04th week of 2010 patent applcation highlights part 61 |
Patent application number | Title | Published |
20100023933 | MAINTENANCE ASSESSMENT MANAGEMENT - A computer-implemented method, system, and computer program product for assessing environment specific maintenance actions are provided. The method includes identifying a maintenance update for a specific environment including one or more computer systems, where the maintenance update addresses one or more known problems. The method also includes applying factors to determine an assessment index for the one or more known problems as a function of the specific environment. The assessment index indicates a level of installation criticality relative to the specific environment. The method further includes outputting an installation recommendation for the identified maintenance update in response to determining the assessment index. | 2010-01-28 |
20100023934 | Computer Application Packages with Customizations - Applications operated within a virtual environment may be organized into a package containing various software components. Each software component or resource may have a specific name and other metadata, including a designator for overwriting or modifying the component. A policy may define how any changes to specific software components may be stored and retrieved based on the designator. One or more sets of changed components may be generated, persisted, and re-applied to create a customized version of the application based on the original package. The application may be operated within a virtual application environment or within a dedicated virtual machine environment. | 2010-01-28 |
20100023935 | APPARATUS, SYSTEM AND METHOD FOR SOFTWARE UPGRADE - An apparatus, system and method for software upgrade are provided. The software upgrading system includes a broadcast transmitting device which transmits a digital broadcasting signal; a broadcast receiving device which receives the digital broadcasting signal, extracts upgrade information that relates to acquiring an upgrade image for upgrading software from the digital broadcasting signal which is received, and requests the upgrade image based on the upgrade information which is extracted; and an upgrade image storage device which transmits the upgrade image according to the upgrade image request. The broadcast receiving device upgrades the software by receiving the upgrade image from the upgrade image storage device. | 2010-01-28 |
20100023936 | PROGRAM MODIFICATION METHOD, PROGRAM RESTORATION METHOD AND DATA PROCESSING DEVICE - One system to which the present invention is applied collects real data to be used to modify a program modification data having the identification data of the real data for each program to be modified, of a group of programs to be managed and regularly modified, makes a person in charge select desired modification data from the collected modification data, using the identification data of the collected modification data and makes the person in charge modify a program corresponding to the modification data, using the selected modification data. | 2010-01-28 |
20100023937 | SYSTEM AND METHOD OF ENABLING MULTI-TENANCY FOR SOFTWARE AS A SERVICE APPLICATION - A method and system for enabling multi-tenancy for software as a service application is provided. The method includes defining a plurality of policy configuration files for each tenant of the SaaS application. The method further includes identifying a tenant and tenant-context for the SaaS application. Thereafter, the method includes identifying one or more policy configuration files and then applying one or more variations to one or more variation points to provide the SaaS application to the user. | 2010-01-28 |
20100023938 | HOME APPLIANCE AND HOME APPLIANCE SYSTEM - A home appliance and a home appliance system are provided. The home appliance receives input of a sound including update information, and updates a product operating program. The home appliance system receives a sound including product information from the home appliance, judges whether to update the product operating program of the home appliance, and transmits update information. | 2010-01-28 |
20100023939 | Virtual-machine generating apparatus, virtual-machine generating method, and virtual-machine generation program - A virtual-machine generating apparatus includes a configuration-information storage unit that stores hardware resources and hardware configuration information in association with unique information of virtual machines. When accepting resources as many as the number of virtual machines to be newly introduced, the apparatus determines whether the resources identical to the accepted resources are stored in the configuration-information storage unit. When it is determined that the identical hardware resources are stored, the apparatus performs a process of copying an OS of the virtual machines having the identical resources, as many times as the number of those having the resources determined as being stored in the configuration-information storage unit. | 2010-01-28 |
20100023940 | VIRTUAL MACHINE SYSTEM - A virtual machine system includes a virtual battery manager, a discharge calculator, and a discharger. The virtual battery manager manages a virtual battery for running a virtual machine. The virtual battery holds electric energy used by the virtual machine. The virtual battery is capable of discharging and being charged. The discharge calculator calculates a discharged amount of the virtual battery by calculating energy consumption of the virtual machine with reference to a consumption policy and a consumption allocation table when a resource quota for the virtual machine satisfies a predefined condition for discharging. The consumption policy defines a maximum amount of total energy consumption of the plurality of virtual machines. The consumption allocation table contains an allocated ratio of energy consumption for each of the plurality of virtual machines. The discharger decreases a battery level of the virtual battery. | 2010-01-28 |
20100023941 | VIRTUAL MACHINE MONITOR - A mapping data generator determines a virtual page number of a virtual page where an executable code in an object file is mapped. A virtual page manager manages a virtual page record containing the virtual page number, a first object ID corresponding to the virtual page number, and a detection flag indicative of existence of another virtual page record containing a second object ID identical with the first object ID. A machine page manager manages a machine page record containing the first object ID, and a machine page number to which the virtual page number is mapped. A sharable page detector determines whether a detection flag indicates existence of another virtual page record containing the first object ID and determines whether a machine page number has been set. A page mapper maps a set machine page number to the virtual page number of the access page. | 2010-01-28 |
20100023942 | ACCELERATING VIRTUAL MACHINE RESUME TIME USING A PRE-CACHED WORKING SET - A client transitions between a suspended virtual machine (VM) state and an active VM state by employing a working set comprising a VM state file and a working set index file. The VM state file serializes each of the VM components that is saved to storage. The working set index file contains indirect information that records the offset, length, and region of various pieces of the VM state and contains a VM working set. The VM suspend state serialization is implemented as either a monolithic or an incremental process. | 2010-01-28 |
20100023943 | INTERFACE FOR PROCESSING CLIENT-SERVER METHOD CALLS WITHIN A SINGLE VIRTUAL MACHINE - The present invention concerns a method and system for enabling a server application to be executed in the same Java Virtual Machine (VM) as a client application using direct Java method calls without the need for remote communications protocol processing of the method calls. This is achieved by providing an application program interface (API) that exposes objects comprising the server application program to the client application program, whereby a client application method call is reduced by the interface to a Plain Old Java Objects (POJO) method call. | 2010-01-28 |
20100023944 | Suspend Profiles and Hinted Suspending - Methods, systems and computer program products for suspend profiles and hinted suspending. Exemplary embodiments include a suspend mode management method, including determining a task to perform in the computer system during a suspend period of the computer system, detecting a suspend event in the computer system, the suspend event initiating the suspend period and performing the task during the suspend period. | 2010-01-28 |
20100023945 | EARLY ISSUE OF TRANSACTION ID - Early issue of transaction ID is disclosed. An apparatus comprising decoder to generate a first node ID indicative of the destination of a cache transaction from a caching agent, a transaction ID allocation logic coupled to and operating in parallel to the decoder to select a transaction ID (TID) for the transaction based on the first node ID, a packet creation unit to create a packet that includes the transaction, the first node ID, the TID and a second node ID corresponding to the requestor. | 2010-01-28 |
20100023946 | USER-LEVEL READ-COPY UPDATE THAT DOES NOT REQUIRE DISABLING PREEMPTION OR SIGNAL HANDLING - A user-level read-copy update (RCU) technique. A user-level RCU subsystem executes within threads of a user-level multithreaded application. The multithreaded application may include reader threads that read RCU-protected data elements in a shared memory and updater threads that update such data elements. The reader and updater threads may be preemptible and comprise signal handlers that process signals. Reader registration and unregistration components in the RCU subsystem respectively register and unregister the reader threads for RCU critical section processing. These operations are performed while the reader threads remain preemptible and with their signal handlers being operational. A grace period detection component in the RCU subsystem considers a registration status of the reader threads and determines when it is safe to perform RCU second-phase update processing to remove stale versions of updated data elements that are being referenced by the reader threads, or take other RCU second-phase update processing actions. | 2010-01-28 |
20100023947 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR RESOURCE COLLABORATION OPTIMIZATION - A method including receiving a plurality of roles in a data processing system and adding a part-time resource to at least one role. The method also includes determining, in the data processing system, if a project duration has changed as a result of adding the part-time resource, and if the project duration has changed, repeating the process at the adding step. The method also includes storing results corresponding to the resources assigned to roles. There is also a similar data processing system and machine-usable medium. | 2010-01-28 |
20100023948 | ALLOCATING RESOURCES IN A MULTICORE ENVIRONMENT - In a multicore programming environment comprising a plurality of processors in a plurality of categories, and having predetermined communication resources of different types for interconnecting the processors, resources are allocated by: receiving a plurality of software processes, each process having a connection requirement; receiving an allocation scheme, in which each of the software processes is allocated to a respective processor of the plurality of processors; determining a plurality of communication requirements based on the connection requirements and the processors to which each process is allocated; and for each of the communication requirements: determining the respective processors to which the associated processes have been assigned; and allocating a communications resource of a type that is suitable based on the categories of said respective processors, such that the total allocated communications resource does not exceed the predetermined communication resources. | 2010-01-28 |
20100023949 | SYSTEM AND METHOD FOR PROVIDING ADVANCED RESERVATIONS IN A COMPUTE ENVIRONMENT - A system and method are disclosed for dynamically reserving resources within a cluster environment. The method embodiment of the invention comprises receiving a request for resources in the cluster environment, monitoring events after receiving the request for resources and based on the monitored events, dynamically modifying at least one of the request for resources and the cluster environment. | 2010-01-28 |
20100023950 | WORKFLOW PROCESSING APPARATUS - A workflow processing apparatus receives interface information of a function provided by a device on a network from the device on the network and sends, during the processing of a workflow, input information based on the interface information of the function provided by the device on the network and a program for controlling the function provided by the device on the network to the device on the network. | 2010-01-28 |
20100023951 | Method and apparatus for data transfer between isolated execution contexts - An approach for making an object owned by a first application that executes in a first isolated execution context accessible to a second application that executes in a second isolated execution context is described herein. According to this approach the object is associated with the first isolated execution context. A request is received to render the object accessible to the second application. Ownership of the object is transferred to the second application by changing the isolated execution context that is associated with the object to the second isolated execution context, thereby rendering the object accessible to the second application. | 2010-01-28 |
20100023952 | PLATFORM FOR DATA AGGREGATION, COMMUNICATION, RULE EVALUATION, AND COMBINATIONS THEREOF, USING TEMPLATED AUTO-GENERATION - Embodiments of the present invention provide platforms for data aggregation, communication, rule evaluation, and combinations thereof. The platform may include three distinct functional layers; a core layer, an adaptive layer and an intelligence layer. Furthermore, the platform may include a data block, messaging block, rule block, or combinations thereof. Generally, the platform may facilitate data acquisition, storage, and manipulation between and among clients and data sources in a generic manner. That is, clients may communicate and make requests independent of a target system or database type. The platform may process the communications and requests in a manner suitable to the target system or database type. The platform may also evaluate rules received from the clients in a manner generic to the client application. Instances of the platform for a given application may be efficiently created using a template-based mechanism. In this manner, the platform may be used to support a variety of end user applications in a flexible, scalable manner. | 2010-01-28 |
20100023953 | METHOD AND APPARATUS FOR EXECUTING APPLICATION - Provided are a method and apparatus for executing a web application, the method including receiving a predetermined application program interface (API) set from an external device in which APIs are stored, parsing and storing the received API set, and executing the web application by using at least one of APIs included in the parsed API set. | 2010-01-28 |
20100023954 | Generic User Interface Command Architecture - Certain aspects of a generic user interface command architecture allow an application to host commands for presentation on a computing device. The commands can be written by the same designer or author as the application, or alternatively by other parties (e.g., by a third-party developer). Other aspects of the generic UI command architecture describe an application programming interface (API) that can be used to allow the application to host the commands. Other aspects of the generic UI command architecture describe an activation mechanism by which registered commands can be activated by an application. | 2010-01-28 |
20100023955 | METHOD AND SYSTEM AND APPARATUS FOR DYNAMIC SOFTWARE ENVIRONMENT - A method and system are provided for runtime dynamic binding. The system includes a processor for executing computer-readable instructions. The system includes a computer-readable medium for storing an object definition in communications with the processor. The system includes a user object instantiated from the object definition, the object definition including a programmer-defined lookup method and a programmer-defined binding method. The programmer-defined lookup method dynamically searches and retrieves a requested functionality. The programmer-defined binding method dynamically binds the requested functionality at runtime for execution without a system restart. | 2010-01-28 |
20100023956 | METHODS FOR IMPLEMENTATION OF AN EJECT SERVICE FOR A REMOVABLE DISK DRIVE - Embodiments provide systems and methods for ejecting a removable disk drive. To prevent data corruption from the eject operation, a shell extension can be stored in the server requesting the eject. The shell extension can monitor and intercept eject commands from the operating system of the server and send the commands to an eject service. The eject service, in embodiments, checks the status of the removable disk drive and ejects the removable disk drive only when the removable disk drive is not busy with another operation. | 2010-01-28 |
20100023957 | Optical Disc Apparatus - An optical disc apparatus for enabling reduction of fluid noises accompanying with disc rotation, effectively, comprises a tray | 2010-01-28 |
20100023958 | SYSTEM AND METHOD FOR OPERATING A VIRTUAL BROADCASTER NETWORK - A system and method for operating a virtual broadcast network may include using, by a virtual broadcaster, a network server remotely located from the virtual broadcaster and managed by a communications service provider to host a virtual broadcast network. A selection, via a control panel, of at least one broadcast content feed from a plurality of different content service providers may be performed. The selected broadcast content feeds may be broadcast to users who access the virtual broadcast network. | 2010-01-28 |
20100023959 | SYSTEM AND METHOD FOR A CONTENT SERVER TO BE USED BY A CONTENT PROVIDER TO DISTRIBUTE CONTENT TO SUBSCRIBERS OF A COMMUNICATIONS SERVICE PROVIDER - A system and method for a content provider to distribute content may include configuring a webserver to be in communication with the Internet and be accessible to subscribers of a communication service provider without accessing the Internet. The content provider may be enabled to store content in at least one data storage bin at the webserver, where the webserver may further be configured to provide digital rights management for the content provider and guaranteed QoS to the subscribers when downloading the content. The content may be communicated from the webserver with guaranteed QoS to the subscribers. | 2010-01-28 |
20100023960 | Detection of Video Program Viewing Behavior for Correlation with Advertisement Presentation - A video user's viewing behavior with respect to video program selection is monitored. The monitored behavior is analyzed and a suitable advertising format for display that is related to the monitored viewing behavior is identified. Monitoring, for example, can include detecting channel surfing of available viewing channels, accessing and surfing through programming schedules, fast forwarding or reversing through a recorded program, and pausing display of a program. | 2010-01-28 |
20100023961 | APPARATUS AND METHOD FOR DETECTING TARGET IMAGE - The present invention relates to a target image detecting apparatus and a method thereof. According to the present invention, the target video detecting apparatus calculates a video index for each frame of an input broadcasting signal, and compares a video index of an advertisement signal to be detected with the calculated video index of each frame of the broadcasting signal. In addition, the target video detecting apparatus detects a predetermined sequence of frames having video indexes that match a sequence of video indexes of the advertisement signal from the broadcasting signal. In addition, the target video detecting apparatus compares video indexes from a start frame of the detected plurality of frames and the corresponding frame of the advertisement signal in order to detect an advertisement signal from the broadcasting signal. | 2010-01-28 |
20100023962 | Method for Single Sign-On When Using a Set-Top Box - When the set-top box (STB) has been switched on, registration and authentication with the provider (IDP) are carried out ( | 2010-01-28 |
20100023963 | DIGITAL PROGRAM MANAGEMENT - An apparatus and methods are disclosed for managing an incoming transport stream. The system can include controls configured for modifying program content as well as for remapping the packet identifiers. These controls thus can be employed for adapting incoming stream information to facilitate the specified actions on the incoming content that is to be managed. | 2010-01-28 |
20100023964 | SYSTEM AND METHOD FOR TEMPORALLY ADAPTIVE MEDIA PLAYBACK - Disclosed herein are systems, methods, and computer readable-media for temporally adaptive media playback. The method for adaptive media playback includes estimating or determining an amount of time between a first event and a second event, selecting media content to fill the estimated amount of time between the first event and the second event, and playing the selected media content possibly at a reasonably different speed to fit the time interval. One embodiment includes events that are destination-based or temporal-based. Another embodiment includes adding, removing, speeding up, or slowing down selected media content in order to fit the estimated amount of time between the first event and the second event or to modify the selected media content to adjust to an updated estimated amount of time. Another embodiment bases selected media content on a user or group profile. | 2010-01-28 |
20100023965 | System and Method of Delivering Advertisement Data to a Mobile Device - A method of delivering advertisement data to a mobile device includes receiving video content associated with an advertisement at a set-top box device via an access network of a video distribution system. The method also includes receiving an advertisement selection command at the set-top box device. The advertisement selection command indicates that data related to the advertisement is to be sent to a particular mobile device associated with the set-top box device. Further, the method includes sending an indication of the advertisement selection command to an advertisement data management system via the access network, in response to the advertisement selection command. | 2010-01-28 |
20100023966 | SYSTEM AND METHOD FOR CONTEXTUAL ADAPTIVE ADVERTISING - Disclosed herein are systems, methods, and computer readable-media for contextual adaptive advertising. The method for contextual adaptive advertising comprises analyzing a video program, selecting at least one advertisement related to the video program and based on a viewer profile, and displaying the at least one advertisement simultaneously with the video program. One aspect of the method includes advertisements that are one or more of audio, text, images, or video and are displayed in a different modality, in a different location, or on a different device. Contextual adaptive advertisements may be displayed in a partially transparent manner over the video program. Contextual adaptive advertisements may be streamed, stored in advance, or a combination of both. The space and time for advertisements may also be auctioned to interested parties based on a number of parameters. | 2010-01-28 |
20100023967 | ADVERTISEMENT BROADCASTING SYSTEM WITH LOCATION-IDENTIFYING ABILITY - An advertisement broadcasting system with location-identifying ability includes a central processing unit coupled with a GPS positioning module, a storage unit, and a broadcasting unit. The GPS positioning module receives a positioning signal transmitted from a satellite. According to the received positioning signal, the central processing unit identifies the current position of the advertisement broadcasting system and reads the storage unit to retrieve advertisement information corresponding to that location. The central processing unit then transmits the retrieved advertisement information to the broadcasting unit for broadcasting. | 2010-01-28 |
20100023968 | Community-Based Enhanced Television - The invention pertains to a method and apparatus for generating an enhanced television event at a set top box in a television network comprising, playing a television program via the set top box, selecting a point in the television program using the set top box, generating content comprising the enhanced television event, storing the content in a memory storage device in the set top box, and creating an enhanced television event dataset by associating the content with the television program and the point in the television program. | 2010-01-28 |
20100023969 | DIGITAL PHOTO FRAME CAPABLE OF AUTOMATICALLY ENTERING AND SWITCHING OPERATIONAL MODES AND METHOD THEREOF - A method used in a digital photo frame (DPF) for automatically entering and switching operational mode is provided. In an exemplary embodiment, the method includes: obtaining TV program information from a TV program table under a DPF mode; determining whether a TV program is on or about to start at the current time; automatically entering a TV mode or switching from the DPF mode to the TV mode when a TV program is on or about to start; and automatically receiving and playing the TV program. | 2010-01-28 |
20100023970 | Transmitting apparatus, receiving apparatus, transmission/reception method, transmission/reception system, and recording medium thereof - The present invention provides a transmitting apparatus including an acquisition unit that acquires electronic program guide information contained in broadcast waves; a recording unit that records the electronic program guide information acquired by the acquisition unit in a storage medium; a determination unit that determines whether the electronic program guide information has changed, by comparing the electronic program guide information recorded in the storage medium and the electronic program guide information newly acquired by the acquisition unit; and a transmitting unit that transmits, when the determination unit determines that the electronic program guide information has changed, the newly acquired electronic program guide information to one or more than one receiving apparatuses connected via a network. | 2010-01-28 |
20100023971 | SYSTEM AND METHOD FOR SCROLLING THROUGH TV VIDEO ICONS BY CATEGORY - In a TV displaying thumbnails of videos grouped by genre, genre labels are shown so that a user can conveniently move genre to genre with a single click on a remote control device. | 2010-01-28 |
20100023972 | WIDEBAND DIRECT-TO-HOME BROADCASTING SATELLITE COMMUNICATIONS SYSTEM AND METHOD - The present invention relates to one- or two-way Direct-To-Home (DTH) satellite communications systems which broadcast high bit rate wideband television and multimedia content to user terminals located within a desired coverage area and, more specifically, a single or multi-transponder Direct-To-Home satellite communications system in which a high bit rate wideband data stream is comprised of real-time, statistically multiplexed information and non-real-time information that is transmitted to a subscriber media gateway device for storage and later use. The user terminal contains a specially designed receiving system and may contain a transmitter for transmission of a return data channel to the Broadcast Center. | 2010-01-28 |
20100023973 | DIGITAL DEVICE SYSTEM - When one program is selected from an EPG display screen in S | 2010-01-28 |
20100023974 | METHOD AND DEVICE FOR RECEIVING CONTENT IN A CONTENT DELIVERY SYSTEM - A content reception device that receives a content having at least one reproduction start time predetermined, includes: a non-real time receiver for receiving a content in non-real time; a program information reference section for referring to program information which includes a reproduction start time of at least one content and a delivery method of said at least one content; a scheduler for scheduling reception of a content whose delivery method is non-real time delivery by the non-real time receiver based on a current time and a reproduction start time of the content; and a content storage section for storing at least one content received by the non-real time receiver. | 2010-01-28 |
20100023975 | SYSTEM, METHOD, AND APPARATUS FOR PROVIDING DIGITAL VIDEO RECORDER SERVICES ON A PORTABLE WIRELESS DEVICE - Methods and apparatus for providing digital video recorder services with a portable wireless device (PWD). The PWD includes at least a transceiver, a processing unit and a memory unit. The transceiver receives a video content signal transmitted from a broadcaster of mobile broadcast digital TV, and an electronic program guide (EPG). The processing unit is in communication with the transceiver and the memory unit and the processing unit: stores the TV programming information on the memory unit; displays, responsive to a first user input, the TV programming information; records on the memory unit, responsive to a second user input, a selected video content signal received by the transceiver; and plays back the selected video content signal, responsive to a third user input, from the memory unit. | 2010-01-28 |
20100023976 | Method and Configuration for Storing and Playing Back TV Transmissions - A method and a configuration for storing and playing back TV transmissions, in particular an improved method and configuration for operating a network PVR, include a PVR server for receiving digitally encoded TV channels. Terminals select TV transmissions to be stored and transmit the selection to the PVR server. The PVR server records the TV transmissions to be stored, wherein a small part of data items to be stored during recording is transmitted to the memory of the selecting terminal and a main part of the data items to be stored is recorded in a mass storage device coupled to the PVR server. The parts of the recording stored in the memory of the selecting terminal and in the mass storage device are combined in such a way that they can be played back through the use of the selecting terminal, either by the selecting terminal or by the PVR server. | 2010-01-28 |
20100023977 | EXTERNAL SERVICES ALLOCATION IN CLOSED ON-DEMAND SYSTEMS - Integrating external on-demand services is performed through embedding a pseudo on-demand video-title for each new on-demand external service, which is activated by an original session manager (SM) once a particular set-top converter box (STB), which belongs to a particular group_id, initiates a request for the external service. An STB application intercepts SM tuning information on the selected transport_id and service_id of the pseudo service and recovers the address of the selected edge device and QAM in the original system, associated with the intercepted transport_id, through the inverse mapping the couple (group_id, transport_id) to the edge and QAM IP and UDP port addresses which map is set by external management system. The STB application initiates the external on-demand service with same edge and QAM but with a different unique external_service_id , through streaming of the external service to the recovered edge IP address and to a new UDP port number where the new UDP port number encodes the original QAM address with the new unique external_service_id number of the external service, and tunes to the new external_service_id. | 2010-01-28 |
20100023978 | Method and Apparatus for Determining Broadcast Reception Requirements Based on Location - A disclosed method comprises obtaining location data including geographic coordinates; searching stored digital video broadcast network requirements data corresponding to the location data; and tuning to a digital video broadcast network channel indicated by the digital video broadcast network requirements data. The step of obtaining location data may further comprise obtaining Global Positioning System (GPS) data; and searching using the GPS data. An integrated circuit includes tuner logic, operative to tune to, and receive, a digital video broadcast network channel in response to a command; location data logic to receive location data; digital video broadcast network reception requirements logic to obtain location data from the location data logic and search stored digital video broadcast network requirements data corresponding to the location data, and send the command to the tuner logic to tune to a digital video broadcast network channel indicated by the digital video broadcast network requirements data. | 2010-01-28 |
20100023979 | SYSTEM AND METHOD FOR SHARING DIGITAL IMAGES OVER A CONTENT-BASED NETWORK - A head end application server is coupled to a photo-sharing server having an Internet interface. A video content network is coupled to the head end application server, and a terminal is coupled to the video content network at a location remote from the head end application server and the photo-sharing server. The photo-sharing server is configured to accept upload of digital still images via the Internet interface, and the digital still images are in a format other than MPEG I-frames. The head end application server is configured to receive a request from the terminal and, responsive to the request, to fetch the digital still images from the photo-sharing server, transcode the digital still images into MPEG I-frames, and make the MPEG I-frames available, over the video content network, for selective display via the terminal. The system can advantageously function without use of a video-on-demand server. | 2010-01-28 |
20100023980 | Information Processing Apparatus, Terminal Apparatus, and Program - An information processing apparatus includes a content purchase history storage unit in which a content purchase history for each user is stored, a metadata storage unit in which metadata of a plurality of contents is stored, and a metadata retrieval unit to retrieve, upon reception of a metadata retrieval request that is sent from a terminal apparatus of the user via a network and includes information for identifying a user and a retrieval condition, metadata of a content that meets the retrieval condition from the metadata storage unit, judge whether the content retrieved has already been purchased based on the content purchase history of the user that is stored in the content purchase history storage unit, and send a retrieval result of the metadata of the content that includes a judgment result to the terminal apparatus via the network as a metadata retrieval response. | 2010-01-28 |
20100023981 | METHOD FOR SENDING IMAGE DATA FROM CAMERA TO CCTV NETWORK - An integrated Internet camera includes, as embedded components contained within the camera body and controlled by a microcontroller, at least a network interface device for connecting to the Internet, a transport control device for packetizing according to Internet protocols, a file transfer device for communicating with a destination user directory on the Internet, and a transmission initiating device for initiating the connection and transfer operations of the file transfer device and transport control device. The network interface device may be a modem, network adapter, or adapter for connection to the Internet. Upon capturing the digital image, the camera initiates a connection to the Internet, connects to the destination user directory, and uploads the digital images. Thereafter, the digital images are available to authorized (or any) user having access to the Internet. | 2010-01-28 |
20100023982 | CAMERA CONNECTIBLE TO CCTV NETWORK - A camera, connectible to a CCTV network, includes a camera lens and image sensor. as well as an analog video input connector that receives analog image signals corresponding to views from outside the camera. An image processing circuit outputs image signal data of the image sensor, and a video conversion circuit outputs image signal data of the analog image signals. The image signal data is stored on a storage device. A microcontroller controls the circuits, and a network adapter connects to an internet-protocol address corresponding to a network device capable of serving files. The microcontroller selectively transmits image signal data of the image sensor or transmits image signal data of the analog video input connector from the storage device to the network device using the network adapter and the internet-protocol address. | 2010-01-28 |
20100023983 | METHOD AND APPARATUS FOR PERFORMING IPTV COMMUNICATION SERVICE - Provided are a method and apparatus for performing an internet protocol television (IPTV) communication service. The method includes: acquiring an application message providing the IPTV communication service from an external input with respect to a general-purpose web application by using plug-in application programming interfaces (APIs) of a web browser which are independent of an IPTV communication service provider; sending the application message to an IP multimedia subsystem (IMS) gateway (IG) functional entity apparatus; and receiving a response message comprising a result of processing the application message as a response to the sending of the application message, from the IG functional entity apparatus. | 2010-01-28 |
20100023984 | Identifying Events in Addressable Video Stream for Generation of Summary Video Stream - In one embodiment, a method comprises identifying, by a device, an addressable media stream selected for presentation by a user; identifying, by the device, a user input that is input by the user during presentation of the addressable media stream to the user, the user input identified relative to an identified position within the addressable media stream; defining by the device a media clip from the addressable media stream based on determining the user input demonstrates a favorable affinity by the user toward the identified position, the defining including the device selecting a media clip start position within the addressable media stream and that precedes the identified position, and the device selecting a media clip end position that follows the identified position; and creating by the device a summary media clip of the addressable media stream that includes at least the media clip. | 2010-01-28 |
20100023985 | Host device, a point of deployment (POD), and a method of identifying an operation mode - A host device, a point of deployment (POD), and a method for recognizing an operation mode are disclosed. The host device interfaces with a point of deployment (POD), and includes an interface unit and a controller. The interface unit includes CD | 2010-01-28 |
20100023986 | SYSTEM AND METHOD FOR PROVIDING A DATA MALL - A system and method for providing content providers with network distribution nodes for distributing content to subscribers of a communications service provider may include maintaining multiple network nodes by the communications service provider, where the network nodes may be in communication with the Internet and be configured to enable subscribers of the communications service provider to access and download content without the content having to be communicated over the Internet. Multiple respective content service providers may be enabled to store content at the network nodes for subscribers local to each respective network node to download the content. Multiple customer databases configured to store information associated with subscribers of the communications service provider may be operated. Limited access to the information stored in the customer databases may be provided to prevent the respective content providers from accessing personal information of the subscribers. | 2010-01-28 |
20100023987 | IPTV DELIVERY SYSTEM AND METHOD - A system and method for broadcasting content as IPTV may include receiving broadcast feed content. The broadcast feed content may be converted into a first data format for broadcasting to set-top boxes. The broadcast feed content may be converted into a second data format for broadcasting to mobile devices. The converted broadcast feed content may be broadcast to set-top boxes and mobile devices in the first and second data formats, respectively. | 2010-01-28 |
20100023988 | System And Method For Suppressing Silence In Voice Traffic Over A Wireless Communication Medium - A method and system for increasing the efficiency of providing bandwidth for voice traffic to a data provider via communication mediums is provided. This is generally accomplished by not transmitting any data during the silence periods and playing out background noise (i.e., comfort noise) at the other end, to obtain significant bandwidth savings. | 2010-01-28 |
20100023989 | RELAY DEVICE, RELAY METHOD, AND PROGRAM - When a relay device receives a content transmitted from a first communication device toward a second communication device, the relay device performs relay processing of transmitting the content toward the second communication device. When, during the relay processing, the relay device receives a transmission request for the content, which has been transmitted from a third communication device toward the first communication device, the relay device performs transmission processing of transmitting a first section of the content, which has not been transmitted in the relay processing at a time of reception of the transmission request, from the relay device toward the third communication device in synchronization with transmission of the first section performed in the relay processing. | 2010-01-28 |
20100023990 | APPARATUS AND METHOD FOR SENSING A SIGNAL USING CYCLOSTATIONARITY - A Wireless Regional Area Network (WRAN) receiver comprises a transceiver for communicating with a wireless network over one of a number of channels, and an Advanced Television Systems Committee (ATSC) signal detector for use in forming a supported channel list comprising those ones of the number of channels upon which an ATSC signal was not detected. The ATSC signal detector computes at least one cyclostationary feature of a received signal for determining if the received signal is an incumbent ATSC broadcast signal. | 2010-01-28 |
20100023991 | APPARATUS AND METHOD FOR SHARING TELEVISION SIGNALS VIA INSTANT MESSAGING SERVICES - Provided is an apparatus for sharing television signals via an instant messaging service, which comprises an instant messaging module, a television receiver and a television sharing interface, wherein the instant messaging module is used to exchange information with outside networks via the instant messaging service. The television receiver is used to receive the television signals having video signals and audio signals, and the television sharing interface is used to connect the television receiver with the instant messaging module, wherein the television sharing interface further comprises a control module, a video capture module and an audio output module. The control module is for controlling the television receiver, the video capture module is for capturing the video signal for the instant messaging module to output under control of the control module, and the audio output module is for outputting the audio signal according to the control module. | 2010-01-28 |
20100023992 | Method and Apparatus for Managing Presentation of Media Content - A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to monitor for a triggering event that is associated with viewing of media content, retrieve a screen saver from a remote server when the triggering event is detected, and apply the screen saver to a display device connected with the set top box. Other embodiments are disclosed. | 2010-01-28 |
20100023993 | UNIVERSAL SET-TOP BOX - A set-top box may include a storage unit, input/output (I/O) unit configured to communicate with a network node of a service provider over a communications network, memory unit, and a processing unit in communication with the storage unit, I/O unit, and memory unit. A user control panel module may be executed by the processing unit and configured to cause the processing unit to present a graphical user interface to a user to control access to one or more content stores of a content mall operating on the network node. A service provider control panel module may be executed by the processing unit and be configured to cause the processing unit to enable the communications service provider to control operation of the processing unit. A codec module may be executed by the processing unit and configured to enable the processing unit to display content downloaded from a content store of the content mall. | 2010-01-28 |
20100023994 | Network Interface Devices - Network interface devices and methods are provided. A particular network interface device includes a first network interface adapted to terminate one or more communication lines and a second network interface to terminate at least one coaxial line. The network interface device also includes at least one interface connector adapted to receive a removable plug-in module. The removable plug-in module includes a video unit that is operable to receive video data from a network device via at least one of the one or more communication lines and to process the video data for communication via the at least one coaxial line or a twisted wire pair when the plug-in module is connected to the at least one interface connector. The removable plug-in module also includes a power coupling device to receive power via at least one of the one or more communication lines. | 2010-01-28 |
20100023995 | Methods and Aparatus for Securing Access to Computer Libraries and Modules, The SecModule Framework - We have shown an efficient, easy-to-use framework which allows retrofitting of existing libraries, as well as develop new ones into a secured, session-managed environment. Our framework can be used for policy level enforcement (i.e. create enforceable, undeniable rules) for accessing, using, arbitrary code, functions and data held inside the library. | 2010-01-28 |
20100023996 | TECHNIQUES FOR IDENTITY AUTHENTICATION OF VIRTUALIZED MACHINES - Techniques for identity authentication of Virtual Machines (VM's) are provided. A VM is authenticated and once authenticated, each device interfaced to or accessible to the VM is also authenticated. When both the VM and each device are authenticated, the VM is granted access to a machine for installation thereon. | 2010-01-28 |
20100023997 | METHOD OF USING XPATH AND ONTOLOGY ENGINE IN AUTHORIZATION CONTROL OF ASSETS AND RESOURCES - A method of defining access control. The method allows the expression of access control rules using ontology based semantics and references an ontology subset using XPath as the ontological expression. The access control rules or access criteria are defined by an access control statement and may be expressed using classification criteria and ontology classes. The access control statement comprises a structural description that is used to define an asset and a logical expression that may be used to express the classification criteria. The access control statement defines access policy for various assets. | 2010-01-28 |
20100023998 | METHOD, ENTITY AND SYSTEM FOR REALIZING NETWORK ADDRESS TRANSLATION - A method of realizing network address translation (NAT) includes the following steps. An application function (AF) entity receives a message, and determines a signaling direction according to the message. The AF entity carries the signaling direction information in an access authorization request (AAR) message and sends the AAR message to a service-based policy decision function (SPDF) entity. The SPDF entity obtains a corresponding local domain address according to the signaling direction, and sends the obtained address to the AF entity. The AF entity sends the message according to the local domain address. An entity and a system of realizing NAT are also provided. By extending a message interacted between the AF entity and the SPDF entity and adding a field indicating a signaling direction, the SPDF entity is enabled to distinguish an uplink direction or a downlink direction of the message, for example, from an access side/a local core side to a core side/an opposite core side or from the core side/opposite core side to the access side/local core side, so as to realize an NAT control. | 2010-01-28 |
20100023999 | SYSTEM AND METHOD FOR NETWORK ADMINISTRATION AND LOCAL ADMINISTRATION OF PRIVACY PROTECTION CRITERIA - Cookie files are screened in a client machine, wherein a cookie file includes a cookie file source. A request from a subscriber is received at a server to send a list of untrusted cookie file sources to the client machine. The list of untrusted cookie file sources is downloaded from the server to the client machine. The downloaded list of untrusted cookie file sources is used to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list. | 2010-01-28 |
20100024000 | Method for improving accuracy of a time estimate used in digital rights management (DRM) license validation - A method for improving accuracy of a time estimate used in digital rights management (DRM) license validation is disclosed. In one embodiment, a memory device receives a request to validate a DRM license stored on the memory device, wherein the DRM license is associated with a time stamp update policy (TUP) that specifies when a new time stamp is needed. Before attempting to validate the DRM license, the memory device determines if a new time stamp is needed based on the TUP associated with the DRM license. If a new time stamp is needed, the memory device receives the new time stamp and then attempts to validate the DRM license using a time estimate based on the new time stamp. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination. | 2010-01-28 |
20100024001 | Securing Blade Servers In A Data Center - Securing blade servers in a data center, the data center including a plurality of blade servers installed in a plurality of blade server chassis, the blade servers and chassis connected for data communications to a management module, each blade server chassis including a chassis key, where securing blade servers includes: prior to enabling user-level operation of the blade server, receiving, by a security module, from the management module, a chassis key for the blade server chassis in which the blade server is installed; determining, by the security module, whether the chassis key matches a security key stored on the blade server; if the chassis key matches the security key, enabling, by the security module, user-level operation of the blade server; and if the chassis key does not match the security key, disabling, by the security module, operation of the blade server. | 2010-01-28 |
20100024002 | Authentication system - An authentication system determines if a counterfeit ineligible unit is installed in a main device. When connected with a battery pack, a notebook PC generates and combines a random number and a function determination signal using a signal combining unit and transmits same to the battery pack. A first function calculation unit calculates the function of the random number. The battery pack has a signal separation unit to separate the combined signal into the random number and function determination signal, and a second function calculation unit to calculate the function of the random number for transmitting back to the notebook PC. A comparison unit compares the calculation results by the first and second function calculation units to determine whether the connected battery pack is an authorized one and denies connection if the pack is an unauthorized one. | 2010-01-28 |
20100024003 | Method for controlling connection of a peripheral to an access point, corresponding access point and peripheral - The invention concerns a method for controlling connection of a peripheral (T) to an access point (AP) in shared network. It consists in pre-initializing (A) the access point through a local command of that access point, the pre-initializing step enabling at least the access point to be configured to provisionally match the peripheral, simultaneously initializing (B) the access point (AP) and the peripheral (T) through a substantially concurrent local command of the access point respectively of the peripheral, locally measuring and storing the initializing duration (T | 2010-01-28 |
20100024004 | METHOD AND SYSTEM FOR SECURING ACCESS TO AN UNSECURE NETWORK UTILIZING A TRANSPARENT IDENTIFICATION MEMBER - A method, system and computer-usable medium for providing secure access to an application over an unsecure network. A transparent identification member can be physically placed by a user against a login interface, the transparent identification member possessing a filter for filtering and displaying a pattern unique to the login interface. Thereafter, the user can be automatically permitted to authenticate an unsecure network and securely access an application over the unsecure network, in response to placing the transparent identification member against the login interface and providing a user input at a physical location on the login interface corresponding to the pattern unique to the login interface, thereby providing a secure authentication for the user to perform secure transactions over the unsecure network and preventing phishing by others with respect to the user and the unsecure network. | 2010-01-28 |
20100024005 | METHOD AND APPARATUS FOR PROVIDING IDENTITY MANAGEMENT FOR USERS IN A WEB ENVIRONMENT - An identity management method, apparatus, and computer readable article of manufacture tangibly embodying computer readable instructions for executing the identity management method. The method includes: creating an association table to record a first session ID between the user and the first Web application, a second session ID between the user and the second Web application, and an association of the IDs; sending a session ID request containing the first session ID by the first Web application to a return module; receiving the session ID request and searching by the return module for the associated second session ID in the association table according to the first session ID; and returning the second session ID to the first Web application, thereby providing identity management for a user in a Web environment in which a first Web application accesses a second Web application on behalf of the user. | 2010-01-28 |
20100024006 | HTTP AUTHENTICATION AND AUTHORIZATION MANAGEMENT - Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a state manager that is used to identify and maintain the source associated with a client browser that submits requests to the state manager. The state manager can allow requests that are authorized and request authorization for requests that are not. The state manager can maintain the states associated with each domain to reduce the number of transaction needed to authenticate and/or authorize subsequent requests to the same domain or to different domains. | 2010-01-28 |
20100024007 | AFFIRMING NETWORK RELATIONSHIPS AND RESOURCE ACCESS VIA RELATED NETWORKS - A technique for providing a prediction as to whether a resource will be accessible to a user is described. The technique can involve comparing asserted membership in a wireless realm with membership records. Advantageously, a user can be made aware of the likelihood of access to a resource before attempting to reach the resource. | 2010-01-28 |
20100024008 | Managing Resource Allocations - Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e.g., retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques. | 2010-01-28 |
20100024009 | METHOD AND SYSTEM FOR DYNAMIC SECURITY USING AUTHENTICATION SERVER - Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from security databases and from Network Monitoring System, processing said data according to a dynamic security policy and using said processing outcome to determine the access level which will be granted to an access point in the network. | 2010-01-28 |
20100024010 | Mobile device with customizable login screen - An exemplary method controls the display of information on the screen of a mobile device during a request for login information. Independently controlled regions of the screens are used to concurrently convey different information associated with each region to a user of the mobile device during the rendering of a login request that is contained in one of the regions. | 2010-01-28 |
20100024011 | DOCUMENT MANAGEMENT SYSTEM AND DOCUMENT MANAGEMENT METHOD - When a valid password is input by a user having a right to access a folder, a decrypted document and image for view are produced from an encrypted document included in the folder and stored in the folder such that they are correlated with the encrypted document. If a request to view a document in this folder is issued by a user having a right to access the folder, a corresponding image for view is displayed on a terminal of the issuer of the request. When a request to acquire a document in the folder in order to save it is issued, a corresponding encrypted document is transmitted to a terminal of the issuer of the request. In a case where a request to acquire a document in the folder in order to print it is issued, a corresponding decrypted document is transmitted to an terminal of the issuer of the request. | 2010-01-28 |
20100024012 | SECURE CUSTOMER INTERFACE FOR WEB BASED DATA MANAGEMENT - An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the enterprises services from third parties. In the first layer, an implementation of the Secure Sockets Layer (SSL) version of HTTPS provides communications security, including authentication of the enterprise web server and the security of the transmitted data. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a “stateless” public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems. Security for the enterprise network and security for the data maintained by the various enterprise applications is also described. | 2010-01-28 |
20100024013 | Authenticating a Client Using Linked Authentication Credentials - Techniques are provided for improving security in a single-sign-on context by providing, to a user's client system, two linked authentication credentials in separate logical communication sessions and requiring that both credentials be presented to a host system. Only after presentation of both credentials is the user authenticated and permitted to access applications on the host system. | 2010-01-28 |
20100024014 | HTTP AUTHENTICATION AND AUTHORIZATION MANAGEMENT - Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a source processor that is used to identify the source associated with a request for authentication or authorization. The source processor can maintain the initial source associated with the request through the use of an association token. The associate token can be transmitted with each subsequent request that includes authentication or authorization data. The source processor can use the associate token to verify that the source associated with the initial request is the same as the source associated with subsequent authentication and authorization requests. | 2010-01-28 |
20100024015 | SYSTEM AND METHOD FOR SIMPLIFIED LOGIN USING AN IDENTITY MANAGER - A system and method for simplifying a login process makes use of a set of bookmarks that can be used to playback a series of actions and provide a stored username and password to a website or webservice. A user can access a bookmark manager component of the system and an identify manager component of the system either locally or remotely and have the two components act independently of each other but in communication to store the bookmarking and identity information. | 2010-01-28 |
20100024016 | Method and apparatus for protection domain based security - A first application instance is associated with a protection domain based on credentials (e.g.: a signed certificate) associated with a set of application code that, when executed, gives rise to the application instance. The first application instance executes in a first execution context. An indication is received that the first application instance seeks access to protected functionality associated with a second execution context. In response to receiving the indication, a determining is made as to whether the first application instance has permission to access the protected functionality. The determination is made by determining the protection domain with which the first application instance is associated, and determining if the protection domain with which the first application instance is associated is in the set of one or more protection domains. | 2010-01-28 |
20100024017 | Location-Based Authentication of Online Transactions Using Mobile Device - Systems, methods, and software for implementing location-based authentication of both online and mobile web-based transactions. This implementation may involve verifying whether a mobile device (such as a cellular telephone) is proximate to a computer from which the transaction is being performed. Depending upon the location of the mobile device, further transactions may be approved or rejected. In further implementations, the transactions may be made from the mobile device itself. In this case, the location of the mobile device compared with one or more pre-stored locations may affect whether further transactions from the mobile device are approved or rejected. | 2010-01-28 |
20100024018 | Keyboard Display Posing An Identification Challenge For An Automated Agent - Methods, systems, and computer readable medium storing computer executable programs for communicating symbol data using a keyboard display that poses an identification challenge for an automated agent are disclosed. A first plurality of symbols is provided. A dynamic version of each of the first plurality of symbols is defined. The dynamic version of each of the first plurality of symbols includes a noise component. A keyboard display arrangement for displaying the dynamic version of each of the first plurality of symbols in a keyboard display is defined. A display mechanism operable to display the keyboard display including the dynamic version of the first plurality of symbols in accordance with the keyboard display arrangement is provided. | 2010-01-28 |
20100024019 | Authentication - User authentication is based on a home network user database that authenticates users to external service providers. A user logs into home network and starts accessing the external service by clicking on a link labelled for the external service provider. The link is directed to script at a home server. The script causes the home server to obtain details related to the user from a home network user database. The home server passes information related to the user to a foreign server associated with the service provider. Based on the passed information, the foreign server grants or denies authentication of the user to the external service. If granting, the foreign server provides the home server with access data and the home server forwards the access data to the user so that the user can initialise an authorised external service session using the access data. | 2010-01-28 |
20100024020 | Wireless mobile device with privacy groups that independently control access to resident application programs - An exemplary method implemented by a wireless mobile device controls user access to programs and files defining items that are resident on the mobile device. A first icon associated with a corresponding first program installed on the wireless mobile device is displayed on the screen of the wireless mobile device, where the first icon can be seen by any person using the wireless mobile device and the corresponding first program is available for execution to said person. A privacy gate and a corresponding privacy icon displayed on the screen are created using a privacy interface program installed on the wireless mobile device. A password associated with the privacy gate is entered by a first user so that a subsequent request by a user to traverse the privacy gate will require entry of this password. The first program and the privacy gate are linked so that a user must traverse the privacy gate in order to execute the first program. | 2010-01-28 |
20100024021 | SYSTEM AND METHOD FOR SECURE OPERATION OF A MEDICAL RECORDS REPORTING SYSTEM - A system for accessing, updating, and maintaining health records of a medical data and reporting system. The system can comprise one or more data processors and a module configured to execute on the one or more data processors. The module can be configured to validate a particular user based upon patient identifying information, where the module is further configured to obtain patient identifying information from one or more computer-readable mediums, a voice response system, a mobile device, a global positioning system, and a biometric system. Additionally, the module can be configured to enable the user to securely access the medical data and reporting system and to report the data to the user. | 2010-01-28 |
20100024022 | METHODS AND SYSTEMS FOR SECURE KEY ENTRY VIA COMMUNICATION NETWORKS - According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server. | 2010-01-28 |
20100024023 | Reactive Biometric Single Sign-on Utility - A computer implemented method, apparatus, and computer usable program code for accessing protected resources. Biometric data for a user is received from a biometric input device and an indication of an application requiring a password. Responsive to receiving the biometric data from the user, the user is authenticated using the biometric data and a profile. Responsive to the user being authenticated, the password is established with the application to allow access to the application, wherein the password is established without user input. | 2010-01-28 |
20100024024 | Authentication System and Process - An authentication system including: (i) a user device, such as a mobile phone or media player, for storing random identification data for a user of the user device, and for processing entered token data to generate response data on the basis of the identification data; (ii) a client device, such as a personal computer, for use by the user to request a session, such as an online banking session, with a server system, for receiving the token data in response to the request, and for sending the response data to the server system; and (iii) a server of the server system, for storing the random identification data for the user, generating the token data for the client device on the basis of the identification data in response to the request, and for processing the response data to determine authentication for the client device for the session. | 2010-01-28 |
20100024025 | AUTHENTICATION SYSTEM AND AUTHENTICATION SERVER DEVICE - An account management server, when a device executing a service receives a card ID read from an ID card, sends back log-on data as a response, which is recorded in an account management DB in a way that associates the log-on data with the card ID. A user terminal, when reading the card ID from the ID card, transmits the card ID together with an account name of a user to an account management server. The account management server overwrites, with the received card ID, the card ID registered in the account management DB in a way that associates the card ID with the received account name or password. | 2010-01-28 |
20100024026 | Application gateway system and method for maintaining security in a packet-switched information network - A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network from a protected domain. A packet processor part intercepts a packet that is in transit between the untrusted packet-switched information network and the protected domain. The packet is examined at the packet processor part in order to determine, whether the packet contains digital data that pertains to a certain protocol. If the packet is not found to contain such digital data, it is processed at the packet processor part. If the packet is found to contain digital data that pertains to said certain protocol, it gets redirected to an application gateway part that processes the packet according to a set of processing rules based on obedience to said certain protocol. The packet processor part is a kernel mode process running in a computer device and the application gateway part is a user mode process running in a computer device. | 2010-01-28 |
20100024027 | Client-side security management for an operations, administration, and maintenance system for wireless clients - An Operations, Administration, and Maintenance (OA&M) | 2010-01-28 |
20100024028 | Wireless mobile device with user selectable privacy for groups of resident application programs and files - An exemplary method implemented by a wireless mobile device provides user selectable access to programs and files defining items that are resident on the mobile device. Screen icons associated with a privacy group are visually differentiated from icons associated with a public group. On receiving a user first input to initially access one of the items, where the first input is the first attempt by the user to access any item since a power up activation of the mobile device, determining whether the first input is a request to access an item associated with the privacy group or public group. If the sought access is to one item associated with the privacy group, a request is displayed on the screen requesting the user to enter a predetermined group privacy password and access is inhibited to the item unless the predetermined group privacy password is input to the mobile device by the user. The same predetermined group privacy password is required to initially access any of the items associated with the privacy group. If the sought access is to one item associated with the public group, the first user input is permitted to be conveyed to the associated one item causing the one item associated with the public group to be accessed without requiring an input by the user of the group privacy password. | 2010-01-28 |
20100024029 | Battery And Authentication Requesting Device - An authentication requesting device which includes a battery connecting section to be connected to a battery and a receiving section to be supplied with power from an external power source when connected to the external power source, and executes an authentication process for authenticating a battery connected to the battery connecting section, where the authentication requesting device is arranged to change the authentication process depending on whether or not the receiving section is being supplied with power from the external power source. | 2010-01-28 |
20100024030 | RESTARTABLE TRANSFORMATION AUTOMATON - Data transformation is lazily performed to facilitate reduced memory footprint, among other things. Rather than constituting an entire data structure, information is saved to enable iterative construction the structure. Moreover, an interface is afforded that appears to operate over a fully resolved structure but which is implemented on top of a restartable transformation mechanism that computes values in response to requests. These computed values could also be released based on one or more configurable policies. | 2010-01-28 |
20100024031 | System and method for transforming hierarchical objects - A method and apparatus for configuring a device, by receiving or creating a hierarchical object controlling the configuration of the device, deriving a set of commands relevant to the hierarchical object, receiving a string from a command line interface, parsing the siring into a command in accordance with the relevant set of commands, and executing the command thus manipulating the hierarchical object. | 2010-01-28 |
20100024032 | METHOD AND APPARATUS FOR EFFECTING AN INTERNET USER'S PRIVACY DIRECTIVE - Disclosed is a method for effecting an internet user's privacy directive. In the method, copied packets, that are based on original packets sent from a user client, are monitored for a web content request including state information that is not in compliance with a user's privacy directive. Upon detection of a copied packet having a web content request including noncompliant state information, the state information is modified to comply with the user's privacy directive. A replacement packet is forwarded to the user client such that the user client receives the replacement packet before receiving a response packet from a target server of the corresponding original packet. The replacement packet has a redirection with a renewed web content request including the modified state information. | 2010-01-28 |