05th week of 2012 patent applcation highlights part 71 |
Patent application number | Title | Published |
20120030645 | PREDICTIVE RETIREMENT TOOLSET - A system assesses one or more applications for retirement. The system includes a processing device configured for receiving attribute data corresponding to one or more of a plurality of applications. The processing device is further configured for determining one or more of the plurality of applications to assess for retirement, translating at least some of the received attribute data into two or more translated values based at least in part on one or more predetermined values, and summing two or more of the translated values, thereby resulting in one or more combined values. The processing device is further configured for calculating one or more cumulative values based at least in part on the one or more combined values and converting the one or more cumulative values, thereby resulting in one or more probability values each indicating the probability of retirement of one of the one or more applications. | 2012-02-02 |
20120030646 | Developing Programs in a Graphical Specification and Constraint Language - System and method for specifying and implementing programs. A graphical program is created in a graphical specification and constraint language that allows specification of a model of computation and explicit declaration of constraints in response to user input. The graphical program includes a specified model of computation, a plurality of interconnected functional blocks that visually indicate functionality of the graphical program in accordance with the specified model of computation, and specifications or constraints for the graphical program or at least one of the functional blocks in the graphical program. The specified model of computation and specifications or constraints are useable to analyze the graphical program or generate a program or simulation. | 2012-02-02 |
20120030647 | Developing Programs for Hardware Implementation in a Graphical Specification and Constraint Language via Iterative Estimation of Performance or Resource Utilization - System and method for specifying and implementing programs. A graphical program is created in a graphical specification and constraint language that allows specification of a model of computation and explicit declaration of constraints in response to user input. The graphical program includes a specified model of computation, a plurality of interconnected functional blocks that visually indicate functionality of the graphical program in accordance with the specified model of computation, and specifications or constraints for the graphical program or at least one of the functional blocks in the graphical program. The specified model of computation and specifications or constraints are useable to analyze the graphical program or generate a program or simulation. | 2012-02-02 |
20120030648 | Generating and Debugging Timing Accurate Simulations in a Graphical Specification and Constraint Language - System and method for specifying and implementing programs. A graphical program is created in a graphical specification and constraint language that allows specification of a model of computation and explicit declaration of constraints in response to user input. The graphical program includes a specified model of computation, a plurality of interconnected functional blocks that visually indicate functionality of the graphical program in accordance with the specified model of computation, and specifications or constraints for the graphical program or at least one of the functional blocks in the graphical program. The specified model of computation and specifications or constraints are useable to analyze the graphical program or generate a program or simulation. | 2012-02-02 |
20120030649 | Methods and Systems for Automatic Generation of Multithread-Safe Software Code - An exemplary method of automatic generation of multithread-safe software code includes a multithread-safe code generator subsystem analyzing data representative of non-multithread-safe software code and automatically generating data representative of multithread-safe software code based on the analyzing of the data representative of the non-multithread-safe software code. Corresponding methods and systems are also described. | 2012-02-02 |
20120030650 | Developing Programs for Hardware Implementation in a Graphical Specification and Constraint Language - System and method for specifying and implementing programs. A graphical program is created in a graphical specification and constraint language that allows specification of a model of computation and explicit declaration of constraints in response to user input. The graphical program includes a specified model of computation, a plurality of interconnected functional blocks that visually indicate functionality of the graphical program in accordance with the specified model of computation, and specifications or constraints for the graphical program or at least one of the functional blocks in the graphical program. The specified model of computation and specifications or constraints are useable to analyze the graphical program or generate a program or simulation. | 2012-02-02 |
20120030651 | SYSTEM AND METHOD FOR TEST STRATEGY OPTIMIZATION - A test strategy optimizer for minimizing the impact of software update correctness testing is provided for software having several processes. Each process may have a criticality level associated with it and a test effort level associated with it. An update analyzer may determine what functions are modified and a dependency analyzer may determine what processes are connected to modifications, and thus require testing. User input may specify global test parameters related to test time, test completeness per criticality level, test iterations, etc. The test strategy optimizer will then take the process parameters, process dependencies, and user criteria to calculate the most efficient test procedure and provide information about the same. The test strategy optimizer may also provide adjustment tools, so users may modify parameters, based on the resulting information. | 2012-02-02 |
20120030652 | Mechanism for Describing Values of Optimized Away Parameters in a Compiler-Generated Debug Output - A mechanism for describing values of optimized away parameters in a compiler-generated debug output. A method of embodiments of the invention includes monitoring parameters in a source code during compilation of the source code by a compiler on a computer system. Each parameter includes a value and is optimized away during optimization of the source code into an optimized code. The method further includes generating status information that relates to the parameters based on the monitoring of the parameters, and providing the status information in a debug output that is generated by the compiler. The status information is used to recover values of the parameters missing from the optimized code. | 2012-02-02 |
20120030653 | ASSUMPTION-BASED COMPILATION - Techniques for processing source code written in a traditionally interpreted language such as JavaScript, or another dynamic and/or interpreted language, are disclosed. In one example, compiled code associated with the source code is constructed and executed. An assumption on which a specific aspect of the compiled code is based (e.g., an optimization) is tested at a checkpoint of the compiled code. A roll over to fallback code is performed if the test indicates the assumption is not true. | 2012-02-02 |
20120030654 | APPARATUS AND METHOD FOR AUTOMATED TESTING OF SOFTWARE PROGRAM - Provided is an apparatus and method for automated testing of a software program. More particularly, provided is an apparatus and method for automated testing of a software program of which a source code is frequently changed. An aspect of the present invention provides an apparatus and method for automated testing of a software program that may automatically perform testing with respect to a source code file changed within a software program based on a correlation between a plurality of test objects for testing of the software program. | 2012-02-02 |
20120030655 | Generating and Modifying Textual Code Interfaces from Graphical Programs - A graphical program is analyzed, where the graphical program includes an I/O interface including one or more ordered parameters for providing input to or receiving output from the graphical program. A function is generated in a textual programming language based on the analyzing, where the function implements the functionality of the graphical program, and includes a textual function I/O interface with the one or more ordered parameters of the I/O interface of the graphical program. User input is received specifying a modified textual function I/O interface that differs from the textual function I/O interface. A wrapper for the function is generated with the modified textual function I/O interface, where the wrapper includes the function, and where during execution the wrapper receives or outputs values in accordance with the modified textual function I/O interface, and provides values to or receives values from the function via the textual function I/O interface. | 2012-02-02 |
20120030656 | SYSTEM AND METHOD FOR PARAMETRIC SYSTEM EVALUATION - A method and system for evaluating a system are described. A parameter space comprising one or more parameters corresponding to the system and/or an application executed on the system is defined. Additionally, one or more search functions for selecting a parameter from the parameter space to evaluate a desired characteristic of the system are determined. Further, at least one parameter from the parameter space is selected using the one or more search functions and the application is executed using the selected parameter. Subsequently, the execution of the application is monitored and metrics associated with the application are recorded. The method further includes iteratively selecting another parameter from the parameter space based on the recorded metrics and executing the application using the selected another parameter. | 2012-02-02 |
20120030657 | METHOD AND SYSTEM FOR USING A VIRTUALIZATION SYSTEM TO IDENTIFY DEADLOCK CONDITIONS IN MULTI-THREADED PROGRAMS BY CONTROLLING SCHEDULING IN REPLAY - A method and system for determining potential deadlock conditions in a target multi-threaded software application. The target application is first run in a virtual machine and the events within the application are recorded. The recorded events are replayed and analyzed to identify potential lock acquisition conflicts occurring between threads of the application. The potential lock acquisition conflicts are identified by analyzing the order in which resource locks are obtained and pairs of resources that have respective locks obtained in different orders are analyzed. These analyzed pairs are used to define a different order of events in the target application that, when the target application is re-run with the second order of events, may trigger a deadlock condition. The target application is then re-run with the different order of events in an attempt to trigger and then identify potential deadlock situations. | 2012-02-02 |
20120030658 | SOFTWARE DEVELOPMENT ASSISTANT METHOD AND SYSTEM - The present invention provides a software development method, system and computer program product. Generally, a computer program product for software development assistance includes a computer readable storage medium having computer readable program code embodied therewith such that the computer readable program receives from a server over a computer communications network both a software update for software installed in an end user device, and also test cases and a testing tool. The test cases are loaded in memory of the end user device and executed in the end user device with the execution tool with respect to the software update. Execution information produced by the execution of the test cases is collected and transmitted back to the server from the end user device. Optionally, a new test case for the software update can be created within the memory of the end user device the new test case can be executed along with the received test cases with the execution tool in the end user device. Consequently, the new test case can be transmitted to the server along with the collected execution information. | 2012-02-02 |
20120030659 | CONSTRUCTING RUNTIME STATE FOR INLINED CODE - Techniques for processing computer code are disclosed. In one example, an indication that a computer code is to begin execution at a portion of code other than a starting portion of the code is received, and a runtime state associated with the portion of the code at which execution is to begin is constructed. In some examples, execution of the portion of code is initiated. In some examples, a program counter associated with the portion of the code is used to initiate execution of the code. In some examples, the computer code comprises a fallback code associated with a previously executing code. | 2012-02-02 |
20120030660 | Mechanism for Replacing Memory pointers with Implicit Pointers to be Used in Compiler-Generated Debug Output - A mechanism for replacing memory pointers with implicit pointers is disclosed. A method of embodiments of the invention includes determining a memory pointer in a source code compiling on a computer system. The memory pointer is associated with a first value in the source code and serves as a referencing link to a second value in memory. The method further includes replacing the memory pointer with an implicit pointer as the memory pointer is optimized away during code optimization of the source code such that the implicit pointer is provided in a compiler-generated debug output to serve as an implicit reference link between the first value and second value. The implicit reference link was once provided as an explicit reference link by the memory pointer before getting optimized away. | 2012-02-02 |
20120030661 | OBSERVATION AND ANALYSIS BASED CODE OPTIMIZATION - Observation and analysis based optimization of software code is disclosed. An expected value is chosen for a dynamic attribute that cannot be determined, prior to execution of the associated software code, to be guaranteed to have that expected value at runtime. An optimized version of the software code is generated, including one or more optimizations based on an assumption that the dynamic attribute will have the expected value. Non-exhaustive examples of a dynamic attribute include a variable type; a location in memory; a location in which a global object, property, or variable is stored; the contents of a global function or method; and a value of a global property or variable. A check is performed during execution of the optimized version of the software code, prior to executing the portion that has been optimized based on the assumption, to verify that the dynamic attribute has the expected value. In the event that it is determined at runtime that the dynamic attribute does not have the expected value, execution reverts to backup code that is not based on the assumption that dynamic attribute will have the expected value. | 2012-02-02 |
20120030662 | DEVELOPMENT TOOL FOR FOOTPRINT REDUCTION - A method and apparatus for reducing a memory footprint of an embedded system. The method may include analyzing packages installed in a root file system of the embedded system, and determining which package components are not required for the operation of the embedded system. The method further includes reducing a memory footprint of the embedded system based on the above determination. | 2012-02-02 |
20120030663 | MULTIPLEXER FOR MULTI-TENANT ARCHITECTURES - A tenant multiplexer in an administrative tenant of a multi-tenant software architecture can call an administrative agent in the administrative tenant and receive, from the administrative agent, an action framework and a trusted connection protocol for accessing each of the plurality of client tenants. The trusted connection protocol can establish, without tenant-specific authentication information, a trusted system connection to an update agent in each of the plurality of client tenants. An action framework can be simultaneously implemented using the update agent of each of at least a subset of the plurality of client tenants under control of the multiplexer via the trusted system connection to begin execution of the software process for the at least the subset of client tenants. | 2012-02-02 |
20120030664 | PROCESSING OF SOFTWARE OBJECTS MOVED INTO A DROPZONE REGION OF AN APPLICATION - A non-transitory computer-readable storage medium storing code representing instructions that when executed are configured to cause a processor to perform a process. The code can comprise code to receive, on a client side of a network, an indicator that a first software object has been moved from a first application into a dropzone region of a second application. The code can include code to receive an indicator that a second software object has been moved into the dropzone region of the second application, and code to access a plurality of dropzone conditions. The code can include code to determine that a dropzone condition from the plurality of dropzone conditions has been satisfied based on the first software object and the second software object both being moved into the dropzone region, and code to send to a server side of a network an indicator that the dropzone condition has been satisfied. | 2012-02-02 |
20120030665 | METHOD AND APPARATUS FOR UPDATING FIRMWARE - A method and apparatus for updating firmware using a firmware-over-the-air update. The apparatus comprises a plurality of repository files each comprising one or more settings. The apparatus is configured to store a specified value corresponding to at least one of the settings. The apparatus is capable of receiving a firmware over-the-air update which overwrites at least one repository file with an updated version. The apparatus is capable of identifying repository files which have been changed by the update and for which at least one corresponding specified value exists. Identification is achieved by comparing representations of repository files. Further, the apparatus is capable of merging updated repository files to retain specified values. | 2012-02-02 |
20120030666 | STANDARDIZED PROCEDURES FOR IMPLEMENTING SOFTWARE CHANGES - A change to a tenant-independent content item identified as a target for changes as part of an update process of a core software platform provided by a multi-tenant system can be registered, and one or more customer tenants of the multi-tenant system can be analyzed to identify tenant-specific content items to which the registered change are relevant. A sequence can be established for processing a modification to the tenant-specific content item resulting from the registered change. The sequence can be based on at least one dependency of the tenant-specific content item on the tenant-independent content item affected by the registered change. Related articles and systems are also disclosed. | 2012-02-02 |
20120030667 | PACKAGING AN APPLICATION - A method for packaging an application, for use with a system comprising the application and a plurality of libraries, the method comprising: in response to runtime execution of the application, monitoring library data associated with at least one of the plurality of libraries that is invoked by the application; associating the library data with an identifier of the application; and using the library data and the application identifier to create a package comprising the application and the at least one of the plurality of libraries. | 2012-02-02 |
20120030668 | POST-PRODUCTION PREPARATION OF AN UNPROTECTED INSTALLATION IMAGE FOR DOWNLOADING AS A PROTECTED SOFTWARE PRODUCT - An installation image for installing an unprotected software product is used to install a protected version of the same product. A protected version of the executable file is embedded in a new installation image with the original installation image, in which the unprotected version of the executable file is damaged so as to be unusable and unreadable. The new installation image causes the original installation image to operate, installing the damaged installation file and other data files. The new installation image then replaces the damaged installation file with the protected installation file. | 2012-02-02 |
20120030669 | Mechanism for Delayed Hardware Upgrades in Virtualization Systems - A mechanism for delayed hardware upgrades in virtualization systems is disclosed. A method of the invention includes maintaining a delayed hardware upgrade mode that is applicable to one or more virtual machines (VMs) managed by a hypervisor of a host machine, receiving a command to change VM hardware presented to a VM of the one or more VMs, placing the command in a delayed command queue associated with the VM per the delayed hardware upgrade mode maintained by the hypervisor, and executing the command in the delayed command queue when it is determined that the VM has been rebooted, wherein the reboot of the VM is not directly associated with the command. | 2012-02-02 |
20120030670 | Providing Application High Availability in Highly-Available Virtual Machine Environments - Various systems and methods can provide high availability of an application executing in a highly-available virtual machine environment. One method involves receiving information indicating a state of an application executing in a virtual machine from a monitoring agent executing in the virtual machine. In response to receiving the information, the method involves determining whether the virtual machine should be restarted. Based upon that determination, the method then determines whether the monitoring agent should send a heartbeat message to a virtualization controller prior to expiration of a timeout interval. The virtualization controller is configured to restart the virtual machine if the virtual machine does not send the heartbeat message prior to expiration of the timeout interval. | 2012-02-02 |
20120030671 | Information transmission device, network system, and information transmission method - An information transmission device stores an identifier representing an information processing device connected to a network in association with an identifier representing a storage device used by the information processing device. When transmission of information is requested from the information processing device, the information transmission device specifies an identifier representing an information processing device. The information transmission device acquires an identifier representing a storage device stored in association with the specified identifier. The information transmission device transmits information on a request for transmission by the information processing device to the storage device represented by the acquired identifier. | 2012-02-02 |
20120030672 | MICROCLOUD PLATFORM DELIVERY SYSTEM - A cloud computing environment with the ability to deploy a web application that has been developed using one of a plurality of application frameworks and is configured to execute within one of a plurality of runtime environments can be delivered as a self-contained virtual machine disk image configured to launch in a virtualization environment. Upon request (or alternatively, in a pre-processing phase), a cloud computing platform provider can compose a virtual machine disk image comprising the cloud computing environment. The virtual machine disk image may be attached to any virtual machine, whether running on a personal computing device such as a laptop or in an infrastructure-as-a-service service provider to provide a cloud computing environment that is automatically configured to receive and deploy a web application. | 2012-02-02 |
20120030673 | THIN CLIENT SYSTEM, MANAGEMENT SERVER, VIRTUAL MACHINE CREATION MANAGEMENT METHOD AND VIRTUAL MACHINE CREATION MANAGEMENT PROGRAM - To prevent creation of a virtual machine in a hypervisor unusable by a license for use in creating a virtual machine. | 2012-02-02 |
20120030674 | Non-Disruptive, Reliable Live Migration of Virtual Machines with Network Data Reception Directly into Virtual Machines' Memory - Techniques are disclosed for the non-disruptive and reliable live migration of a virtual machine (VM) from a source host to a target host, where network data is placed directly into the VM's memory. When a live migration begins, a network interface card (NIC) of the source stops placing newly received packets into the VM's memory. A virtual server driver (VSP) on the source stores the packets being processed and forces a return of the memory where the packets are stored to the NIC. When the VM has been migrated to the target, and the source VSP has transferred the stored packets to the target host, the VM resumes processing the packets, and when the VM sends messages to the target NIC that the memory associated with a processed packet is free, a VSP on the target intercepts that message, blocking the target NIC from receiving it. | 2012-02-02 |
20120030675 | COMPUTER SYSTEM - In scheduling shared processing that has a higher priority than LPAR processing, giving precedence to physical CPUs running idle LPARs prevents prolonged hold-up of LPAR processing. In a system is comprised of multiple physical CPUs, multiple LPARs to which these physical CPUs are allocated and which execute programs under their guest OSes, and a management program managing these LPARs, a few additional units are introduced: a guest OS monitoring unit that can grasp the states of guest OSes running on these LPARs and a dispatcher unit that allocates one of these physical CPUs to shared processing requested by the management program, which has a higher priority than LPAR processing. When a request for shared processing arises, the dispatcher unit interrogates the guest OS monitoring unit and, based on the information obtained from it, gives priority of allocation to the physical CPU processing an idle LPAR. | 2012-02-02 |
20120030676 | Methods And Apparatus For Creating An Isolated Partition For A Virtual Trusted Platform Module - A data processing system isolates a virtual trusted platform module (vTPM) manager in the processing system from other management software in the processing system. In one example process, the processing system launches a virtual machine monitor (VMM) that includes a memory-mapped input/output (MMIO) trap. The processing system also launches a vTPM manager in a first virtual machine (VM). In addition, the processing system launches a second VM to contain virtual machine management programs other than the vTPM manager and the MMIO trap. Other embodiments are described and claimed. | 2012-02-02 |
20120030677 | Method and apparatus for supporting universal serial bus devices in a virtualized environment - A method for managing data between a virtual machine a bus controller includes transmitting an input output (IO) request from the virtual machine to a service virtual machine that owns the bus controller. According to an alternate embodiment, managing data between a virtual machine and a bus controller includes trapping a register access made by the virtual machine. A schedule is generated to be implemented by the bus controller. Status is returned to the virtual machine via a virtual host controller. Other embodiments are described and claimed. | 2012-02-02 |
20120030678 | Method and Apparatus for Tracking Documents - A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents. | 2012-02-02 |
20120030679 | Resource Allocator With Knowledge-Based Optimization - An automated resource allocation technique for scheduling a batch computer job in a multi-computer system environment. According to example embodiments, resource allocation processing may be performed when receiving a batch computer job that needs to be run by a software application executable on more than one computing system in the multi-computer system environment. The job may be submitted for pre-processing analysis by the software application. A pre-processing analysis result comprising job evaluation information may be received from the software application and the result may be evaluated to select a computing system in the multi-computer system environment that is capable of executing the application to run the job. The job may be submitted to the selected computing system to have the software application run the job to completion. | 2012-02-02 |
20120030680 | System and Method of General Service Management - A system and method is provided for servicing service management requests via a general service management framework that supports a plurality of platforms (for example, Windows®, UNIX®, Linux, Solaris™, and/or other platforms), and that manages local and/or remote machine services at system and/or application level. | 2012-02-02 |
20120030681 | HIGH PERFORMANCE LOCKS - Systems and methods of enhancing computing performance may provide for detecting a request to acquire a lock associated with a shared resource in a multi-threaded execution environment. A determination may be made as to whether to grant the request based on a context-based lock condition. In one example, the context-based lock condition includes a lock redundancy component and an execution context component. | 2012-02-02 |
20120030682 | Dynamic Priority Assessment of Multimedia for Allocation of Recording and Delivery Resources - Techniques are provided to allocate resources used for recording multimedia or to retrieve recorded content and deliver it to a recipient. A request associated with multimedia for access to resources is received. A context associated with the multimedia is determined. Resources for the multimedia are allocated based on the context. | 2012-02-02 |
20120030683 | Method of forming a personal mobile grid system and resource scheduling thereon - The method of forming a personal mobile grid system and resource scheduling thereon provides for the formation of a personal network, a personal area network or the like having a computational grid superimposed thereon. Resource scheduling in the personal mobile grid is performed through an optimization model based upon the nectar acquisition process of honeybees. | 2012-02-02 |
20120030684 | RESOURCE ALLOCATION - At least one candidate allocation time period is determined according to a resource benefit time step function. The resource benefit does not vary with time in the at least one candidate allocation time period. Resources and relations between the resources are converted into sub-resource groups according to the resource cost time step function. Each of the sub-resource groups comprise sub-resources that correspond to the resources and relations between the sub-resources. The resource benefits and resource costs of the sub-resources do not vary with time. With respect to the at least one candidate allocation time period, the sub-resource groups are input into a resource schedule optimizer to obtain optimized results with respect to the sub-resource groups. An optimized result, with respect to the at least one candidate allocation time period, is obtained from the optimized results with respect to the sub-resource groups. | 2012-02-02 |
20120030685 | SYSTEM AND METHOD FOR PROVIDING DYNAMIC PROVISIONING WITHIN A COMPUTE ENVIRONMENT - The disclosure relates to systems, methods and computer-readable media for dynamically provisioning resources within a compute environment. The method aspect of the disclosure comprises A method of dynamically provisioning resources within a compute environment, the method comprises analyzing a queue of jobs to determine an availability of compute resources for each job, determining an availability of a scheduler of the compute environment to satisfy all service level agreements (SLAs) and target service levels within a current configuration of the compute resources, determining possible resource provisioning changes to improve SLA fulfillment, determining a cost of provisioning; and if provisioning changes improve overall SLA delivery, then re-provisioning at least one compute resource. | 2012-02-02 |
20120030686 | THERMAL LOAD MANAGEMENT IN A PARTITIONED VIRTUAL COMPUTER SYSTEM ENVIRONMENT THROUGH MONITORING OF AMBIENT TEMPERATURES OF ENVIRNOMENT SURROUNDING THE SYSTEMS - Thermal load, management in a virtualized environment wherein server controlled physical processor systems are partitioned into a plurality of logical partitions LPARs that comprise first predetermining a set of ambient temperature levels for the surrounding outside environment for a first server controlled system having a plurality of LPARs. Then the ambient set of temperature levels are sensed and, if the set or predetermined pattern of temperature levels are exceeded, one or more of the plurality of LPARs are transferred from said first server controlled system to a second server controlled LPAR system over a connecting network. | 2012-02-02 |
20120030687 | EFFICIENT DATA TRANSFER ON LOCAL NETWORK CONNECTIONS USING A PSEUDO SOCKET LAYER - A method, system and computer program product for transferring data between two applications over a local network connection. The invention establishes a socket connection between the applications and transfers data through the socket connection using a pseudo socket layer interface when the two endpoints of the socket connection are on the same host. Socket application program interface comprises socket buffers for sending and receiving data. A connecting application identifies and establishes a connection with a listening socket, and places data directly in the socket receive buffer of the receiving socket. If the other end of the socket connection is on a remote host, then data is transferred using underlying network facilities. | 2012-02-02 |
20120030688 | PERIOD GENERATION TOOLSET - Methods, systems, and program products for generating time periods and/or due dates are provided. One method comprises providing a period toolset that is accessible by a calling program to perform a plurality of functions performed during runtime. The functions include defining a plurality of period types based on a period duration selected by the calling program. The functions further include generating a first period stream based on one of the period types. The functions further include mapping the first period stream to a second period stream based on one or more mapping rules selected by the calling program. The functions further include determining a due date for one or more periods of at least one of the first period stream and the second period stream based on one or more due date rules selected by the calling program. | 2012-02-02 |
20120030689 | BUSINESS APPLICATION INTEGRATION ADAPTERS MANAGEMENT SYSTEM - An Integration Adapters Management System (IAMS). In an example embodiment, the system manages adapters and connectors used to integrate software applications. The example system includes a repository of connectors, where each connectors includes one or more integration adapters. A connector generator communicates with the repository of connectors is adapted to selectively generate one or more connectors in response to detection of an event for which a corresponding connector is not found in the repository of connectors. In a more specific example embodiment, the connector generator is adapted to implement one or more generated connectors as a web service. The connector generator may be constructed in accordance with an Application Integration Architecture (AIA) integration framework. Additional tools are provided for monitoring connector runtime information and receiving and logging user feedback pertaining to connectors. | 2012-02-02 |
20120030690 | Computer Readable Medium Storing a Universal Driver, Method of Controlling a Device and Apparatus - A non-transitory computer readable medium has a universal driver executable on a computer. The universal driver includes instructions for: selecting a device for executing a function from connected devices according to an input from a user; sending a request to the operating system to set a communication port for communication with the selected device as a specified port; storing port identification information of a communication port for communication with the selected device and associated with the user in a memory; determining whether port identification information of the specified communication port matches the port identification information of the communication port associated with the user; sending a control command to the device to execute the function via the specified communication port according to a result of the determination indicating a match; and notifying the user of a different port being set as a specified port according to a result indicating a non-match. | 2012-02-02 |
20120030691 | Method and Apparatus for Supporting Diverse Memory Access Schemes - Methods and apparatus for supporting diverse memory access schemes are disclosed. In one embodiment, a mobile computing device includes program code that accesses memory according to a first bad block management scheme and program code that accesses memory according to a second bad block management scheme, which is different than the first bad block memory scheme. In addition, a memory component includes data that is partitioned according to both the first bad block management scheme and the second bad block management scheme so as to enable both the code that accesses memory according to a first bad block management scheme and the code that accesses memory according to a second bad block management scheme to utilize the memory component. | 2012-02-02 |
20120030692 | VIRTUAL MACHINE INTERFACE FOR HARDWARE RECONFIGURABLE AND SOFTWARE PROGRAMMABLE PROCESSORS - The present invention provides a virtual machine interface (VMI) and an application programming interface (API) usable in conjunction with a reconfigurable wireless network communication apparatus. The reconfigurable wireless network communication apparatus comprises a plurality of hardware kernels. The apparatus can be reconfigured to support different or modified communication protocols over time. The VMI comprises a library of software objects. By configuring VMI software objects, a programmer selects the communication protocol used by the reconfigurable wireless network communication apparatus. The API of the present invention provides higher level management of the communication protocol used by a reconfigurable wireless network communication apparatus. The API comprises a library of high level software objects that further abstract hardware details of the apparatus. | 2012-02-02 |
20120030693 | ELECTRONIC APPARATUS AND METHOD OF MANUFACTURING THE SAME - An electronic apparatus includes a disk drive unit, a first casing and a second casing. The disk drive unit is provided inside the electronic apparatus and has an insertion slot into which a disk medium is to be slid or placed. The first casing covers an upper side of the disk drive unit and includes a cover portion covering an upper edge of the insertion slot. The second casing joins to the first casing and provides a housing portion housing the disk drive unit. | 2012-02-02 |
20120030694 | OPTICAL DATA RECORDING/REPRODUCTION APPARATUS - The relation between the cover layer thickness of a data recording surface and ratio α of SCO to SCD is previously calculated and stored in a storage unit, where SCD denotes coma aberration which occurs when the data recording medium is tilted by unit angle and SCO denotes coma aberration which occurs when the objective lens is tilted by unit angle. When α | 2012-02-02 |
20120030695 | REMOTE CONTROL UNIT FOR INTELLIGENT DIGITAL AUDIOVISUAL REPRODUCTION SYSTEMS - The invention relates to a remote control unit for intelligent digital audiovisual reproduction systems, comprising storage means, payment means, a sound control circuit, display means and a metal chassis wherein said remote control unit comprises a distant radio frequency transmitter that is associated with a radio frequency receiver connected to the sound control circuit of the audiovisual reproduction system. | 2012-02-02 |
20120030696 | Spatially Constrained Biosensory Measurements Used to Decode Specific Physiological States and User Responses Induced by Marketing Media and Interactive Experiences - Embodiments described herein include a method running on a processor for decoding user response to marketing media, the method comprising: defining calibration stimuli that produce at least one expected response; defining data features for assessing one or more states of a plurality of users using at least one of the calibration stimuli and the at least one expected response; identifying a set of data features based on a first correlation between the set of data features and the at least one expected response; and iteratively reducing the set of data features based upon an amount of variation explained by the reduced set of data features and a second correlation between the reduced set of data features and the at least one expected response. | 2012-02-02 |
20120030697 | DISPLAY CONTROL APARATUS, DISPLAY CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM - In the conventional program recommend method, there is a problem that the user misses to view a program being wanted to view or a problem that the information is redundant to the user. A display control apparatus of the present invention includes a preference information acquisition unit which acquires a preference information of a viewer from the broadcast reception apparatus, a program information acquisition unit which acquires the program information of a preference target program which suits the preference information, from the server, a reception apparatus state detection unit which detects an instruction of a power supply off to the broadcast reception apparatus, a program information display unit which displays at least a part of the program information, and a display control unit which controls a start of a display of the program information, on the basis of the instruction of the power supply off. | 2012-02-02 |
20120030698 | APPARATUS AND METHOD FOR PARENTAL CONTROL USING V-CHIP PLUS+ AND MASTER PASSWORD - A method and apparatus for exercising access control over television programs using a parental control user interface that has different functions is provided. The method requires a password to enter into a master mode for obtaining access to all the functions of the parental control user interface. Once in the master mode, the user may enter a criterion for blocking a television program from being viewed or recorded or the user can override an already blocked television program. | 2012-02-02 |
20120030699 | SYSTEMS AND METHODS FOR STORING AND RENDERING ATLEAST AN USER PREFERENCE BASED MEDIA CONTENT - Disclosed are systems and methods for storing and rendering atleast a desired media content of a mixed rated media according to user preference. The method comprises the steps of: inputting atleast a preference of the desired media content of the mixed rated media to atleast a media player; editing out undesired media content of the mixed rated media; and rendering the desired media contents according to the user preference. | 2012-02-02 |
20120030700 | MOBILE TERMINAL AND CONTROLLING METHOD THEREOF - A mobile terminal and controlling method thereof are disclosed, which facilitates a terminal to be used in further consideration of user's convenience. The present invention includes displaying a channel list in which receivable channels including at least one pay broadcast channel are listed, receiving a broadcast viewing authority for watching the pay broadcast channel from a broadcast viewing authority server via a broadcasting network or an internet network, storing the received broadcast viewing authority, and updating the stored broadcast viewing authority each time a broadcast mode is entered. Accordingly, when the broadcast viewing authority is updated in the mobile terminal to prevent illegal copying or piracy of the broadcast viewing authority, the terminal user needs not to temporarily stop viewing the corresponding broadcast. Moreover, each time the mobile terminal enters a broadcast mode, an old broadcast viewing authority is deactivated and a new broadcast viewing authority is received. Therefore, the illegal copying or piracy of the broadcast viewing authority stored in the mobile terminal can be basically prevented. | 2012-02-02 |
20120030701 | CONTROL OF IPTV USING SECOND DEVICE - An IPTV may be controlled in part by a second user consumer electronic (CE) device such as a personal digital assistant (PDA) or laptop computer. The IPTV obtains system credentials from a management server to access multiple content servers, and the second CE device can browse Internet content available to the IPTV by accessing a proxy server, which coordinates with the management server and content serves to obtain necessary credentials and information for the second CE device. | 2012-02-02 |
20120030702 | Digital television broadcasting apparatus and method for providing information in a digital television and internet convergent environment - A digital television broadcast apparatus, including a database which stores a plurality of news stories or information received or obtained from any number of content providers, a memory device which stores information regarding a request by an individual to receive a personal news report, wherein the personal news report contains one or more news stories associated with a topic or subject specified by the individual, a processor which detects a posting of a news story or news stories in the database, determines if the news story or news stories are associated with the topic or subject specified by the individual, and if the news story or news stories are associated with the topic or subject specified by the individual, generates a personal news report containing the news story or news stories, and a transmitter which transmits the personal news story to a communication device associated with the individual. | 2012-02-02 |
20120030703 | Systems, Methods and Apparatus For Transmitting Weather Information in a Television Distribution Network - Described herein are techniques for transmitting alert information in association with television programming in a transport stream. The alert information may be transmitted to a plurality of television receivers for which the message may be applicable to at least a portion of the television receivers. Each television receiver receives the alert information and determines whether to output the alert information for presentation to a user. | 2012-02-02 |
20120030704 | Digital Ad Insertion for Video-On-Demand - A method including identifying one or more ad break points within digital video and/or audio content, selecting ad content to provide with the video and/or audio content, and generating a playlist referencing the ad content at the one or more ad break points. | 2012-02-02 |
20120030705 | Scheduling and Presenting IPG Ads in Conjunction with Programming Ads in a Television Environment - A method and system whereby conventional television advertisements (i.e., those delivered to viewers while they watch television programming) can be delivered in conjunction with and correlated with advertisements that are presented to viewers in the Interactive Program Guide (IPG). Moreover, the invention described herein provides for delivering highly targeted ads to viewers in both conventional programming avails and in the IPG, and for linking the targeted ads in these two media to provide for enhanced and highly effective advertising campaigns. | 2012-02-02 |
20120030706 | Virtual Set Top Box - Methods and apparatus are described for providing digital content to televisions or other devices having media playback capabilities over a network infrastructure using virtual set top boxes (VSTBs). | 2012-02-02 |
20120030707 | Methods and Arrangements for Channel Change in an IPTV Network - The present invention relates to methods and arrangements for providing an improved channel change solution for and IPTV system. This is achieved by sending an additional FCC (Fast Channel Change) media stream using multicast from a fast channel change server. The FCC media stream contains a stream being a copy of the main stream wherein the speed is higher than the speed of the main stream. The FCC media stream may start with an I or S-frame and a number of STBs can use the same FCC multicast stream. | 2012-02-02 |
20120030708 | Portable Media Device and Method for Presenting Viewing Content During Travel - A portable media device for use in cooperation with passenger entertainment systems installed in vehicles, such as automobiles and aircraft, and methods for manufacturing and using same. The portable media device is configured to communicate with one or more content sources, which provide viewing content and which may be proximate to, and/or remote from, the portable media device. Preferably being configured to wirelessly communicate with the content sources, the portable media device can select content from any available content source and can download and present the selected content in any conventional manner. The selected content can be streamed to the portable media device for contemporaneous presentation and/or stored by the portable media device for viewing at any time, including after disembarking the vehicle once travel is completed. As desired, the portable media device likewise can be configured to transmit appropriate upload content to the content sources. | 2012-02-02 |
20120030709 | Customized Interface Based on Viewed Programming - In one embodiment, a system generates a customized interface based on displayed programming. The system stores a program that a user displayed through a media device; searches through a network for information related to the displayed program; and extracts data associated with the information related to the displayed program. A custom interface is generated based substantially on the data associated with the information related to the displayed program. | 2012-02-02 |
20120030710 | TV WITH LANDLINE INTEGRATED INTO TV'S USER INTERFACE - A landline telephone circuit is provided within a TV chassis or in a set-back box connectable to the TV processor to enable a user to place and receive calls through the TV. The telephone feature is integrated with the UI of the TV so that telephone features appear alongside other TV features. The telephone feature is controlled by the TV remote control, and has a microphone and computer storage for audio and database information. | 2012-02-02 |
20120030711 | METHOD OR SYSTEM TO PREDICT MEDIA CONTENT PREFERENCES - Briefly, embodiments of a method or system of predicting media content preferences are disclosed. | 2012-02-02 |
20120030712 | NETWORK-INTEGRATED REMOTE CONTROL WITH VOICE ACTIVATION - A method and system for network-integrated remote control includes voice activation of a user interface context on a remote control device. A user may utter a voice command, which the remote control device may use to obtain a user interface context from a network server. The user interface context may be used by the remote control device to display a user interface. The voice command may be associated with desired multimedia content, which may be selectable using control elements in the user interface. The remote control device can then be used to select and control desired multimedia programs. | 2012-02-02 |
20120030713 | SYSTEM AND METHOD FOR AUTOMATICALLY AUTHORING INTERACTIVE TELEVISION CONTENT - A system and method is provided to automatically generate content for ITV products and services by processing primary media sources. In one embodiment of the invention, keywords are automatically extracted from the primary media sources using one or more of a variety of techniques directed to video, audio and/or textual content of the multimodal source. In some embodiments, keywords are then processed according to one or more disclosed algorithms to narrow the quantity of downstream processing that is necessary to associate secondary sources (reference items) with the primary video source. Embodiments of the invention also provide automatic searching methods for the identification of reference items based on the processed keywords in order to maximize the value added by the association of reference items to the video source. | 2012-02-02 |
20120030714 | METHOD AND SYSTEM FOR REMOTE TELEVISION REPLAY CONTROL - A method, system, computer medium, and other embodiments for integrating unrelated web hosted services with stand-alone media-based devices are provided. Users can access and control the media-based device conveniently with a web-browser through various portals on the Internet. In one embodiment, users access the media-based device through one or more unrelated web portals, so as to control and to program the media-based device in a single web session, and to see information both stored on the media-based device and originating from third-party online sources of information and services in a single integrated presentation. | 2012-02-02 |
20120030715 | DEVICE FOR SENDING-OUT DATA IN WHICH ASSOCIATED DATA IS MULTIPLEXED WITH MAIN DATA - A table creating unit receives program information and an upper limit bit rate of EPG data, creates a table of EIT [current/net] on the basis of the information and upper limit bit rate, and determines the frequency of transmission of the table in consideration of the upper limit bit rate and the lower limit of the frequency of transmission of the table. A stream transmitting unit receives the table and the frequency of transmission, converts the table to stream information, and transmits a stream at a frequency determined based on the transmission frequency. Therefore, data transmission is carried out satisfying both the limit of the upper limit bit rate and the limit on the transmission frequency. | 2012-02-02 |
20120030716 | Multicast Video and Data Delivery With Beamforming Antennas in Indoor Wireless Networks - A method includes receiving input information related to transmission of video and data by an access point in a wireless network, the input information including at least one of setup connections, modulating and coding scheme MCS; receiving, by the access point, channel state each information from each user in the wireless network, the channel state information including signal-to-interference-and-noise-ratio SINR for each user under each beam pattern; and multicast beamform scheduling, responsive to the receiving, for multicast delivery of the video and data from the access point with beamforming antennas, the videos being at least one of a multi-resolution and a multi-layered video, the scheduling including a greedy procedure for selecting beams, assigning MCS and video layer or resolution to each of the beams. | 2012-02-02 |
20120030717 | Systems and Methods for Prioritizing Wireless Commuinication of Aircraft - A method for wireless communication of aircraft. The method includes, inter alia, in any feasible order, (1) in accordance with detecting a touchdown of the aircraft, assigning a first priority for transmitting information and a second priority for receiving media content; (2) in accordance with detecting an arrival of the aircraft at the gate, assigning a third priority for receiving media content; (3) in accordance with detecting a departure of the aircraft, assigning the first priority for transmitting information and the second priority for receiving media content; and (4) in accordance with detecting a departure ready of the aircraft, assigning a fourth priority for receiving essential media content and the second priority for receiving other media content. The first priority is greater than the second priority; and the fourth priority is greater than the second priority. | 2012-02-02 |
20120030718 | APPARATUS AND METHOD FOR EFFECTIVELY IMPLEMENTING A WIRELESS TELEVISION SYSTEM - An apparatus and method for effectively implementing a wireless television system may include a communications processor and a transmitter device that combine at least one of a local-area network interface, a wide-area network interface, and one or more television data interfaces for effectively performing a wireless network transmission process. A transmitted stream from the wireless television system may be received via wireless network processing for viewing local-area network data, wide-area network data (such as Internet data), or television data by flexibly utilizing various electronic devices such as a notepad personal computer, a personal digital assistant (PDA), or a handheld TV remote control device. | 2012-02-02 |
20120030719 | DEVICE AND METHOD FOR OUTPUTTING DATA OF A WIRELESS TERMINAL TO AN EXTERNAL DEVICE - A method for a media device is provided. The method includes establishing communication with a wireless terminal, receiving multimedia data wirelessly transmitted from the wireless terminal, and displaying the multimedia data on an external device, whereby the multimedia data is reproduced on the external device in real time. | 2012-02-02 |
20120030720 | DEVICE AND METHOD FOR OUTPUTTING DATA OF A WIRELESS TERMINAL TO AN EXTERNAL DEVICE - An apparatus is provided. The apparatus includes a control unit to establish communication with a wireless terminal and to control reception of multimedia data wirelessly transmitted from the wireless terminal, and an output unit to display the multimedia data on an external device, whereby the multimedia data is reproduced on the external device in real time. | 2012-02-02 |
20120030721 | HOME AND NETWORK VIDEO CACHING - A method may include storing a number of programs on a digital video recorder (DVR) and assigning a score or ranking to each of the programs. The method may also include receiving a request to store another program on the DVR and determining whether the DVR has adequate storage space for the other program. The method may further include forwarding, when the DVR does not have adequate storage space for the other program, one of the programs having a lowest score or ranking to a secondary storage located remotely from the DVR. | 2012-02-02 |
20120030722 | METHOD OF AND A SYSTEM FOR PROVIDING BUFFER MANAGEMENT MECHANISM - The present invention provides a method of and a system for providing buffer management mechanism in an on-Demand environment to keep the popular content sections in server memory so as to reduce the repeatable disk I/O and improve the server performance. The method comprises: setting the state of a buffer to be ACTIVE when a file section stored in the buffer is requested by any users; setting the state of the buffer to be INACTIVE when users no longer request the file section stored in the buffer, the buffer in INACTIVE state having a lifetime; changing the state of the buffer from INACTIVE to FREE when the lifetime decreases to zero. The system comprises at least one detector for detecting the number of the users requesting a file section stored in the buffer and providing the detection results for a processor, one processor for determining the state of the buffer according to the detection results and providing instructions for at least one state setting unit, and at least one state setting unit for setting the state of the buffer based on instructions from the processor. | 2012-02-02 |
20120030723 | METHOD AND APPARATUS FOR STREAMING VIDEO - A method and apparatus for transmitting video is provided herein. A video representation is segmented into video chunks, with each chunk spanning a different time interval. Each chunk may be divided into two or more sub-chunks. During operation, the client requests a sub-chunk of a particular video chunk and then possibly requests an additional sub-chunk of the video chunk. The client then combines and decodes the sub-chunks to provide a reconstructed video chunk for playback on a device. In an embodiment, I-frames of a video chunk are made available in a separate sub-chunk file than P-frames (or B-frames). | 2012-02-02 |
20120030724 | SYSTEM AND METHOD FOR DETECTING HACKED MODEMS - A system, method, and computer program product are provided for detecting hacked modems in a cable network system. A cable Internet service provider can provide the disclosed heuristic to determine whether a particular cable modem has likely been hacked by obtaining a score corresponding to this likelihood. This score, as well as information regarding failure and success of various tests, can be used to generate a report identifying the likelihood that various modems have been hacked. | 2012-02-02 |
20120030725 | CONTENTS URL NOTIFICATION SYSTEM - A contents URL notification system is configured to notify users of contents URLs using TV sets. In the contents URL notification system, a server computer of a content provider transmits information related to the contents URL (URL information) to a client computer via an electronic communication network. The client computer prepares TV data for broadcasting the URL information received from the server computer. A terminal device of the user accesses the server computer via the electronic communication network according to the URL information extracted from the TV data thus prepared with the client computer. | 2012-02-02 |
20120030726 | DYNAMIC VIDEO CONTENT APPARATUSES, SYSTEMS AND METHODS - A media control player includes a central processing unit, a graphics processing unit, an audio/video input, an audio/video output, a memory device, and a media control player housing. The media control player to receives broadcast content from a broadcast source and proprietary targeted messages from a proprietary targeted message source. The proprietary targeted messages are based on one or more viewers within a viewing area of a display device, sales data associated with the one or more viewers, and inventory data selected based at least in part on the sales data. The media control player combines the proprietary targeted messages and the broadcast content into a merged output signal, and provides the merged output signal to the display device such that the proprietary targeted messages are displayed in a message region of the display device and the broadcast content is displayed in a broadcast content region of the display device. | 2012-02-02 |
20120030727 | APPARATUS AND METHOD FOR PROVIDING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to receive two-dimensional image content comprising a plurality of images, identify an object in a first image of the plurality of images, identify the object in a second image of the plurality of images, determine a perspective angle difference between the first and second images, generate a third image using the first and second images when the perspective angle difference satisfies a three-dimensional angle threshold, generate three-dimensional image content using the first image and the third image, and provide the three-dimensional image content to a display device operably coupled with the set top box. Other embodiments are disclosed. | 2012-02-02 |
20120030728 | DIGITAL BROADCAST RECEIVER AND SOFTWARE STARTUP METHOD - A digital broadcast receiver schedules the startup of its software on the basis of the number of data transfer channels and core processing units available to transfer the necessary programs into main storage and execute them, the execution priority order of the programs, the time required to transfer each necessary program into main storage, and the time required to initialize each program. If a snapshot startup option exists for a program, the initialization time is compared with the time required for transferring the snapshot of the program's working data and for further post-processing. Consideration of the data transfer times and initialization times as well as execution priority enables the shortest schedule to be determined. | 2012-02-02 |
20120030729 | COLLABORATIVE STRUCTURED ANALYSIS SYSTEM AND METHOD - Methods, systems, and apparatus for providing compartmented, collaborative, integrated, automated analytics to analysts are provided. In a first aspect, the present invention provides a computer-implemented method for providing compartmented, collaborative, integrated, automated analytics to analysts including: selecting a computer-encoded project-specific workflow; determining a computer-encoded compartment manager, said computer-encoded compartment manager including computer-encoded information about the context of said project-specific workflow; retrieving said computer-encoded information about the context; selecting a computer-implemented automated analytic using said computer-encoded project-specific workflow; providing under control of said computer-encoded compartment manager said information about the context to said automated analytic; processing said computer-encoded information using said computer-implemented automated analytic, to generate thereby analytical information representing an outcome to said analysts; and processing said analytical information in accordance with said computer-encoded compartment manager and said computer-encoded project-specific workflow. | 2012-02-02 |
20120030730 | PROVIDING A MULTI-PHASE LOCKSTEP INTEGRITY REPORTING MECHANISM - In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed. | 2012-02-02 |
20120030731 | System and Method for Local Protection Against Malicious Software - A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status. | 2012-02-02 |
20120030732 | THIRD-PARTY-SECURED ZONES ON WEB PAGES - There is provided a method that includes storing a plurality of image elements of a seal media object in respective files in an authentication server system, each of the image elements is selected from the group consisting of: a layer of the seal media object, a still image portion of the seal media object, and a moving image portion of the seal media object. Authenticating at least a portion of a web page, upon opening of the web page in a browser, by the authentication server system. Delivering to the browser, by the authentication server system, files for assembly and display of the image elements on the web page as the seal media object upon authenticating. | 2012-02-02 |
20120030733 | ACCESSING RESOURCES OF A SECURE COMPUTING NETWORK - According to one embodiment of the present invention, a method for accessing resources of a secure computing network may be provided. The method may include receiving a request to allow a user to access a secure computing network. The user may be associated with an avatar that has a unique set of one or more identifiers that are associated with the user. A security clearance level of the avatar may be determined from the unique set of identifiers of the avatar. The avatar may be authorized to access one or more virtual compartments of the secure computing network according to the security clearance level of the avatar. The virtual compartment may comprise one or more resources of the secure computing network. The method may further include facilitating display of one or more resources of a virtual compartment accessed by the avatar. | 2012-02-02 |
20120030734 | FEMTOCELL ACCESS PROVISIONING BASED ON SOCIAL NETWORK, PRESENCE, AND USER PREFERENCES - A system and methodology that facilitates user friendly, automatic and/or dynamic femtocell access provisioning based on social network, presence, and/or user preference information is provided. In particular, the system can includes femto access manager that can identify a list of ‘close friends’, to which the femtocell owner is likely to grant femtocell access, based on an analysis of access data (e.g., data from social networks, communication logs, calendars, address books, websites and/or blogs, transaction related data, and the like). Further, an access priority associated with each of the close friends can be determined based in part on location data, availability data, and/or predefined policies. Furthermore, the femto access control list, within the femto access point (FAP), can be populated, dynamically and/or automatically, with the highest priority friends from the close friends list. | 2012-02-02 |
20120030735 | COMMUNICATION APPARATUS, RELAY APPARATUS, WIRELESS COMMUNICATION SYSTEM, CONTROL METHOD OF COMMUNICATION APPARATUS, CONTROL METHOD OF RELAY APPARATUS, AND STORAGE MEDIUM - A communication apparatus, which is connected to a relay apparatus, and transmits data to a server apparatus connected via the relay apparatus, includes a determination unit which determines whether the communication apparatus or the relay apparatus holds authentication information used in authentication processing required to access the server apparatus, a decision unit which decides, according to the determination result, a transmission method required to transmit the data by controlling an authentication processing unit of the apparatus that holds the authentication information to execute the authentication processing, and a transmission unit which transmits the data by the decided transmission method. | 2012-02-02 |
20120030736 | AUTHENTICATING A DATA ACCESS REQUEST TO A DISPERSED STORAGE NETWORK - A method begins by a data accessing module of a dispersed storage network (DSN) sending a data access request to a data storage module. The method continues with the data storage module sending an authentication request to an authenticating module. The method continues with the authenticating module outputting a verification request destined for the data accessing module, wherein the verification request includes a verification code that is generated based on the authentication request. The method continues with the data accessing module outputting a verification response that includes a modified verification code that is generated based on the verification code and a credential. The method continues with the authenticating module outputting an authentication response to the data storage module, wherein the authentication response is generated based on the verification response. The method continues with the data storage module facilitating the data access request when the authentication response is favorable. | 2012-02-02 |
20120030737 | SYSTEM AND METHOD FOR AUTHORIZING A PORTABLE COMMUNICATION DEVICE - Systems and methods of authorizing a portable communication device to access a network resource. In an embodiment, a request to access a network resource is received from a portable communication device via a network. A processor is used to dynamically and selectively determine whether the portable communication device is authorized to access the requested network resource. The determination may be based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information. If the portable communication device is authorized, it may be allowed to access the network resource. Otherwise, it may be redirected to an authentication system where it may be enabled to submit authentication-related information so that it may be authorized to access the requested network resource. | 2012-02-02 |
20120030738 | DIGITAL MEDIA CONTROLLER AND METHOD FOR SHARING MEDIA DATA BETWEEN NETWORKS USING THE DIGITAL MEDIA CONTROLLER - Digital media controller and a method for sharing media data include setting an account and a password. The method further includes when the second DMC sending input account and input password and logging on legally, searching and storing first shared media data in a first DMS into the shared folder and informing the second DMC to obtain a list of the first shared media data from the shared folder. The method further includes sending the first shared media data using a stream packet to the second DLNA network, in response that the first DLNA network receiving a request of accessing the first shared media data in the shared folder from the second DLNA network through a VPN. | 2012-02-02 |
20120030739 | METHOD AND APPARATUS FOR SECURITY OF MEDIUM INDEPENDENT HANDOVER MESSAGE TRANSMISSION - A method and an apparatus for securing media independent handover message transportation are provided. The method for securing media independent handover message transportation, include: performing an authentication procedure by a terminal with an access router to generate a master session key; transmitting the generated master session key and address information of the terminal to an information server by the access router; generating an information server key to be used in transmitting and receiving a message by the information server with the terminal using the received master session key and the address information of the terminal; and forming a secure channel by the terminal and the information server using the generated information server key. Since a key formed at a layer 2 is used in an MIH authentication step being a layer 3 not to repeatedly create a secure key, a security procedure may be rapidly performed. | 2012-02-02 |
20120030740 | AUTHENTICATION OF DEVICES OF A DISPERSED STORAGE NETWORK - A method begins by a first processing module generating a dispersed storage network (DSN) authentication request frame that includes authenticating data and an authenticating code, wherein the authenticating code references a valid authenticating process. The method continues with the first processing module transmitting the DSN authentication request frame to a second processing module. The method continues with the second processing module determining whether the second processing module includes the valid authentication process referenced by the authentication code. When the second processing module includes the valid authentication process, processing, by the second processing module, the authenticating data in accordance with the valid authentication process to produce processed authenticating data. The method continues with the second processing module generating a DSN authentication response frame that includes the processed authenticating data and transmitting the DSN authentication response frame to the first processing module. | 2012-02-02 |
20120030741 | METHOD FOR TERMINAL CONFIGURATION AND MANAGEMENT AND TERMINAL DEVICE - A method for terminal configuration and management includes: acquiring a configuration file, where the configuration file includes server account information; configuring the server account information in the acquired configuration file onto a Device Management Tree (DMT) of a terminal; based on the server account information, establishing a management session between the terminal and the server, and performing management and subsequent configuration on the terminal during the session. A corresponding terminal device and a corresponding system are also provided. Through the method, the terminal can determine, according to protocol version information supported by or corresponding to the corresponding server and carried in a configuration packet, a protocol that should be used for communication with a server, and perform configuration according to the correct protocol version, thus improving the operation efficiency. | 2012-02-02 |
20120030742 | METHODS AND APPARATUS FOR PROVIDING APPLICATION CREDENTIALS - Methods and apparatus for providing an application credential for an application running on a device. In one embodiment, a method provides an application credential to an application running on a device, wherein the application credential is used by the application to authenticate to a data server. The method comprises receiving a request to generate the application credential, wherein the request includes an application identifier. The method also comprises generating the application credential using the application identifier and a master credential associated with the device. | 2012-02-02 |
20120030743 | Fingerprint authentication server, client computer and fingerprint authentication method - A fingerprint authentication server device is disclosed. The fingerprint authentication server device includes a database in which user IDs and the registered fingerprint data of plural users are stored; and a hash value table including user hash values of the user IDs and the registered fingerprint data of the users. The fingerprint authentication server device is configured to receive a hash value of a user ID of a user to be authenticated and a hash value of registered fingerprint data associated with the user ID from a client computer; perform a search in the hash value table to determine whether there are hash values corresponding to the received hash values in the hash value table; and transmit a determination result to the client computer, thereby to cause the client computer to perform a fingerprint authentication process for a user for which correspondence of the hash values has been confirmed. | 2012-02-02 |
20120030744 | Method of Managing Sensitive Data in an Electronic Token - A method of managing data in an electronic token includes an initial step of storing a first data into the electronic token and into a secured site. Secret data, intended to be initialized in the electronic token, is identified. Instructions and a subset of the first data are also identified, wherein the subset allows the secret data to be rebuilt by applying the instructions. A reference identifying the subset is sent to the electronic token. In the electronic token, the secret data is rebuilt from the first data and the reference by applying the instructions. | 2012-02-02 |