07th week of 2015 patent applcation highlights part 67 |
Patent application number | Title | Published |
20150046889 | STATE GROUPING FOR ELEMENT UTILIZATION - Embodiments of a system and method for generating an image configured to program a parallel machine from source code are disclosed. One such parallel machine includes a plurality of state machine elements (SMEs) grouped into pairs, such that SMEs in a pair have a common output. One such method includes converting source code into an automaton comprising a plurality of interconnected states, and converting the automaton into a netlist comprising instances corresponding to states in the automaton, wherein converting includes pairing states corresponding to pairs of SMEs based on the fact that SMEs in a pair have a common output. The netlist can be converted into the image and published. | 2015-02-12 |
20150046890 | Method for Displaying Timing Information of an Integrated Circuit Floorplan - A method includes (a) generating timing information of an integrated circuit (IC) floorplan by a processing unit, (b) displaying on a display device a representation of the IC floorplan according to the timing information, (c) receiving user input via an input device, the user input associated with an IC macro of the IC floorplan, (d) updating the timing information associated with the IC macro to generated updated timing information according to the user input, and (e) altering display of the representation according to the updated timing information. | 2015-02-12 |
20150046891 | Cross-Talk Noise Computation Using Mixed Integer Linear Program Problems And Their Solutions - A method includes forming a mixed integer linear problem (MILP) capturing at least a plurality of timing windows over which aggressor net(s), electromagnetically coupled to a victim net in a circuit, produce computed cross-talk noise pulses potentially contributing to a maximum noise for the victim net. The MILP is solved to determine the maximum noise at the victim net. Responsive to the maximum noise meeting one or more criteria, at least an indication of the victim net is output. Forming may include forming a linear problem using overlapping timing windows for which noise pulses contribute to the maximum noise and converting the linear problem to the mixed integer linear problem by introducing into the linear problem binary variables that determine whether individual ones of overlapping or non-overlapping noise pulses from the one or more aggressor nets contribute to the maximum noise. Apparatus and program products are also disclosed. | 2015-02-12 |
20150046892 | Cross-Talk Noise Computation Using Mixed Integer Linear Program Problems And Their Solutions - A method includes forming a mixed integer linear problem (MILP) capturing at least a plurality of timing windows over which aggressor net(s), electromagnetically coupled to a victim net in a circuit, produce computed cross-talk noise pulses potentially contributing to a maximum noise for the victim net. The MILP is solved to determine the maximum noise at the victim net. Responsive to the maximum noise meeting one or more criteria, at least an indication of the victim net is output. Forming may include forming a linear problem using overlapping timing windows for which noise pulses contribute to the maximum noise and converting the linear problem to the mixed integer linear problem by introducing into the linear problem binary variables that determine whether individual ones of overlapping or non-overlapping noise pulses from the one or more aggressor nets contribute to the maximum noise. Apparatus and program products are also disclosed. | 2015-02-12 |
20150046893 | TECHNIQUES FOR ELECTROMIGRATION STRESS MITIGATION IN INTERCONNECTS OF AN INTEGRATED CIRCUIT DESIGN - A technique for electromigration stress mitigation in interconnects of an integrated circuit design includes generating a maximal spanning tree of a directed graph, which represents an interconnect network of an integrated circuit design. A first point on the spanning tree having a lowest stress and a second point on the spanning tree having a highest stress are located. A maximum first stress between the first and second points is determined. In response to determining the maximum first stress between the first and second points is greater than a critical stress, a stub is added to the spanning tree at a node between the first and second points. The maximum first stress between the first and second points is re-determined subsequent to adding the stub. | 2015-02-12 |
20150046894 | Constrained Placement of Connected Elements - An improved method for the placement and routing of compound elements, each comprising a series/parallel combination of nominally identical elements, is disclosed. The method treats each compound element as a separate cell (the sub-circuit construct commonly used in silicon chip design) so as to treat as a unit all the nominally identical elements that make up a compound value, and place them as a single group in the design of a chip. This results in the compound elements being placed as units and routed in such a way that all of the nominal elements are located together and any effects between compound values are thus relatively localized and optimally isolated. | 2015-02-12 |
20150046895 | VLSI Layouts of Fully Connected Generalized and Pyramid Networks with Locality Exploitation - VLSI layouts of generalized multi-stage and pyramid networks for broadcast, unicast and multicast connections are presented using only horizontal and vertical links with spacial locality exploitation. The VLSI layouts employ shuffle exchange links where outlet links of cross links from switches in a stage in one sub-integrated circuit block are connected to inlet links of switches in the succeeding stage in another sub-integrated circuit block so that said cross links are either vertical links or horizontal and vice versa. Furthermore the shuffle exchange links are employed between different sub-integrated circuit blocks so that spacially nearer sub-integrated circuit blocks are connected with shorter links compared to the shuffle exchange links between spacially farther sub-integrated circuit blocks. In one embodiment the sub-integrated circuit blocks are arranged in a hypercube arrangement in a two-dimensional plane. The VLSI layouts exploit the benefits of significantly lower cross points, lower signal latency, lower power and full connectivity with significantly fast compilation. | 2015-02-12 |
20150046896 | CAPACITOR ARRANGEMENT ASSISTING METHOD AND CAPACITOR ARRANGEMENT ASSISTING DEVICE - A capacitor arrangement assisting method wherein data entered by a user, such as the width w of a power supply wiring, the thickness h of a dielectric between the power supply wiring and a ground plane, the ESL | 2015-02-12 |
20150046897 | GENERALIZED MOMENT BASED APPROACH FOR VARIATION AWARE TIMING ANALYSIS - A method and apparatus of a device that performs a generalized moment based variation aware timing analysis on a circuit design is described. The device receives a signal path that traverses a plurality of gates. For each of the plurality of gates, the device retrieves a statistical distribution that represents delay variation at the gate. The statistical distribution for each gate is measured by a number of statistical moments that include higher order statistical moments besides the mean and the standard deviation of the distribution. The device computes statistical moments to represent the timing variation on the signal path by propagating statistical distributions of the gates on the signal path. The device reconstructs a statistical distribution function for timing variation on the signal path based on the computed statistical moments. | 2015-02-12 |
20150046898 | SYSTEM AND METHOD FOR PROVISIONING A DYNAMIC MODULE SYSTEM WITHIN A COMPONENT ORIENTED APPLICATION DEVELOPMENT FRAMEWORK - A system and method can support a hybrid application development environment. The system can provision a framework instance for a dynamic module system in the application runtime environment. Furthermore, the system can associate a host application in the application runtime environment with a system bundle in the dynamic module system, wherein an application class loader can be used to load the framework instance when the host application is started/loaded. Then, the host application can export one or more resources associated with the host application to the dynamic module system, and/or consume one or more services provided by the dynamic module system. | 2015-02-12 |
20150046899 | PRESCRIBING A SOFTWARE ARCHITECTURE FOR IMPLEMENTING SERVICE INTEGRATION - An approach is provided for prescribing a software architecture to implement service integration. To determine first and second products, a first weight of a first software architecture is multiplied by weights of first requirements of a service and a second weight of a second software architecture is multiplied by weights of second requirements of the service. The first and second requirements are satisfied, respectively, by first and second sets of responses respectively associated with the first and second software architectures. A first summation of the first products is determined to be greater than a second summation of the second products. Based on the first summation being greater than the second summation, the first software architecture instead of the second software architecture is prescribed to realize the service in a service integration implementation. A work effort required to utilize the first software architecture to realize the service is estimated. | 2015-02-12 |
20150046900 | STRATEGY EDITOR FOR PROCESS CONTROL SUPPORTING DRAG AND DROP CONNECTIONS TO DECLARATIONS - Enhancements to a strategy object editor for creating and modifying control strategies for process control systems (both distributed and discrete) is described. The improvements include: supporting a set of graphical depictions for individual control object (modified by an appearance object editor), drag and drop connections for declarations that connect control strategies to other control strategies, GUI-based designation of object execution order, automatically applied line styles based upon connection data type, and automatic modification of elements within an appearance object to accommodate a moved attribute. | 2015-02-12 |
20150046901 | DYNAMIC CLASS LOADING - Approaches are described for loading code on an electronic device by altering the behavior of an application's classloader. The application can be received at an application store, and the application can be injected with code. The application can be downloaded from the application store and installed on the portable computing device or other device, and in response to starting the application, the injected code can be configured to select classes or other application code, and modify a classpath associated with the application to reference the selected classes or application code. | 2015-02-12 |
20150046902 | EXECUTION SEMANTICS FOR SUB-PROCESSES IN BPEL - A system and method for facilitating execution of a portion of a process via a subprocess. An example method includes encapsulating process logic of a portion of a parent process via the subprocess, wherein the parent process is encoded via a business process language characterized by process lifecycle management functionality; using an instance of a call activity in a scope of the parent process or subprocess to activate the subprocess, yielding a called subprocess in response thereto; and employing a business process runtime engine to adjust a scope of the subprocess to inherit the scope of the process used to call the subprocess, thereby enabling the process lifecycle management functionality to govern a lifecycle of the subprocess. In a more specific embodiment, the business process language includes standard Business Prosecution Execution Language (BPEL); the parent process represents a business process; and the subprocess includes a standalone subprocess. | 2015-02-12 |
20150046903 | PREDICTING IMMEDIATE BUILD TARGETS - Respective dependencies are identified for each build target in a plurality of build targets. In response to scheduling a build for any build target in the plurality of build targets, determining that all dependencies for a build target in the plurality of build targets have one of the following classifications list: no build is required, built, currently being built, and ready to build, and classifying the target as available for preparatory build activities. In another aspect of the invention, each build target in the plurality of build targets that is available for preparatory build activities is classified as considered to be built. For these build targets, in response to scheduling a build for a build target in the plurality of build targets, classifying the target as available for preparatory build activities. | 2015-02-12 |
20150046904 | OBSERVING EVOLUTION OF SOFTWARE DEVELOPMENT ARTIFACTS - Methods, systems, and computer-readable storage media for providing notifications in distributed development. In some implementations, actions include receiving change information, the change information indicating one or more changes to source code, processing the change information to determine one or more entities associated with the change, comparing the one or more entities to one or more subscriptions, the one or more subscriptions being specific to a user, for each entity associated with a subscription, providing a notification in a set of notifications, and providing a sub-set of notifications for display to the user. | 2015-02-12 |
20150046905 | SUBPROCESS DEFINITION AND VISUALIZATION IN BPEL - A system and method for enabling reuse of a portion of a business process. An example method includes employing a business process language to facilitate accessing a definition of a subprocess characterizing the process logic, wherein the definition indicates one or more parameters to be used by the subprocess to implement a task specified by the process logic; and employing the definition to facilitate: using one or more variables of a parent process as one or more arguments that are passed to an instantiated version of the subprocess, and mapping the one or more arguments to the one or more parameters. In a more specific embodiment, the example method further includes characterizing a behavior of the subprocess via one or more dynamic scoping rules. The business process language includes a version of Business Process Execution Language (BPEL), and a BPEL extension activity facilitates defining the subprocess. | 2015-02-12 |
20150046906 | TEST PLANNING WITH ORDER COVERAGE REQUIREMENTS - A method, apparatus and computer-implemented method, the method comprising: receiving a combinatorial testing model comprising an attribute collection, the attribute collection comprising a predetermined number of initial attributes, one or more possible values for each of the initial attributes, a coverage requirement, and an order coverage requirement for the initial attributes, the order coverage requirement related to predetermined relative order in which the attribute values are to be applied; and providing two or more tests in which each of the initial attributes is assigned a value from the possible values, wherein the tests satisfy the order coverage requirement for the at least two attributes. | 2015-02-12 |
20150046907 | VALIDATING TRANSLATIONS OF EXTERNALIZED CONTENT FOR INCLUSION IN AN APPLICATION - An approach is provided for validating translated files for inclusion in an application being developed. Content in a natural language is translated into another language and received as a first translation in a first translated file. Based on an error condition indicated by simulations of loading and presenting the first translation in a user interface of the application, a syntax error that causes the error condition is determined. The syntax error can include a lack of a match between a key and exactly one value, a missing key, or a mismatch of placeholders in the first translated file. Responsive to a receipt of a second translation of the content that includes the correction of the syntax error, and based on simulations of loading and presenting the second translation in the interface not indicating the error condition, the second translation is presented at runtime without causing the application to stop running. | 2015-02-12 |
20150046908 | SYSTEM AND METHOD FOR HYPERVISOR BREAKPOINTS - Methods and systems allow the use of hypervisors to use software breakpoints in the same manner as hardware breakpoints. A program to be tested is executed by a hypervisor running a virtual machine. A memory page containing the location of a breakpoint is copied to a temporary memory page. Then a new page is written containing breakpoint instructions at specified memory locations. The new page is tagged as execute only, so the program to be tested is unaware of any changes to the program. If the program attempts to read from the changed memory page, it will read from the temporary memory page instead. Such a method can be used to search websites for malware in relative safety because of the inability of the malware to write to memory locations that are located on a page that is execute only. | 2015-02-12 |
20150046909 | System, Method, and Apparatus for Automatic Recording and Replaying of Application Executions - A method comprises receiving data pertaining to a recorded interaction between a test device operating system and an application on a test device, the recorded interaction being based on a user input; compiling the data pertaining to the recorded interaction in a script compiler, the data comprising human-readable action-description language; sending the compiled data comprising human-readable action-description language from the script compiler of the server to a developer device; receiving modified data from the developer device; and sending the modified data from the developer device to the test device. | 2015-02-12 |
20150046910 | HARDWARE COMPILATION AND/OR TRANSLATION WITH FAULT DETECTION AND ROLL BACK FUNCTIONALITY - Hardware compilation and/or translation with fault detection and roll back functionality are disclosed. Compilation and/or translation logic receives programs encoded in one language, and encodes the programs into a second language including instructions to support processor features not encoded into the original language encoding of the programs. In one embodiment, an execution unit executes instructions of the second language including an operation-check instruction to perform a first operation and record the first operation result for a comparison, and an operation-test instruction to perform a second operation and a fault detection operation by comparing the second operation result to the recorded first operation result. In some embodiments, an execution unit executes instructions of the second language including commit instructions to record execution checkpoint states of registers mapped to architectural registers, and roll-back instructions to restore the registers mapped to architectural registers to previously recorded execution checkpoint states. | 2015-02-12 |
20150046911 | RE-FACTOR CODE TO USE METHOD CHAINING WITH OPTIMIZER TOOL - Optimizing compiled code includes finding a portion of the compiled code arising from method calls in a portion of source code that were not chained method calls. Modified code is produced for the portion of the compiled code, wherein the modified code conforms to compiled code that would have arisen from source code having chained calls equivalent to the method calls that were not chained in the portion of the source code. | 2015-02-12 |
20150046912 | Method for Controlling Inlining in a Code Generator - The various aspects leverage the novel observation that the number of call sites in code is directly correlated with the code's compile time and provide methods implemented by a compiler operating on a computing device (e.g., a smartphone) for performing inline throttling based on a projected number of call sites in the code that would exist after performing inline expansion. The various aspects enable the compiler to improve the performance of the generated code by aggressive inlining while carefully managing increases in compile time, thereby decreasing the power required to compile the code while increasing performance of the computing device. Thus, by inlining enough call sites to reduce the costs of handling calls while accounting for the costs of inlining, the various aspects provide for an effective balance of short compile times and effective code performance. | 2015-02-12 |
20150046913 | DATA SPLITTING FOR MULTI-INSTANTIATED OBJECTS - Embodiments relate to data splitting for multi-instantiated objects. An aspect includes receiving a portion of source code for compilation having a dynamic object to split using object size array data splitting. Another aspect includes replacing all memory allocations for the dynamic object with a total size of an object size array and object field arrays including a predetermined padding. Another aspect includes inserting statements in the source code after the memory allocations to populate the object size array with a value of a number of elements of the object size array. Another aspect includes updating a stride for load and store operations using dynamic pointers. Yet another aspect includes modifying field references by adding a distance between the object size array and the object field array to respective address operations. | 2015-02-12 |
20150046914 | SYSTEM AND METHOD FOR REFERENCING A DYNAMIC MODULE SYSTEM WITHIN A COMPONENT ORIENTED APPLICATION DEVELOPMENT FRAMEWORK - A system and method can support a hybrid application development environment. The system allows a client application in the application runtime environment to obtain a reference to a framework instance for a dynamic module system. Furthermore, the system can configure a bundle in the dynamic module system to be a gateway bundle based on the framework instance, and the client application can access the dynamic module system using the gateway bundle. | 2015-02-12 |
20150046915 | PROVIDING AN IMPROVED WEB USER INTERFACE FRAMEWORK FOR BUILDING WEB APPLICATIONS - Disclosed are methods, systems, and computer program products for updating a web application displayed on a client machine. In some implementations, a server maintains a database of application identifiers identifying instances of one or more web applications. The server receives, from a first client machine, a communication identifying a first web application and a first application identifier, the instance of the first web application being associated with one or more components. The server determines that the first application identifier is not included in the database of application identifiers, and generates an updated application identifier for the instance of the first web application based on component version identifiers of the one or more components. The server stores the updated application identifier and transmits a notification to the first client machine indicating that the instance of the first web application is out-of-date. | 2015-02-12 |
20150046916 | METHOD AND LICENSING SYSTEM FOR AUTOMATICALLY LICENSING SERVICE FEATURES DURING THE UPGRADE OF A COMMUNICAITON SYSTEM - The invention relates to a method for automatically licensing service features during the upgrade of a first communication system ( | 2015-02-12 |
20150046917 | AUTOMATIC QUALITY ASSURANCE FOR SOFTWARE INSTALLERS - An approach for assuring quality of a software installer is presented. A change between first and second views of an operating system is determined. The second view is recorded after executing an installer to create installed software application components. The installation is determined to be successful. A location for an installed shortcut for the software application is determined. Executable and command line information inside the shortcut is extracted using the location. Based on the extracted executable and command line information, the application is executed to perform a test of the application. While the application is executing, a close signal is sent to a window of the application. An exit code from the application is read. If the exit code matches a standard exit code, the test is documented as being successful. If the exit code does not match the standard exit code, the test is documented as being unsuccessful. | 2015-02-12 |
20150046918 | Application Distribution Method, Terminal, and Server - The present invention discloses an application distribution method, a terminal, and a server. The method includes: sending, by a first terminal, a distribution request to an application distribution server; when the distribution request satisfies a preset criterion of the application distribution server, receiving at least one propagation code sent by the application distribution server; and sending the propagation code to a second terminal, so that the second terminal completes registration, running, and tracking of an application according to the propagation code. The present invention can be applied to an intelligent terminal for acquiring and distributing an application, however, the present invention is not limited thereto. | 2015-02-12 |
20150046919 | INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE - It is provided an information processing method, applied to a first electronic device including a display unit, M applications being installed in the first electronic device with M being an integer greater than or equal to 1. The method includes: detecting a first data transmission operation for transmitting a first display object of M display objects, for the M display objects displayed in a first interface of the display unit, wherein the M display objects correspond to the M applications; retrieving a first transmission file corresponding to a first application according to a predetermined rule in response to the first data transmission operation; and transmitting the first transmission file to at least one second electronic device so that the at least one second electronic device can receive and run the first transmission file to have the first application available. An electronic device is also provided. | 2015-02-12 |
20150046920 | REQUEST PROCESSING TECHNIQUES - A computer system implements a hypervisor which, in turn, implements one or more computer system instances and a controller. The controller and a computer system instance share a memory. A request is processed using facilities of both the computer system instance and the controller. As part of request processing, information is passed between the computer system instance and the controller via the shared memory. | 2015-02-12 |
20150046921 | APPLICATION BOOT IMAGE - Application boot images are generated for later instantiation of computer system images. A computer system partially executes executable code of an application source. A snapshot of the computer system is taken and the snapshot is used to build a repository of application boot images that can be accessed for computer system instantiation. | 2015-02-12 |
20150046922 | PER REQUEST COMPUTER SYSTEM INSTANCES - As requests are received, virtual computer systems are provisioned to process the requests. The virtual computer systems may be configured without various components typically implemented by virtual computer systems, such as traditional operating systems, network interfaces and the like. Application images for the virtual computer systems are configured so that execution of the applications can begin soon after provisioning, with minimal overhead the provisioning process contributing relatively little to any latency in processing the request. | 2015-02-12 |
20150046923 | DIFFERENTIAL VOLTAGE AND FREQUENCY SCALING (DVFS) SWITCH REDUCTION - Technologies are generally described for systems, devices and methods effective to schedule access to a core. In some examples, a first differential voltage frequency scaling (DVFS) value of a first virtual machine may be received by a virtual machine manager. A second DVFS value of a second virtual machine may be received by the virtual machine manager. A third DVFS value of a third virtual machine may be received by the virtual machine manager. The third DVFS value may be substantially the same as the first DVFS value and different from the second DVFS value. A dispatch cycle may be generated to execute the first, second and third virtual machines on the core. After execution of the first virtual machine, the dispatch cycle may require execution of the third virtual machine before execution of the second virtual machine. | 2015-02-12 |
20150046924 | TRANSPARENT MEMORY-MAPPED EMULATION OF I/O CALLS - A virtual-machine-based system provides a mechanism to implement application file I/O operations of protected data by implementing the I/O operations semantics in a shim layer with memory-mapped regions. The semantics of these I/O operations are emulated in a shim layer with memory-mapped regions by using a mapping between a process' address space and a file or shared memory object. Data that is protected from viewing by a guest OS running in a virtual machine may nonetheless be accessed by the process. | 2015-02-12 |
20150046925 | VIRTUAL MACHINE REDEPLOYMENT - One or more techniques and/or systems are disclosed for redeploying a baseline VM (BVM) to one or more child VMs (CVMs) by merely cloning virtual drives of the BVM, instead of the entirety of the parent BVM. A temporary directory is created in a datastore that has the target CVMs that are targeted for virtual drive replacement (e.g., are to be “re-baselined”). One or more replacement virtual drives (RVDs) are created in the temporary directory, where the RVDs comprise a clone of a virtual drive of the source BVM. The one or more RVDs are moved from the temporary directory to a directory of the target CVMs, replacing existing virtual drives of the target CVMs so that the target CVMs are thus re-baselined to the state of the parent BVM. | 2015-02-12 |
20150046926 | VIRTUAL MACHINE DEPENDENCY - One or more techniques and/or systems are provided for describing virtual machine dependencies. In particular, data objects, such as virtual hard drives, associated with virtual machines may be identified and/or examined to identify data structures, such as configuration files, comprising configuration data. The configuration data may be analyzed to determine dependency relationships between virtual machines to describe virtual machine dependencies. Identifying virtual machine dependencies, among other things, allows virtual machines that are no longer used to be repurposed, deleted, reset, etc. with little to no adverse effect on other virtual machines. | 2015-02-12 |
20150046927 | Allocating Processor Resources - Disclosed herein is a method of allocating resources of a processor executing a first real-time code component for processing a first sequence of data portions and a second code component for processing a second sequence of data portions. At least the second code component has a configurable complexity. The method comprises estimating a first real-time performance metric for the first code component, and configuring the complexity of the second code component based on the estimated first real-time performance metric. | 2015-02-12 |
20150046928 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY INCREASING RESOURCES UTILIZED FOR PROCESSING TASKS - Mechanisms and methods are provided for dynamically increasing resources utilized for processing tasks. These mechanisms and methods for dynamically increasing resources utilized for processing tasks can enable embodiments to adjust processing power utilized for task processing. Further, adjusting processing power can ensure that quality of service goals set for processing tasks are achieved. | 2015-02-12 |
20150046929 | USING-SUB-PROCESSES ACROSS BUSINESS PROCESSES IN DIFFERENT COMPOSITES - A system and method for facilitating reuse of a portion of process logic by different processes. An example method includes providing a subprocess that is adapted to perform the process logic in a file accessible to a composite system, wherein the subprocess is adapted to be called by a first parent process via a subprocess extension to a business process language employed to encode the first parent process; using a call activity defined as part of the subprocess extension, and included in a scope of the first parent process to facilitate access to functionality of the subprocess by the parent process; and employing a business process engine to facilitate instantiating the subprocess, resulting in an instantiated subprocess in response thereto; and using a second parent process to share use of the instantiated subprocess with the first parent process. | 2015-02-12 |
20150046930 | Method And System For Integrating Applications - A method and system for integrating computer applications is disclosed. A first data on a screen of a source application is intercepted. A target application is then executed and the first data is populated in one or more data fields on a screen of the target application. Thereafter, a second data on the screen of the target application is intercepted and populated in the one or more data fields on the screen of the source application. | 2015-02-12 |
20150046931 | APPARATUS AND METHOD FOR CONTROLLING A SYSTEM CALL IN A PORTABLE TERMINAL - An apparatus and a method for controlling a system call in a portable terminal are provided. The method includes searching for a first process control block of a task to which a first software interrupt is applied; detecting a system call interface table from the retrieved first process control block; searching for a system call service routine from the detected system call interface table; and executing a system call using the retrieved system call service routine. | 2015-02-12 |
20150046932 | USER DEVICE AND METHOD TO PROCESS SENSOR OUTPUT USING A PLURALITY OF PROCESSORS - A user device for processing a sensor output is provided. The user device includes a first processor configured to sense a context awareness input based on the sensor output, a second processor configured to sense an effective input based on the sensor output, and a switch configured to convert a connection between the sensor output and the first processor to a connection between the sensor output and the second processor when the first processor that is connected to the sensor output is deactivated, and to convert the connection between the sensor output and the second processor to the connection between the sensor output and the first processor when the first processor is activated. The second processor is further configured to request activation of the first processor when the second processor senses the effective input. | 2015-02-12 |
20150046933 | EVENT HANDLING - A method of handling events is described. The method comprises: receiving an event; transmitting the event to a remote management application; receiving a new event; ascertaining if the new event fulfils an event storm criterion; suppressing the new event if the new event fulfils the event storm criterion; and transmitting the new event to the remote management application if the new event does not fulfil the event storm criterion. | 2015-02-12 |
20150046934 | IDENTIFYING SOFTWARE APPLICATION EVENTS - In one embodiment, a method includes receiving, by a server computing device, a notification which includes: information associated with the identity of the user associated with the user-initiated event or with the identity of the client computing device; a variable, pre-determined string of symbols for the user-initiated event associated with the notification; a variable number describing a value of an attribute associated with the user-initiated event; and a variable parameter describing an attribute of the user at or near the time of the event or an attribute of the variable number. The method includes correlating, by the server computing device, the user-initiated events with a user; and determining, by the computing device, a description of the user-initiated event associated with the notification based at least in part on the string of symbols. | 2015-02-12 |
20150046935 | Guaranteed Ad Targeting with Stable Precision - In one embodiment, a method trains a predictive model configured to predict a probability that advertisement (ad) impressions belong to a segment that is being targeted where the ad impressions are provided during sending of videos to users. A first threshold is determined in which the probability predicted from the predictive model is compared to determine whether ad impressions belong to the segment. A distribution probability used in the training of the predictive model is determined. The distribution probability is determined based on a characteristic for ad impressions on a site. Then, a changed distribution probability for the site is determined. The method further determines a second threshold in which the probability predicted from the predictive model is compared to determine whether ad impressions belong to the segment. | 2015-02-12 |
20150046936 | SYSTEM AND METHOD FOR DETECTING AND CLASSIFYING DIRECT RESPONSE ADVERTISEMENTS - The present invention relates to a system and method for detecting and classifying direct response advertisements, and provides a system for detecting and classifying direct response advertisements, including an advertisement candidate segment generation unit for generating an advertisement candidate segment for an advertisement section detected from a broadcast stream; a matching unit for determining whether the advertisement candidate segment matches each advertisement segment stored in an advertisement database (DB); a direct response advertisement determination unit for, if it is determined by the matching unit that an advertisement segment matching the advertisement candidate segment is not present, determining whether the advertisement candidate segment is a direct response advertisement; a direct response advertisement registration unit for storing the advertisement candidate segment, determined to be the direct response advertisement by the direct response advertisement determination unit, as an advertisement segment that is the direct response advertisement in the advertisement DB; and a direct response advertisement grouping unit for, if it is determined by the matching unit that an advertisement segment matching the advertisement candidate segment is present, and the matching advertisement segment is a direct response advertisement, grouping the advertisement candidate segment with advertisement segments that are direct response advertisements stored in the advertisement DB, and the method using the system. | 2015-02-12 |
20150046937 | TRANSMISSION APAPRATUS, TRANSMISSION METHOD, RECEPTION APPARATUS, RECEPTION METHOD, PROGRAM, AND BROADCASTING SYSTEM - Disclosed herein is a transmission apparatus for transmitting AV (Audio/Video) content, including: an acquirer configured to acquire an estimated number of audience terminals indicative of an estimated number of reception apparatuses receiving the AV content; a computer configured, in conjugation with the AV content, to compute, on the basis of the estimated number of audience terminals, a validity probability of trigger information associated with control of an application program to be executed in the reception apparatus; a generator configured to generate the trigger signal including the computed validity probability; and a transmitter configured to transmit the generated trigger information with the AV content. | 2015-02-12 |
20150046938 | METADATA VALIDATION - A method includes receiving a video content metadata entry. The method also includes accessing video content metadata validation rules. The method further includes determining whether the video content metadata entry is valid based on the video content metadata validation rules. The video content metadata entry is reported as a valid video content metadata entry in response to a determination that the video content metadata entry is valid. The method also includes reporting the video content metadata entry as an invalid video content metadata entry in response to a determination that the video content metadata entry is invalid. | 2015-02-12 |
20150046939 | SEAMLESS MULTI-CHANNEL TV EVERYWHERE SIGN-N - A network device receives a unique device identifier (UDID) associated with a mobile device belonging to a user, and content channel subscription information associated with the user, and stores the UDID and the content channel subscription information in a database. The network device receives the UDID and a channel identifier (ID) from a content application executing at the mobile device, and accesses the database with the UDID and the channel ID to verify the user's subscription to a content channel identified by the channel ID. The network device sends, if the user's subscription to the content channel is verified, a channel permission and a timestamp, to the mobile device, such that the mobile device is able to access content at a content provider corresponding to the channel ID prior to an expiration time that is based on the timestamp. | 2015-02-12 |
20150046940 | METHOD OF PROVIDING ASSOCIATED SERVICE - The present invention relates to a method for providing an associated service. According to the present invention, a program runtime event (PRE) information corresponding to an event generated while a digital broadcast program is being reproduced is transmitted to a receiver in which an application is being executed, and the application receives and displays additional information associated with the PRE information, thereby providing a service linked to the digital broadcast program. | 2015-02-12 |
20150046941 | VIDEO DISPLAY DEVICE, VIDEO DISPLAY METHOD, AND PROGRAM - An AV playback device includes: advertisement storage which stores an advertisement to be displayed on an AV monitor; a platform which displays an operation menu as a graphical user interface on the AV monitor; a platform which receives an operation on the operation menu on the screen by the user; and a advertisement player which displays the advertisement stored in the advertisement storage on the AV monitor upon the displaying of the operation menu on the AV monitor by the platform or the receiving of the operation by the platform. | 2015-02-12 |
20150046942 | SERVER LOAD BALANCING FOR INTERACTIVE TELEVISION - A method consistent with certain implementations involves receiving a triggered declarative object (TDO) to a digital television receiver device that carries out a programmed routine when activated; receiving a trigger object associated with the TDO to the digital television receiver device; receiving a back-off parameter that represents a time interval during which the trigger is to initiate an operation; the digital television receiver device having a processor that establishes a random time within the time interval of the backoff parameter in which the TDO is activated; and the digital television receiver device processor initiating the operation at the random time. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2015-02-12 |
20150046943 | AUTOMATIC SWITCHING FROM PRIMARY TO SECONDARY AUDIO DURING EMERGENCY BROADCAST - An audio video display device (AVDD) includes a display, a processor controlling the display and a computer readable storage medium that is accessible to the processor. The computer readable storage medium bears instructions which when executed by the processor cause the processor to present, on the AVDD, AV content that is not associated with information pertaining to an emergency. The instructions cause the processor to receive, at the AVDD, data associated with an emergency alert and, responsive to receiving the data associated with the emergency alert, change audio presented on the AVDD from first audio presented on the AVDD and associated with the AV content to second audio associated the data to present the second audio. The second audio is presented on the AVDD automatically without receiving user input to change from the first audio to the second audio subsequent to receiving the data associated with the emergency alert. | 2015-02-12 |
20150046944 | TELEVISION CONTENT THROUGH SUPPLEMENTARY MEDIA CHANNELS - A method and system implements supplementary media channels to Internet-protocol television (IPTV) channels. An IPTV user may receive a selected IPTV program on an IPTV channel. The IPTV program may be correlated in time with metadata describing the content of the IPTV program. At a point in the IPTV program, the metadata may match with user configuration information for receiving supplemental content. A supplementary media channel may be used at such point to provide the supplemental content to the IPTV user during the IPTV program. Supplemental content may include additional storyline content for the IPTV program or an advertising message, a redeemable coupon, a promotional offer, or an order invitation. The supplementary media channel may include a telephone connection with the IPTV user, an email message, a text message, or an instant message sent to the IPTV user, or a voice-over-Internet-protocol (VoIP) connection with the IPTV user. | 2015-02-12 |
20150046945 | Method for Controlling Touch Screen, and Mobile Terminal - A method for controlling touch screens and a mobile terminal are disclosed. The method includes: a mobile terminal, connected with an HDMI device, requesting the HDMI device for obtaining a right of controlling a touch screen of the HDMI device; and after receiving a permission response message of the HDMI device, the mobile terminal performing a control operation on the touch screen of the HDMI device. | 2015-02-12 |
20150046946 | ELECTRONIC PROGRAM GUIDE WITH DIGITAL STORAGE - An interactive television program guide system with digital storage is provided. The program guide gives users the ability to store information associated with recorded programs in a directory in the digital storage device thereby providing easy access to program information. The program guide may also provide a global media library for indicating the programs stored on removable storage media used with the program guide. The guide may also allow the user to manage and maintain a user media library to do the same. Non-time-sensitive data associated with recorded programs may be stored in a way that allows the user to interact with the data on playback as if the program were being originally aired. The program guide also allows the user to define “super-programs” for playback of a sequence of stored programs or program segments. | 2015-02-12 |
20150046947 | SYSTEM AND APPARATUS FOR ENHANCING DELIVERY OF MEDIA SERVICES - A system and apparatus for enhancing delivery of media services is disclosed. A system that incorporates teachings of the present disclosure may include, for example, receiving a request for content information received during a presentation of a first multimedia program on equipment. The request is provided by a signal disassociated with a satellite signal to the equipment providing the multimedia satellite service. The content information is provided to a remote mobile device concurrent with the presentation of the first multimedia program at the equipment. A selection obtained from the mobile device is identified from among the content information provided to the mobile device, and the selection is provided to the equipment. Operation of a media processor of the equipment is directed based on the selection. Additional embodiments are disclosed. | 2015-02-12 |
20150046948 | DIGITAL BROADCAST RECEIVER CONTROLLED BY SCREEN REMOTE CONTROLLER AND SPACE REMOTE CONTROLLER AND CONTROLLING METHOD THEREOF - A data processing method and a television controlled by a remote controller are described. The television includes a tuner to receive a broadcast program, an infrared (IR) module to receive an IR signal from a physical remote controller, a controller to change a power-off state into a power-on state based on the received IR signal, a radio frequency (RF) module configured to receive an RF signal from the physical remote controller, and a display module to display a screen remote controller in a predetermined region while displaying the received broadcast program in a screen of the television. The screen remote controller's size is changeable depending on a user's selection. The screen remote controller comprises a first control region comprised of sub-regions used to change at least one channel of the television and a second control region comprised of at least one sub-region used to link to the Internet. | 2015-02-12 |
20150046949 | TIME-LINE BASED DIGITAL MEDIA POST VIEWING EXPERIENCE - Disclosed are a digital media asset selection interface and method. The interface may comprise a plurality of digital media assets that are displayed to a user such that the user can navigate the digital media assets in a first direction and a second direction, such as a horizontal direction and a vertical direction. In a more particular embodiment, the digital media assets are listed horizontally such that assets listed to the left of a selection pane represent a “past” aspect and assets listed to the right of a selection pane represent a “future” aspect. The digital media assets listed vertically are related to one another in some way. | 2015-02-12 |
20150046950 | DISPLAY APPARATUS AND METHOD OF SETTING UP CHANNEL OF THE SAME - Disclosed are a display apparatus and a method of setting up a channel of the same. The method includes receiving a channel retrieval request on a setting screen displayed on the display apparatus, retrieving a determined frequency band corresponding to the received channel retrieval request, and selecting one of a terrestrial broadcasting mode and a cable broadcasting mode in response to a retrieval result. Thus, automatically retrieving a frequency band corresponding to one connected broadcasting mode of a terrestrial broadcasting mode and a cable broadcasting mode is possible. | 2015-02-12 |
20150046951 | INTELLIGENT URL SYSTEM FOR RECOMMENDING VIDEO PROGRAMS - An addressing format, or intelligent Uniform Resource Locator (IURL), is used to direct users amongst content across disparate sources. Information about media content items available across the disparate sources is managed by a server which relates the media content items and the different sources from which a media content item may be accessed in a database. When a user desires to share media content, an iURL referencing the media content is generated for the user to share. When a given user selects the iURL, information about the content sources available to the given user in conjunction with the content referenced by the iURL are processed to determine a configuration of the content sources available to the given user (which often differs from the user having shared the content) to effect playback the media content. | 2015-02-12 |
20150046952 | USE OF TELEVISION SATELLITE SIGNALS TO DETERMINE LOCATION - Various arrangements are directed to locating a television receiver. Multiple tuners of the television receiver may be simultaneously tuned to different television distribution satellites to receive timing signals. Using these timing signals, the location of the television receiver may be determined Based on a comparison between a stored, expected location of the television receiver and the determined location, the functionality of the television receiver may be adjusted. | 2015-02-12 |
20150046953 | Systems and Methods for Providing Synchronized Content - Systems and methods for providing synchronized content are disclosed. The synchronized content may be content related to visual content captured by an imager of a mobile computing device. The mobile computer device may send the captured visual content to a content synchronization server that may identify the captured visual content, find relevant content associated with the captured visual content, synchronize the relevant content with the captured visual content, and send the synchronized relevant content to the client device. | 2015-02-12 |
20150046954 | Set Top/Back Box, System and Method for Providing a Remote Control Device - A set top/back box and system and method for providing a remote control device are disclosed. In one embodiment, one or more wireless transceivers are located within a housing, which also interconnectively includes television input/output, a processor, and memory. The set top/back box may establish a pairing with a programmable device, such as a proximate wireless-enabled interactive handheld device having a touch screen display, whereby formatted parallel audiovisual experience instructions, including virtual buttons, may be transmitted to the programmable device for display on the touch screen display to create an experience parallel to the experience on the television. The set top/back box receives and processes virtual remote control functionality input instructions from the programmable device to control amenities associated with the set top/back box. | 2015-02-12 |
20150046955 | WIRELESS TRANSMISSION SYSTEM, RELAY DEVICE, WIRELESS SINK DEVICE, AND WIRELESS SOURCE DEVICE - A wireless transmission system is provided that can minimize the control command transmission amount by operating a plurality of sink devices in conjunction with each other with respect to each group. The wireless transmission system includes: a bridge device ( | 2015-02-12 |
20150046956 | WIRELESS TRANSMISSION SYSTEM, RELAY DEVICE, WIRELESS SINK DEVICE, AND WIRELESS SOURCE DEVICE - A wireless transmission system is provided that can minimize the control command transmission amount by operating a plurality of sink devices in conjunction with each other with respect to each group. The wireless transmission system includes: a bridge device ( | 2015-02-12 |
20150046957 | TVOD SONG PLAYING METHOD AND PLAYER THEREFOR - An embodiment of the present invention provides a TVOD song playing method, comprising: assigning coordinates of a starting point and an end point to each sentence of lyrics; determining a coordinate of a click position; determining, according to the coordinate of the click position, coordinates of the starting point and the end point of lyrics to be played; and playing the lyrics corresponding to the coordinates of the starting point and the end point. Another embodiment of the present invention further provides a TVOD song player, comprising: a lyrics editing module, a coordinate determining module, and a playing module. | 2015-02-12 |
20150046958 | COMMUNICATION APPARATUS THAT PERFORMS STREAMING DISTRIBUTION, METHOD OF CONTROLLING COMMUNICATION APPARATUS, REPRODUCTION APPARATUS, METHOD OF CONTROLLING REPRODUCTION APPARATUS, AND STORAGE MEDIUM - A communication apparatus capable of switching between videos to be each displayed on a reproduction apparatus based on video data subjected to streaming distribution, on a distributor side. A camera registers management information of a plurality of cameras capable of distributing images to a PC by streaming distribution in a camera management table. Selection of a camera that is to distribute images to the PC is received from a user on a camera selection screen of the camera. The camera management table is updated so as to distribute images from the selected camera to the PC. Upon receipt of a playlist acquisition request from the PC, the camera generates a playlist based on the updated camera management table, and sends the generated playlist to the PC as a response. | 2015-02-12 |
20150046959 | QUALITY FEEDBACK MECHANISM FOR BANDWIDTH ALLOCATION IN A SWITCHED DIGITAL VIDEO SYSTEM - In a switched digital video content-based network, wherein a head end obtains a first group of program streams and sends to a client only a subset of the program streams selected by subscribers in a neighborhood of the client, imminence and/or presence of a condition of inadequate bandwidth is determined. Responsive to the determining, a bit rate of at least one of the subset of the program streams selected by the subscribers in the neighborhood of the client is dynamically decreased by adjusting encoding thereof, while maintaining adequate quality for the at least one of the subset of the program streams selected by the subscribers in the neighborhood of the client, based on an objective quality measure, in order to address the imminence and/or presence of the condition of inadequate bandwidth. | 2015-02-12 |
20150046960 | METHOD AND APPARATUS FOR NETWORK BANDWIDTH ALLOCATION - Methods and apparatus for assigning bandwidth to a network based on two or more different service levels. In an exemplary embodiment, video on-demand (VOD) session requests within a service group of an HFC cable network are assigned bandwidth such that maximum opportunity is given to grant HD VOD request among SD VOD requests, while meeting the goal of minimizing service disruption by spreading the sessions over multiple QAM channels, and limiting the maximum number of active VOD sessions of any kind. | 2015-02-12 |
20150046961 | METHOD OF PROCESSING NON-REAL TIME SERVICE AND BROADCAST RECEIVER - A method of processing a non-real time service of a broadcast receiver, which receives and processes a service being transmitted in non-real time, and a broadcast receiver are disclosed. Herein, the method of processing a non-real time service in a broadcast receiver includes receiving in non-real time first signaling information including access information of a content item and second signaling information including detail information of the content item, receiving in non-real time a file belonging to the content item by accessing to a FLUTE session transmitting the content item, wherein the file corresponds to a compressed file that has one or more files including an entry file compressed therein, and decompressing the compressed file and then executing the content item referring to information on the entry file. | 2015-02-12 |
20150046962 | METHOD OF CONTROLLING PHYSICALLY SEPARATED NETWORK COMPUTERS IN ONE MONITOR AND SECURITY SYSTEM USING THE SAME. - Disclosed is a method of controlling physically separated network computers in one monitor and a security system using the same in that a video information of two computers having physically separated networks is displayed on one monitor and controlled by means of a cursor, thereby reducing a video information throughput and implementing fast network switching. | 2015-02-12 |
20150046963 | MECHANISM TO DIVERT AN IP FLOW OVER A NON-IP TRANSPORT - Data between a client and a server is pinned through a receiving interworking unit and a transmitting interworking unit connected via a non-IP based communications path. The receiving interworking unit and transmitting interworking unit convert received data between IP and a non-IP based communications protocols. The transmitting interworking unit receives IP data for the client from the server. The data is converted and transmitted via the non-IP based communications link to the receiving interworking unit, which converts the data back into an IP format and forwards the converted data on to the client. One segment of the path between server and client transports the data in a non-IP format. Neither IP client nor the server are aware of the non IP segment and no change in their IP network mode of operation is required. | 2015-02-12 |
20150046964 | CATV Digital Transmission with BandPass Sampling - Methods and systems capable of improving the transmission of data along an upstream path of a Hybrid Fiber-Coaxial Cable Network, from a transmitter in a node to a receiver in a Cable Modem Termination System. | 2015-02-12 |
20150046965 | SYSTEM AND METHOD FOR MAINTAINING INTEGRITY OF AUDIO DATA IN A MULTIPLEXED AUDIO/VIDEO STREAM OVER A LOW-LATENCY NETWORK CONNECTION - A system and method for allowing streaming audio to be transmitted in advance of streaming video in a data stream without synchliiOnization errors, in order to minimize audio discontinuities, even where video transmission may become degraded. | 2015-02-12 |
20150046966 | CABLE TV NETWORK BROADBAND ACCESS SYSTEM WITH DISTRIBUTED DEPLOYMENT AND CENTRALIZED CONTROL - The present invention provides a cable TV broadband access system with distributed deployment and centralized control, which comprises: a system terminal end, configured to receive and transmit uplink and downlink service data, and receive and respond to access control data and management control data; a system access end, configured to implement data format transformation and data forwarding or processing for said uplink and downlink service data, said access control data and said management control data of said system terminal end, and transmit, receive and respond to management control data of said system access end; a system head end, configured to implement management control and access control for said system access end and said system terminal end, and process, converge and forward said uplink and downlink service data. Said system uses a system architecture with three-stage distributed deployment and centralized control comprising a system terminal end, a system access end and a system head end, and it can not only realize the end-to-end control management and QoS priority assurance of the broadband data service, but can also realize easy network deployment, low comprehensive cost and high management efficiency. | 2015-02-12 |
20150046967 | VIDEO TRANSCEIVER SYSTEM, VIDEO TRANSMISSION METHOD, AND TRANSMISSION DEVICE - A video transmitting and receiving system includes a transmitting device that transmits a packet, and a receiving device that receives the packet transmitted from the transmitting device. The transmitting device inserts null data into an unused space after a video signal has been encoded and generates a packet having a predetermined packet length. Then, the null data is replaced with known data to modulate and the packet is transmitted. The receiving device receives the transmitted packet to demodulate and waveform distortion of the packet is detected based on the known data pre-registered to correct so as to perform waveform equalization. | 2015-02-12 |
20150046968 | FUNCTION UPGRADE DEVICE, DISPLAY APPARATUS AND METHOD FOR CONTROLLING DISPLAY APPARATUS THEREOF - A function upgrade device, a display apparatus, and a method for controlling a display apparatus are provided. The function upgrade device may include a function unit configured to perform a function in conjunction with the display apparatus, a storage configured to store user information and an application related to the function unit, an interface configured to connect the function upgrade device to the display apparatus and enable the function upgrade device to communicate with the display apparatus, and a controller configured to, when the display apparatus is connected to the function upgrade device through the interface, control the function unit to operate in conjunction with the display apparatus based on the user information and the application stored in the storage. | 2015-02-12 |
20150046969 | ADJUSTING MULTI-FACTOR AUTHENTICATION USING CONTEXT AND PRE-REGISTRATION OF OBJECTS - A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to dynamically modify that user's authentication or login requirements to an application in a computer or mobile device. The system is configured to run methods that detect and make use of a user's context that includes: a current environment or personal context, and uses this capability to enable variable strength authentication when attempting to log in or enter another application or resource. In one embodiment, the system implements methods to dynamically adjust the authentication challenge as a differential of all accumulated user contexts (e.g., providing a shorter password or pin-code). | 2015-02-12 |
20150046970 | IMAGE PROCESSING APPARATUS THAT CONFIGURES SETTINGS OF INFORMATION SECURITY POLICY, METHOD OF CONTROLLING THE SAME, PROGRAM, AND STORAGE MEDIUM - An image processing apparatus which enables a user to change the user mode while maintaining the state compliant with the information security policy. A network communication section receives security policy data in which information security policy is described from an external apparatus. A CPU identifies an operation mode of the image processing apparatus based on the received security policy. The CPU configures the identified operation mode such that the information security policy is satisfied. | 2015-02-12 |
20150046971 | METHOD AND SYSTEM FOR ACCESS CONTROL IN CLOUD COMPUTING SERVICE - Provided is a method and system for assigning a suitable right to a user through a security policy based access control in a computing service. A collaborative service server may authenticate a user through a cloud service server, and may issue an access token including user authentication information and user right information. The cloud service server may compare information associated with the access token and an access control list and may determine whether to authorize an access of the user to the service based on the comparison result. | 2015-02-12 |
20150046972 | RETROSPECTIVE POLICY SAFETY NET - These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. The method comprises the further steps of submitting a second policy to the access control mechanism, comparing the log entries to the second policy, and based on the results of the comparing step, taking one of a predetermined number of actions. | 2015-02-12 |
20150046973 | Access control in data processing system - A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure. | 2015-02-12 |
20150046974 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 2015-02-12 |
20150046975 | DATA TRANSMISSION APPARATUS, DATA TRANSMISSION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A data transmission apparatus having an authentication mode in which user authentication is required in order to transmit data and a non-authentication mode in which data may be transmitted without requiring user authentication includes an authenticating unit that authenticates a user, an address acquiring unit that acquires a destination that is a transmission destination of data and that is associated with the user who is authenticated, a history information acquiring unit that acquires history information that is a group of destinations that have been used previously, and a display that displays the destination, which is associated with the user who is authenticated, as a destination of data in the case where the authenticating unit performs user authentication successfully in the authentication mode and that displays a destination that is included in the history information as a candidate for a destination of data in the non-authentication mode. | 2015-02-12 |
20150046976 | IMAGE PROCESSING SYSTEM AND IMAGE PROCESSING APPARATUS FOR SENDING IMAGE DATA - An image processing system receives an input of authentication information from a user, and authenticates the user based on the received authentication information. The image processing system further selects a folder setting method in a case where an operation key for setting a folder of the user as a destination of image data is operated, sets the folder according to the selected folder setting method in response to the operation of the operation key, and sends the image data to the set folder as the destination. | 2015-02-12 |
20150046977 | Permit Compliance System - A system and method is disclosed that enables the display of permits and/or permit information related to a specific location, collection of permitting data onsite, comparison of the onsite data to permitted constraints, and reporting the results of the inspection (as required under the appropriate regulatory policy or as requested by the organization or entity being inspected), as well as sending immediate notifications, as appropriate, to decision makers. In certain embodiments, the system and method may also offer predictions on the likelihood of an enforcement action against the organization given factors such as, but not limited to, the type of violation, degree of violation, and enforcement actions against others for similar violations. In other embodiments, the system and method allows the permittee to mitigate the risk of a violation by notifying emergency personnel in addition to decision makers within the organization. | 2015-02-12 |
20150046978 | Electronic Messaging Exchange - A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform. | 2015-02-12 |
20150046979 | Storage Detection Apparatus, System, and Method - A storage detection apparatus is placed in an operating system in kernel mode; after file information is intercepted and a security level of file content is determined, file content of a high security level is redirected to a storage area of high storage security; the security level of the file content itself is determined and stored, which is transparent to a user, thereby implementing division of security levels for different documents generated by a same application. | 2015-02-12 |
20150046980 | SECURITY MODULE HAVING A SECONDARY AGENT IN COORDINATION WITH A HOST AGENT - The invention is directed to a security module deployed in a host device, which provides a secondary agent that operates in coordination with the host agent in the host device, but operates independent of the host operating system of the host device to independently access an existing communication network interface in the host device or a separate dedicated network interface, if available. In one aspect, the present invention enables robust theft recovery and asset tracking services. The system comprises a monitoring center; one or more monitored devices; a security module in the monitored devices; and one or more active communications networks. Monitored devices may be stand alone devices, such as computers (e.g., portable or desktop computers), or a device or a subsystem included in a system. A monitored device comprises a security module, a host agent and software to support the host agent that runs in the monitored device's OS. | 2015-02-12 |
20150046981 | TRUST DISCOVERY IN A COMMUNICATIONS NETWORK - A method and apparatus to establish trust between two nodes in a communications network. A first node receives from a network node authentication data unique to the first node, which can be used to derive a compact representation of verification data for the first node. The first node also receives a certified compact representation of verification data of all nodes in the network. The first node derives trust information from the authentication data for the node, and sends to a second node a message that includes the trust information and part of the authentication data. The second node has its own copy of the certified compact representation of verification data of all nodes in the network, and verifies the authenticity of the message from the first node using the compact representation of verification data of all nodes in the network and the received trust information and authentication data. | 2015-02-12 |
20150046982 | Determining Response Signature Commonalities - An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data to create signatures corresponding to each of the multiple channels. Based on similarities between signatures, the analyzer may then identify clusters of signatures associated with devices that share channels or portions of channels. | 2015-02-12 |
20150046983 | Method and Apparatus for Providing An Adaptable Security Level in An Electronic Communication - A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient. | 2015-02-12 |
20150046984 | DYNAMIC AUTHENTICATION IN ALTERNATE OPERATING ENVIRONMENT - Systems and methods that employ dynamic credentials across distinct authentication standards can be used to reduce the burden associated with repeated re-authentication. A utility can be employed during logon in an alternate operating environment that stores information from the logon dynamically and generates a credential file that is employed to grant access to a resource without repeating the earlier logon procedure, even if the device changes its user state. After processes requiring resource access are complete, or when an allowed time expires, the granted access is revoked and the device returns to a default or standard authentication technique. | 2015-02-12 |
20150046985 | USER ADMINISTERING A TRUSTWORTHY WORKSPACE - Methods, systems and apparatuses for an operator provisioning a trustworthy workspace to a subscriber are disclosed. One method includes providing the subscriber with the trustworthy workspace, where in the trustworthy workspace comprises a virtualized content repository with trustworthy workflows for storing, sharing and processing a digital content across a plurality of repositories. The method further includes allowing the subscriber authority to sub-provision the trustworthy workspace to one or more authorized parties, wherein only the one or more authorized parties can view or modify at least a portion of the digital content. | 2015-02-12 |
20150046986 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR RECOVERING A PASSWORD USING USER-SELECTED THIRD PARTY AUTHORIZATION - A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party. | 2015-02-12 |
20150046987 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a storage unit capable of storing authentication information corresponding to a web service. Information is output in a web page corresponding to a first web service so as to cause a display unit to display, via a web browser, an indicator to receive an instruction to delete the authentication information stored in the storage unit. Upon receiving the instruction by the output indicator, deletion processing of authentication information corresponding to a second web service different from the first web service is executed in the storage unit. | 2015-02-12 |
20150046988 | SYSTEM, CONTROL METHOD THEREFOR, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - A system comprises: a management unit which manages, in an authentication server, user identification information and a mail address; a send unit which sends authorization information including identification information of the user from an authentication server if a user is authenticated; a reception unit which, upon receiving a request of the service together with the authorization information at an service server, receives a mail send request associated with the service and the identification information included in the authorization information from the service server at a mail send server; a specifying unit which, in response to reception of the mail send request associated with the service, specifies a mail address associated with the identification information included in the authorization information by inquiring of the authentication server; and a mail send unit which sends mail to the specified mail address. | 2015-02-12 |