03rd week of 2010 patent applcation highlights part 64 |
Patent application number | Title | Published |
20100017796 | INPUT/OUTPUT TRANSACTION MANAGEMENT DURING PLATFORM INITIATION - In a Uniform Extensible Firmware Interface (UEFI) environment, a system management mode (SMM) driver and a non-SMM driver may be installed for the same hardware device. Until the SMM driver is available, the non-SMM driver is configured to conduct input/output (IO) transactions directly with the hardware device. The non-SMM driver can utilize native UEFI services to receive a notification that the SMM driver is available. Upon receiving such notification, (or if the SMM driver was already available before the non-SMM driver), the non-SMM driver is reconfigured to redirect all IO requests to the SMM driver, which then conducts the corresponding IO transactions directly with the hardware device. Redirecting all non-SMM IO requests for a hardware device to the SMM driver for the hardware device limits direct access to the hardware device to only one driver, the SMM driver, thereby facilitating the integrity or atomicity of IO transactions. | 2010-01-21 |
20100017797 | IMAGE FORMING APPARATUS, SERVICE SYSTEM AND METHOD OF INSTALLING OPEN SERVICES GATEWAY INITIATIVE (OSGI)-BASED SERVICE - A method of installing an Open Services Gateway initiative (OSGi)-based service, the method including: accessing characteristic information associated with an OSGi bundle; generating a virtual Java Archive (JAR) file using the accessed characteristic information; and installing the generated virtual JAR file on an OSGi framework. Accordingly, there is no need to generate a separate JAR file, and user convenience is thus increased. | 2010-01-21 |
20100017798 | Automatic Computer Program Customization Based On A User Information Store - Software programs, such as an operating system or other application programs, are automatically customized to a specific user(s) based on data corresponding to the specific user(s) that is maintained in a user information store. In one embodiment, the information store is a unified store that is accessible by multiple programs including the operating system. Thus, new information or information changes can be made available to multiple programs by the user adding (or changing) the information only once. In another embodiment, the operating system image to be installed on a computer is pre-populated with user-specific information at the factory. The user-specific information can be integrated into the operating system at the factory or alternatively upon an initial boot of the computer by the user. | 2010-01-21 |
20100017799 | SYSTEM AND METHOD FOR ADDING LOCAL RESOURCES FOR USE BY A MOBILE AGENT OBJECT - System and method for importing service objects to a host computing environment. In one embodiment, a method includes the steps of executing a mobile agent object, (called a delivery-mobile agent object) in a mobile-agent runtime environment in a host computing environment and then installing a service object to be executable in the mobile-agent runtime environment. | 2010-01-21 |
20100017800 | METHOD, COMPUTER PROGRAM PRODUCT, AND HARDWARE PRODUCT FOR SUPPORTING VIRTUAL MACHINE GUEST MIGRATION OVERCOMMIT - Virtual machine guest migration overcommit is supported by providing a virtual machine with an unschedulable resource that is not available for system scheduling. The unschedulable resource may, but need not, be provided in the form of a memory buffer, or one or more network resources, or one or more resources that are accessible from a network. The unschedulable resource is utilized in one or more domains to temporarily conceal one or more user environments that do not fit into a set of currently available resources, such that the one or more temporarily concealed user environments are not terminated or paged out. | 2010-01-21 |
20100017801 | PROFILE BASED CREATION OF VIRTUAL MACHINES IN A VIRTUALIZATION ENVIRONMENT - A method of creating a new virtual machine in a hypervisor server using a virtual machine setup profile is disclosed. A virtual machine setup profile method is selected from a plurality of virtual machine setup profiles. Then, system information is retrieved from the hypervisor server. The system information includes available computing resources in the hypervisor server. Thereafter a number of virtual machines that can be hosted in the hypervisor server based on the available computing resources is calculated and a number of new virtual machines are created in the hypervisor server. | 2010-01-21 |
20100017802 | NETWORK SYSTEM AND METHOD FOR CONTROLLING ADDRESS SPACES EXISTING IN PARALLEL - The present invention relates to a network system having a large number of network elements which are connected via network connections and also to a method for controlling address spaces which exist in parallel. Network systems and methods of this type are required in order to organise distributed memories in an efficient manner which are connected via network connections, in particular in order to accelerate the memory access in the case of parallel distributed computing. | 2010-01-21 |
20100017803 | WORKFLOW PROCESSING APPARATUS AND WORKFLOW PROCESSING METHOD - The present invention allows for storing new document data immediately after the details of processing associated with a box are changed. The present invention provides a workflow processing apparatus executing processing procedures in sequence for data existing in a storage location based on setting information, where the workflow processing apparatus includes a data registration unit changing the setting information, a data acquisition unit determining whether or not data exists in the first storage location when the setting information is changed, and a box operation unit that changes the original name of the first storage location to a new name and that generates the second storage location having the original name when it is determined that the data exists in the first storage location. | 2010-01-21 |
20100017804 | Thread-to-Processor Assignment Based on Affinity Identifiers - For each thread of a computer program to be executed on a multiple-processor computer system, an affinity identifier is associated to the thread by the computer program. The affinity identifiers of the threads denote how closely related the threads are. For each thread, a processor of the multiple-processor computer system on which the thread is to be executed is selected based on the affinity identifiers of the threads, by an operating system being executed on the multiple-processor computer system and in relation to which the computer programs are to be executed. Each thread is then executed by the processor selected for the thread. | 2010-01-21 |
20100017805 | DATA PROCESSING APPARATUS, METHOD FOR CONTROLLING DATA PROCESSING APPARATUS,AND COMPUTER-READABLE STORAGE MEDIUM - When a plurality of jobs are processed using a plurality of data processing units, data formats of the jobs to be processed can be determined to distribute a data processing load of the data processing units. A method for controlling a data processing apparatus for causing a plurality of data processing units to process data of a job includes storing data of a first job in a storing unit in first and second data formats, determining whether to process the stored data of the first job in the first or second data format, and causing the plurality of data processing units to process the data in the determined data format. The determination is made based on whether processing of data of a second job by the first or second processing unit requires longer time. | 2010-01-21 |
20100017806 | FINE GRAIN OS SCHEDULING - The invention relates to a method of enabling multiple operating systems to run concurrently on the same computer, the method comprising: scheduling a plurality of tasks for execution by at least first and second operating systems, wherein each task has one of a plurality of priorities; setting the priority of each operating system in accordance with the priority of the next task scheduled for execution by the respective operating system; and providing a common program arranged to compare the priorities of all operating systems and to pass control to the operating system having the highest priority. Accordingly, the invention resides in the idea that different operating systems can be run more efficiently on a single CPU by changing the priority of each operating system over time. In other words, each operating system has a flexible priority. | 2010-01-21 |
20100017807 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRANSPARENT COMMUNICATION BETWEEN A STORAGE DEVICE AND AN APPLICATION - A system, method, and computer program product are provided for modulating a response time of a response to an application for communicating with the application. In operation, data from an application is received. Additionally, the application is identified based on the data. Further, a response time of a response to the application is modulated for communicating with the application. | 2010-01-21 |
20100017808 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR APPLICATION NAME AND CLIENT ID PAIRING IN A MESSAGE CONNECTION - Methods, systems and computer program products for application name and client ID pairing in a message connection. An exemplary embodiment includes a method for pairing an application name and a client ID in a messaging broker infrastructure, the method including running a messaging system associated with the messaging broker infrastructure running a monitoring application configured to monitor a connection to the messaging broker, creating a connection to the messaging broker, identifying a class name and the client ID associated with an application, converting the class name to an application name and publishing a pairing of the application name and the client ID on the messaging infrastructure. | 2010-01-21 |
20100017809 | METHODS FOR ENABLING SOFTWARE IN STORAGE-CAPABLE DEVICES - Methods for enabling software from a storage-capable device including the steps of: loading, by a host system operationally connected to the storage-capable device, software from an authenticatable storage area residing in the storage-capable device; validating the software; and installing the validated software, wherein the validated software provides an interface between the host system and the storage-capable device. In some embodiments, the software is enabling software, the method further including the step of: loading, by the host system, device-functionality software from the authenticatable storage area. In some embodiments, the method further includes the steps of: validating the device-functionality software; and enabling the validated device-functionality software. In some embodiments, the method further includes the steps of: prior to the step of loading the software, executing a probe command in the host system; and returning, by the probe command, a list of device functional units residing in the storage-capable device. | 2010-01-21 |
20100017810 | APPLICATION INTEGRATION IN NETWORKED COMPUTING DEVICES - The present specification provides application integration in networked computing devices. An embodiment includes a mobile computing device having a message application that includes a programming interface. The mobile computing device also has a second message application that creates a connection with the message application through the programming interface. Messages that are associated with the second message application can be accessed through the message application, with optional invocation of the second message application via the message application. | 2010-01-21 |
20100017811 | Method and system for comprehensive socket application programming interface loopback processing - Methods and systems for comprehensive socket API loopback processing on a computing device. In an exemplary method and system, a socket API processes loopback calls without resort to a TCP/IP protocol stock or lower level systems (e.g. network drivers), reducing overhead requirements and processing burdens imposed on the TCP/IP stack and lower level systems and improving overall computing device performance. | 2010-01-21 |
20100017812 | Deploy Anywhere Framework For Heterogeneous Mobile Application Development - A system, method, and computer program product are provided for developing a portable software application. The method includes the steps of defining a project, adding a screen to the project, the screen being defined as a generic screen or a platform-specific screen, adding a component to the screen, the component being defined as a generic component or a platform-specific component, redefining the screen as a platform-specific screen when it is defined as a generic screen and one or more platform-specific components have been added to the screen, and defining an application flow from the screen to one or more additional screens. | 2010-01-21 |
20100017813 | DISK DEVICE - A disk drive includes: a pair of guide walls, which is arranged in the vicinity of the holder opening of a cartridge holder to define a direction in which a disk cartridge is supposed to be inserted; a first opening/closing lever, which has a first engaging portion that engages with a portion of the disk cartridge and which rotates while the disk cartridge is being inserted or ejected; and a second opening/closing lever, which has a second engaging portion that engages with another portion of the disk cartridge and which rotates while the disk cartridge is being inserted or ejected. The first and second opening/closing levers rotate so as to leave a broader gap between the first and second engaging portions than between the guide walls when the drive gets loaded with the disk cartridge, thereby opening a window in the disk cartridge. | 2010-01-21 |
20100017814 | METHODS AND SYSTEMS FOR DELIVERING PROMOTIONAL CONTENT FOR PRESENTATION IN AN INTERACTIVE MEDIA GUIDANCE APPLICATION - In some embodiments, methods for delivering promotional content for presentation in a first interactive media guidance application on a first user equipment device are provided, the methods comprising: receiving data corresponding to a plurality of user actions in a second interactive media guidance application; associating at least one of a plurality of weights with each of the plurality of user actions; based upon the plurality of user actions and the at least one of the plurality of weights associated with each user action, determining the likelihood of a user watching at least one of a certain program, a certain type of program, and a certain channel; selecting promotional content for presentation in the first interactive media guidance application based on the determination; and transmitting the promotional content selected to the first user equipment device with program content. | 2010-01-21 |
20100017815 | Method and Node in an IPTV Network - The present invention relates to a method and a node in an IETV network. The node according to the present invention is configured to use the knowledge of the user channel switching behavior in order to predict user channel switching and to make the channels predicted to be used available close to the STB of the user in advance of the anticipated channel switch. | 2010-01-21 |
20100017816 | Method and System for Enabling Reception of Multimedia Contents at a User's TV Set Via a Communications Terminal - A method for enabling use of contents by a user of at least one set top box adapted to receive broadcast TV signals, includes: establishing an association between at least one identifier of the user in a communications network, and at least one identifier of the at least one user's set top box; notifying the user via the communications network of the availability of the contents, wherein the notifying includes exploiting the at least one identifier of the user in the communications network; upon receiving a confirmation by the user, delivering the contents to the user's set top box, wherein the delivering includes identifying the at least one user's set top box exploiting the at least one identifier thereof. | 2010-01-21 |
20100017817 | METHOD FOR INSERTING ADVERTISEMENTS INTO A TRAFFIC CAMERA IMAGE - The present disclosure describes a method for inserting advertisements into a traffic camera image. The method may receive an advertisement package, the advertisement package comprising a business identifier, a message text, and a price per congestion level. The method may store the advertisement package. The method may receive a user query for a traffic camera image. The method may receive the traffic camera image, the traffic camera image comprising a camera image, a business indicator, and coordinates of the traffic camera image. The method may associate the traffic camera image with the advertisement package. The method may then produce an overlay image associated with the advertisement package. The method may merge the traffic camera image and the overlay image into a final image. Finally, the method may display the final image. | 2010-01-21 |
20100017818 | NON-BANDWIDTH INTENSIVE METHOD FOR PROVIDING MULTIPLE LEVELS OF CENSORING IN AN A/V STREAM - Particular embodiments generally relate to providing different censoring levels for audio-video streams. In one embodiment, an audio-video stream is received. Metadata including censoring information for the audio-video stream is also received. The audio-video stream and metadata may be sent by a source in separate streams. A first level of censoring associated with a first receiver is determined along with a second level of censoring for a second receiver. A first audio-video stream is generated for the first receiver with a first censor level and a second audio-video stream is generated for the second receiver with a second censor level. For example, the first audio-video stream may include censoring of faces and the second audio-video stream may be an audio-video stream without censoring or may censor some other part of the audio-video. The first audio-video stream and the second audio-video stream are then sent to the first and second receivers, respectively. | 2010-01-21 |
20100017819 | Providing Targeted Multimedia Content - Targeted multimedia content stored on a computer system is selected and streamed to users on the network based on requests containing information about the user. A sequence of selected clips is streamed in the order in which they are to be rendered by the user's computing device and delivery of a second clip begins before delivery of the first clip ends, so there is substantially no gap in time between the end of the first clip and the beginning of the second clip from the user's perspective. | 2010-01-21 |
20100017820 | REALTIME INSERTION OF VIDEO CONTENT IN LIVE BROADCASTING - A system and method relates to providing a set of pre-recorded video content for inclusion into one or more locations in a video broadcast having sport content of a live sporting event, the video broadcast for production during the live sporting event. | 2010-01-21 |
20100017821 | Software based Internet/Television convergence methods and systems for organizing and displaying Internet media content on computers and Television sets - Convergence systems described in the prior art typically focus on advancing hardware architecture. Such systems provide limited solutions as consumers are restricted to the use of proprietary networks, incur significant extra costs upgrading their equipment and pay subscription fees. General public demands low cost solutions for the consumption of the Internet media content in a traditional TV watching experience in the living room. | 2010-01-21 |
20100017822 | METHOD OF DISPLAYING ELECTRONIC PROGRAM GUIDE AND APPARATUS USING THE SAME - A method and apparatus for displaying an electronic program guide in a television receiver provided with a PVR function enhance user convenience by providing information of a program recorded and stored in the television receiver as well as information of programs currently broadcast or scheduled to be broadcast. The method of controlling a receiver includes steps of extracting electronic program guide (EPG) information from a received broadcast signal, the EPG information indicating a broadcasting schedule for a plurality of broadcast programs; searching at least one broadcast program of the plurality of broadcast programs, the searched at least one broadcast program corresponding to a temporary storage of the received broadcast signal in a storage device enabling a time-shift function; and constructing an EPG in which the searched at least one broadcast program is visually distinguishable from other broadcast programs of the plurality of broadcast programs. | 2010-01-21 |
20100017823 | ELECTRONIC DEVICE AND METHOD OF CREATING A SEQUENCE OF CONTENT ITEMS - The method of creating a sequence of content items of the invention comprises determining similar content items (P | 2010-01-21 |
20100017824 | APPARATUS AND METHOD FOR PRESENTING AN ELECTRONIC PROGRAMMING GUIDE - A system that incorporates teachings of the present disclosure may include, for example, a set-top box having a controller to establish a user profile, retrieve from a media communication system media content schedules according to the user profile, determine a consumption status for each of the retrieved media content schedules, generate an Electronic Programming Guide (EPG) comprising the retrieved media content schedules, each media content schedule depicting its corresponding consumption status, and present the EPG at a media presentation device upon request. Other embodiments are disclosed. | 2010-01-21 |
20100017825 | BROADCAST RECEIVING APPARATUS AND METHOD FOR PROVIDING WIDGET SERVICE THEREOF - A method for providing a widget service using a media service providing apparatus is provided. A method for providing the widget service includes operations of scanning channels providing media services therethrough; determining whether or not there is an available channel among the scanned channels for allocating a widget service; if it is determined that there is the available channel, allocating the widget service to the available channel; and providing the widget service allocated to the available channel. Accordingly, a widget service is provided without disturbing a user viewing a television (TV), increasing user convenience. | 2010-01-21 |
20100017826 | DOCSIS MAC CHIP ADAPTED - Disclosed in one embodiment is the use of a terrestrial media access control (MAC) chip or circuit in a satellite modem. The satellite modem comprises a satellite receiver, a satellite transmitter, an adaptor, and a terrestrial MAC chip. The adapter translates between the satellite physical layer and the physical layer of the terrestrial MAC chip. Protocols, messaging and signaling is spoofed for the terrestrial MAC chip such that it can be integrated into a satellite system. The received satellite signal is filtered so select one or more sub-channels that are fed to the terrestrial MAC chip. The terrestrial MAC chip could use a variety of physical layers, for example, Data Over Cable Service Interface Specifications (DOCSIS) or World Interoperability for Microwave Access (WiMAX). | 2010-01-21 |
20100017827 | RECEIVER AND DISTRIBUTION UNIT FOR VEHICLE ENTERTAINMENT SYSTEM - A receiver and distribution unit in a vehicle that includes a wireless receiver and signal processing/conversion facilities. The receiver and distribution unit may include a data bus and a selection multiplexer connected to the wireless receiver and an additional media source. The wireless receiver receives a signal comprising media content from a wireless network, such as the FLO™ network. The processing/conversion facilities decode the signal for output to a display and speaker in the vehicle. The selection multiplexer multiplexes media content from the wireless receiver or media content from the additional media source to the data bus. A function control, controllable by a wired controller and a wireless controller, controls the functions of the receiver and distribution unit. | 2010-01-21 |
20100017828 | METHOD, SYSTEM, AND DEVICE FOR IMPROVING VOD SERVICE RELIABILITY - A method for improving video on demand (VOD) service reliability includes: selecting a first VOD server to provide VOD services for a user terminal; and reselecting a second VOD server according to the current running status of each VOD server and a policy to continue providing VOD services for the user terminal after receiving a VOD request re-initiated by the user terminal. The present invention avoids blind switchover of VOD services, greatly improves the switchover success ratio, and ensures the quality of the VOD services provided for users. | 2010-01-21 |
20100017829 | REAL TIME RADIO-BASED TELEVISION PROGRAMMING APPARATUS AND METHOD - An apparatus for providing real time radio-based audiovisual content that includes a radio station audio and video data system providing at least one audio channel and at least one video channel associated with a radio station program. | 2010-01-21 |
20100017830 | MEDIA ON DEMAND USING AN INTERMEDIARY DEVICE TO OUTPUT MEDIA FROM A REMOTE COMPUTING DEVICE - Particular embodiments generally relate to providing media for display to a user. In one embodiment, the media may be stored on a remote computing device. An intermediary device may be used to display the media on output device. Even though the media may be stored on the remote computing device, the user may believe that the media is stored on the intermediary device when displaying content using the intermediary device. Representations of the media units may be received at the intermediary device. The intermediary device automatically predicts which representations of the media may be most likely to be accessed by the user. When a request to access the media units is received, if the requested media unit is stored on the intermediary device, then it can be automatically displayed using the corresponding representation of the media unit. | 2010-01-21 |
20100017831 | Pay-Per-View Sharing - One embodiment takes the form of a method and apparatus for sharing a purchased pay-per-view (PPV) event over a plurality of set-top boxes (STB). Thus, a PPV event purchased through one STB may be viewed through every STB associated with the customer ID number of the purchaser, including an STB located in a separate location from the PPV purchaser. The customer information used to locate the STBs associated with the customer ID may be retrieved from a database or may be provided by a billing site. Providing for the purchaser to view the PPV event on several STBs may allow the customer of the PPV service maximum access to the purchased PPV event. | 2010-01-21 |
20100017832 | NETWORK DIGITAL TELEVISION MIDDLEWARE - A digital television middleware, comprising: an application program description information finding unit for requesting application program description information from a first network and a second network; an application program description information converting unit for converting the received application program description information for the second network into description information in a format of an application program information table (AIT) which can be used by the first network; and an AIT table buffering unit for buffering the converted description information so as to download the requested application program description information for the second network used by the first network. | 2010-01-21 |
20100017833 | METHOD, CABLE MODEM AND A DEVICE FOR PROVIDING VIDEO TO A CUSTOMER PREMISES EQUIPMENT - A method for providing video to a customer premises equipment, the method includes: receiving, by a radio frequency interface of a cable modem, radio frequency signals; receiving by a data tuner out of multiple tuners of the cable modem, radio frequency signals that convey data; detecting, by a monitor of the cable modem, a request to receive a certain video channel that is being broadcasted; wherein the request is sent to the cable modem from a customer premises equipment; tuning a certain tuner out of multiple tuners of the cable modem, in response to a mapping between radio frequencies and video channels, to receive the certain video channel; filtering out data layer encapsulation information that encapsulates certain video channel information; and transmitting certain video channel information to the customer premises equipment. | 2010-01-21 |
20100017834 | Apparatus and Method for Transmitting Multimedia Objects in Digital Multimedia Broadcasting - An apparatus and method for transmitting multimedia objects in DMB is disclosed to reduce transfer delays and transfer errors during a multimedia object transfer by using a multimedia object transfer protocol in the digital multimedia broadcasting. The method for transmitting multimedia objects comprises; scheduling to-be-transmitted multimedia objects based on a pre-set number of iterative transfer times in such a manner that no identical multimedia objects are consecutively transmitted; inserting the scheduled multimedia objects into a transfer queues; and transmitting the transport queue-inserted multimedia objects to a Digital Multimedia Broadcasting receiving terminal via a multimedia object transfer protocol. As a result, transmission errors that occur during transmission of the multimedia objects to the digital multimedia broadcasting receiving terminal using the multimedia object transfer protocol can be prevented. | 2010-01-21 |
20100017835 | METHODS AND APPARATUS FOR FREQUENCY AGILE BAND-PASS FILTERING OF BROADCAST SIGNALS - Methods and apparatus for frequency agile band-pass filtering of broadcast signals are disclosed. An example method to receive a broadcast signal for distribution to a plurality of reception sites disclosed herein comprises processing the broadcast signal with a frequency agile band-pass filter to receive the broadcast signal at a headend site for distribution to the plurality of reception sites, monitoring reception quality of the broadcast signal at an operating center separate from the headend site and included in the plurality of reception sites, and sending commands to the frequency agile band-pass filter from the operating center based on the monitored reception quality of the broadcast signal, the commands controlling at least a tuned operating frequency of and an attenuation provided by the frequency agile band-pass filter. | 2010-01-21 |
20100017836 | Method and Device for Stream Adaptation - A stream adaptation device and method of adapting source data streams to the attainable transmission rate of a bandwidth-limited channel such as a Digital Subscriber Line (DSL). A plurality of transcoding units each receive a source stream at a given rate and transcode the stream into a plurality of transcoded streams of lower transmission rates. A polling unit retrieves the current quality of the DSL line from an IPDSLAM to which the DSL line is connected. A controller calculates the rates to be used on the DSL line for the different source streams. A selector then selects a combination of an original source stream and/or transcoded streams of lesser rates that fits the quality of the DSL line. A multiplexer combines the selected source streams and/or transcoded streams onto the DSL line. | 2010-01-21 |
20100017837 | METHOD OF SECURING RESOURCES IN A VIDEO AND AUDIO STREAMING DELIVERY SYSTEM - A video and audio stream is predicted that is to be selected for reception next to a video and audio stream that is being received by the terminal or that is after a video and audio stream that has been selected for reception by the terminal. Resources necessary for delivering the predicted video and audio stream, in addition to resources necessary for the video and audio stream that is being received by the terminal or that has been selected for reception by the terminal, are secured in advance before a user of the terminal selects the next video and audio stream. The predicted video and audio stream is not delivered to the terminal before it coincides with a video and audio stream that is selected at the next zapping. | 2010-01-21 |
20100017838 | METHOD AND APPARATUS FOR UPDATING A NETWORK ADDRESS OF AN AUDIO/VIDEO NODE TO A COMMUNICATION DEVICE - A method for updating a network address of an audio/video node of a communication network to a communication device is provided. In the method, a communication identifier associated with the communication device is received at the audio/video node. Also received at the audio/video node, by way of the communication network, is a network address of the audio/video node. In response to receiving the network address, a message is transferred from the audio/video node to the communication device using the communication identifier, wherein the message comprises the network address. A request for audio/video data is transferred from the communication device over the communication network to the audio/video node using the network address. In response to receiving the request, the audio/video data is transferred from the audio/video node over the communication network to the communication device. | 2010-01-21 |
20100017839 | METHOD OF RECEIVING A BROADCASTING SIGNAL AND RECEIVING SYSTEM FOR RECEIVING A BROADCASTING SIGNAL - A broadcast signal reception method and a reception system are provided. The reception system includes a first processor, a second processor, and a storage medium. The first processor receives and processes a signaling table, the signaling table comprising first signaling information including access information of Non-Real-Time (NRT) service data and second signaling information including media object association information of the NRT service data. The second processor receives the NRT service data and processes a file including the received NRT service data based on the access information and the media object association information processed by the first processor. The storage medium stores the processed file of the NRT service data. | 2010-01-21 |
20100017840 | FEATURE ENABLEMENT AT A COMMUNICATIONS TERMINAL - In one embodiment, a method for electronic enablement of features at a communication device that includes receiving a feature token, validating the feature token, and changing the enablement state of one or more features at the communication device in accordance with a valid feature token. | 2010-01-21 |
20100017841 | METHOD AND SYSTEM FOR SYNCHRONIZING TRANSPORT STREAMS OF MULTIPLE TRANSPONDERS FOR AREA CRITICAL APPLICATIONS - Disclosed is a transport stream synchronizing system for synchronizing transport streams output from a plurality of transponders and decoded by a plurality of tuners. The transport stream synchronizing system comprises a tuner selector operable to select one transport stream out of a plurality of transport streams decoded by the plurality of tuners, a transport packet synchronizer operable receive the transport stream selected by the tuner selector, and synchronize the received transport stream; and a transport packet arbiter and router operable to receive a synchronized transport stream from the selected tuner, and route the received synchronized transport stream to a predetermined destination. | 2010-01-21 |
20100017842 | Passive-Active Terminal Adapter and Method Having Automatic Return Loss Control - Return loss due to excessive signal reflection into a cable television (CATV) network from an inoperative or abnormally operative terminal adapter is minimized, to communicate enhanced passive downstream signals to passive subscriber devices such as “life-line” telephone sets. A predetermined termination impedance is substituted for an active branch circuit of the terminal adapter whenever reduced input voltage, over-current or under-current conditions exist in the terminal adapter. | 2010-01-21 |
20100017843 | Scenario Based Security - A security management system uses several security scenarios that have rules defining the configuration of system and security components in order to meet a specific security scenario. The rules may include an evaluation of multiple components to give a summary statistic or evaluation, as well as rules that may be used to configure the various components to achieve a desired level of security. A management console may aggregate multiple security scenarios together for administration. | 2010-01-21 |
20100017844 | ASSOCIATING A UNIQUE IDENTIFIER AND A HEIRARCHY CODE WITH A RECORD - A method and system for creating a record and associating a unique identifier and a hierarchy code with the record where the record is created in response to identifying that a transmission violates an institution's policy. The record may also be passed to a reporting module which may generate a report based on the unique identifier and/or a hierarchy code. Additionally, the record may be passed to a remediation agent for handling. The remediation agent may also update the record based on actions taken by the remediation agent or updates identified by the remediation agent. | 2010-01-21 |
20100017845 | DIFFERENTIATED AUTHENTICATION FOR COMPARTMENTALIZED COMPUTING RESOURCES - Embodiments for providing differentiated authentication for accessing groups of compartmentalized computing resources, and accessing each compartmentalized computing resources, as displayed on a desktop environment of an operating system. In one embodiment, a method includes organizing one or more computing resources accessible in a desktop environment into a group. The one or more computing resources include a data content, an application, a network portal, and a device. The method also includes providing an authentication policy for actions that can be performed on each computing resource. The authentication policy is configured to associate an authentication input to each action for a particular computing resource. The method further includes receiving an authentication input when the user intends one of the actions on the particular computing resource. The method additionally includes allowing the user to perform the intended action on the particular computing resource when the received authentication input enables the intended action. | 2010-01-21 |
20100017846 | SERVICE PROCESSING METHOD AND SYSTEM, AND POLICY CONTROL AND CHARGING RULES FUNCTION - A service processing method, a service processing system, and a PCRF entity are disclosed to overcome this defect in the prior art: The prior art is unable to handle services discriminatively according to the policy context information when different services require the same QoS level. The method includes: receiving bearer priority information from a PCRF entity, where the bearer priority information includes: bearer priority information of a service data stream, bearer priority information of an IP-CAN session, and/or bearer priority information of an IP-CAN bearer; and handling services according to the bearer priority information. In the embodiments of the present invention, the policy context information is converted into bearer priority information so that the PCEF handles services according to the bearer priority information. In this way, different services that require the same QoS level are handled discriminatively according to the policy context information. | 2010-01-21 |
20100017847 | Wireless Connection Setting Program - A computer program product includes computer readable instructions that cause a computer to execute a wireless connection setting process. The computer includes a communication interface configured to communicate with at least one device. The wireless connection setting process includes recognizing a state of the at least one device through the communication interface, displaying an input screen image sequentially for each of at least one setting item of wireless connection settings, configuring the wireless connection settings for the at least one device based upon the input, and controlling whether to display the input screen image by judging whether the input is required to be received for each of the at least one setting item based upon the state of the recognized at least one device. Said configuring includes determining the setting item for which the input is not judged required to be received. | 2010-01-21 |
20100017848 | VERIFYING CERTIFICATE USE - A method, system, and computer usable program product for verifying certificate use are provided in the illustrative embodiments. A secure data communication is directed to a certificate use verification application. A test certificate that may be stored in a data storage associated with a data processing system is presented to an originator of the secure data communication. The test certificate includes an identity, and the identity identifies an entity other than the intended party to the secure data communication as being the holder of the test certificate. A determination is made whether the originator responds to continue the secure data communication when presented with the test certificate. If the originator responds to continue the secure data communication, a report is made that the originator does not perform a verification of the identity from the test certificate. | 2010-01-21 |
20100017849 | THIRD-PARTY SOFTWARE PRODUCT CERTIFICATION - According to one general aspect, a method of software certification comprising establishing a host application server software (HASS) on a system. The method further comprising installing, on the system, an third-party software product (TPSP) that uses the HASS. In various embodiments, the method may also comprise verifying that the TPSP functions to at least a predefined standard. In some embodiments, the method may also include uninstalling the third-party software product. The method also including testing that the HASS functions to at least a predefined standard once the TPSP has been uninstalled. | 2010-01-21 |
20100017850 | METHODS AND SYSTEMS TO FINGERPRINT TEXTUAL INFORMATION USING WORD RUNS - The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The present system receives textual information and provides algorithms to convert the information into representative fingerprints. In one embodiment, the fingerprints are recorded in a repository to maintain a database of an organization's secure data. In another embodiment, textual information entered by a user is verified against the repository of fingerprints to prevent unauthorized disclosure of secure data. This invention provides approaches to allow derivative works (e.g., different ordering of words, substitution of words with synonyms, etc.) of the original information to be detected at the sentence level or even at the paragraph level. This invention also provides means for enhancing storage and resource efficiencies by providing approaches to optimize the number of fingerprints generated for the textual information. | 2010-01-21 |
20100017851 | System and process for registering and later confirming a written or printed document is genuine and unaltered, while mitigating the risk of its loss - A method for authenticating a document including: radio frequency scanning at least a portion of the document; optically scanning the document; generating a document data dependently upon the radio frequency scanning and optical scanning; comparing the generated data to stored data, the stored data being previously generated dependently upon a prior radio frequency scanning of the portion of the document and prior optical scanning of the document; and providing an output indicative of the document being authentic if the generated data is sufficiently identical to the stored data as determined by the comparing. | 2010-01-21 |
20100017852 | Electronic board provided with security functions and method for ensuring electronic board security - To prevent being able to capture sensitive signals between electronic circuits placed on an electronic card, these circuits are arranged in a protected zone in such a manner so as not be distant from each other by more than a determined distance. The circuits of the protected zone comprise at least one control circuit. The electronic card further comprises another zone defining a non-protected environment; the circuits of this zone do not need to comply with the distance constraint. The communication between the circuits of the protected zone and the non-protected environment is carried out by means of a communication circuit allowing or not allowing the electrical signals to pass. The passage of the electrical signals in the communication circuit is conditioned by an electrical control signal sent by the control circuit. The invention also relates to a method allowing the control circuit to be blocked if the electrical status of the signal controlling the passage of the signals does not correspond to the status imposed by the control circuit. | 2010-01-21 |
20100017853 | SYSTEM AND METHOD FOR SELECTING A WEB SERVICE FROM A SERVICE REGISTRY BASED ON AUDIT AND COMPLIANCE QUALITIES - A particular web service is selected based on conformation to a particular degree-of-trust. Information about available web services is requested. Responsive to requesting that information on the particular web service, a list of possible services is presented. The list of possible services includes a plurality of services, each of the plurality having a levels-of-trust assigned thereto. An acceptable web service having an acceptable degree-of-trust can then be selected from the list of possible services. Responsive to selecting the acceptable service from the list of possible services, the acceptable service can be invoked. | 2010-01-21 |
20100017854 | IMAGE FORMING APPARATUS, METHOD AND MEDIUM STORING PROGRAM - The image forming apparatus acquires authentication information for authentication of document data and an authentication result. When the result indicates success, the document data is converted and is added with the specific information to specify the authentication apparatus and is stored. The image forming apparatus acquires the specific information from the converted data, transmits the specific information to a destination of the converted data, requests the destination to confirm establishment of a communication path from the destination to the authentication apparatus and transmits the converted data to the destination when receiving information representing establishment. | 2010-01-21 |
20100017855 | State Saver/Restorer for a Geospatial Decision Management System - A geospatial decision management system (GDMS) can save the overall state of a user's experience at one point in time within a GDMS session so that the user can restore the overall state at a later time, such as by restoring a geospatial browser view (e.g., camera settings for rending the map on the display screen, layer state information, map location) and restoring the states of one or more instances of geospatially-referenced tools that were active at the time of the state save. Upon restore, the browser and tools are initialized with their saved states so that the user is presented with the same functionality, data, and browser view that were displayed and accessible at the time of the state save. Saved states are transportable and can also be sequenced and animated to allow presentation of a slide show of individual GDMS views. | 2010-01-21 |
20100017856 | BIOMETRIC RECORD CACHING - An apparatus, method and program product locally stores biometric data in response to a user accessing a network ( | 2010-01-21 |
20100017857 | SYSTEM AND METHOD FOR EXECUTING INTERACTIVE APPLICATIONS WITH MINIMAL PRIVILEGES - A mechanism for running interactive applications with a minimal set of privileges is disclosed. The privileges form a subset of the privileges afforded to the user requesting the application and are allocated consistent with the principle of least privilege. The application runs with the minimal amount of permissions necessary to accomplish its assigned tasks. A new user account is created and provisioned or identified for each application to which a user requests access. The accounts have a subset or superset of the access rights and operating system privileges that the user who is logged on to the system and requesting access to the application ordinarily enjoys. The subset/superset of the user's privileges is determined by a policy-based decision system. The policy-based decision system makes its determination based on an analysis of the application requirements, an analysis of the data security and privacy concerns associated with the execution of the application, the identity of the user and user's role and any other policy considerations previously specified by an administrator. Once the determination as to the appropriate set of privileges to be afforded in the execution environment has been made, the execution environment is created and provisioned or a pre-existing execution environment possessing the requisite privileges is identified and the remote user is logged into the server-side account. The application-specific accounts may be audited by audit trail tools that provide evidence of policy enforcement. | 2010-01-21 |
20100017858 | SYSTEM AND METHOD FOR AUTHENTICATING COMPONENTS IN WIRELESS HOME ENTERTAINMENT SYSTEM - Configuration information is exchanged between a home entertainment system server and various wireless components by pushing a button on the server and a random button on a remote control device as it is pointed at the devices sought to be authenticated. | 2010-01-21 |
20100017859 | Authentication system for networked computer applications - A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated. | 2010-01-21 |
20100017860 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - The security of an authentication system using a one-time password is increased, a shift from an authentication system using a fixed password is simplified, and a range of use is increased. An authentication system wherein a one-time password is synchronized with time, or an authentication system wherein a one-time password is synchronized with the number of online service authentication requests, is provided. When a one-time password client | 2010-01-21 |
20100017861 | APPARATUS AND METHOD FOR MOBILE VIRTUAL NETWORK OPERATOR (MVNO) HOSTING AND PRICING - A method and apparatus facilitating access to a communication session for a client is provided. The method may comprise receiving, at a mobile virtual network operator (MVNO), an access request from a client, wherein the MVNO is associated with a set of mobile network operators (MNOs), receiving, from the client, client connection parameters associated with at least one of the set of MNOs, formulating at least one option for a communication session over a network associated with at least one of the set of MNOs, the at least one option based on the client connection parameters and MVNO-connection parameters associated with the set of MNOs, and establishing a selected communication session based on the at least one option. | 2010-01-21 |
20100017862 | METHOD AND RELATED SYSTEM FOR AUTHENTICATING E-LEARNING STUDY - This invention provides an e-learning system having a capability for authenticating the learner's ID via Internet with the learner's physical Bio-ID such as a fingerprint, an iris and/or a vein of the learner into the login process and additional periodic checking according to the instruction signal generated by the contents. Accordingly, once a learner successfully logs into his or her account, the computer will monitor each learner's progress on a lecture or an examination. Thus, the invention enable to operate a full online distance education from a single database for the worldwide learners, at each learner's own space and scheduling, anytime, anyplace, in any of the major languages selected by the learners and accurately account credit hours of each learner by the lectures and examination on demand for conferring a degree or to transfer the credit to the university where they will earn their degrees. | 2010-01-21 |
20100017863 | PORTABLE STORAGE APPARATUS FOR PROVIDING WORKING ENVIRONMENT MIGRATION SERVICE AND METHOD THEREOF - Provided are an apparatus and method for providing a working environment migration service. The portable storage apparatus, includes: a management and execution unit for performing user authentication by connection to an external user terminal, managing a user profile and application information, and executing a context management unit; a working environment storage unit for storing an application context and data representing the working state at the time of log out; and the context management unit for recovering and executing the application context and data stored in the working environment storage unit upon execution by the management and execution unit, and collecting the application context and data representing the working state at the time of log out, and storing them in the working environment storage unit. | 2010-01-21 |
20100017864 | SYSTEM FOR PUBLISHING AND CONVERTING MESSAGES FROM IDENTIFIED, AUTHORIZED SENDERS - A message publishing system operative to process a message from a sender in a first format has a central processor; at least one sender account, at least one storage area configured to store at least a first portion of the message, and software executing in the central processor. The processor is configured to identify the sender of the message as an authorized sender based on information associated with the message in comparison to data in the sender account, wherein the identification is dependent upon the first format. The processor is configured to convert at least a second portion of the message from the first format to a second format. The processor is also configured to publish the converted second portion of the message so as to be viewable in the second format only if the sender has been identified as an authorized sender. | 2010-01-21 |
20100017865 | METHOD AND SYSTEM FOR PREVENTING FRAUDULENT ACTIVITIES - A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application. | 2010-01-21 |
20100017866 | SECURE USER INTERACTION USING VIRTUALIZATION - A first virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least first and second hardware devices of the computer system. Data is communicated between the first hardware device and the second hardware device, via the first virtualization layer, without exposing the data to the operating system. | 2010-01-21 |
20100017867 | SELF-MANAGEMENT NETWORK ACCESS USING LOCALIZED ACCESS MANAGEMENT - The invention provides a method and system for locally tracking network usage and enforcing usage plans at a client device. In an embodiment of the invention, a unique physical key, or token, is installed at a client device of one or more networks. The key comprises a usage application and one or more access parameters designated the conditions and/or limits of a particular network usage plan. Upon initial connection to the network, the usage application grants or denies access to the network based on an analysis of the current values of the access parameters. Therefore, network usage tracking and enforcement is made simple and automatic without requiring any back-end servers on the network while still providing ultimate flexibility in changing billing plans for any number of users at any time. | 2010-01-21 |
20100017868 | METHOD AND SYSTEM FOR CONFIGURING A RULE FILE FOR FIREWALL OF WEB SERVER - A method, a system, and a computer program product embodying computer readable code for configuring a rule file for a Web application firewall. The method includes: blocking a response created by a Web application; modifying the response by adding capturing code for capturing a regular expression and an associated parameter value embedded in the response while being executed; sending the modified response to the browser; receiving a request submitted by the browser and at least one regular expression and an associated parameter value captured by the capturing code; determining a parameter name and a regular expression associated with the same parameter value, and configuring the rule file of the firewall by use of the determined parameter name and regular expression associated with one another as a filtering rule. | 2010-01-21 |
20100017869 | Inferencing Data Types Of Message Components - A method of a device for filtering messages routing across a network includes extracting, by a filter configured on the device, a plurality of message components from messages received via a network. The plurality of message components is identified as having at least a field name in common, including a first field name. A learning engine configured on the device creates a list of data types for values of the first field name. The list includes one or more data types of a value of the first field name identified for each of the plurality of message components. The learning engine determines a most restrictive data type from the list of data types for the values of the first field name of the plurality of message components. | 2010-01-21 |
20100017870 | MULTI-AGENT, DISTRIBUTED, PRIVACY-PRESERVING DATA MANAGEMENT AND DATA MINING TECHNIQUES TO DETECT CROSS-DOMAIN NETWORK ATTACKS - The present invention is a method and a system that uses privacy-preserving distributed data stream mining algorithms for mining continuously generated data from different network sensors used to monitor data communication in a computer network. The system is designed to compute global network-threat statistics by combining the output of the network sensors using privacy-preserving distributed data stream mining algorithms. | 2010-01-21 |
20100017871 | Security In Networks - Embodiments related to security in networks are described and depicted. | 2010-01-21 |
20100017872 | USER INTERFACE FOR MOBILE COMPUTER UNIT - A computer readable medium storing a computer program with computer program code, which, when read by a mobile computer unit, allows the computer to present a user interface for the mobile computer unit. The user interface includes a touch sensitive area in which a portion of a first window and a portion of a second window are displayed. The user scrolls the first window when an object touches a corresponding location in the touch sensitive area at which the first window is displayed, and scrolls the second window when an object touches a corresponding location in the touch sensitive area at which the second window is displayed. The user interface displays a plurality of keys which are selected when an object touches a corresponding key location and are activated when the object applies additional pressure to the corresponding key location. Alternatively, the key is activated when an object touches its corresponding location. The user interface presents keys in a manner facilitating entry of Chinese characters using stroke and Pinyin input. | 2010-01-21 |
20100017873 | Secure communication over virtual IPMB of a mainframe computing system - In general, techniques for secure communicating over a virtual IPMB of a mainframe computing system are described herein. More specifically, the mainframe computing system comprises a plurality of independent computing cells communicatively coupled together by a network interconnect and that form a plurality of partitions. Each partition is a logical association of one or more of the cells to define a single execution environment. Each cell further executes a virtual intelligent platform management interface (IPMI) protocol to define and configure a respective logical intelligent platform management bus (IPMB) for each of the partitions. Each of the IPMBs logically interconnects with each of the other cells included within the same partition, and each is defined for communication of IMPI messages over the network interconnect. The cells securely communicate the IPMI messages between each of the one or more other cells of each partition via the respective logical IPMB of each partition. | 2010-01-21 |
20100017874 | METHOD AND SYSTEM FOR LOCATION-AWARE AUTHORIZATION - A method and system for controlling access to a module based on spatial location of the module is provided. One implementation involves detecting spatial location of the module, accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. | 2010-01-21 |
20100017875 | PASSWORD AUTHENTICATION APPARATUS AND PASSWORD AUTHENTICATION METHOD - A password authentication apparatus and a password authentication method for preventing the leakage of password information from user's password input operations includes a storage means for storing a correct answer symbol and selection information for selecting at least one input symbol for each digit of a password; a display means for displaying combinations of input symbol candidates based on user operation; a determination means for selecting, for each digit of the password, one or more input symbols from the combinations of input symbol candidates displayed by the display means based on the selection information corresponding to the digit to determine whether the correct answer symbol corresponding to the digit is included in the selected one or more input symbols; and an authentication means for authenticating that the password is entered correctly when the determination means determines that correct answer symbols for all the digits of the password are included. | 2010-01-21 |
20100017876 | ACCESS CONTROL AND ENTITLEMENT DETERMINATION FOR HIERARCHICALLY ORGANIZED CONTENT - Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control and entitlement determination for hierarchically organized content. In an embodiment of the invention, a method for access control and entitlement determination for hierarchically organized content can be provided. The method can include selecting a node in hierarchically organized content, inferring entitlements for direct descendants of the selected node based upon expressly conferred permissive access rights amongst ancestors and descendants of the selected node and expressly conferred impermissive rights amongst descendants of the selected node. Finally, the method can include applying the inferred entitlements in a view to the hierarchically organized content. | 2010-01-21 |
20100017877 | METHODS AND SYSTEMS FOR DETERMINING FILE CLASSIFICATIONS - A computer-implemented method for determining file classifications. The method may include determining identification information of a first file stored on a first computing system. The method may also include querying a second computing system for classification information by sending the identification information of the first file to the second computing system. The first computing system may receive, in response to the query, identification information of a second file. The first computing system may also receive the classification information. The classification information may indicate that the first file and second file are trusted. The first computing system may use the identification information of the second file to determine that the second file is stored on the first computing system. The first computing system may also apply the classification information to the first and second files by excluding the first and second files from a security scan. | 2010-01-21 |
20100017878 | PRECISE WEB SECURITY ALERT - A method for providing an alert when a potentially or likely malicious web site is browsed to by a user. The method maintains web site identification details. If a web site purporting to be a known, previously identified, encountered and utilized web site is browsed to and requests information, the user is alerted to the precise differences between the stored web site historical identity and the identity of the present requester. | 2010-01-21 |
20100017879 | Method and System for Intrusion Detection - Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least a processor memory, wherein the computer software to be protected communicates with a license container containing a license for using and executing the protected computer software and containing at least one cryptographic key, wherein the license container provides licenses and cryptographic keys for the protected software to protect its usage and its integrity, and wherein the protected computer software is at least partly encrypted and uses the associated cryptographic keys to decrypt said protected software for executing comprises the following steps: during execution of the protected software, analyzing the behavior of the protected software and/or the execution environment of the protected software on the computer system, and searching for patterns of an intrusion or an intruding program, detecting an intrusion into the protected software during the execution of the protected software, wherein the intruding program uses a monitoring component for gaining unauthorized access, and creating a signal on detection of an attack. | 2010-01-21 |
20100017880 | Website content regulation - A method of facilitating the scanning of web pages for suspect and/or malicious hyperlinks that includes receiving at a content hosting website, user generated content. A web page or web page containing said content is then generated and, in the web page source code is included a detection code segment or a link from which a detection code segment can be downloaded. The detection code segment is executable by a web browser or web browser plug-in to scan the web page(s), or cause the web page(s) to be scanned, for suspect and/or malicious links. | 2010-01-21 |
20100017881 | Portable Electronic Device and Method for Securing Such Device - The device of the invention includes: a first interface ( | 2010-01-21 |
20100017882 | METHOD AND SYSTEM FOR LOCALLY ACTIVATING A DRM ENGINE - A method for locally activating a DRM engine is disclosed. A preprocessing operation is performed, wherein rights objects are bound with digital content files with a first format. The digital content files with the first format are converted to the digital content files with a second format. The digital content files with the second format file are encrypted and a corresponding decryption key is generated. The encrypted digital content files and the decryption key are stored in a memory device. An application is designed and installed on the electronic device and the memory device is installed to the electronic device. The application is authorized according to the rights objects bound in the digital content files, decrypts the encrypted digital content files using the decryption key, wherein the digital content files with the second format can be recovered from the third format, and activates a DRM engine of the electronic device. The DRM engine binds an IMEI code of the electronic device with the digital content files, enabling the digital content files to only be accessed by the specific electronic device. | 2010-01-21 |
20100017883 | LOCKBOX FOR MITIGATING SAME ORIGIN POLICY FAILURES - Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy. | 2010-01-21 |
20100017884 | METHOD FOR ALLOWING FULL VERSION CONTENT EMBEDDED IN MOBILE DEVICE AND SYSTEM THEREOF - A method for unlocking full version contents embedded in a mobile device comprises receiving a first signal for requesting the unlocking of full version contents embedded in a mobile device, the full version contents of which permitted usage is initially limited, and sending an unlocking message having an unlocking code for permitting a user to use the full version contents. According to the method and system for unlocking the full version contents, the full version contents are unlocked only after requesting the unlocking, and costs for the full version contents are charged to the user only when the request is allowed. Thus, costs may be saved. | 2010-01-21 |
20100017885 | Media markup identifier for alterable promotional segments - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or topic or category of an alterable media content component may be implemented to enable selective audio, visual, and audio/video content alteration. | 2010-01-21 |
20100017886 | SYSTEM AND METHOD FOR REMOTELY TRACKING AN ACTIVATION OF PROTECTED SOFTWARE - The invention is related to a system ( | 2010-01-21 |
20100017887 | RIGHTS OBJECT MOVING METHOD, CONTENT PLAYER, AND SEMICONDUCTOR DEVICE - A method of moving a rights object according to the present invention includes the following steps. First, a rights object in the memory card is disabled. Then, the rights object is copied from the memory card in response to a retrieval request and installed to a content player. After the installation, a removal request is transmitted to the memory card and the rights object in the memory card is removed (deleted). After transmitting the removal request, second state information is generated and held in the content player to indicate that the removal of the rights object in the memory card has not yet been completed and that the rights object installed in the content player is conditionally enabled. When the memory card receives the removal request, the memory card removes the rights object from the memory card and transmits a removal response for notifying completion of the removal to the content player. | 2010-01-21 |
20100017888 | METHOD, DEVICE AND SYSTEM FOR TRANSFERRING LICENSE - The present invention discloses a method for transferring licenses, a device for issuing licenses, and a communication system, and relates to the Digital Rights Management (DRM) technology. The method includes: the first issuing device receives a request of transferring a license issued by the second issuing device; the first issuing device transfers the license after determining that a relationship is set up with the second issuing device. The license issuing device includes: a receiving module, a setup module, a determining module, and a sending module. The communication system includes: a first issuing device, a second issuing device, and a device requesting to transfer a license. Through the present invention, an issuing device may transfer the licenses issued by other issuing devices, thus improving the flexibility of transferring the licenses. | 2010-01-21 |
20100017889 | Control of Website Usage Via Online Storage of Restricted Authentication Credentials - A client communicates with a website usage server via a network to gain access to an account on a website. The client requests an indication of whether user access to the account on the website is permitted. The website usage server determines whether website usage is permitted based at least in part on a website usage policy associated with the website and the user. The website usage server provides restricted authentication credentials to the website responsive to determining that access to the account is permitted. | 2010-01-21 |
20100017890 | Symbol Based Cipher Code Registration System and Method - A symbol cipher system. The system has a symbol cipher application for execution on a digital platform. The symbol cipher application has: a first group of symbol components; a first range of code entry fields; a cipher correlation table. The cipher correlation table correlates the first group of symbol components to a first range of language characters. The first group of symbol components can be entered into the first range of code entry fields for registration of a symbol information item in an application database. | 2010-01-21 |
20100017891 | Method of Controlling a Browser Window - A method of controlling a browser window is disclosed. The method comprises the steps of associating the browser window to a token indicative of a personalized session; and repetitively, verifying said token; and, closing the browser window in dependence of said token. A valid token is generated at startup of the personalized session. The token is invalidated when the user logoffs from the personalized session. Upon detection of an invalid token all browser windows associated with said personalized session will be closed. | 2010-01-21 |
20100017892 | IP STREAMING COPY CONTROL METHOD AND SYSTEM - Copy control desired by a streaming content provider is enabled using a relatively simple configuration. In an IP streaming copy control method, even when a client terminal receives streaming content which is not assigned with copy control information via a network from a streaming server, if the streaming content is streaming content satisfying a condition beforehand set to the client terminal, the client terminal outputs a reproduced signal of the streaming by assigning copy control information to the reproduced signal and then delivers the reproduced signal to a TV/video recorder. | 2010-01-21 |
20100017893 | System for Securing Register Space and Method of Securing the Same - A system includes a processing device, at least one data processing module, and a security control module. The security control module is operatively connected to both the processing device and the data processing module. The security control module is operative to control access to a protected register that is associated with the at least one data processing module. As such, the security control module operates as a firewall or filter to allow or deny access to a protected register. Security-unaware data processing module are therefore secured in the system at a central location while eliminating the need to use only security-aware data processing module. A method for securing data processing modules, including security-unaware data processing module, is also disclosed. | 2010-01-21 |
20100017894 | Mutants of Human App and Their Use for the Production of Transgenice Animals - A modified amyloid precursor protein can be expressed from a DNA construct comprising an APP DNA sequence, or a fragment or artificial substrate thereof, encoding the mutation I45W, I45Y V46W or V46Y (numbering relative to A4CT); the use of the DNA construct in the generation of cell lines or transgenic animals and the use of these proteins or such transgenic animals in the diagnosis of Alzheimer's Disease and screening putative drugs against Alzheimer's Disease are also described. | 2010-01-21 |
20100017895 | Small animal model for hcv replication - An animal model for HCV replication and/or production of virus or virus like particles is provided. The invention utilizes an HCV replicon present in a cell to deliver HCV nucleic acid and replicate and express HCV proteins in an animal model comprising an animal that has been immunocompromised. The invention further provides a method of treatment or prevention of HCV in a mammal which comprises administering to the mammal a combination which comprises an immunomodulatory compound and another antiviral agent. Also provided are cell lines showing a decreased sensitivity to interferon alpha or some other immunomodulator and methods of making or isolating such cell lines. | 2010-01-21 |