16th week of 2009 patent applcation highlights part 58 |
Patent application number | Title | Published |
20090100430 | METHOD AND SYSTEM FOR A TASK AUTOMATION TOOL - Disclosed is a method and system for receiving a task list containing a task, determining if the task must be executed based on a context of a business scenario and executing the task. After executing the task, a result of execution of the task is analyzed based on the context of the business scenario and an operation to be performed is determined based on the result of the execution. | 2009-04-16 |
20090100431 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance. | 2009-04-16 |
20090100432 | FORWARD PROGRESS MECHANISM FOR A MULTITHREADED PROCESSOR - A processing device includes a storage component configured to store instructions associated with a corresponding thread of a plurality of threads, and an execution unit configured to fetch and execute instructions. The processing device further includes a period timer comprising an output to provide an indicator in response to a count value of the period timer reaching a predetermined value based on a clock signal. The processing device additionally includes a plurality of thread forward-progress counter components, each configured to adjust a corresponding execution counter value based on an occurrence of a forward-progress indicator while instructions of a corresponding thread are being executed. The processing device further includes a thread select module configured to select threads of the plurality of threads for execution by the execution unit based a state of the period timer and a state of each of the plurality of thread forward-progress counter components. | 2009-04-16 |
20090100433 | DISK SCHEDULING METHOD AND APPARATUS - The present invention relates to a method and apparatus for scheduling requests having priorities and deadlines for an I/O operation on a disk storage medium. Requests are normally arranged and processed in deadline order, and requests whose process times based on deadlines overlap each other are processed in priority order. Therefore, it is possible to prevent processing of any requests having relatively higher priorities from being delayed due to a process based on deadline order. Further, in order to minimize seek time, the requests may also be processed in the scanning order. Furthermore, in order to minimize a time required for performing request search and arrangement in the scanning order and the deadline order, a deadline queue where requests are arranged in deadline order and a scan order queue where requests are arranged in the scanning order may be separately prepared. | 2009-04-16 |
20090100434 | TRANSACTION MANAGEMENT - A method and transaction processing system for managing transaction processing tasks are provided. The transaction processing system comprises a transaction log, a log management policy, a log manager and a dispatcher. The method comprises maintaining a transaction log of recoverable changes made by transaction processing tasks and storing a log management policy including at least one log threshold. Usage of the log by transaction processing tasks is then monitored to determine when a log threshold is reached. When a log threshold is reached the active task having the oldest log entry of all active tasks is identified and its dispatching priority is increased. This increases the likelihood that the identified task will be dispatched, and should mean that the task will more quickly reach normal completion. | 2009-04-16 |
20090100435 | HIERARCHICAL RESERVATION RESOURCE SCHEDULING INFRASTRUCTURE - Scheduling system resources. A system resource scheduling policy for scheduling operations within a workload is accessed. The policy is specified on a workload basis such that the policy is specific to the workload. System resources are reserved for the workload as specified by the policy. Reservations may be hierarchical in nature where workloads are also hierarchically arranged. Further, dispatching mechanisms for dispatching workloads to system resources may be implemented independent from policies. Feedback regarding system resource use may be used to determine policy selection for controlling dispatch mechanisms. | 2009-04-16 |
20090100436 | PARTITIONING SYSTEM INCLUDING A GENERIC PARTITIONING MANAGER FOR PARTITIONING RESOURCES - The application discloses a generic partitioning manager for partitioning resources across one or more owner nodes. In illustrated embodiments described, the partitioning manager interfaces with the one or more owner nodes through an owner library. A lookup node or application interfaces with the partitioning manager through the lookup library to lookup address or locations of the partitioned resources. In illustrated embodiments, resources are partitioned via the partitioning manager in response to lease request messages from an owner library. In illustrated embodiments, the lease grant message includes a complete list of the leases for the owner node. | 2009-04-16 |
20090100437 | TEMPERATURE-AWARE AND ENERGY-AWARE SCHEDULING IN A COMPUTER SYSTEM - A computer system to schedule loads across a set of processor cores is described. During operation, the computer system receives a process to be executed. Next, the computer system obtains one or more thermodynamic process characteristics associated with the process and one or more thermodynamic processor-core characteristics associated with operation of the set of processor cores. Then, the computer system schedules the process to be executed by at least one of the processor cores based on the one or more thermodynamic process characteristics and the one or more thermodynamic processor-core characteristics. | 2009-04-16 |
20090100438 | BROWSER-BASED LOGOFF FROM DISTRIBUTED AND FEDERATED ENVIRONMENTS - A web browser is provided with a logout enablement function that traps a browser or page shutdown request and prevents that request from completing until the browser (or page) has logged out from one or more current server-side application sessions. The logout enablement function ensures that server-side resources that have been invoked for a given session are released before the web browser can be shutdown. The function is implemented as native browser code, a web page applet, a Java server page, a script, a control associated with the browser, and a browser plug-in. | 2009-04-16 |
20090100439 | INFORMATION ENGINE - A user-customizable computer information engine called “windBreak” includes modular, autonomous, separately programmable, processing mytes which interact via the exchange of messages. It is equipped with user interface image protocols suitable for 2D and 3D presentations. Rather than appearing in predefined “windows,” mytes' images are presented in indefinitely large territories. Applications are derived from combinations of mytes, their data, their procedures, and their images, thus partaking of all of the facilities of the information engine and therefore fully integral and consistent with it as regards user interface conventions, application appearance, data management, and internal protocols. A myte is assigned to control every unitary process and to hold every unitary set of data, thus allowing for amorphous associative data management and fully scalable processing for implementations of any size. Mytes are addressable individually by name or associatively by the resultants of their internal processing and data. | 2009-04-16 |
20090100440 | DISPLAY OF DATA USED FOR SYSTEM PERFORMANCE ANALYSIS - Method, system, and computer program product for displaying data used to analyze system performance are provided. The method, system, and computer program product provides for determining an alert was triggered in a system at a point in time, identifying an alert type associated with the alert that was triggered in the system at the point in time, and displaying data concerning the system based on the alert type identified, the data displayed comprising a subset of a plurality of types of data available concerning the system, the subset being selected based on the alert type identified. | 2009-04-16 |
20090100441 | RESOURCE ASSIGNMENT SYSTEM WITH RECOVERY NOTIFICATION - The application discloses a resource assignment system including recovery notification procedures or methods to notify an application or node of potentially lost resources. The recovery notification procedures or calls are invoked in response to a recovery notification registration function. In response to recovery notification registration, a recovery notification or call is generated to report lost resources. | 2009-04-16 |
20090100442 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An information processing apparatus includes a CPU-A which starts a first OS stored in a DRAM-A, a CPU-B which starts a second OS stored in a non-volatile memory, and an HDD which stores a first program executed on the first OS and a second program executed on the second OS, in which CPU-A loads the second program from the HDD into DRAM-A when starting the first OS, and CPU-B makes the second OS execute the second program loaded in DRAM-A, once the first OS is started. | 2009-04-16 |
20090100443 | Methods and systems for ambistateful backend control - Methods, computer-readable media, and systems control a backend. In one implementation, a method controls a backend by executing, at the backend, at least one command. The method may determine, by applying a set of ambistateful criteria, whether to place the backend under stateless control or stateful control, upon completion of executing the at least one command. | 2009-04-16 |
20090100444 | Embeded driver for an electronic device - An electronics module with driver information electronically associated therein. The driver information may be in a memory on the electronics module. The memory may store drivers for multiple operating systems, including a virtual machine type operating system that can be used with any processor or operating system that can run the virtual machine. The memory may alternatively store website information, e.g., an address of the website and codes to use on the website to get the right driver and to validate the hardware. | 2009-04-16 |
20090100445 | METHOD AND APPARATUS FOR DRIVING PRINTER DRIVER ACCORDING TO A DETERMINED APPLICATION AND METHOD AND APPARATUS FOR INSTALLING THE PRINTER DRIVER - A method and apparatus for driving a printer driver according to a determined type of application and a method and apparatus for installing a printer driver. The method includes determining the type of application; and driving one of an extensible markup language (XML) paper specification (XPS) driver and a legacy driver in accordance with the determined type of application. The most appropriate printer driver is automatically selected in accordance with the determined type of application. Thus, a user does not have to inconveniently select a printer driver whenever the user prints data and the data may be printed using the most appropriate printer driver. Furthermore, in consideration of various types of applications, such as, a Windows Presentation Foundation (WPF) type application and a conventional Win32 type application, an optimized printing operation may be performed even when a user does not check whether an application to be used is a WPF type application or a Win32 type application, or whether a printer driver corresponding to the application is an XPS driver or a legacy driver, such as a printer control language (PCL), graphical device interface (GDI), or postscript (PS) driver. | 2009-04-16 |
20090100446 | METHOD AND SYSTEM OF EXTERNAL DATA STORAGE - A method of external data storage in a system including a primary processing device, having a processor and a primary data storage unit, adapted to run application programs for processing active records in the processor and configured to store data belonging to active records in the primary data storage unit; and a secondary data storage system, accessible to the primary processing device, includes loading data belonging to an active record into the primary data storage unit and externalising the record by transferring at least a piece of data belonging to the record to the secondary data storage system for storage. The step of externalising a record includes the making of a call by an application program using data belonging to the record to an interface, arranged to transfer the piece of data to the secondary data storage system. | 2009-04-16 |
20090100447 | PROVIDING LINKS BETWEEN APPLICATION PROGRAMS - Links are established between data elements common to different application programs to make it easier for a user to perform an action in one application program using data available in another application program. Data elements are identified in a first data set for a first application program. One or more performable actions is associated with each identified data element. Common or matching data elements in a second data set for a second application are identified. When a user selects one of the matching data elements in the second data set, a selectable list of actions is presented to enable performance of a selected action from within the first application program in relation to the data element selected in the second application program. | 2009-04-16 |
20090100448 | Remote Auto Provisioning and Publication of Applications - Techniques for auto provisioning and publication of applications are described. The auto provisioning process enables automatic installation of applications having their respective file packages pre-stored in the server. Subsequently, publication of these applications is conducted automatically. By employing such an automatic process, the latency involved in provisioning and publication of remote applications is reduced, thereby making the process more efficient. | 2009-04-16 |
20090100449 | Media device - A media device including a disc tray moved by two motors. | 2009-04-16 |
20090100450 | GEAR HOLDER IN AN OPTICAL DISK DRIVE - The invention is to provide a gear holder in an optical disk drive, wherein a bolt upwardly protrudes from the bottom of a casing. A screw hole is disposed in the center of the bolt inserted by a wheel hole on the center of a gear. The height of the wheel hole is lower than the height of the bolt. A ring flange protrudes under the peripheral of a through hole disposed on a support cover. The width of the ring flange is equal to the width of the bolt, and the height thereof is equal to the height difference from the bolt to the wheel hole. The support cover is fastened on the bolt by a screw screwed in the screw hole, and then the gear is held and rotates between the casing and the support cover. The ring flange presses on the top of the bolt to maintain a rotation space. | 2009-04-16 |
20090100451 | GEAR MECHANISM AND DISK TRAY DEVICE - A gear mechanism includes a first rack, a second rack and a gear component. The first rack is provided to a disk tray that is configured to move between a retracted position and an ejected position. The second rack is provided to a slider that is configured to reciprocally move between a first end position and a second end position. The gear component has a first gear, a second gear and an input gear. The first gear selectively meshes with the first rack to move the disk tray between the retracted position and the ejected position. The second gear selectively meshes with the second rack to move the slider between the first end position and the second end position. The input gear operatively coupled to the first and second gears. The first gear and the second gear have equal number of teeth and different modules. | 2009-04-16 |
20090100452 | Interactive multi-media system - An interactive multi media system comprising a display capable of displaying multi media information, one or more input central devices capable of enabling one or more users to interact with the multi media information and characterized by an interactive engine including an application programmer's interface having a format interpreter capable of enabling a programmer to combine multiple multi media formats for display on the display. | 2009-04-16 |
20090100453 | BROADCAST VIEWING CONTROL METHOD FOR A MOBILE TERMINAL - A method for controlling viewing a broadcast in a terminal. A terminal having a broadcast control function includes a first replaceable identity device attached to a portion of the terminal and a controller for setting a broadcast viewing level when a second identity device replaces the first identity device, wherein the broadcast viewing level was previously set by the first identity device. | 2009-04-16 |
20090100454 | CHARACTER-BASED AUTOMATED MEDIA SUMMARIZATION - Methods, devices, systems and tools are presented that allow the summarization of text, audio, and audiovisual presentations, such as movies, into less lengthy forms. High-content media files are shortened in a manner that preserves important details, by splitting the files into segments, rating the segments, and reassembling preferred segments into a final abridged piece. Summarization of media can be customized by user selection of criteria, and opens new possibilities for delivering entertainment, news, and information in the form of dense, information-rich content that can be viewed by means of broadcast or cable distribution, “on-demand” distribution, internet and cell phone digital video streaming, or can be downloaded onto an iPod™ and other portable video playback devices. | 2009-04-16 |
20090100455 | Multi-Criteria Rating and Searching System - A method and apparatus to provide a multi-criteria rating and search system is described. Users can provide ratings along multiple axes, which can then be used for searching. | 2009-04-16 |
20090100456 | METHOD AND APPARATUS FOR MONITORING ONLINE VIDEO - A method and apparatus for online video analytics provides a cross-platform, online video analytics solution that enables advertisers and content publishers to assess the effectiveness of their video clips better, gain more insights into viewership demographics and behavior, and track and compare online video viewership across multiple video sharing websites. | 2009-04-16 |
20090100457 | Apparatus and method for managing customized channel in IP-based broadcasting services - Provided are an apparatus and method for managing customized channels in Internet Protocol (IP)-based broadcasting services. The apparatus includes: a monitored channel selection message receiver receiving a monitored channel selection message from a group manager of a viewing group consisting of customized channels that provide broadcast programs in real time according to a broadcast program list set by each viewer, wherein the monitored channel selection message contains information about a channel selected to be monitored by the group manager among the customized channels in the viewing group; a monitored channel provider transmitting a broadcast program being provided in real time over the channel selected to be monitored to the group manager; and a harmful channel blocking unit forcedly terminating the transmission of the broadcast program over the monitored channel upon receipt of a harm determination message notifying that the broadcast program being provided over the monitored channel is harmful from the group manager. The apparatus and method allow easy management of customized channels by blocking broadcast programs harmful to viewers over customized channels and providing the viewers with broadcast programs according to a preset schedule. | 2009-04-16 |
20090100458 | System and Method for Instantaneous Information Reporting on Portable Devices - An system and method for instantaneous information reporting on portable devices including a computer server, a wireless device attached to a personal computer, a communication network and one or more display monitors. The wireless device forwards the information retrieved from the computer server via the communication network and send such information to the portable display monitors via wireless communication. Moreover, a method for reporting environmental information to a personal computer of a prescribed user from a computer server via a communication network is disclosed. | 2009-04-16 |
20090100459 | Methods and apparatus for revenue-optimized delivery of content in a network - Methods and apparatus for optimizing the distribution and delivery of multimedia or other content within a content-based network. In one embodiment, the network comprises a broadcast switched cable television network, which utilizes a Network optimization controller (NOC) that processes subscriber program viewing requests to identify options available to fulfill the request (including, e.g., the creation of one or more “microcasts” specifically targeting one or more users), and evaluate these options to determine one that optimizes network operation. The NOC performs these decisions by considering various parameters including network resource availability, type of CPE, subscriber's targeted advertisement profile, and business rules programmed by operator of the network. Business methods based on such network optimization are also described. | 2009-04-16 |
20090100460 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING AD INSERTION VIA A MULTIMEDIA APPLICATIONS GATEWAY - Methods, systems, and computer program products for providing advertisement insertion to a user device are disclosed. A method includes providing a multimedia applications gateway (MAG) that is connected to an access gateway for a domain or a multimedia applications gateway that includes an integrated access gateway function, the access gateway in communication with user devices. The method also includes configuring the MAG to convert multimedia program content from a program source received at the access gateway and transmitted from the access gateway to a user device into a first communication having an open standards protocol recognized by each of the user devices, the first communication representing programming content. The method further includes configuring the MAG to convert multimedia advertising content into a second communication having the open standards protocol, the second communication representing advertising content. The method also includes retrieving the second communication from local memory, inserting the second communication within the first communication, and presenting the first and second communications on the device. | 2009-04-16 |
20090100461 | System for Distributing TV Signals to an End-Terminal - A system is described for distributing TV signals to an end-terminal. The system comprises at least one central broadcast station, a channel manager and one or more end-terminals connected to the channel manager. The broadcast station is adapted to transmit at least one TV channel signal, comprising an audio signal and a video signal and one or more service signals to the channel manager. Further, the channel manager is adapted to receive the TV channel signal, to extract the audio, video and service signals from the TV channel signal, to transform the signals into packetized elementary streams and to transmit a packetized data transport stream to the channel manager. The transport stream comprises a TV channel stream, comprising elementary audio and video streams, and a services channel stream, comprising one or more elementary service streams and the one or more end-terminals are adapted to select between the TV channel stream and the services channel stream. | 2009-04-16 |
20090100462 | VIDEO BROWSING BASED ON THUMBNAIL IMAGE - Provided is video browsing based on a thumbnail image. When video data is selected on the basis of a representative image, thumbnail images generated from the selected video data are continuously displayed. The thumbnail images are sequentially displayed with a set time interval on a window on which the representative image is displayed. The thumbnail images can be enlarged and continuously displayed. Contents of a corresponding video can be recognized in a summarized form using the continuously displayed thumbnail images. | 2009-04-16 |
20090100463 | SYSTEMS AND METHODS FOR GENERATING AND/OR PRESENTING A CONDENSED LIST OF CHANNELS - A method of generating a condensed list of channels for display on a client device of a broadcasting system may include: monitoring channels viewed via a client device configured to receive a plurality of channels; selecting a subset of the plurality of channels based at least in part on a frequency of viewing and/or an amount of time of viewing of the channels; and associating the subset together to generate a condensed list of channels. A related system may include: a client device configured to receive a plurality of channels from a source of programming; and a processor configured to monitor channels viewed via the client device, to select a subset of the plurality of channels based at least in part on a frequency of viewing and/or an amount of time of viewing of the channels, and to associate the subset together to generate a condensed list of channels. | 2009-04-16 |
20090100464 | Content filter - Techniques are described to filter content. In an implementation, channels are filtered according to whether a respective item of content that is currently available via a respective channel complies with one or more criteria. Direct sequential navigation is then provided through a lineup of the filtered channels such that at least one channel having respective content that does not comply with the one or more criteria is not available via the direct sequential navigation. | 2009-04-16 |
20090100465 | CONTENT DELIVERY PROXY SYSTEM AND METHOD - A content delivery proxy system and method delivers content to an unsupported client device within a content delivery system by converting messages and data from the unsupported client device into content delivery system supported messages and data. Client log-in messages received from the unsupported client device are converted into a content delivery system supported format and sent to the content delivery system, and user entitlement information of a user of the unsupported client device is requested from the content delivery system. If the user is a subscriber of the content provider, an unsupported client device identifier is created for the client device. A user interface for selecting content from the content delivery system is displayed on the client device in a client device supported format, and selections on the user interface are sent to the content delivery system. Selected content is provided to the client device in the proper format for playback on the client device. | 2009-04-16 |
20090100466 | Electronic program guide (EPG) referencing past television content - Techniques are described that involve an electronic program guide referencing past television content. In an implementation, a reference to an episode of television content that has already been broadcast is output in an electronic program guide. An event is scheduled that relates to another episode of the television with the reference to the television content that has already been broadcast. | 2009-04-16 |
20090100467 | Apparatus and Method for Providing Program Guide With Channel Signal Strength - An apparatus provides an on-screen program guide that includes information indicating channel signal strength. According to an exemplary embodiment, the apparatus includes a memory operative to store data related to the program guide, and a processor operative to enable display of the program guide using the stored data. The program guide includes a plurality of program titles. The processor determines a program title pointed to by a pointer and determines a channel associated with the determined program title. Signal strength of the determined channel is displayed along with the program guide. | 2009-04-16 |
20090100468 | FACILITATING REAL-TIME TRIGGERS IN ASSOCIATION WITH MEDIA STREAMS - In one embodiment, a Media Analysis and Delivery System obtains a set of media delivery rules, wherein the set of media delivery rules includes one or more triggers, each of the triggers identifying a topic of interest. The Media Analysis and Delivery System examines a media stream for at least one of the one or more triggers in accordance with the set of media delivery rules. The Media Analysis and Delivery System provides at least a portion of the media stream in response to at least one of the triggers in accordance with at least one of the set of media delivery rules. | 2009-04-16 |
20090100469 | Recommendations from Social Networks - Recommendations from social networks is described. In embodiment(s), communications data that is representative of communications between users of client devices can be collected. The communications data can then be evaluated to associate the users that communicate with each other, and a social network can be created that includes the associated users. Media content data that is representative of media content utilized by the associated users in the social network can be complied. A media content recommendation for a user can then be generated based on the compiled media content data for the associated users in the social network. | 2009-04-16 |
20090100470 | INFORMATION PROCESSING DEVICE - For enabling the user to acquire the desired information in a short period of time with a simple operation, an information processing device comprises: an extraction module that extracts at least one set of presenting information to be presented to a user from within a plurality of information groups; a control module that displays the plural pieces of presenting information extracted per information group by the extraction module on one display screen; and a display unit capable of displaying the display screen. | 2009-04-16 |
20090100471 | DIGITAL BROADCASTING SYSTEM AND METHOD FOR TRANSMITTING AND RECEIVING ELECTRONIC SERVICE GUIDE DATA IN DIGITAL BROADCASTING SYSTEM - Disclosed are a digital broadcasting system and a method for transmitting and receiving electronic service guide data in a digital broadcasting system, which communicates applications capable of executing content files downloaded through a file download service. The digital broadcasting system includes a digital broadcasting transmitter for broadcasting Electronic Service Guide (ESG) data which includes application information corresponding to respective content files, and a digital broadcasting receiver for receiving the broadcasted ESG data and executing applications corresponding to the respective content files by using the application information included in the ESG data. | 2009-04-16 |
20090100472 | METHOD AND SYSTEM FOR TRANSMITTING PLURAL DATA IN PORTABLE BROADCASTING SERVICE - A method and system for transmitting a plurality of ESG data to an MS over a communication network in a DVB-H CBMS portable broadcasting service are provided. The MS requests ESG data over the communication network, a server collects the requested ESG data and transmits at least one of the collected ESG data in an ESG data group file to the MS over the communication network. The MS receives the ESG data group file and stores the ESG data included in the ESG data group file. | 2009-04-16 |
20090100473 | PERSONALIZED VIDEO ENTERTAINMENT SYSTEM - One or more content sequences are created from a store of video content, which could simply be broadcast content which has been captured and stored at a server within a network. The content sequences are generated according to the viewer's specified, or demonstrated, viewing preferences. The viewer preferences are captured form entry by the user themselves, or by observation of their viewing habits. Multiple ‘users’ per household and multiple content sequences per viewer are possible. A content sequences is then streamed to the viewer, and looks to him/her just like a TV channel: when one program ends, another starts automatically. It is also possible for a viewer to select an item within the content sequence using an interactive program controller. | 2009-04-16 |
20090100474 | Remote control based output selection - Remote control based output selection techniques are described in which an output to a display device is selected based on identification of a remote control device that is manipulated by a user. In an implementation, each of a plurality of remote control devices is associated with a respective client device in an audio visual system. When a user manipulates one of the plurality of remote control devices, the manipulated remote control device is detected and a corresponding client device is determined. Then, an output to a display device is set to present audio visual data from the determined client device. In another implementation, when a manipulated remote control device is identified, a user interface for output on the display device is configured according to the identified remote control device and/or the functional capabilities of the identified remote control device. | 2009-04-16 |
20090100475 | MOBILE TV SYSTEM ARCHITECTURE FOR MOBILE TERMINALS - A mobile TV system architecture for a mobile terminal that reduces the processing required by the main processor during reception of digital broadcasts such as DVB-H. The mobile terminal architecture includes a main processor system and a mobile TV receiver device. The mobile TV receiver device includes units for SI/PSI processing, IP processing and decryption engine. The SI/PSI (service information/program specific information) processing unit receives non-protected transport stream (TS) packets and extracts SI/PSI tables which can be stored in memory local to the receiver device. The IP processing unit receives decrypted error-corrected protected packets containing multimedia content. The receiver device may include an HTTP server for communicating with a browser application running on the main processor system. The browser application presents multimedia content, received via HTTP, corresponding to a URL entered or selected by a user. | 2009-04-16 |
20090100476 | AIRCRAFT IN-FLIGHT ENTERTAINMENT SYSTEM HAVING A DUAL-BEAM ANTENNA AND ASSOCIATED METHODS - An aircraft in-flight entertainment (IFE) system for an aircraft includes a radome to be carried by the aircraft, and a dual-beam satellite antenna and at least one positioner coupled thereto to be carried by the aircraft and protected by the radome. The dual-beam satellite antenna is to generate dual antenna beams for television programming and Internet data from respective spaced apart satellites. The dual-beam satellite antenna includes a first aperture for receiving the television programming, and a second aperture adjacent the first aperture for receiving the Internet data. A television programming distribution system is to be carried by the aircraft and coupled to the dual-beam satellite antenna to provide television programming within the aircraft. At least one access point is to be carried by the aircraft and coupled to the dual-beam 0satellite antenna to provide a wireless local area network (WLAN) within the aircraft for the Internet data. | 2009-04-16 |
20090100477 | METHOD AND SYSTEM FOR ORDERING VIDEO CONTENT FROM A MOBILE DEVICE - A method and system for ordering content includes a mobile device having an ordering interactive interface having available content including linear content and on-demand content. The interactive interface receives a content selection corresponding to the on-demand content from the interactive interface and communicates the selection to a content processing system. The content processing system communicates a control word to the user device. A user device receives the on-demand content corresponding to the selection in response to the control word. | 2009-04-16 |
20090100478 | Storage management of a recording device in a multi-user system - Systems and methods for managing the storage of recordings in a recording device in which the recordings were requested by several users are provided. Each user may be assigned a storage space limit defining the amount of storage space each user is entitled to use. In some embodiments, the storage space limit may be flexibly increased to take advantage of extra space available from other users. The system may intelligently borrow space from other users to limit the risk that a requested recording is canceled due to unavailable storage resources. In some embodiments, the system may jointly allocate a recording to several users who commonly requested a recording. The system may also set aside space in the recording device that is saved exclusively for a particular user. In some embodiments, the recording device may allocate the storage resources based on the usage of the recordings. | 2009-04-16 |
20090100479 | Media Online Broadcasting - Media online and/or offline broadcasting software but not limiting to just and/or only media online and/or offline broadcasting software which operation within a multimedia software program but not limiting to just and/or only to multimedia software enabling the access of a variety of multimedia sources but not limiting it to just and/or only multimedia sources to be utilized on a variety of multimedia players and/or anything that can show any form of video and/or any form of text, and/or any form of audio. This software will allow ability to air anything on any device and/or form of audio and/or any form of video, and/or any form of text and allow the customer(s) to utilize this at their convenience. | 2009-04-16 |
20090100480 | Methods, systems, and products for distributing digital media - Methods, systems, and products are disclosed for advanced distribution of digital media. A list of subscriber addresses to a new release of a digital media is retrieved at a server associated with a producer. An electronic copy of the digital media is sent from the server to a subscriber's address in the list of subscribers. The electronic copy of the digital media is stored in a memory of a device and may be retrieved at a specified date. The memory may have a partitioned portion that is dedicated to new releases of media offered by the producer. A cost associated with the device and/or the digital media is subsidized by the producer, such that only the producer, the subscriber, and/or a service/network provider have access to the partitioned portion of the memory. | 2009-04-16 |
20090100481 | DEVICE WITH BROADCAST RECEIVER AND LOCAL WIRELESS INTERFACE - A device that includes a broadcast receiver and a local wireless interface where the broadcast receiver is capable of receiving broadcast data, and the local wireless interface is capable of communicating with at least one wireless device and transmitting at least some of the broadcast data to the at least one wireless device. The broadcast receiver may be an audio receiver, a video signal receiver, or a satellite receiver. The local wireless interface may be a Bluetooth interface, an IEEE 802.11 (WiFi) interface, an IrDA interface, or a home radio frequency (HomeRF) interface. | 2009-04-16 |
20090100482 | Conveyance of Concatenation Properties and Picture Orderness in a Video Stream - Systems and methods that provide a video stream including a first video sequence followed by a second video sequence, and that provide a first information in the video stream pertaining to pictures in the first video sequence, wherein the location of the first information provided in the video stream is in relation to a second information in the video stream, wherein the second information pertains to the end of the first video sequence, wherein the first information in the video stream corresponds to a first information type and the second information in the video stream corresponds to a second information type different than the first information type, and wherein the first information corresponds to auxiliary information. | 2009-04-16 |
20090100483 | COMMON KEY FRAME CACHING FOR A REMOTE USER INTERFACE - Common key frames are provided to a client during initialization to provide more efficient remoting of user interface graphical information. By storing the common key frames at the client, the common key frames may be loaded quicker and more efficiently at the client without having to resend graphical information for each common key frame each time a common key frame is used to provide a new frame. Differences between a selected common key frame and the new frame are encoded as delta commands. A payload containing a common key frame command, which identifies a common key frame at the client, and delta commands which encode differences between the selected common key frame and new frame is sent to the client. The client receives the payload, sets a cached common key frame as the current frame, applies the delta commands to the selected common key frame, and renders the new frame. | 2009-04-16 |
20090100484 | SYSTEM AND METHOD FOR GENERATING OUTPUT MULTIMEDIA STREAM FROM A PLURALITY OF USER PARTIALLY- OR FULLY-ANIMATED MULTIMEDIA STREAMS - A system for generating an output multimedia stream user multimedia streams each comprising partially- or fully-animated images that track the movement, orientation, and facial expression of respective users, a non-user multimedia stream (e.g., television broadcast), graphic elements, and video and audio effects. The system includes a multiplexer that generates a multiplexed stream from a plurality of user multimedia streams, a selector for selecting one or more user multimedia stream from the multiplexed stream, a multimedia director device for generating the output multimedia stream from the selected streams, non-user multimedia stream, and added graphics and video effects. The output multimedia stream may be sent to the user devices for generating an interactive experience, such as an online gaming experience. These systems may be organized in a hierarchical manner, whereby regional systems provide multimedia streams to a central system that generates an output stream from the regional streams. | 2009-04-16 |
20090100485 | WEB TELEVISION THAT SWAPS TELEVISION VIDEO AND INTERNET VIDEO IN A PIP AREA - A web television includes a display, a tuner, an internet module, and a PIP module. The tuner is arranged to select television video for display on the display and to select television audio for display by a speaker of the web television. The internet module is arranged to supply internet video for display on the display and to supply internet audio for display by the speaker of the web television, and the internet video and audio are derived from internet communications between the web television and internet content providers. The PIP module is arranged to provide a PIP area within a main area of the display. The internet video and the television video may be swapped between the PIP area and the main area of the display, and the speaker of the web television may be swapped between the internet audio and the television audio. | 2009-04-16 |
20090100486 | WEB TELEVISION HAVING A TWO-WAY COMMUNICATION BUS INTERCONNECTING A TELEVISION CONTROLLER AND AN INTERNET MODULE - A web television includes a display, a tuner, an internet module, and a PIP module. The tuner is arranged to select television video for display on the display and to select television audio for display by a speaker of the web television. The internet module is arranged to supply internet video for display on the display and to supply internet audio for display by the speaker of the web television, and the internet video and audio are derived from internet communications between the web television and internet content providers. The PIP module is arranged to provide a PIP area within a main area of the display. The internet video and the television video may be swapped between the PIP area and the main area of the display, and the speaker of the web television may be swapped between the internet audio and the television audio. | 2009-04-16 |
20090100487 | MITIGATING SUBSCRIBER SIDE ATTACKS IN A CABLE NETWORK - In one embodiment, a Cable Modem Termination System (CMTS) identifies an endpoint originating undesired traffic. Instead of dropping a bandwidth request for the identified endpoint by not responding, the CMTS responds to such a request by sending a data grant pending message. The data grant pending message causes a cable modem for the identified endpoint to enter a waiting state, which prevents further bandwidth requests for the identified endpoint. | 2009-04-16 |
20090100488 | BROADCASTING FOR BROWSING THE WEB - A broadcast system includes a transmitting unit configured for: receiving a web page as input; converting the web page into video image data; and providing a link to the video image data on a basis of a link provided to the web page; an encoder for compressing the video image data; and a receiving unit for receiving the compressed video data; decoding the compressed video data; and directly transmitting the decoded video data to a video display device, without requiring a browser application. | 2009-04-16 |
20090100489 | SIMULTANEOUS ACCESS TO MEDIA IN A MEDIA DELIVERY SYSTEM - An embodiment of a cable television system includes a media content source configured to transmit media content to a plurality of home communication terminals (HCTs) over a plurality of physical channels over a shared communication medium. Each physical channel carries the media content on a plurality of logical channels. The system further includes a media allocation server configured to receive requests from the plurality of HCTs, each of the requests from a respective HCT designating desired media content to be simultaneously received at the respective HCT and allocating at least a portion of the desired media content among a plurality of physical channels on respective logical channels. | 2009-04-16 |
20090100490 | Method of processing data of a host in an internet protocol television (IPTV) system and the apparatus thereof - A method of processing data of a host in an internet protocol television (IPTV) system and the apparatus thereof are disclosed. Herein, the method includes discovering a source internet protocol (IP) address for routing between a card and servers; communicating the servers using address information, wherein the address information is used by the servers to resolve a destination IP address to which to send messages for a targeted card; and routing IP packets from the discovered source IP address to the targeted card by directing the IP packets to a media access control (MAC) address of the targeted card. | 2009-04-16 |
20090100491 | Signal Splitter Circuit - A signal splitter for reducing noise ingress and a cable television network incorporating such splitters. A signal splitter has an input and a plurality of outputs, where alternate outputs are connected to phase shifting devices. Prevention circuitry is provided for at least preventing the generation of intermodulation products in the phase shifting devices. The prevention circuitry is provided with a pre-connected filter in the form of a high-pass filter for stopping voltage peaks through reflection of the energy contained in the voltage peaks. | 2009-04-16 |
20090100492 | Systems, Methods, and Products for Multimedia Applications Gateways - Methods, systems, and products are disclosed for a multimedia applications gateway. A home network management application is downloaded to the multimedia applications gateway operating in a home network. An anomaly that occurs in the home network is observed. An alert is sent to an external network controller, and the alert describes the anomaly in the home network. An instruction is received from the external network controller to remedy the anomaly. | 2009-04-16 |
20090100493 | System and Method for Display Format Detection at Set Top Box Device - A set top box (STB) device receives a data stream comprising video content data and meta data. The data stream can include, for example, an H.264-compliant data stream transmitted to the STB device via a packet-switched network, such as an Internet Protocol Television (IPTV) network. The meta data comprises an indicator of a display format for the video content data. The STB device accesses the indicator from the data stream and processes the video content data to generate a first display data having the first display format. The STB device can include a preset static display format configuration that is overridden by the STB device in response to accessing the indicator. | 2009-04-16 |
20090100494 | SYSTEM AND METHOD FOR CONTROLLING PLAYLIST ENTRY SELECTION - A playback selection feature of an electronic device is disclosed. The playback selection feature enhances the ability of a user to control the manner in which audiovisual files are played back using the electronic device. In one implementation, the playback selection feature allows a user to scroll through a playlist and select a desired entry for playback. Playback of the selected entry may commence after playback of an entry that is currently being played back ends. | 2009-04-16 |
20090100495 | Wireless multimedia system - Methods and systems for a novel multi-media macro-network. A Picon media server is connected with variety of high data rate sources including high definition video and audio connections. Picon media server is configured to process the variety of data streams into lower data rate IP packets and dynamically transmit them wirelessly via plurality of channels and antennas to variety of Picon receivers which are configured to congregate the received data packets into the correct signal formats for specific displays. | 2009-04-16 |
20090100496 | MEDIA SERVER SYSTEM - A media server system includes a switch having a volatile memory such as dynamic random access memory (DRAM), for example. The switch may be configured to store one or more formatted media content streams in large blocks within the volatile memory. The switch unit also includes a switch controller including a crossbar switch that is coupled between a plurality of network ports and the volatile memory. The switch controller may be configured to create one or more concurrent media streams from one of the one or more formatted media content streams by concurrently performing read operations to a plurality of portions of the volatile memory, and to concurrently route the one or more concurrent media streams via any of the plurality of network ports, which may provide a digital transport for conveying the one or more concurrent media streams for use by the subscriber | 2009-04-16 |
20090100497 | METHOD AND APPARATUS FOR PREVENTING A SET OF USERS FROM ACCESSING A MESSAGE IN AN INSTANT MESSAGING SYSTEM - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for preventing a set of users from accessing a message in an instant messaging system. The process determines whether a message received by a receiving computing device from a sending computing device is undetected by a set of users associated with the receiving computing device. The process notifies the sending computing device that the message is undetected by the set of users in response to determining that the message is undetected by the set of users associated with the receiving computing device. The process prevents the set of users from accessing the message in response to receiving a request to prevent the set of users from accessing the message. | 2009-04-16 |
20090100498 | METHOD AND SYSTEM FOR ANALYZING POLICIES FOR COMPLIANCE WITH A SPECIFIED POLICY USING A POLICY TEMPLATE - A method and system are disclosed for analyzing policies for compliance with a specified policy. The method comprises the steps of creating a policy template representing said specified policy, and comparing a group of given policies to said policy template to determine whether said given policies conflict with said specified policy. In the preferred embodiment of the invention, the specified policy may include specified rules, the given policies include a plurality of given rules, and the policy template expresses said specified rules. In this preferred embodiment, the comparing step includes the step of comparing said plurality of given rules to the policy template to determine whether any of said given rules conflicts with said specified rules. In addition, preferably, if conflicts are found between said given policies and said specified policy, the given policies are modified to eliminate the conflicts. | 2009-04-16 |
20090100499 | Database System and Method for Encryption and Protection of Confidential Information - A database system for encryption and protection of confidential data is provided. The database system includes a data source system receiving confidential data and first associated data. A secure data network interface system is connected to the data source system over an open network, the data network interface system receives the confidential data and the first associated data from the data source system and further comprises a secure data storage system coupled to the data network interface system and isolated from the open network, a data encryption system generating a unique encrypted identifier for the confidential data, and a data association system associating the confidential data with the unique encrypted identifier and storing the confidential data, the first associated data and the unique encrypted identifier in the secure data storage system. | 2009-04-16 |
20090100500 | Scalable distributed web-based authentication - Web-based authentication includes receiving a packet in a network switch having at least one associative store configured to forward packet traffic to a first one or more processors of the switch that are dedicated to cryptographic processing if a destination port of the packet indicates a secure transport protocol, and to a second one or more processors of the switch that are not dedicated to cryptographic processing if the destination port does not indicate a secure transport protocol. If a source of the packet is an authenticated user, the packet is forwarded via an output port of the switch, based on the associative store. If the source is an unauthenticated user, the packet is forwarded to the first one or more processors if the destination port indicates a secure transport protocol, and to the second one or more processors if the destination port does not indicate a secure transport protocol. | 2009-04-16 |
20090100501 | Content Providing System, Content Providing Method, and Optical Disk - A terminal transmits disk identification information and user information to a content delivery server for purchase of initial content in the case where the content to be stored in an optical disk is provided to a user. The user information and the content delivered by the content delivery server are written on the optical disk. The optical disk storing the initial content is set in the terminal for purchase of additional content. The terminal transmits, to the content delivery server, disk identification information, the user information and content information. The content delivery server determines whether or not the purchase of the additional content is authorized. When the content delivery server determines that the purchase of the additional content is authorized, the content delivery server delivers the additional content to the terminal. The terminal writes the additional content on the optical disk. It is therefore possible to prevent content from being copied and obtained in an unauthorized manner and provide content based on preferences and characteristics of the user. | 2009-04-16 |
20090100502 | PROTECTING AGAINST COUNTERFEIT ELECTRONIC DEVICES - An embodiment of the invention includes a method of authenticating a second device connected to a first device. The method includes transmitting a first data string from the first device to the second device and receiving a second data string at the first device from the second device. The method also includes generating a third data string using an alteration key at the first device and comparing the third data string and either the first data string or the second data string. The method further includes authenticating the second device if the compared data strings match. | 2009-04-16 |
20090100503 | AUTHENTICATION FOR SHARED WIRELESS PERIPHERALS HAVING AN INTERNAL MEMORY STORE FOR SHARING DIGITAL CONTENT ACROSS MULTIPLE HOSTS - The present solution can authenticate a first host to access a memory space of a shared wireless peripheral communicatively linked to the first host via a bus and a device controller. Digital content displayed within a graphical user interface of the first host can be selected. Either a CUT or COPY clipboard operation can be detected that is conducted from the first host. The selected content can be copied to the memory space of the peripheral. The second host can be authenticated to access a memory space of the peripheral communicatively linked to the second host via a bus and a device controller. A PASTE clipboard operation conducted from the second host can be detected. The selected content obtained from the first host can be conveyed from the memory space of the shared wireless peripheral to a cursor specified location within a graphical user interface of the second host. | 2009-04-16 |
20090100504 | Methods and Apparatus for Adaptively Determining Trust in Client-Server Environments - Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s | 2009-04-16 |
20090100505 | Third-party-secured zones on web pages - A computer-implemented method is provided, including storing, in an authentication server system, a URL identifying at least one web page, and providing a secure zone browser-side script to be placed on the web page. Upon opening of the web page in a browser, the secure zone browser-side script triggers execution of a server-side script at the authentication server system. The server-side script creates, on the web page, an inline frame, which is controlled by the authentication server system during a session that is associated with the inline frame. The authentication server system retrieves a referrer address from the session, and compares the referrer address with the stored URL. Upon finding a match between the referrer address and the stored URL, the authentication server system delivers web content to or via the inline frame. Other embodiments are also described. | 2009-04-16 |
20090100506 | System and Method for Managing Network Flows Based on Policy Criteria - A policy-based network flow management system and method. In one embodiment, various policy conditions are configured based at least in part upon source network conditions and multi-layer information (e.g., Layer 2, Layer 3, and so on) associated with network traffic. Where network traffic from a content requester is determined to satisfy a policy condition, a corresponding policy action is effectuated, e.g., dropping the network traffic, forwarding the network traffic, redirecting the network traffic, or queuing the network traffic. | 2009-04-16 |
20090100507 | SYSTEM TO AUDIT, MONITOR AND CONTROL ACCESS TO COMPUTERS - An audit, monitor, and access control system for use with at least one user computer and at least one protected computer. The system includes first software to authenticate authorized access by a user computer. A server connection network adapter permits communication with a user computer. Second software is provided to authenticate authorized superuser access by a user computer. A client connection network adapter permits communication with a protected computer. All data transferred and all activity between user computers and protected computers is recorded. Additionally, all data transferred and all activity between the user computers and the protected computers is audited. | 2009-04-16 |
20090100508 | METHOD AND APPARATUS FOR THE SECURE IDENTIFICATION OF THE OWNER OF A PORTABLE DEVICE - An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a challenge and a response. The challenge and response is sent to a decryption node. In response, the decryption node computes a presumed response and compares the presumed response to the response of the portable device, in order to authenticate the individual associated with the portable device. | 2009-04-16 |
20090100509 | EMERGENCY NOTIFICATION SYSTEM - The emergency notification system includes a plurality of client devices operatively connected to a server through a communication network for communication of threats. The server administers a monitoring program that permits an administrator to monitor the user client device and communicate with users of the user client device regarding threats. Specifically, alert information and instructions is communicated to a discrete subset of client devices regarding a threat. | 2009-04-16 |
20090100510 | System and Method for Representing Multiple Security Groups as a Single Data Object - A system and method for representing multiple security groups as a single data object are provided. With the system and method, a complex group object is created that consists of a group set value and a mask value. The complex group object represents a plurality of groups by the group set value. The mask value is used to apply to group identifiers received during an authentication process to generate a value that is compared against the group set value to determine if the group identifiers are part of the complex group. For example, in a first step of authorization processing, the group identifier received in an authorization request is bit-wise AND'd with the mask value for the complex group data object. In a second step, the masked group identifier from the received request is compared to the group set value of the complex group object. Such comparison may take the form of masking the group set value and comparing the masked group set value to the masked group identifier from the received request, for example. If the two values match, then access is granted. If the two values do not match, then access is denied. | 2009-04-16 |
20090100511 | METHOD AND APPARATUS FOR USE IN PERSONALIZING IDENTIFICATION TOKEN - According to some embodiments, a method comprises: storing, in a personalization token, information to personalize an identification token; issuing the personalization token to an account holder; and transmitting the information from the personalization token to the identification token using a wireless interface. According to some embodiments, apparatus comprises: a personalization token issued to an account holder, the personalization token comprising: information to personalize an identification token; and a wireless communication interface to transmit the information to the identification token. | 2009-04-16 |
20090100512 | Setting a preliminary time on a network appliance using a digital certificate - A method and system for setting a time on a network appliance. The method may include attempting to establish a secure connection with a server using a certificate issued for a network appliance, and determining that an attempt to establish a secure connection has failed. The method may further include determining that a possible cause of the failure to establish a secure connection is incorrect time data provided by the network appliance, and updating the time on the network appliance using time data contained in the certificate. | 2009-04-16 |
20090100513 | Universal media firewall - A universal media firewall allows a parent to control filtering of multiple media providers via a single firewall policy. The firewall(s) may be a stand-alone device or may be preformed with software on a home computer or at a remote site. Parental controls are accessible by the media provider so that media is filtered according to the parental settings prior to entering the home media network. | 2009-04-16 |
20090100514 | METHOD FOR MOBILE NODE'S CONNECTION TO VIRTUAL PRIVATE NETWORK USING MOBILE IP - A method for a mobile node's connection to a virtual private network using a mobile IP under a mobile environment is provided. According to this method, the mobile node firstly makes a mobile IP registration request message including VPN user authentication information and transmits the message to VPN gateway. Then, the VPN gateway reads the VPN user authentication information from the message and inquires a database in which VPN user authentication information is already stored, to verify a VPN access authority of the mobile node. If the access authority is verified, private IP is recorded in a response message to the mobile IP registration request message, and the response message is transmitted to the mobile node to assign the private IP. Accordingly, a VPN having low construction cost, simple topology, less network traffic and low working loads on the mobile node and the network under a mobile environment can be constructed. | 2009-04-16 |
20090100515 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, RECORDING MEDIUM AND INFORMATION PROCESSING METHOD - A receiving unit receives information selected by a user on an operating screen. A detecting unit detects a function executing part corresponding to the information received by the receiving unit. A determining unit determines that the user authentication is required when a function is to be executed, when “the user authentication is required” is set for at least any one of a function allocated to a function executing part that is detected by the detecting unit, the function allocated to another function executing part, and the operating screen that includes the function executing part to which the function is allocated. A function executing unit executes a function allocated to the function executing part selected by the user, wherein the user is authorized to execute the function. | 2009-04-16 |
20090100516 | Secure Bait and Switch Resume - Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file. | 2009-04-16 |
20090100517 | APPARATUS AND METHOD FOR MONITORING AND PROTECTING SYSTEM RESOURCES FROM WEB BROWSER - An apparatus and method for preventing an attempt to perform malicious activities using web browser weaknesses are provided. A file protection module monitors attempts to access at least one file resource when the web browser executes a program, and allows or denies access. A registry protection module monitors attempts to access at least one registry resource when the web browser executes a program, and allows or denies access. A process protection module monitors attempts to execute or terminate at least one process when the web browser executes a program, and allows or denies the execution or termination. | 2009-04-16 |
20090100518 | SYSTEM AND METHOD FOR DETECTING SECURITY DEFECTS IN APPLICATIONS - A system and method for detecting vulnerabilities in a deployed web application includes developing a profile of acceptable behavior for inbound communication and outbound communication of a web application. The method also includes receiving a current inbound communication and a current outbound communication from the web application. The current inbound communication includes an inbound user request and the current outbound communication is in response to the current inbound communication. The current inbound communication and the current outbound communication are validated with the profile of acceptable behavior to identify an anomaly. The identified anomaly includes an occurrence of an acceptable behavior for the current inbound communication in combination with an occurrence of an unacceptable behavior for the current outbound communication. | 2009-04-16 |
20090100519 | Installer detection and warning system and method - A user of a computer system is provided with warning of unexpected or covert installation attempts using a malware or anti-virus detection engine. Even though the files that are unexpectedly attempted to be installed may be legitimate, rather than malware, the malware detection software is modified or configured to detect the unexpected installation and provide the user with an opportunity to abort the installation. A method of controlling installation of software in a computer system comprises detecting an attempt to install software on the computer system, identifying the software that was attempted to be installed, taking an action in response to identifying the software that was attempted to be installed. | 2009-04-16 |
20090100520 | Detection and dynamic alteration of execution of potential software threats - An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier. | 2009-04-16 |
20090100521 | MALICIOUS SOFTWARE PREVENTION APPARATUS, SYSTEM, AND METHOD USING SAME - A malicious software prevention method is used for detecting malicious software and includes receiving data transmitted from a host machine or a mobile terminal and temporally storing the received data as temporary data in a random access memory; detecting malicious software by scanning the temporary data with malicious data definitions stored in a read only memory; cutting off a data connection between the host machine and the malicious software prevention apparatus or between the mobile terminal and the malicious software prevention apparatus if the malicious software is detected in the temporary data. | 2009-04-16 |
20090100522 | WEB FIREWALL AND METHOD FOR AUTOMATICALLY CHECKING WEB SERVER FOR VULNERABILITIES - Provided is a web firewall for automatically checking for vulnerabilities, including: an administrating server scheduling part for ordering the examination of an administrating web server according to a predetermined examination schedule; a vulnerability search database calling part for calling a vulnerability search database previously stored according to the order of the administrating server scheduling part; a vulnerability searching part for searching for potential vulnerabilities of the administrating web server corresponding to data included in the called vulnerability search database; a vulnerability information deducing part for optimizing the results searched in the vulnerability searching part to deduce vulnerability information; a vulnerability checking part for checking the vulnerabilities of the administrating web server based on the results deduced from the vulnerability information deducing part; and a detailed vulnerability information reporting part for reporting detailed information on the checked vulnerabilities. | 2009-04-16 |
20090100523 | SPAM DETECTION WITHIN IMAGES OF A COMMUNICATION - Determining undesirable, or “spam” communication, by reviewing and recognizing portions within the communications that are things other than ASCII or text. Images are analyzed to determine whether the content of the images is likely to represent undesired content. The images can be classified as to type, can be OCRed, and the contents of the recognition used for analysis, and can be compared against similar images in a database. | 2009-04-16 |
20090100524 | COMMUNICATION TERMINAL APPARATUS, SERVER TERMINAL APPARATUS, AND COMMUNICATION SYSTEM USING THE SAME - A communication terminal apparatus includes a storage section configured to store a library function in which a first specific instruction is executed a process to be executed prior to a communication with a communication target and a second specific instruction is executed before returning to a call source, a client application, an attribute value group of the client application, and an permissible address range of the first specific instruction. A communication instruction execution control section controls execution of a communication instruction based on the attribute value group of the client application, when the client application executes the communication instruction to generate an internal interruption. A security gate entering section checks whether or not an address of the first specific instruction is within a permissible address range when the client application executes the first specific instruction to generate the internal interrupt, and changes the attribute value group of the client application when the address of the first specific instruction is within the permissible address range. A security gate exiting section returns the attribute value group of the client application to an original state when the client application executes the second specific instruction to generate the internal interrupt. | 2009-04-16 |
20090100525 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - An information processing apparatus capable of permitting electronic data with an access authority to be available at a transfer destination, without the access authority being lost. In a case where a received electronic document is set with access authority management information, it is determined, referring to transfer means ( | 2009-04-16 |
20090100526 | PORTABLE COMPUTER AND SECURITY OPERATING METHOD THEREOF - A portable computer and security operating method thereof are provided to secure the portable computer in a power-off mode. The portable mainly includes a computer host, a system BIOS (Basic Input/Output System), an EC (Embedded Controller), an EC BIOS, one or more input device and a power device, all of which are in bus connection or circuit connection with each other. The EC includes a KBC (Keyboard Controller) and remains activated when the portable computer is in the power-off mode. Meanwhile, the EC is adapted so that in the power-off mode of the portable computer and upon receipt of a security signal, the EC executes a power-off-mode security routine of the EC BIOS to lock the portable computer in the power-off mode. | 2009-04-16 |
20090100527 | Real-time enterprise data masking - The invention describes a method, a system and a computer program product for masking data in a database system. The database system includes a database in which sensitive data is stored. The database system also includes a Database Management System (DBMS) which manages the database. Further, the database system includes a plurality of users that run various database queries and commands on the sensitive data. Masking policies are set for users that have access to the sensitive data. Users without privileges to view or manipulate sensitive data may run their queries and commands on masked data, while users with privileges to run and manipulate sensitive data may run their queries and commands on sensitive data. The masked data is generated in real-time and is not stored on the database, thereby preserving its integrity. | 2009-04-16 |
20090100528 | Method for Linking Intellectual Property System to Other System and the System - Provided are a method and system for reducing user inconvenience by exchanging information between different intellectual property information systems having different servers from each other or storing the information in a storage folder of each user of one of the intellectual property information systems. The method associates at least first and second different intellectual property related systems operated by different servers from each other. The method includes the steps of: providing, by the first intellectual property information system, identification of a user of the first intellectual property information system to the second intellectual property information system; and providing, by the second intellectual property information system, searched case information or case information searched for each user of the second intellectual property information system to a storage folder of each user in the first intellectual property information system. | 2009-04-16 |
20090100529 | DEVICE, SYSTEM, AND METHOD OF FILE-UTILIZATION MANAGEMENT - Device, system, and method of file-utilization management. In some embodiments, a method may include linking between a computing device and at least one electronic mail address by verifying that a user of the linked computing device is authorized to access an electronic mail account represented by the linked electronic mail address; identifying an attempt by the user to access the content of a protected file, wherein the protected file is associated with permission information representing one or more allowed electronic mail addresses and including one or more content-utilization restrictions; and presenting the content of the protected file to the user of the linked device, if the linked electronic mail address is included in the allowed electronic mail addresses, while restricting the utilizing of the presented content according to a content-utilization restriction corresponding to the linked electronic mail address. Other embodiments are described and claimed. | 2009-04-16 |