comprise a file name and a directory path. The file name identifies the data file to be uploaded. The directory path identifies an upload directory of the network drive. The second workstation periodically searches the upload directory and, upon locating a data file in the upload directory with the file name, transfers the data file to the transfer server over a secure connection established with the transfer server over the internet. | 2009-11-26 |
20090293108 | Method and System for User Management of Authentication Tokens - A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A client logs into a security context using a first alias from a list of existing federated single sign-on authentication aliases associated with an account. Responsive to logging into the security context, the client can receive the list of existing federated single sign-on authentication aliases. The client can then manage the list of authentication aliases. | 2009-11-26 |
20090293109 | SYSTEM AND METHOD FOR REFLECTING INFORMATION FROM PARTICIPANTS - An approach is provided for a method including initiating an information distribution session based on instructions from a first participant of a plurality of participants. The method also includes assigning access information and a passcode to the information distribution session, receiving posting information sent from two or more active participants of the plurality of participants using the access information with the passcode, and transmitting to the active participants the posting information of other active participants. | 2009-11-26 |
20090293110 | Upload apparatus, server apparatus, upload system, and upload method - An upload apparatus includes: an outputter configured to output a code image including information of an ID and a password necessary for uploading content onto a network; and an uploader configured to upload the content onto said network by use of said code image outputted by the outputter. | 2009-11-26 |
20090293111 | THIRD PARTY SYSTEM FOR BIOMETRIC AUTHENTICATION - A method of authenticating an identity of a user includes launching a user interface and obtaining biometric data of a user at the user interface. The method further includes comparing the biometric data of the user to stored biometric information of the user that was previously obtained during an enrollment process. A comparison result is generated and provided to a third party system documenting if the stored biometric information was satisfied, wherein the third party system is configured to utilize the comparison result to authenticate an identity of the user | 2009-11-26 |
20090293112 | ON-LINE GENERATION AND AUTHENTICATION OF ITEMS - Value based tokens are generated for inclusion on a data carrier which may be applied to a media such as a coupon, bank note etc. The tokens are generated by a core system which communicates with application specific wrappers. The wrappers supply token parameters to the core that are specific to the application and the core generates the tokens, and stores them for later authentication. The core then encodes the tokens onto a data carrier under the control of the wrapper and distributes the tokens under the control of the wrapper. When a token is presented for validation, for example by a customer in a shop, the encoded data carrier is scanned and the token retrieved. It is passed back to the core by the wrapper for validation of its identification number and other parameters. | 2009-11-26 |
20090293113 | CONTROLLED DELIVERY OF EVENT INFORMATION TO IPTV USERS - A method and a gateway are provided for controlling delivery of event information to users sharing a user device. The gateway is informed of activity states of each user sharing a same user device. Events related to services used by the users are detected by the gateway. Because some users of a same device may be active while others are inactive, the gateway verifies the activity state of each user for whom an event is detected. Active users are informed of events that are of interest for them. | 2009-11-26 |
20090293114 | DIVERSITY STRING BASED PATTERN MATCHING - Diversity string based pattern matching is disclosed. In one embodiment, a method for inspecting multiple data patterns in a data block includes scanning the data block for a diversity string of each data pattern, where the diversity string is a subset of the each data pattern. The method further includes comparing the each data pattern with a respective segment of the data block only if the diversity string is present in the data block, and forwarding flag data if the each data pattern matches with the respective segment of the data block. | 2009-11-26 |
20090293115 | AUTHORIZATION SYSTEM OF NAVIGATION DEVICE AND ASSOCIATED AUTHORIZATION METHOD - An authorization system of a navigation device includes a first identification (ID) module and a second ID module. The first ID module is arranged to perform authorization for a first portion of the navigation device, and the second ID module is arranged to perform authorization for a second portion of the navigation device. The first and the second ID modules perform bidirectional authorization of the first and the second portions, and further determine behavior of the navigation device according to a result of the bidirectional authorization. An associated authorization method for controlling the navigation device is further provided. | 2009-11-26 |
20090293116 | Accessing Protected Content In A Rights-Management Architecture - A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or “inscribed”); source-signed; and fully-individualized (or “owner exclusive”). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content. The client components include an object which accesses encrypted content, an object that parses the license and enforces the rights in the license, an object which obtains protection software and data that is individualized for the client and/or the persona operating the client, and a script of instructions that provides individualization information to a distributor of content so that the content may be individualized for the client and/or its operating persona. Content is generally protected by encrypting it with a key and then sealing the key into the content in a way that binds it to the meta-data associated with the content. In some instances, the key may also be encrypted in such a way as to be accessible only by the use of individualized protection software installed on the client, thereby binding use of the content to a particular client or set of clients. | 2009-11-26 |
20090293117 | AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 2009-11-26 |
20090293118 | SYSTEMS FOR AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 2009-11-26 |
20090293119 | User authentication method and system and password management system - In one embodiment of the present invention, a user authentication method including the steps of automatically generating a set of deviation parameters; deviating from a reference password object, within an object space defined by appearance parameters previously acquired from a training set of objects, in a direction and with an amount determined by the set of deviation parameters, to thereby synthesize a password object; assigning a perceptual password including the password object to a user, and receiving a user identity claim including a user-provided perceptual password. The method further includes the steps of comparing the user-provided perceptual password with the perceptual password assigned to the claimed user, and, based on the result of this comparison, accepting or rejecting the user identity claim. | 2009-11-26 |
20090293120 | ANTI-THEFT METHOD AND APPARATUS WITH WIRELESS TECHNOLOGIES - An anti-theft method to be executed in an active peer, comprising: (a) transmitting radio RF signals to a passive peer to detect whether one of the active peer and the passive peer as a monitored object is in the coverage area of the radio range of the other one of the active peer and the passive peer as a dock; (b) checking whether the monitored object is permitted to leave the dock when detecting that the monitored object is going to leave the area of the dock; (c) sending an alarm signal to an alarm apparatus if the monitored object is not permitted to leave the dock. | 2009-11-26 |
20090293121 | DEVIATION DETECTION OF USAGE PATTERNS OF COMPUTER RESOURCES - Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes. | 2009-11-26 |
20090293122 | METHOD AND SYSTEM FOR IDENTIFYING ENTERPRISE NETWORK HOSTS INFECTED WITH SLOW AND/OR DISTRIBUTED SCANNING MALWARE - Malware detection systems are presented in which a list is constructed of enterprise hosts to or from which each given enterprise network host sends or receives packets within a current measurement period and statistics are accumulated based on two or more measurement period lists, with a count value being derived from the statistics to indicate the number of other hosts to or from which each monitored host sent or received packets, and one or more monitored hosts may be identified as suspected of being infected with slow and/or distributed scanning malware for which the count value exceeds a threshold value. | 2009-11-26 |
20090293123 | METHODS AND APPARATUS TO MITIGATE A DENIAL-OF-SERVICE ATTACK IN A VOICE OVER INTERNET PROTOCOL NETWORK - Methods and apparatus to mitigate a Denial-of-Service (DoS) attack in a voice over Internet protocol (VoIP) network are disclosed. An example method comprises receiving a communication session initiation message from a communication session endpoint, determining whether the communication session endpoint is associated with a probable DoS attack, and sending to the communication session endpoint a communication session initiation response message comprising a DoS header when the communication session endpoint is associated with the probable DoS attack. | 2009-11-26 |
20090293124 | Intrinsically Safe Remote Data Monitoring System and Monitoring Method Thereof - This invention refers to an intrinsically safe remote data monitoring system and a monitoring method for remote data monitoring by using such system. The monitoring system comprises a process control computer that monitors or controls the controlled process, a remote monitoring computer that remotely monitors the process control computer, a signal collecting device physically connected, without through network, with the process control computer, for acquiring data from the process control computer, a local monitoring computer ( | 2009-11-26 |
20090293125 | Centralized Scanner Database With Qptimal Definition Distribution Using Network Queries - A system and method detects malware on client devices based on partially distributed malware definitions from a central server. A server stores malware definitions for known malware. The server generates one or more filters based on the malware definitions and distributes the filter(s) to client devices. The server also distributes full definitions to the clients for a subset of the most commonly detected malware. The client device scans files for malware by first applying the filter to a file. If the filter outputs a positive detection, the client scans the file using the full definition to determine if the file comprises malware. If the full definition is not stored locally by the client, the client queries the server for the definition and then continues the scanning process. | 2009-11-26 |
20090293126 | MALWARE DETECTION DEVICE - An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware. | 2009-11-26 |
20090293127 | System for Protecting a Computing System from Harmful Active Content in Documents - A system protects a computing device from potentially harmful code in a document by receiving a data structure representation of the document and adding dynamically one or more definitions of potentially harmful active content to an editable configuration file. Each definition identifies potentially harmful active content and specifies an action to be performed on that potentially harmful active content if that potentially harmful active content is found in the document. The editable configuration file is parsed to generate a data structure representation of the one or more definitions in the editable configuration file. The data structure representation of the document is compared with the data structure representation of the one or more definitions of potentially harmful active content to identify potentially harmful active content within the document. The document is modified to render harmless any identified potentially harmful active content before presenting the document to the computing device. | 2009-11-26 |
20090293128 | GENERATING A MULTIPLE-PREREQUISITE ATTACK GRAPH - In one aspect, a method to generate an attack graph includes determining if a potential node provides a first precondition equivalent to one of preconditions provided by a group of preexisting nodes on the attack graph. The group of preexisting nodes includes a first state node, a first vulnerability instance node, a first prerequisite node, and a second state node. The method also includes, if the first precondition is equivalent to one of the preconditions provided by the group of preexisting nodes, coupling a current node to a preexisting node providing the precondition equivalent to the first precondition using a first edge and if the first precondition is not equivalent to one of the preconditions provided by the group of preexisting nodes, generating the potential node as a new node on the attack graph and coupling the new node to the current node using a second edge. | 2009-11-26 |
20090293129 | TERMINATION OF SECURE EXECUTION MODE IN A MICROPROCESSOR PROVIDING FOR EXECUTION OF SECURE CODE - An apparatus providing for a secure execution environment including a microprocessor and a secure non-volatile memory. The microprocessor is configured to execute non-secure application programs and a secure application program, where the non-secure application programs are accessed from a system memory via a system bus. The microprocessor has secure execution mode logic that is configured to detect execution of a secure execution mode return event, and that is configured to terminate a secure execution mode within the microprocessor, where the secure execution mode exclusively supports execution of the secure application program. The secure non-volatile memory is coupled to the microprocessor via a private bus and is configured to store the secure application program prior to termination of the secure execution mode, where transactions over the private bus between the microprocessor and the secure non-volatile memory are isolated from the system bus and corresponding system bus resources within the microprocessor. | 2009-11-26 |
20090293130 | MICROPROCESSOR HAVING A SECURE EXECUTION MODE WITH PROVISIONS FOR MONITORING, INDICATING, AND MANAGING SECURITY LEVELS - An apparatus providing for a secure execution environment including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure application program. The non-secure application programs are accessed from a system memory via a system bus, and the secure application program is executed in a secure execution mode. The microprocessor has a watchdog manager that monitors environments of the microprocessor by noting and evaluating data communicated by a plurality of monitors, and that classifies the data to indicate a security level associated with execution of the secure application program, and that directs secure execution mode logic to perform responsive actions in accordance with the security level. The secure non-volatile memory is coupled to the microprocessor via a private bus, and stores the secure application program. Transactions over the private bus are isolated from the system bus and corresponding system bus resources within the microprocessor. | 2009-11-26 |
20090293131 | METHOD AND SYSTEM FOR PROCESSING CONTENT - A method and system for processing content are provided. The method of processing content includes: receiving source data from a first system; interoperable-processing the source data and generating a target data; and transmitting the target data to a second system, the first system or the second system include at least one of access control system, copy protection system and use control system. Accordingly, it is possible to easily process non-compliant content in the DRM interoperable system. | 2009-11-26 |
20090293132 | MICROPROCESSOR APPARATUS FOR SECURE ON-DIE REAL-TIME CLOCK - An apparatus providing for a secure execution environment. The apparatus includes a microprocessor and an external crystal. The microprocessor is configured to execute non-secure application programs and a secure application program, where the non-secure application programs are accessed from a system memory via a system bus and the secure application program is accessed from a secure non-volatile memory via a private bus coupled to the microprocessor. The microprocessor has a secure real time clock that is configured to provide a persistent time, where the secure real time clock is only visible and accessible by the secure application program when the microprocessor is executing in a secure mode. The external crystal is coupled to the secure real time clock within the microprocessor and is configured to cause an oscillator within the secure real time clock to generate an oscillating output voltage that is proportional to the frequency of the external crystal. | 2009-11-26 |
20090293133 | Card Authorization Terminal System and a Card Management Method Using the Same - The present invention relates to a card authorization terminal system and an electronic card processing method using the card authorization terminal system. An authorization terminal system includes an exclusive database management system to update and delete property change information, and a card processing method uses the authorization terminal system. In the card processing method, since a physical memory area is efficiently managed, a problem of memory capacity limitation is solved, a processing speed delay caused by a file processing structure is improved, and various pieces of information may be managed. | 2009-11-26 |
20090293134 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND PROGRAM - Strict security is ensured with respect to information in originals scanned by an MFP. There are provided: password detector for judging if original information obtained by decoding the two-dimensional code of original images contains a one-way hash value generated from a password; password input for prompting input of a password in the case where it is determined by the password detector that a hash value is contained in the original information; password verifier for using the one-way hash value to verify a password input by the password input; and converter for converting the original images into an electronic file protected by the password input by the password input. | 2009-11-26 |
20090293135 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREFOR - An information processing apparatus includes a document registration unit configured to register a document, a data extraction unit configured to extract a content of the document, a first setting unit configured to set an access right to the document to each user, and a first character string registration unit configured to register a character string for each user. In the information processing apparatus, when the document is registered by the document registration unit, the first setting unit sets an access right of a user to the document based on a result of comparison of the character string registered by the first character string registration unit with the content of the document extracted by the data extraction unit. | 2009-11-26 |
20090293136 | SECURITY SYSTEM TO PREVENT TAMPERING WITH A SERVER BLADE - Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises detecting an unauthorized physical intrusion event to a data center, rack or chassis including a plurality of servers, communicating the detected unauthorized intrusion event to a management module that manages the plurality of servers, and automatically physically securing one or more of the plurality of servers against manual removal. Optionally, the step of physically securing may include disabling one or more front panel controls on the plurality of servers, such as a physical power switch. In a further option, the step of physically securing may include disabling one or more external ports on the plurality of servers, such as a keyboard-video-mouse port. A preferred method allows the one or more physically secured servers to continue to operate. | 2009-11-26 |
20090293137 | Novel Gene Disruptions, Compositions and Methods Relating Thereto - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO218, PRO228, PRO271, PRO273, PRO295, PRO302, PRO305, PRO326, PRO386, PRO655, PRO162, PRO788, PRO792, PRO940, PRO941, PRO1004, PRO1012, PRO 1016, PRO474, PRO5238, PRO1069, PRO1111, PRO1113, PRO1130, PRO1195, PRO1271, PRO1865, PRO1879, PRO3446, PRO3543, PRO4329, PRO4352, PRO5733, PRO9859, PRO9864, PRO9904, PRO9907, PRO10013, PRO90948, PRO28694, PRO16089, PRO19563, PRO19675, PRO20084, PRO21434, PRO50332, PRO38465 or PRO346 genes. Such in vivo studies and characterizations may provide valuable identification and discovery of therapeutics and/or treatments useful in the prevention, amelioration or correction of diseases or dysfunctions associated with gene disruptions such as neurological disorders; cardiovascular, endothelial or angiogenic disorders; eye abnormalities; immunological disorders; oncological disorders; bone metabolic abnormalities or disorders; lipid metabolic disorders; or developmental abnormalities. | 2009-11-26 |
20090293138 | ANIMAL MODELS CARRYING TUMORS EXPRESSING HUMAN PROSTATE CANCER-SPECIFIC ANTIGEN AND METHOD FOR ANALYZING PREVENTION AND TREATMENT EFFICACY OF DENDRITIC CELLS-DERIVED IMMUNOTHERAPEUTICS - A method for analyzing the prevention and treatment efficacy of a dendritic cell-derived immunotherapeutic for prostate cancer using an animal model carrying tumors expressing a human prostate cancer-specific antigen includes either administering to a normal non-human animal dendritic cells to be analyzed, or administering to a normal non-human animal a cancer cell line expressing the human prostate cancer-specific antigen to induce cancer in the normal non-human animal; administering to the animal the cancer cell line expressing the human prostate cancer-specific antigen to induce cancer in the animal when the dendritic cell administering step was performed, or administering to the animal with cancer dendritic cells to be analyzed when the human prostate cancer-specific antigen expressing cell line administering step was performed; and determining the prevention and treatment efficacy of the dendritic cells as immunotherapeutics for prostate cancer by measuring the formation or growth of cancer cells originated from the cancer cell line in the animal. | 2009-11-26 |
20090293139 | DOUBLE-INDUCIBLE GENE ACTIVATION SYSTEM AND ITS APPLICATIONS - A double-inducible system for expressing a transgene, preferably comprising an RU486-inducible system integrated with a CID-inducible system. The invention further comprises a gene expression system for use in in vitro cell culture studies, and a gene expression expression system for use in engineering modified bigenic mice. | 2009-11-26 |
20090293140 | Guzmania hybrid named 'Glossita' - A new and distinct | 2009-11-26 |
20090293141 | Highly Transformable Elite Doubled Haploid Line-PHWWD - A novel double haploid maize line designated PHWWD and seed, plants and plant parts thereof. Methods for producing a maize plant that comprise crossing double haploid maize line PHWWD with another maize plant. Methods for producing a maize plant containing in its genetic material one or more traits introgressed into PHWWD through backcross conversion and/or transformation, and to the maize seed, plant and plant part produced thereby. Hybrid maize seed, plant or plant part produced by crossing the double haploid line PHWWD or a trait conversion of PHWWD with another maize line. Inbred maize lines derived from double haploid maize line PHWWD, methods for producing other inbred maize lines derived from double haploid maize line PHWWD and the inbred maize lines and their parts derived by the use of those methods. | 2009-11-26 |