27th week of 2010 patent applcation highlights part 51 |
Patent application number | Title | Published |
20100175037 | METHOD, APPARATUS, AND PROGRAM FOR CORRECTING HOLD ERROR - A hold error correction method for complicated large scale integration in a semiconductor is provided. Based on timing analyses, hold error path start point information including a set of a hold error amount at a start point and a minimum value in set-up margins for all data paths starting from the start point, and hold error path end point information including a set of a hold error amount at an end point and a minimum value in set-up margins for all data paths reaching the end point, in association with a failed hold error path, is obtained. The hold error path is classified based on whether the hold error is correctable according to the obtained information. The correctable hold error path is grouped based on a certain criterion. Finally, which of the start point and the end point a delay buffer is inserted into is determined per group. | 2010-07-08 |
20100175038 | Techniques for Implementing an Engineering Change Order in an Integrated Circuit Design - A technique for implementing an engineering change order (ECO) includes comparing a first hardware description language (HDL) design with a second HDL design. In this case, the second HDL design corresponds to the first HDL design with at least one implemented ECO. The technique identifies differences in latch points, primary inputs, and primary outputs between the first and second HDL designs. The second HDL design is converted to a non-optimized netlist. Logical cones (cones of logic) that feed the latch points, the primary inputs, and the primary outputs are extracted from the non-optimized netlist. Based on the extracted logical cones and the non-optimized netlist, a physical implementation of the second HDL design is synthesized. | 2010-07-08 |
20100175039 | INTEGRATED CIRCUIT DESIGN APPARATUS, DESIGN METHOD, AND STORAGE MEDIA - An integrated circuit design apparatus includes: a layout information storing unit which stores layout information of an integrated circuit; a scan path connection information storing unit which stores scan path connection information that indicates connection order of scan path terminals; a macro signal terminal position determination unit which determines temporary arrangement positions of a scan-in terminal and a scan-out terminal of each of a plurality of macros, and updates the layout information; an initial scan path route determination unit which updates the scan path connection information such that one of the plurality of macros arranged in a closest distance is connected in turn starting with the scan-in external terminal; and a scan path re-routing unit which determines a scan path connection order such that a scan path total wiring length becomes shortest, and updates the scan path connection information updated by the initial scan path route determination unit. | 2010-07-08 |
20100175040 | METHODOLOGY OF PLACING PRINTING ASSIST FEATURE FOR RANDOM MASK LAYOUT - Embodiments of the present invention provide a method of placing printing assist features in a mask layout. The method includes providing a design layout having one or more designed features; generating a set of parameters, the set of parameters being associated with one or more printing assist features (PrAFs); adding the one or more PrAFs of the set of parameters to the design layout to produce a modified design layout; performing simulation of the one or more PrAFs and the one or more designed features on the modified design layout; verifying whether the one or more PrAFs are removable based on results of the simulation; and creating a set of PrAF placement rules based on the set of parameters, if the one or more PrAFs are verified as removable. The set of PrAF placement rules may be used in creating a final set of PrAF features to be used for creating the mask layout. | 2010-07-08 |
20100175041 | ADJUSTMENT OF MASK SHAPES FOR IMPROVING PRINTABILITY OF DENSE INTEGRATED CIRCUIT LAYOUT - Embodiments of the present invention provide a method for making mask shape adjustment The method includes creating a first mask shape; identifying one or more mask segments of the first mask shape as candidate mask segments of needing segment adjustment; applying an optical proximity correction (OPC) process to the first mask shape, the OPC process identifying at least one of the candidate mask segments as a constrained mask segment; applying a rotational adjustment to the constrained mask segment; and creating a second mask shape having the constrained mask segment being rotationally adjusted. A system and a machine-readable medium for performing the above method are also provided. | 2010-07-08 |
20100175042 | EFFICIENT ISOTROPIC MODELING APPROACH TO INCORPORATE ELECTROMAGNETIC EFFECTS INTO LITHOGRAPHIC PROCESS SIMULATIONS - The present invention relates to the modeling of lithographic processes for use in the design of photomasks for the manufacture of semiconductor integrated circuits, and particularly to the modeling of the complex effects due to interaction of the illuminating light with the mask topography. According to the invention, an isofield perturbation to a thin mask representation of the mask is provided by determining, for the components of the illumination, differences between the electric field on a feature edge having finite thickness and on the corresponding feature edge of a thin mask representation. An isofield perturbation is obtained from a weighted coherent combination of the differences for each illumination polarization. The electric field of a mask having topographic edges is represented by combining a thin mask representation with the isofield perturbation applied to each edge of the mask. | 2010-07-08 |
20100175043 | FAST AND ACCURATE METHOD TO SIMULATE INTERMEDIATE RANGE FLARE EFFECTS - A method is provided for modeling lithographic processes in the design of photomasks for the manufacture of semiconductor integrated circuits, and more particularly for simulating intermediate range flare effects. For a region of influence (ROI) from first ROI1 of about 5λ/NA to distance ROI2 when the point spread function has a slope that is slowly varying according to a predetermined criterion, then mask shapes at least within the distance range from ROI1 to ROI2 are smoothed prior to computing the SOCS convolutions. The method provides a fast method for simulating intermediate range flare effects with sufficient accuracy. | 2010-07-08 |
20100175044 | METHOD FOR CREATING SOFTWARE FACTORY FOR DEVELOPING J2EE APPLICATIONS - Methods for creating a factory, such as a software factory, a user experience factory, and a persistence factory, for developing one or more Java 2 Platform, Enterprise Edition (J2EE) applications. One or more artifacts related to the J2EE applications, such as code components, workflow scripts, and build scripts, are identified. Further, one or more templates are created for generating the one or more artifacts. The templates may be created based on a predefined architecture and coding conventions. These templates are stored in a repository to enable their subsequent reuse. Thereafter, one or more relationships between the artifacts are defined in a factory schema. Subsequently, the factory is created using the factory schema and the templates. The factory thus created may be used to develop the J2EE applications. | 2010-07-08 |
20100175045 | MULTI-THREADED SUBGRAPH EXECUTION CONTROL IN A GRAPHICAL MODELING ENVIRONMENT - Exemplary embodiments support multi-threaded subgraph execution control within a graphical modeling or graphical programming environment. In an embodiment, a subgraph may be identified as a subset of blocks within a graphical model, or graphical program, or both. A subgraph initiator may explicitly execute the subgraph while maintaining data dependencies within the subgraph. Explicit signatures may be defined for the subgraph initiator and the subgraph either graphically or textually. Execution control may be branched wherein the data dependencies within the subgraph are maintained. Execution control may be joined together wherein the data dependencies within the subgraph are maintained. Exemplary embodiments may allow subgraphs to execute on different threads within a graphical modeling or programming environment. | 2010-07-08 |
20100175046 | METHOD AND DATA PROCESSING SYSTEM FOR COMPUTER-ASSISTED PERFORMANCE ANALYSIS OF A DATA PROCESSING SYSTEM - A method is disclosed for the computer-assisted performance analysis of a data processing system, wherein a program code with a plurality of code parts is running. During the execution of at least one embodiment of the method, one or more parts of the code parts are at least varied once while using a functionality creating a variance in regard to at least one criterion to be evaluated. The data processing system is executed with the varied code part and parts multiple times. A variance of the at least one criterion to be evaluated of the varied code part or parts, or of all code parts of the program code is determined. Finally, a covariance resulting from the variance is subjected to a multivariant analysis. | 2010-07-08 |
20100175047 | ASSOCIATING ADVERTISEMENTS AND GAME DATA IN A FLASH-BASED GAMING ENVIRONMENT - A method of associating advertisements with a computer software product includes loading an executable software file containing software code that upon execution carries out a software program, parsing instructions in the loaded executable software file, presenting the parsed instructions in a user interface, receiving transformation instructions to be applied to the executable software file, and applying the transformation instructions to the executable software file to produce a transformed executable software file. The transformation instructions include location information for displaying an advertisement before, during, or after execution of the software program. | 2010-07-08 |
20100175048 | ARCHITECTURE THAT EXTENDS TYPES USING EXTENSION METHODS - Architecture that extends existing types including constructed and sealed types using extension methods. Extension methods are static methods that can be invoked using instance method syntax. Extension methods are declared by specifying the keyword “this” as a modifier on the first parameter of the methods. Extension methods have all the capabilities of regular static methods. In addition, once imported, extension methods can be invoked using instance method syntax. Also disclosed are rules for importing extension methods, and extension method invocations. Extension methods are imported through using-namespace-directives. In addition to importing the types contained in a namespace, a using-namespace-directive imports all extension methods in all static classes in the namespace. In effect, imported extension methods appear as additional methods on the types that are given by their first parameter and have lower precedence than regular instance methods. | 2010-07-08 |
20100175049 | SCOPE: A STRUCTURED COMPUTATIONS OPTIMIZED FOR PARALLEL EXECUTION SCRIPT LANGUAGE - Embodiments of the present invention relate to systems, methods and computer storage media for providing Structured Computations Optimized for Parallel Execution (SCOPE) that facilitate analysis of a large-scale dataset utilizing row data of those data sets. SCOPE includes, among other features, an extract command for extracting data bytes from a data stream and structuring the data bytes as data rows having strictly defined columns. SCOPE also includes a process command and a reduce command that identify data rows as inputs. The reduce command also identifies a reduce key that facilitates the reduction based on the reduce key. SCOPE additionally includes a combine command that identifies two data row sets that are to be combined based on an identified joint condition. Additionally, SCOPE includes a select command that leverages SQL and C# languages to create an expressive script that is capable of analyzing large-scale data sets in a parallel computing environment. | 2010-07-08 |
20100175050 | METHOD AND SYSTEM TO AUTOMATICALLY GENERATE GUI OBJECT ADDRESSING QUERIES - One embodiment of the present invention provides a system that automatically generates addressing queries for objects rendered on a graphical user interface (GUI). During operation, the system receives a request for GUI object-addressing query for an application to be tested. The system first identifies the application context, and retrieves a rule document describing GUI object-addressing query rules according to the identified application context. Next, the system parses the rule document to generate an applicable query rule set for the application. Based on the applicable query rule set, the system generates a set of query candidates and determines a unique query for each GUI object. | 2010-07-08 |
20100175051 | DEBUGGING SUPPORT DEVICE, DEBUGGING SUPPORT METHOD, AND PROGRAM THEREOF - A debugging support device includes: a plurality of CPU simulating units which simulates the operations of a plurality of CPUs which executes programs in parallel; a memory simulating unit of a memory to be shared by the plurality of CPUs; an event monitoring unit that detects a predetermined event occurring between each CPU simulating unit and the memory simulating unit; and a state judging unit that judges whether the state of the occurred predetermined event matches a predetermined condition and, if the predetermined condition is matched, records history information related to the state of the memory simulating unit. | 2010-07-08 |
20100175052 | SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF TEST DATA TO SATISFY MODIFIED CONDITION DECISION COVERAGE - The tool, MC/DC-Automatic Tool Generator automatically generates test data to satisfy Modified Condition Decision Coverage (MCDC) from input code/model. This tool reduces the effort required to generate MCDC test data significantly. In order to reduce the time required by model checkers, abstraction and optimization methodologies have been implemented to analyze typical reactive software model/code. | 2010-07-08 |
20100175053 | DEVICE AND A METHOD OF MANAGING A PLURALITY OF SOFTWARE ITEMS | 2010-07-08 |
20100175054 | SYSTEM AND METHOD FOR TRANSFORMING A UML MODEL INTO AN OWL REPRESENTATION - A system and method for transforming a human-readable Unified Mark-Up Language (UML) model having a plurality of packages for design purposes into a machine-readable Web Ontology Language (OWL) representation having a plurality of OWL namespaces or a plurality of OWL documents for controlling network elements in a telecommunications network. A processor translates the human-readable UML model into one or more machine-readable OWL ontologies. In one embodiment, the processor produces one ontology (one file) with several namespaces. Thus, the translated ontology corresponds to the UML model, and each UML package in the UML model corresponds to a namespace. In another embodiment, the processor produces several ontologies (several files) corresponding to the UML packages in the UML model, wherein each ontology has just one namespace for its elements. The UML model in this embodiment corresponds to a base ontology importing all created ontologies. | 2010-07-08 |
20100175055 | METHOD AND SYSTEM TO IDENTIFY GUI OBJECTS FOR NON-MARKUP-LANGUAGE-PRESENTED APPLICATIONS - One embodiment of the present invention provides a system that facilitates identifying objects rendered on a graphic user interface (GUI) in a non-markup-language-presented software application. During operation, the system receives a non-markup-language-presented application at a computer. The system first selects a set of attributes that uniquely distinguish a target GUI object. The system then identifies a set of target GUI objects in the application, wherein a respective GUI object is not represented in a markup language in the received application. Next, the system represents the target GUI objects in the application with a markup-language-based structure, wherein each target GUI object is associated with a corresponding markup-language node in the structure. | 2010-07-08 |
20100175056 | COMPILER APPARATUS WITH FLEXIBLE OPTIMIZATION - A compiler comprises an analysis unit that detects directives (options and pragmas) from a user to the compiler, an optimization unit that is made up of a processing unit (a global region allocation unit, a software pipelining unit, a loop unrolling unit, a “if” conversion unit, and a pair instruction generation unit) that performs individual optimization processing designated by options and pragmas from a user, following the directives and the like from the analysis unit, etc. The global region allocation unit performs optimization processing, following designation of the maximum data size of variables to be allocated to a global region, designation of variables to be allocated to the global region, and options and pragmas regarding designation of variables not to be allocated in the global region. | 2010-07-08 |
20100175057 | ASSOCIATING ADVERTISEMENTS AND GAME DATA IN A FLASH-BASED GAMING ENVIRONMENT - A method of associating a service with a computer software product includes loading an executable software file containing software code that upon execution carries out a software program, inputting code into functions of the software file, mapping execution of the functions of the software file, receiving an input identifying a content trigger, identifying a function of the software file associated with the content trigger, and modifying the function associated with the content trigger to cause presentation of service in response to an occurrence of the content trigger. An enhanced software file may be produced that includes the modified function. | 2010-07-08 |
20100175058 | SYSTEM FOR PROVIDING DISTRACTION-FREE CONTENT IN A FLASH-BASED GAMING ENVIRONMENT - A method and tool for providing distraction-free content in a software program is presented. The method includes accessing an executable software file containing software code that upon execution carries out a software program and modifying the executable software file with a service insertion tool. The modified executable software file causes the software program to present a visual display of the software program in a full-screen mode and present additional content in the visual display of the software program in response to pre-defined triggers. The service insertion tool includes a viewer for presenting the software program in a user interface and for receiving user inputs via the user interface, and a processor for modifying the executable software file. | 2010-07-08 |
20100175059 | SYSTEM AND METHOD FOR IMPLEMENTING DATA-COMPATIBILITY-BASED VERSION SCHEME - A versioning schema enforced by the application development environment enables the runtime environment of a terminal device to evaluate a software update to identify potential compatibility issues and control installation of the update. The versioning schema includes a respective field for each one of a plurality of aspects of the application and defines an initial value of each field when an initial application load is released. For each successive software update affecting the application, the method involves identifying each aspect of the application affected by the software update and incrementing a value of the respective field of each identified aspect. The version number can be in the form D.M.F where D, M and F are incremented in response to changes in the application relating to data components, message components and features. | 2010-07-08 |
20100175060 | Simplifying Selection of Targets for Installation of Composite Applications - The present invention provides for formulating a deployment plan for a composite application. A set of topologies is provided for each component of a set of identified components of the composite application to be deployed. For a selected topology for each component of the set of identified components, a set of target computing resources are identified that meet, within a predetermined threshold, a set of prerequisites for each component in the set of identified components. A list of hosts associated with the set of target computing resources that meet the identified topology is displayed. For a selected host for each component of the set of identified components, the set of target computing resources for the selected hosts is displayed. A deployment plan along with a set of installations or upgrades required for each of the selected target computing resources is then displayed. | 2010-07-08 |
20100175061 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 2010-07-08 |
20100175062 | METHOD AND SYSTEM FOR FIRMWARE OVER THE AIR (FOTA) SERVICE - A method and system for providing a firmware over a network to update an update engine used for the firmware upgrade purposes in mobile devices. A specific identifier is inserted into a header of the delta file to inform that the delta file contains an upgrade for the update engine. Upon detection of the specific identifier, the mobile device performs an upgrade of the update engine using the delta file. | 2010-07-08 |
20100175063 | Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script. | 2010-07-08 |
20100175064 | SYSTEM AND METHOD FOR RAW DEVICE MAPPING IN TRADITIONAL NAS SUBSYSTEMS - A method is provided for data storage management in a virtualized information handling system that includes a first and second network storage resource, a hypervisor allowing multiple virtual machines to run on the virtualized information handling system, and a data access agent. The data access agent may intercept a data access request initiated by a virtual machine and intended for the first network storage resource. In response to intercepting the data access request, the data access agent may establish a connection with the first network storage resource, and retrieve from the first network storage resource metadata associated with the data access request. The retrieved metadata may identify a location of the second network storage resource. Additionally, the data access may establish a connection with the second network storage resource using the location of the second network storage resource identified by the retrieved metadata. The virtual machine may complete the intercepted data access request via the established connection with the second network storage resource. | 2010-07-08 |
20100175065 | WORKFLOW MANAGEMENT DEVICE, WORKFLOW MANAGEMENT METHOD, AND PROGRAM - This invention is directed to a workflow execution method capable of allocating a necessary license in accordance with the workflow contents and the license states of all task processing devices capable of executing a task, and preferentially utilizing the license in task execution in a cooperative task processing system capable of executing a plurality of tasks for document data as a workflow by a plurality of task processing devices. | 2010-07-08 |
20100175066 | SYSTEMS ON CHIP WITH WORKLOAD ESTIMATOR AND METHODS OF OPERATING SAME - A system on chip (SOC) includes a processor circuit configured to receive instruction information from an external source and to execute an instruction according to the received instruction information and a workload estimator circuit configured to monitor instruction codes executed in the processor circuit, to generate an estimate of a workload of the processor circuit based on the monitored instruction codes and to generate power supply voltage control signal based on the estimate of the workload. The SOC may further include a power management integrated circuit (PMIC) configured to receive the control signal and to adjust a power supply voltage provided to the SOC in response to the control signal. | 2010-07-08 |
20100175067 | METHOD FOR PROCESSING APPLICATION COMMANDS FROM PHYSICAL CHANNELS USING A PORTABLE ELECTRONIC DEVICE AND CORRESPONDING DEVICE AND SYSTEM - The invention relates to a method for processing at least two application commands from at least two physical communication channels respectively using a portable electronic device. The method includes receiving each application command from one of the physical communication channels, determining a priority level associated with each application command, comparing priority levels and identifying the application command with the highest priority among the application commands and processing of the application command with highest priority. The invention also relates to the portable electronic device and an electronic system including a host device cooperating with such a portable electronic device. | 2010-07-08 |
20100175068 | LIMITING THE AVAILABILITY OF COMPUTATIONAL RESOURCES TO A DEVICE TO STIMULATE A USER OF THE DEVICE TO APPLY NECESSARY UPDATES - Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied. | 2010-07-08 |
20100175069 | DATA PROCESSING DEVICE, SCHEDULER, AND SCHEDULING METHOD - The present invention comprises: a unit time calculating unit for calculating, as a unit time, the greatest common denominator of the individual operating cycles of a plurality of programs; an allocating unit for allocating the individual operating cycles of the plurality of programs into each of a plurality of continuous base periods that each have their respective unit times, in sequence beginning with the shortest operating cycle, and for allocating the operating cycles of remaining programs for which the operations have not been completed during one of the plurality of base periods into remaining base periods, in sequence beginning with the shortest operating cycles; and an operating unit for running the plurality of programs that are allocated to operating times. | 2010-07-08 |
20100175070 | VIRTUAL MACHINE MANAGING DEVICE, VIRTUAL MACHINE MANAGING METHOD, AND VIRTUAL MACHINE MANAGING PROGRAM - An object of the present invention is to suppress a variation in virtual machine startup times when multiple virtual machines are started in a computer system having multiple virtual machine providing servers. Execution server distribution unit | 2010-07-08 |
20100175071 | PROGRAM CODE COMPRISING A NUMBER OF PROGRAM CODE PACKAGE GROUPS STORED ON STORAGE UNITS - A software platform is provided for a hospital for example, wherein software modules (program code packages) are assigned in groups to different levels. In at least one embodiment, the presence of software interfaces allows software modules of different levels to be stored and run on different computer units with a data processing facility and storage unit, thus allowing communication between different levels by way of a data line. In at least one embodiment, this allows tasks to be moved out of the hospital, thereby saving costs. | 2010-07-08 |
20100175072 | OPERATION METHOD OF MOBILE APPLICATION MODEL - An operation method of a mobile application model is provided. An application model is composed that separates applications into individual views and executes the individual views with independent processes. Only a code for a running view is loaded in a memory and a corresponding application is executed in the composed application model when switching to the running view for execution of the corresponding application. | 2010-07-08 |
20100175073 | NETWORK DEVICE FOR ACCELERATING ISCSI PACKET PROCESSING - A network device for accelerating internet small computer systems interface (iSCSI) packet processing is described, which includes a host and a network card. The host includes an online command descriptor block queue, an iSCSI host manager, and an SCSI module. SCSI commands in a CDB are processed through these modules. The network card includes an LLP module and a microprocessor. Through a protocol data unit descriptor, a PDU generator and an iSCSI network card manager in the microprocessor, protocol data units in network packets can be resolved in advance, so that the host can concentrate on executing SCSI commands, thereby accelerating the network packet processing efficiency of the network device. | 2010-07-08 |
20100175074 | HOST APPARATUS, METHOD OF CONTROLLING HOST APPARATUS, IMAGE FORMING SYSTEM, AND COMPUTER PROGRAM - A host apparatus which uses an image foaming apparatus forming an image includes: a first installer which installs a first device driver to use the image forming apparatus; a second installer which installs a second device driver, which has more setting items than the first device driver, to use the image forming apparatus; and a configuration selector which selects one of a first configuration where the first device driver is deleted and only the second device driver remains, when the second installer installs the second device driver, and a second configuration where both the first device driver and the second device driver remain. | 2010-07-08 |
20100175075 | METHOD FOR EXECUTING A SOFTWARE ROUTINE IDENTIFIED IN A TASK OBJECT - A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server. The method further includes generating a task object generation command having at least a first software routine identifier, parameter data, and link task information and generating a second task object in response to the task object generation command. The second task object includes the first software routine identifier, the parameter data, and the link task information. The method further includes adding the second task object to a task execution queue on the computer server and executing the first software routine identified by the first software routine identifier in the second task object on the computer server to obtain at least a first result value, when the first flag value is a first predetermined value and the result parameter associated with the first task object corresponds to a second predetermined value. | 2010-07-08 |
20100175076 | METHOD FOR EXECUTING A SOFTWARE ROUTINE IDENTIFIED IN A TASK OBJECT - A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server, and generating a task object generation command having at least a first software routine identifier, parameter data, and event information. The event information has an event identifier and a first flag value. The method further includes generating a first task object in response to the task object generation command, which includes the first software routine identifier, the parameter data, and the event information. The method further includes adding the first task object to a task execution queue on the computer server, and executing the first software routine identified by the first software routine identifier in the first task object on the computer server to obtain at least a first result value, when an event listener on the computer server determines that the first flag value is a first predetermined value and an event associated with the event identifier is detected. | 2010-07-08 |
20100175077 | DISK REPRODUCING APPARATUS - A disk reproducing apparatus includes a disk detecting lever that has a switch abutting section and a light intercepting section and rotates according to the loading operation and the ejecting operation of a disk caused by abutment of the outer edge of the disk against a detecting pin; a single switch that is switched by the switch abutting section and thereby detects the loading start position, and also the inserting position of the disk; and a single photosensor that detects the inserting position of the disk with keeping the light intercepting condition thereof by either the light intercepting section or the disk and also detects the ejection end position when the light intercepting condition brought about by the disk has been released and then the light intercepting condition brought about by the light intercepting section is released. | 2010-07-08 |
20100175078 | PROGRAM GUIDE SYSTEM WITH TARGETED ADVERTISING - An interactive television program guide system is provided in which targeted advertisements may be presented to a user and targeted actions taken in the program guide based on the user's interests. The program guide monitors the user's interactions with the program guide to determine the user's interests. Interactions that may be monitored include interactions that indicate the categories of programming that interest the user (e.g., movies, sports, children's programming, etc.), setting a reminder for a program, purchasing a program, requesting information on a program, browsing program listings for a particular time or channel, etc. | 2010-07-08 |
20100175079 | VIDEO AD DELIVERY USING CONFIGURABLE VIDEO AD POLICIES - Systems and methods for video ad delivery using configurable dynamic video ad policies are provided. A system for delivering video ads to a video client may include an ad platform service. The ad platform service may have a media registration module configured to receive input data including a video ad policy and associated metadata and digital video content from a digital video content client. The ad platform service may further include a registration database configured to store input data received from the media registration module. The ad platform service may further include a manifest service and an associated manifest generation engine, wherein the manifest service may be configured to receive an ad manifest request from a video client. In response, the manifest generation engine may be configured to generate a manifest instance based on input data received at the manifest service, the manifest service being configured to send the manifest instance to the video client. | 2010-07-08 |
20100175080 | METHOD AND SYSTEM FOR FACILITATING ADVERTISING AND T-COMMERCE TRANSACTIONS IN CONNECTION WITH CONTENT STORED ON A STORAGE MEDIUM - In one embodiment, the present invention is an improved interactive television system and method for t-commerce. In this embodiment, the present invention relates to a method for facilitating transactions by a user through a television system including a playback device. The method includes providing a first storage medium with pre-recorded content stored on the recording medium; storing an interactive advertisement on the first storage medium; generating a trigger for the interactive advertisement; displaying the interactive advertisement on the television system in response to the trigger when the first storage medium is played by the playback device; prompting the user to respond to the interactive advertisement; generating a transaction request from the user response; and transmitting the transaction request through the television system. | 2010-07-08 |
20100175081 | PROGRAM GUIDE SYSTEM WITH TARGETED ADVERTISEMENTS BASED ON FUNCTION BUTTONS AND NON-PROGRAMMING OPTIONS - An interactive television program guide is provided in which targeted advertisements may be displayed on program guide screens and actions may be taken in the program guide based on which program guide function buttons and non-programming options are selected by the user. Advertisements may contain text, graphics, and video. Advertisements may also be selectable. | 2010-07-08 |
20100175082 | SYSTEM AND METHOD FOR INSERTING SPONSOR INFORMATION INTO CLOSED CAPTION CONTENT OF A VIDEO SIGNAL - Disclosed is a system and method of combining traditional programming caption data with advertising caption data in a single closed caption data stream. Advertising caption data is received from a data warehouse. When such advertising caption data is encoded into the closed caption data stream, it must temporally displace the traditional programming caption data that would otherwise be displayed. Thus, such programming caption data is buffered during display of the advertising caption data, and then is played out in an intelligent yet accelerated manner to maintain readability and recover the time lost during the sponsorship event. | 2010-07-08 |
20100175083 | METHOD OF BROADCASTING A COMPLEMENTARY ELEMENT, CORRESPONDING SERVER AND TERMINAL - A method and apparatus are provided for broadcasting at least one complementary element corresponding to a content broadcast to a terminal. The method includes: applying, to at least one portion of the content, at least one index detection function, stored in a database, the detection function delivering an information cue regarding the presence or absence of the index, providing at least one complementary element associated with the index, if a presence cue is emitted; and combining the content and the at least one complementary element, thereby delivering a complete content. | 2010-07-08 |
20100175084 | INTERACTIVE TELEVISION SYSTEM WITH MESSAGING AND RELATED PROMOTIONS - A system is provided in which messages and promotions are linked together in an interactive television system. The messages may be electronic mail messages. When the system displays a message, it displays the associated promotion on the same screen. The television viewer may select the promotion to see more details and to order the product or program advertised or to perform other actions related to the product or program. The system may also include a program guide and allow promotions to be linked to program guide data, in which case the system may allow the television viewer to access program guide features by selecting the promotion. | 2010-07-08 |
20100175085 | SYSTEM AND METHOD FOR DISPLAYING ELECTRONIC PROGRAM GUIDE - Provided is a method for providing electronic program guide of an image display device. A system for displaying an electronic program guide includes a management server and an image display device. The management server collects recommended program-related information from at least one image display device connected through a network, and compiles the same. The image display device receives the compiled recommended program-related information from the management server, and reflects the received recommended program-related information to the electronic program guide to reconstruct the electronic program guide. | 2010-07-08 |
20100175086 | SYSTEMS AND METHODS FOR PROVIDING TRANSPORT CONTROL - A transport control interface may be provided by an interactive television program guide application to provide information, control or both for live and recorded video programming. The transport control interface may indicate to the user the time duration of a live or recorded program and any time segments of the program that have been recorded. The transport control interface may automatically adjust the start and end time shown to accommodate various factors such as continuous viewing on a particular channel, multiple recorded segments, buffer size, etc. Various information associated with the live or recorded video programming may be displayed in the transport control interface. | 2010-07-08 |
20100175087 | Notifying Users of Interactive Functions - A method and apparatus for notifying a user of an interactive event using a remote control device. In one embodiment, a remote control device contains either a display or a bright light, or both, which can create a visual alert to let a user know that an interactive function is available. The nature of the function may be displayed on a screen attached to the remote control device. | 2010-07-08 |
20100175088 | Apparatus and Method for Processing Audio and/or Video Data - An apparatus and a method are provided for processing audio and/or video data comprising a module for displaying an element comprising at least one absolute time or at least one time indicator, wherein a sector or portion associated with the element indicates a duration or a length of the audio and/or video data, wherein time marks are displayed that are set automatically or by user interaction. | 2010-07-08 |
20100175089 | METHOD AND APPARATUS FOR REPRODUCING CONTENT THROUGH INTEGRATED CHANNEL MANAGEMENT - Provided are a method and apparatus for reproducing at least one piece of content received via at least one interface. The method includes classifying the at least one piece of content respectively received via the at least one interface according to a reference attribute, allocating the classified at least one piece of content to a virtual channel, and selecting a channel from among set channels that include the virtual channel and an occupied basic channel. | 2010-07-08 |
20100175090 | SYSTEMS AND METHODS FOR CREATING AGGREGATIONS OF EPISODES OF SERIES PROGRAMMING IN ORDER - A viewer of an episode of a series such as a television series may wish to access episodes of the series that the viewer missed when they were originally broadcast. Interactive applications may receive the viewer's indication of interest to record missed episodes of the incomplete series, which may include instructions regarding recording options for including the missed episodes in a series aggregation. Interactive applications may identify the episodes to be included in the series aggregation, and record the missed episodes, which may then be stored and organized to create a series aggregation, in the order that they were first broadcast with episodes that the viewer may already have available. Interactive applications may present the episodes of the series aggregation in the order that they were originally broadcast, by providing the viewer with options on how to access the episodes. | 2010-07-08 |
20100175091 | System and Method of Providing a Source for Ordering a Plurality of Products from a Plurality of Media - Described herein is a method of providing a single source ordering products from a plurality of media to a user. The method includes the steps of providing a computerized electronic server that may be viewed on a device for ordering a plurality of products seen by the user viewing the media; providing a list of media based upon the geographic location of the user; and providing a means for selecting one or more media from the list of medial providing a list of products based upon the selected media. | 2010-07-08 |
20100175092 | Customer Self Service In Interactive TV Environment for TV Programming Packages - Method and system for enabling users to perform self-service operations in interactive TV environments. In one embodiment, the method enables users to select and activate programming packages via a set-top box, thereby eliminating the need for the users to have to call a call center to activate the unit. Using a set of interactive screens, the user is enabled to view various programming package information, including comparative information. In one embodiment, the method assists users who are moving to activate/reactive broadcast services. For example, options are provided to enable the user to schedule service work, disconnect and activate services, and other activities connected with the move. In another embodiment, the method enables a user to select a programming package based on packages that are recommended by the system. Historic usage patterns, including viewing habits and attempts to access unavailable content are analyzed to determine which programming packages should be recommended for the user. | 2010-07-08 |
20100175093 | Method of Sharing Personal Media Using a Digital Recorder - A method and apparatus for sharing personal media using a digital recorder allows a plurality of multimedia devices to view content stored on a DVR across a local network. The DVR records video content from broadcast signals and records video content downloaded via the Internet. | 2010-07-08 |
20100175094 | COMMUNICATION APPARATUS - A communication apparatus comprises a connecting unit for connecting with a power line, a circuit for receiving a power supply through the connecting unit, and a communicating unit for communicating with an external apparatus through the connecting unit, a controlling unit for determining whether or not to permit a power supply stop, in accordance with the communicating unit receiving information on a request for the power supply stop, and controlling the communicating unit to transmit response data corresponding to the determination. | 2010-07-08 |
20100175095 | DATA-PROCESSING APPARATUS, DATA-PROCESSING METHOD AND DATA-PROCESSING PROGRAM - A data-processing method of receiving broadcast contents and content-related information related to the broadcast contents. The method includes setting a frequency for receiving the broadcast contents from the broadcast station, and recording frequency information corresponding to the set frequency. The method also includes transmitting request information including broadcast station ID identifying the broadcast station corresponding to the frequency information to a server. | 2010-07-08 |
20100175096 | TRANSMISSION METHOD, TRANSMISSION APPARATUS, RECEPTION METHOD, RECEPTION APPARATUS OF DIGITAL BROADCASTING SIGNAL AND TRANSMISSION FRAME-FORM THEREOF - The present invention relates to a transmission method, a transmission apparatus, a reception method, and a reception apparatus of a digital broadcasting signal that can add frame header information to a front portion of a transmission frame in a transmission system for digital broadcasting to thereby determine a different transmission mode, modulation level, hierarchical modulation, error correction code, and the like for each temporally different transmission frame, and a transmission frame structure thereof. The transmission frame structure includes a frame header containing multiplexing information of the transmission frame, and a frame body containing data information associated with a service provided by the transmission frame. Also, the frame header may include a frame synchronization signal unit including synchronization signal information for extracting a start position of the transmission frame and a frame information unit including multiplexing information of data contained in the transmission frame. The multiplexing information denotes information associated with a transmission mode, a modulation level, a hierarchical modulation, and an error correction code of the data contained in the transmission frame. | 2010-07-08 |
20100175097 | METHOD AND SYSTEM FOR USING IP NETWORK TO CONNECT A TELEVISION AND A COMPUTER TO PROCESS INTERACTIVE ENTERTAINMENT - A system and a method for interactive entertainment with a television and a computer connected by the IP network are provided. The system includes a computer, a TV set and an IP network, and particularly a computer PC box and a television TV box. The display output interface and the communication interface of the computer are connected to the computer PC box. The computer PC box communicates with the television TV box via the IP network. The audio-video signal of the television TV box is outputted to the TV set. Other input/output devices on the TV side are connected into the system via a corresponding interface of the television TV box. The communication medium adopted for the IP network can be selected from the group consisting of a category 5 cable, a power line, wirelessness or a fiber. The present invention, establishing the IP network by making use of the existing domestic local area network, the indoor power line or the wireless communication, realizes two-way transmission of the audio-video signal and the control signal between a computer and a TV set inside a house, and greatly facilitates arrangement of the domestic on-line entertainment system with a computer as the center. | 2010-07-08 |
20100175098 | TV-CENTRIC SYSTEM - A TV has a TV processor and a display presenting a map showing the topology of the home network of which the TV is a part. Upon initial energization the TV discovers network devices in the home, uploads this information to an Internet server, which in turn sends back to the TV necessary information for configuring the network, without any user interaction to configure network devices. | 2010-07-08 |
20100175099 | IPTV receiver and method for controlling an application in the IPTV receiver - An IPTV and a method for controlling a video widget in the IPTV are disclosed. Herein, a method for providing a video widget application includes playing-back a video content within an IP packet, executing a video widget application, and selecting a specific area of the video content being played-back, and outputting an object guide including an object list included in the selected specific area. The method also includes selecting at least one object from the object guide, selecting a video filter to be applied to the at least one selected object from the video Widget application, and applying the selected video filter to the at least one selected object. | 2010-07-08 |
20100175100 | PRESENCE INFORMATION SHARING APPARATUS, PRESENCE INFORMATION SHARING METHOD, PRESENCE INFORMATION SHARING PROGRAM AND PRESENCE INFORMATION SHARING SYSTEM - A presence information sharing apparatus is provided which includes a video acquiring unit for acquiring predetermined video contents from a content distribution server, a status information notifying unit for transmitting presence information containing acquisition source information on video contents acquired from the content distribution server to a presence server via a communication network, a status information acquiring unit for acquiring presence information transmitted by at least one another user from the presence server, a presence video acquiring unit for acquiring a video of video contents being viewed by the another user as a presence video from the content distribution server based on the acquisition source information contained in the presence information received by the status information acquiring unit, and a display controlling unit for displaying the video contents being acquired by the video acquiring unit and the presence video being acquired by the presence video acquiring unit on a display. | 2010-07-08 |
20100175101 | Content Distribution Systems and Methods - A content distribution system and method receives data from a data source and identifies at least one unused channel in the received data. The unused channel is filtered and identified as an available content transmission channel. Content is then received from a content source and encoded to generate encoded content. The encoded content is modulated to generate modulated content, which is distributed within a distribution environment using the available content transmission channel. | 2010-07-08 |
20100175102 | Interactive media system - An interactive media system includes a broadcasting device for broadcasting TV signals, and a receiving device for receiving TV signals. The TV signals, such as a TV commercial for new movie preview, contain screen related action codes that include device type, action type and the detail action information. The receiving device includes storage for storing the reference address for other home electronic devices, and a button on a remote controller for the users to start interactive with the interactive media system. When the user presses the button, the receiving device will send the action codes to the designated other home device or another TV screen channel, to allow users to perform the action on the other home device instead of performing the action on TV. The system also allows users just use number keys to navigate web. | 2010-07-08 |
20100175103 | REACTIVE THROTTLING OF INBOUND MESSAGES AND RANGES - A method for throttling inbound email messages in an enterprise email system including a plurality of inbound mail servers and at least one management server is provided. Policies defining message event limits for each unique sender are applied to messaging events from the unique sender at each inbound server. Feedback from each of the inbound mail servers to the management server is provided. When events from a unique sender exceed a threshold, as determined by the management server using the feedback, an alert is generated and a new, more restrictive policy for the unique sender is created. The more restrictive policy is broadcast the more restrictive policy to each of the inbound mail servers. | 2010-07-08 |
20100175104 | SAFE AND SECURE PROGRAM EXECUTION FRAMEWORK WITH GUEST APPLICATION SPACE - A system and method is provided here that allow computer user to create a temporary guest running space for application without switching user environment. This unique method allows user to run trusted applications in regular running space while keeping a separate working space for applications that uses or visit non trusted data sources. | 2010-07-08 |
20100175105 | Systems and Processes for Managing Policy Change in a Distributed Enterprise - A method for managing changes to policies in an enterprise includes receiving a systems policy change request to change a systems policy that implements a published enterprise policy, determining whether the requested systems policy change complies with the published enterprise policy, and updating the systems policy according to the requested systems policy change if the requested systems policy change complies with the published enterprise policy. A system for managing policies in an enterprise includes a policy management module configured for receiving published policies and generating corresponding systems policies having data for implementing the published policies, and a policy library storing the published policies and the systems policies. | 2010-07-08 |
20100175106 | Systems and Methods for Performing Remote Configuration Compliance Assessment of a Networked Computer Device - The disclosed principles describe systems and methods for assessing the policy compliance of a target device, wherein the assessment is performed by a scanning computer in communication with the target device via a communication network. By employing a system or method in accordance with the disclosed principles, distinct advantages are achieved. Specifically, conducting such a remote scan allows for the scanner computer to perform a remote scan of the remote device without installing client software to the remote device. Also, conducting a compliance assessment according to the disclosed principles allows for the target device to be assessed after policy updates and changes, without requiring the target device to be re-scanned. Thus, the disclosed principles reduce the need for internal IT resources to manage the assessment and updates of client configuration settings on the target device. | 2010-07-08 |
20100175107 | SECURE WORKLOAD PARTITIONING IN A SERVER ENVIRONMENT - Generally speaking, systems, methods and computer program products for creating a secure workload partition in a server environment are disclosed. Embodiments of the method may include creating, for a process associated with a client network service, a secure workload partition within a logical partition executing in a server environment having a root partition where the secure workload partition has no network interfaces and no communication with any other workload partitions within the logical partition. Embodiments of the method may also include establishing an alternative network connection for the process within the created secure workload partition without establishing a network interface for the secure workload partition and without establishing communication with any other workload partitions within the logical partition. Embodiments of the method may also include executing the process within the secure workload partition to provide the client network service. | 2010-07-08 |
20100175108 | METHOD AND SYSTEM FOR SECURING VIRTUAL MACHINES BY RESTRICTING ACCESS IN CONNECTION WITH A VULNERABILITY AUDIT - A method and system for securing a virtual machine is disclosed. An initiation signal from the host system that is generated upon startup of the virtual machine is intercepted, and a network connection on the host system accessible by the virtual machine is restricted in response. Then, the virtual machine is queried for preexisting vulnerabilities, and such data is received. Access by the virtual machine to the network connection is controlled based upon a comparison of a security policy, which is associated with the virtual machine, to the received preexisting vulnerabilities. | 2010-07-08 |
20100175109 | ROUTE OPTIMISATION FOR PROXY MOBILE IP - A method of establishing a route optimisation mode between a mobile node and a correspondent node across a mobile IP network. The method comprises establishing a bi-directional security association between a proxy mobile agent to which the mobile node is attached or to which the mobile node will attach, and the correspondent node. On behalf of the mobile node, the proxy mobile agent performs a reachability test with the correspondent node via a home agent of the mobile node, and sends a binding update to the correspondent node. | 2010-07-08 |
20100175110 | PROTECTING A NETWORK FROM UNAUTHORIZED ACCESS - A system to dynamically protect access to a first network receives a data unit containing a source address indicating a source of the data unit. The source address is matched with information stored in the system, and entry of the data unit to the first network is enabled or denied based on the matching. It is determined whether the data unit contains an identifier of a codec type that matches a stored codec type, and occurrence of an attack of the first network is indicated in response to determining that the identifier is of a codec type that does not match the stored codec type. | 2010-07-08 |
20100175111 | Computer-Implemented Method for Obtaining a Minimum Biclique Cover in a Bipartite Dataset - A method includes providing a bipartite graph having vertices of a first type, vertices of a second type, and a plurality of edges, wherein each edge joins a vertex of the first type with a vertex of the second type. A unipartite edge dual graph is generated from the bipartite graph, and a minimum clique partition of the edge dual graph is recursively determined. A biclique is then created in the bipartite graph corresponding to each clique in the minimum clique partition of the edge dual graph. | 2010-07-08 |
20100175112 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCTS FOR ENABLING TRUSTED ACCESS TO INFORMATION IN A DIVERSE SERVICE ENVIRONMENT - A system, method, and computer program product for enabling mediated access to information controlled by one or more information repositories by one or more application service providers. The information controlled by the one or more information repositories is associated with one or more subscribers of information-based services offered by the one or more application service providers. | 2010-07-08 |
20100175113 | Secure System Access Without Password Sharing - A mechanism is provided for performing secure system access by a requesting user without sharing a password of a credential owner. A database stores system information for resources. The owner of super user authority for a resource provides system information to the database including a credential for accessing the resource. When a user wishes to access the system, client software of the requestor sends an access request to client software of the owner. The client software of the owner prompts the owner to authorize or deny access. Responsive to the owner authorizing the access, the client software of the owner returns authorization to the client software of the requestor, which then uses the credential in the system information database to access the resource. The client software of the requestor does not cache or store the credential or present the credential to the user. | 2010-07-08 |
20100175114 | ADDING BIOMETRIC IDENTIFICATION TO THE SERVER SECURITY INFRASTRUCTURE FOR AN ENTERPRISE SERVICE BUS SYSTEM - An enterprise service bus server receives a user's biometric information from a client. The enterprise service bus server requests authentication of the user by sending the user's biometric information to a trusted third party authenticator Furthermore, the enterprise service bus server establishes a connection with the enterprise service bus client if the trusted third party authenticator indicates that the user is authenticated. In addition, the enterprise service bus server allows access to an enterprise service bus service for the enterprise service client. | 2010-07-08 |
20100175115 | MANAGEMENT OF CREDENTIALS USED BY SOFTWARE APPLICATIONS - An identity management (“IdM”) system can change the credentials at certain intervals. If credentials change, there is no way for an application that uses the credentials to know that the credentials have changed because the application dependency relationships are unknown. When service account credentials change, credentials are typically manually updated for each dependent application. Some embodiments of the inventive subject matter allow IdM systems to track application dependencies for service accounts. The IdM systems can detect when service account credentials change and automatically notify dependent applications of the new service account credentials. | 2010-07-08 |
20100175116 | LOCATION-BASED SYSTEM PERMISSIONS AND ADJUSTMENTS AT AN ELECTRONIC DEVICE - Securing access to a portable electronic device (PED), securing e-commerce transactions at an electronic device (ED) and dynamically adjusting system settings at a PED are disclosed. In an example, usage or mobility characteristics of the PED or ED (e.g., a location of the ED or PED, etc.) are compared with current parameters of the PED or ED. A determination as to whether to permit an operation (e.g., access, e-commerce transaction, etc.) at the ED or PED can be based at least in part upon a degree to which the current parameters conform with the usage or mobility characteristics. In another example, at least a current location of a PED can be used to determine which system settings to load at the PED. | 2010-07-08 |
20100175117 | SYSTEM AND METHOD FOR PERSONAL IDENTIFICATION NUMBER MESSAGING - A relay site associated with a wireless network can send messages between mobile devices associated with the wireless network without having to transmit the messages to a host system. The messages include PIN messages and each of the mobile devices has a PIN address. The relay site includes a relay server for controlling the operation of the relay site, and sending the PIN messages between the mobile devices. The relay site also includes a relay data store having PIN information for users associated with the mobile devices. The relay server can access the relay data store to allow users that use the mobile devices to query the relay data store for PIN information of other users. | 2010-07-08 |
20100175118 | ACCESS TO SERVICE - A method is described for providing access to service in an access management system accessible via a data network, in which data network a user is registered and/or authenticated to a service by providing at least one detail related to the user. A user is provided with an option to add a direct view to the service from an external micro application platform and allowed to select the option of adding the direct view and responsively negotiating with the external micro application platform credential information in order to form a trusted relationship for accessing the direct view from the external micro application platform. After recognizing of a show view request from the external micro application platform based on the trusted relationship, the external micro application platform is provided with the view to the service. Corresponding method in a micro platform is described. | 2010-07-08 |
20100175119 | Management of Access Authorization to Web Forums Open to Anonymous Users Within an Organization - A mechanism is provided for managing access authorization to forums open to anonymous users within an organization. A token distributor application provides a unique token to each member of a community or organization. The application is trusted by all members to not store an association between the authenticated user and the token when a token is assigned. The only control exerted by the token distributor is to block users who have already obtained a token from receiving another token. The communication tool or collaboration space may accept creation of a new anonymous identity, such as a nickname, to any individual supplying a token assigned by the token distributor application. An administrator may ban users by token. A banned user cannot access the communication tool or collaboration space using a nickname associated with a banned token. | 2010-07-08 |
20100175120 | MULTI-LAYER DATA MAPPING AUTHENTICATION SYSTEM - A multi-layer data mapping authentication system has a real ID authentication server, a middle data mapping server and a terminal data mapping server. The real ID authentication server links to a private network and stores real IDs and the hidden codes, each of which corresponds to a unique real ID. The terminal data mapping server links to a public network and allows an end user to link so that the end user sends the terminal data mapping server a user's code and an one-time-password (OTP). Since the middle data mapping server links between the real ID authentication server and the terminal data mapping server, the end user only uses hidden code to generate the OTP and sends the user's code and the OTP to the public network. The terminal and middle data mapping servers are converts the user's code to the corresponding real ID of the end user in the private network to complete the authentication procedure. The real ID and hidden code is not sent at the public network and is not stolen. | 2010-07-08 |
20100175121 | ADDING BIOMETRIC IDENTIFICATION TO THE CLIENT SECURITY INFRASTRUCTURE FOR AN ENTERPRISE SERVICE BUS SYSTEM - An enterprise service bus client accesses a user's biometric information, where the biometric information is accessed from a biometric input device coupled to the enterprise service bus client. Furthermore, the enterprise service bus client retrieves a certificate using the user's biometric information. With the certificate, the enterprise service bus client establishes a connection with an enterprise service bus server and accesses an enterprise service bus service. | 2010-07-08 |
20100175122 | SYSTEM AND METHOD FOR PREVENTING HEADER SPOOFING - A system and method for preventing spoofing including a receiver at a session border controller (SBC) configured to receive a message from a network element, wherein the message is a request for network access and the message comprises a first source information. The system and method may also include one or more processors at the session border controller (SBC) configured to identify an identifier associated with the network element, wherein the identifier corresponds to a second source information, and to replace the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element. The system and method may also include one or more databases configured to store the second source information. The system and method may also include a transmitter at the session border controller (SBC) configured to transmit the message with the second source information to a service provider proxy for granting network access. In another embodiment, network access may be denied in the event it is determined that the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element are different. | 2010-07-08 |
20100175123 | ADDRESS TRANSLATION DEVICE AND ADDRESS TRANSLATION METHOD - In order to more efficiently use port resources, which are finite global address resources assigned to an address translation device, the address translation device holds a session-port assignment table showing a correspondence between an existing session and a local endpoint (port resource) in the address translation device, and a port assignment rule indicating port usage about assignable ports. An address translation unit translates address information of a packet received according to the correspondence between the existing session and the port resource shown in the session-port assignment table, and assigns the port according to the port usage indicated by the port assignment rule for a packet for opening a new session. An assignment rule update unit changes a ratio of the port usage in the port assignment rule while the correspondence between the existing session and the port resource in the session-port assignment table is not changed. | 2010-07-08 |
20100175124 | METHODS AND APPARATUS FOR IMPLEMENTING A SEARCH TREE - Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet. | 2010-07-08 |
20100175125 | SYSTEM, METHOD AND APPARATUS THAT ISOLATE VIRTUAL PRIVATE NETWORKS (VPN) AND BEST EFFORT TO RESIST DENIAL OF SERVICE ATTACKS - A network architecture in accordance with the present invention includes a communication network that supports one or more network-based Virtual Private Networks (VPNs). The communication network includes a plurality of boundary routers that are connected by access links to CPE edge routers belonging to the one or more VPNs. To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN, the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. Granting precedence to intra-VPN traffic over extra-VPN traffic in this manner entails special configuration of network elements and protocols, including partitioning between intra-VPN and extra-VPN traffic on the physical access link using layer 2 multiplexing and the configuration of routing protocols to achieve logical traffic separation between intra-VPN traffic and extra-VPN traffic at the VPN boundary routers and CPE edge routers. By configuring the access networks, the VPN boundary routers and CPE edge routers, and the routing protocols of the edge and boundary routers in this manner, the high-level service of DoS attack prevention is achieved. | 2010-07-08 |
20100175126 | System And Method For Registration Of An Electronic Device - A method for registering an electronic device includes receiving from a point-of-sale interface a transaction code and purchaser information associated with a purchase of an electronic device. While the transaction code is associated with the purchase of the electronic device, it does not uniquely identify the electronic device purchased. The method also includes receiving from the electronic device the transaction code and a device identifier that uniquely identifies the electronic device. The purchaser information and the device identifier are associated via the transaction code for registering the electronic device. | 2010-07-08 |
20100175127 | METHOD AND APPARATUS FOR MAXIMIZING CAPACITY OF ACCESS CONTROLLERS - A method and apparatus are provided for controlling access to a secure area. The method includes the steps of providing a plurality of user credentials, generating a Boolean equation based upon the plurality of user credentials where the generated Boolean equation provides a predetermined response to each user credential of the plurality of credentials, saving the generated Boolean equation in a memory in place of the user credentials and recognizing a user credential of the plurality of user credentials by reference to the Boolean equation. | 2010-07-08 |
20100175128 | AUTHENTICATION INFORMATION MANAGEMENT APPARATUS, AUTHENTICATION INFORMATION MANAGEMENT PROGRAM AND METHOD THEREOF, AUTHENTICATION APPARATUS, AND AUTHENTICATION PROGRAM AND METHOD THEREOF - An authentication information management apparatus manages authentication information for execution of authentication in an information processing device by utilizing a terminal device equipped with an IC card and a memory. The apparatus includes an identification information acquisition section that acquires identification information which is written in the IC card, and an authentication information setting section that retrieves stored authentication information corresponding to the identification information from the memory based on the identification information acquired by the identification information acquisition section, and sets up the IC card so that the retrieved authentication information is readable from the IC card. | 2010-07-08 |
20100175129 | METHOD FOR NOTIFICATION UPON EXPOSURE TO OFFENSIVE BEHAVIOURAL PATTERNS IN COLLABORATION - A system and method for protecting a user from offensive behavior in communications and notifying the user and/or an enforcement entity of the offensive behavior. The offensive content analysis system monitors communications between users for offensive behavior. The offensive content analysis system may measure the level of current offense in the communication and determine a historical offensive behavior pattern for the user. The offensive content analysis system may then determine if the offensive behavior, both current and historical, rises to a threshold behavior level. The offensive content analysis system may take notification action if the offensive behavior meets the threshold level. | 2010-07-08 |
20100175130 | Pattern-Recognition Processor with Matching-Data Reporting Module - Disclosed are methods and devices, among which is a device that includes a pattern-recognition processor. The pattern-recognition processor may include a matching-data reporting module, which may have a buffer and a match event table. The buffer may be coupled to a data stream and configured to store at least part of the data stream, and the match event table may be configured to store data indicative of a buffer location corresponding with a start of a search criterion being satisfied. | 2010-07-08 |
20100175131 | METHOD AND SYSTEM FOR NETWORK PROTECTION AGAINST CYBER ATTACKS - A method, system, and device for protecting networking computers or devices from cyber attacks, including periodically changing cyber coordinates of a communications network or system; communicating the changed cyber coordinates to corresponding or reciprocal networks and/or devices so they can maintain communications; detecting a cyber attack or receiving notification from the corresponding or reciprocal networks and/or devices of a cyber attack; and changing the cyber coordinates of the network or system upon such detection or notification and communicating the changed cyber coordinates to the corresponding or reciprocal networks and/or devices. | 2010-07-08 |
20100175132 | ATTACK-RESISTANT VERIFICATION OF AUTO-GENERATED ANTI-MALWARE SIGNATURES - Techniques are disclosed for verifying whether payload signatures correspond to a vulnerability or exploit. Generally a security system may be configured to detect an attack on a server while the server is processing a payload. The security system generates (or obtains) a provisional signature corresponding to the vulnerability. For example, a provisional signature may be generated for a vulnerability from a group of payloads determined to correspond to that vulnerability. The effects of subsequent payloads which match the provisional signature may be monitored. If the effects of a payload duplicate the attack symptoms, a confidence metric for provisional signature may be increased. Once the confidence metric exceeds a predetermined threshold, then the provisional signature may be made active and used to block traffic from reaching an intended destination. | 2010-07-08 |
20100175133 | REORDERING DOCUMENT CONTENT TO AVOID EXPLOITS - Structured document files, such as those utilized by standard productivity applications or for portable documents can have malicious computer executable instructions embedded within them. Modifications to such files can prevent the execution of such malware. Modifications can operate at a file sector level, such as either fragmenting or defragmenting the file, or they can operate at a file record level, such as removing records, adding records, or rearranging the order of records. Other modifications include writing random data into records deemed likely to have malware, removing unaccounted for space, or removing records that are not known to be good and are inordinately large. A scan of the structured document file can identify relevant information and inform the selection of the modifications to be applied. | 2010-07-08 |
20100175134 | System and Method for Performing Remote Security Assessment of Firewalled Computer - Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated. | 2010-07-08 |
20100175135 | Systems and Methods for Assessing the Compliance of a Computer Across a Network - The disclosed principles describe systems and methods for assessing the security posture of a target device, wherein the assessment is performed by a scanning computer in communication with the target device via a communication network. By employing a system or method in accordance with the disclosed principles, distinct advantages are achieved. Specifically, conducting such a remote scan allows for the scanner computer to perform a remote scan of the remote device without installing client software to the remote device. Thus, the disclosed principles reduce the need for internal IT resources to manage the deployment and updates of client software on the target device. Also, conducting a remote scan according to the disclosed principles allows for the remote scan to be performed even if the scanner computer and remote device run different operating systems. | 2010-07-08 |
20100175136 | SYSTEM AND METHOD FOR SECURITY OF SENSITIVE INFORMATION THROUGH A NETWORK CONNECTION - A system and method for preventing phishing attacks by comparing the address of a Web site to which a user wishes to enter sensitive information (or indeed any type of user information) to at least one previous address to which the user already submitted at least a portion of this information. If the current address and the previous address are not identical, the user is preferably at least alerted; more preferably transmission of the information is blocked. The present invention may also optionally operate even if only a portion of the sensitive information is submitted, such as only the password for example. | 2010-07-08 |