33rd week of 2012 patent applcation highlights part 61 |
Patent application number | Title | Published |
20120210313 | Systems and Methods for Controlling Application Updates Across a Wireless Interface - Various embodiments of the present invention are directed to systems, methods, and compute program products for managing connections between a mobile device and a network server over a network connection in a bandwidth-efficient manner. In one embodiment, a mobile device includes a processor, and there are a plurality of services executed by the processor, each of the services receiving information updates over a network connection from a server. At least one update interval function executed by the processor assigns an update interval to each of the services, the update intervals governing when each of the respective services request updated information over the network connection. | 2012-08-16 |
20120210314 | CONCURRENT UPGRADE OF ALL COMPONENTS IN STORAGE SUBSYSTEMS - A plurality of upgraded components associated with an upgraded storage subsystem replaces a plurality of existing components associated with an existing storage subsystem. Support for a verify I/O command is created. A target volume is created in the upgraded storage subsystem having a same volume identification as a source volume. For a command received on the at least one of the plurality of upgraded components, the verify I/O command is invoked on at least one of a comparable one of the plurality of existing components. If the command is verified, the command is driven. The at least one of the plurality of upgraded components disguises a true volume identification of the target volume from the at least one of the plurality of existing components. | 2012-08-16 |
20120210315 | DEVICE MANAGEMENT IN A NETWORK - Methods and devices supporting the management of a plurality of electronic devices and processing of update information for updating software and/or firmware in the electronic devices. Prompting of users may be made using a language associated with the electronic device, and authorization to update an electronic device may be secured using a subscriber identity module. | 2012-08-16 |
20120210316 | SYSTEM AND METHOD FOR ESTABLISHING A SECURE WIRELESS COMMUNICATION PATH - A communication system automatically provides a secure communication link between a device and a network. A switch initiates a wireless link between the switch and the network. Then, a secure communication path is created between the switch and the network. When a device is linked to the switch, the device is automatically granted access to the secure communication path created by the switch. | 2012-08-16 |
20120210317 | METHOD AND APPARATUS FOR UPDATING DATA CARD - Disclosed are a method and apparatus for updating a data card. The method comprises: updating by way of downloading from an online update website the operating system of a user terminal and an operating system side device driver of a data card of the user terminal; downloading from the online update website a coordinated installer program suitable for running in the updated operating system; and updating by way of running the coordinated installer program in the updated operating system a board side device driver of the data card. The present method can enable the board side device driver of the data card to interact with the operating system side device driver, thus the data card can be used normally. | 2012-08-16 |
20120210318 | VIRTUAL SWITCH INTERCEPTOR - Application management is facilitated by observing messages communicated amongst virtual applications external to application-hosting virtual machines. In one instance, the messages can be observed from within a virtual switch outside hosting virtual machines. One or more actions can subsequently be performed as a function of the messages such as but not limited to application monitoring as well as message routing, filtering, and/or transformation. | 2012-08-16 |
20120210319 | NETWORK COMMUNICATIONS OVER SHARED LINKS IN A VIRTUALIZED ENVIRONMENT - A method of data processing includes a physical host executing a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch. | 2012-08-16 |
20120210320 | PREVENTING UNSAFE SHARING THROUGH CONFINEMENT OF MUTABLE CAPTURED VARIABLES - The disclosed embodiments provide a system that facilitates the development and execution of a software program. During operation, the system provides a mechanism for restricting a variable to a runtime context in the software program. Next, the system identifies the runtime context during execution of the software program. Finally, the system uses the mechanism to prevent incorrect execution of the software program by ensuring that a closure capturing the variable executes within the identified runtime context. | 2012-08-16 |
20120210321 | Dormant Background Applications on Mobile Devices - The subject disclosure is directed towards a technology in which a mobile device maintains an application in a dormant state in which the application's process is not terminated and remains in memory, but the application cannot execute code. Further, state and execution context are maintained for the application, allowing the application to be quickly and efficiently resumed into the running state. To prevent the application from executing code while dormant, thread activity is suspended, requests canceled, completed or paused, resources detached, and so forth. Resource usage may be monitored for dormant applications, to remove a misbehaving dormant application process from memory if improperly using resources. | 2012-08-16 |
20120210322 | METHODS FOR SINGLE-OWNER MULTI-CONSUMER WORK QUEUES FOR REPEATABLE TASKS - There are provided methods for single-owner multi-consumer work queues for repeatable tasks. A method includes permitting a single owner thread of a single owner, multi-consumer, work queue to access the work queue using atomic instructions limited to only a single access and using non-atomic operations. The method further includes restricting the single owner thread from accessing the work queue using atomic instructions involving more than one access. The method also includes synchronizing amongst other threads with respect to their respective accesses to the work queue. | 2012-08-16 |
20120210323 | DATA PROCESSING CONTROL METHOD AND COMPUTER SYSTEM - A rerunning load is reduced for reducing the risk of exceeding a specified termination time after abnormally ending a job net. Even if the same data processed by jobs within a job net is replaced with split data of sub-jobs and some of sub-jobs have been abnormally ended, the job net is continued. For each split data, a state and/or an execution server ID of each job are stored, and the progress of a job net is managed. Only split data whose state is not “normal” is to be processed by rerunning. Based on states of execution servers, on whether or not intermediate files transferred between jobs is shared among execution servers, and on whether or not an output file is deleted after ending the subsequent job, it is judged whether or not intermediate files can be referred to and from what job the rerun is to be performed. | 2012-08-16 |
20120210324 | Extended Dynamic Optimization Of Connection Establishment And Message Progress Processing In A Multi-Fabric Message Passing Interface Implementation - In one embodiment, the present invention includes a system that can optimize message passing by, at least in part, automatically determining a minimum number of fabrics and virtual channels to be activated to handle pending connection requests and data transfer requests, and preventing processing of new connection requests and data transfer requests outside of a predetermined communication pattern. Other embodiments are described and claimed. | 2012-08-16 |
20120210325 | Method And Apparatus Of Smart Power Management For Mobile Communication Terminals Using Power Thresholds - A method is provided for use in a mobile communication terminal configured to support a plurality of applications, wherein each application is executed by performing one or more tasks. The method includes, in response to a scheduling request from an application, obtaining an indication of power supply condition at a requested run-time of at least one of the tasks. The method further includes obtaining a prediction of a rate of energy usage by the task at the requested run-time, estimating, from the predicted rate of energy usage, a total amount of energy needed to complete the task, and making a scheduling decision for the task. The scheduling decision comprises making a selection from a group of two or more alternative dispositions for the task. The selection is made according to a criterion that relates the run-time power-supply condition to the predicted rate of energy usage by the task and to the estimate of total energy needed to complete the task. | 2012-08-16 |
20120210326 | Constrained Execution of Background Application Code on Mobile Devices - The subject disclosure is directed towards a technology by which background application code (e.g., provided by third-party developers) runs on a mobile device in a way that is constrained with respect to resource usage. A resource manager processes a resource reservation request for background code, to determine whether the requested resources meet constraint criteria for that type of background code. If the criteria are met and the resources are available, the resources are reserved, whereby the background code is ensured priority access to its reserved resources. As a result, a properly coded background application that executes within its constraints will not experience glitches or other problems (e.g., unexpected termination) and thereby provide a good user experience. | 2012-08-16 |
20120210327 | Method for Packet Flow Control Using Credit Parameters with a Plurality of Limits - The present invention relates to a processor and a method for processing a data packet, the method including steps of decreasing a value of a first credit parameter when the data packet is admitted to a processor at least partly based on the value of the first credit parameter and a first limit of the first credit parameter, and increasing the value of the first credit parameter, in dependence on a data storage level in a buffer in which the data packet is stored before being admitted to the processor, the value of the first credit parameter not being increased, so as to become larger than a second limit of the first credit parameter, when the buffer is empty. | 2012-08-16 |
20120210328 | Guarded, Multi-Metric Resource Control for Safe and Efficient Microprocessor Management - A mechanism is provided for guarded, multi-metric resource control. Monitoring is performed for an intended action to address a negative condition from a resource manager in a plurality of resource managers in the data processing system. Responsive to receiving the intended action, a determination is made as to whether the intended action will cause an additional negative condition within the data processing system. Responsive to determining that the intended action will cause the additional negative condition within the data processing system, at least one alternative action is identified to be implemented in the data processing system that addresses the negative condition while not causing any additional negative condition. The at least one alternative action is then implemented in the data processing system. | 2012-08-16 |
20120210329 | STORAGE SYSTEM AND METHOD FOR CONTROLLING THE SAME - Optimum load distribution processing is selected and executed based on settings made by a user in consideration of load changes caused by load distribution in a plurality of asymmetric cores, by using: a controller having a plurality of cores, and configured to extract, for each LU, a pattern showing the relationship between a core having an LU ownership and a candidate core as an LU ownership change destination based on LU ownership management information; to measure, for each LU, the usage of a plurality of resources; to predicate, for each LU based on the measurement results, a change in the usage of the plurality of resources and overhead to be generated by transfer processing itself; to select, based on the respective prediction results, a pattern that matches the user's setting information; and to transfer the LU ownership to the core belonging to the selected pattern. | 2012-08-16 |
20120210330 | Executing A Distributed Java Application On A Plurality Of Compute Nodes - Methods, systems, and products are disclosed for executing a distributed Java application on a plurality of compute nodes. The Java application includes a plurality of jobs distributed among the plurality of compute nodes. The plurality of compute nodes are connected together for data communications through a data communication network. Each of the plurality of compute nodes has installed upon it a Java Virtual Machine (‘JVM’) capable of supporting at least one job of the Java application. Executing a distributed Java application on a plurality of compute nodes includes: tracking, by an application manager, a just-in-time (‘JIT’) compilation history for the JVMs installed on the plurality of compute nodes; and configuring, by the application manager, the plurality of jobs for execution on the plurality of compute nodes in dependence upon the JIT compilation history for the JVMs installed on the plurality of compute nodes. | 2012-08-16 |
20120210331 | PROCESSOR RESOURCE CAPACITY MANAGEMENT IN AN INFORMATION HANDLING SYSTEM - An operating system or virtual machine of an information handling system (IHS) initializes a resource manager to provide processor resource utilization management during workload or application execution. The resource manager captures short term interval (STI) and long term interval (LTI) processor resource utilization data and stores that utilization data within an information store of the virtual machine. If a capacity on demand mechanism is enabled, the resource manager modifies a reserved capacity value. The resource manager selects previous STI and LTI values for comparison with current resource utilization and may apply a safety margin to generate a reserved capacity or target resource utilization value for the next short term interval (STI). The hypervisor may modify existing virtual processor allocation to match the target resource utilization. | 2012-08-16 |
20120210332 | ASYNCHRONOUS PROGRAMMING EXECUTION - One or more techniques and/or systems are disclosed for improving asynchronous programming execution at runtime. Asynchronous programming code can comprise more than one level of hierarchy, such as in an execution plan. Respective aggregation operations in a portion of the asynchronous programming code are unrolled, to create a single level iterative execution, by combining elements of the multi-level iterative execution of the asynchronous programming code. In this way, the aggregation operations are concatenated to local logic code for the aggregation operations. Thread context switching in the unrolled portion of asynchronous programming code is performed merely at an asynchronous operation, thereby mitigating unnecessary switches. Exceptions thrown during programming code can be propagated up to a top of a virtual callstack for the execution. | 2012-08-16 |
20120210333 | Methods, Systems, and Media for Application Fault Containment - Methods, systems; and media for application fault containment are provided. In accordance with some embodiments, a method for application fault containment is provided, the method comprising: determining a plurality of applications associated with a processing device; isolating each of the plurality of applications into an application container; receiving a user selection of one of the plurality of applications; and creating the application container of a container type for the user selected application in response to receiving the user selection; wherein, upon determining that the container type is a persistent container, configuring the created application container to maintain state information across executions of the user selected application, and wherein, upon determining that the container type is an ephemeral container, configuring the created application container to be removed after a single execution of the user selected application. | 2012-08-16 |
20120210334 | COMMUNICATION DEVICE AND METHOD FOR COHERENT UPDATING OF COLLATED MESSAGE LISTINGS - A device, system and method are provided for presenting message threads in a device display where messages may have a persistent or intermediate status. A list of message threads is displayed, collated according to a given message thread attribute, is displayed. When a new message is detected belonging to one of the message threads, if the message has a persistent status it is added to the message thread and the collating message thread attribute for that thread is updated. If the message has an intermediate status, it may be added to the message thread but the collating message thread attribute for that message is deferred until the intermediate status is changed to a persistent status. The collated list of message threads is then updated. By deferring updates to the collating message thread attribute when a message has an intermediate status, disruption to the order of the collated list is mitigated. | 2012-08-16 |
20120210335 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR A CLIENT APPLICATION PROGRAMMING INTERFACE (API) IN A SERVICE ORIENTED ARCHITECTURE - Described herein are embodiments of a system, method and computer program product for a client application-programming interface (API) in a service oriented architecture (SOA). In one aspect, a system is described comprised of an application client having application code, one or more service interfaces, and a processor. An enterprise service bus (ESB) having a service registry connects one or more service implementations with the application client through the ESB. The processor is configured to execute the application code to invoke at least one of the one or more service interfaces and request at least one of the one or more service implementations via a request message. In one aspect, the request message comprises application code language based objects requesting a service. The processor is further configured to dynamically create a service instance for the service message. The service instance comprises the service message formatted for transport in the ESB and an endpoint reference for the one of the one or more service implementations as determined by the service registry. | 2012-08-16 |
20120210336 | METHODS FOR FILTERING DEVICE ACCESS BY SESSIONS - The creation of individual workstations is enabled by filtering device communications such that device functions are visible to only the workstations to which each device is assigned. Device filtering is done through the use of operating system components providing full device functionality and performance without the creation of special device drivers or routing of communications through virtual machines or networks. | 2012-08-16 |
20120210337 | Resource Affinity Via Dynamic Reconfiguration for Multi-Queue Network Adapters - A mechanism is provided for providing resource affinity for multi-queue network adapters via dynamic reconfiguration. A device driver allocates an initial queue pair within a memory. The device driver determines whether workload of the data processing system has risen above a predetermined high threshold. Responsive to the workload rising above the predetermined high threshold, the device driver allocates and initializes an additional queue pair in the memory. The device driver programs a receive side scaling (RSS) mechanism in a network adapter to allow for dynamic insertion of an additional processing engine associated with the additional queue pair. The device driver enables transmit tuple hashing to the additional queue pair. | 2012-08-16 |
20120210338 | Spindle Motor - A spindle motor is disclosed, characterized by: a rotation shaft rotated by a stator and a rotor; a turn table rotated by the rotation shaft and accommodated by an optical disk; and a center cone moved along an axial direction of the rotation shaft for being brought into contact with an inner periphery of the optical disk to align a rotation center of the optical disk with a rotation center of the rotation shaft, wherein the center cone contacting the inner periphery of the optical disk is formed with a rise prevention unit configured to reduce a contact area with the inner periphery of the optical disk and to tightly contact the optical disk to the turn table. | 2012-08-16 |
20120210339 | System and method for synchronizing on-air commercial programming with interactive applications - There is provided a system and method for the synchronizing on-air commercial programming with interactive applications, providing interactive content synchronized with on-air television programming. There is provided a system comprising a client device with a display device and an input device and running a synchronization application. The client device receives digital data transmitted from a server, and transmits user feedback information generated from user interactions with the digital data back to the server. The digital data are interactive advertisements, such as online social games, that increase users' awareness of the advertised products or messages. The digital data are delivered to the user's client device in synchronization with the broadcasting of on-air television commercials. | 2012-08-16 |
20120210340 | WEB TO VIDEO-ON-DEMAND SYSTEM, AUTHENTICATION ENGINE AND METHOD FOR USING SAME - A system, an authentication engine and a method are described herein for authenticating an end user and associating their set-top box with a third party web based application to stream a third party video to the set-top box. In one example, the end user may utilize a client device (e.g., computer, laptop computer, smart phone) to access via the internet the third party video provider which lists a number of videos that the end user could watch on their television. The end user would select one of the videos to watch and then their cable provider would stream the video to the end-user's set-top box to be displayed on their television. To enable this service, the authentication system authenticates the end user and associates their set-top box with the third party video provider's web based application. | 2012-08-16 |
20120210341 | SYSTEM FOR REGULATING ACCESS TO AND DISTRIBUTING CONTENT IN A NETWORK - There is provided a system for regulating access and managing distribution of content in a network, such as the Internet. The system includes communication gateways, installed at a subscriber site, internet control points, installed remotely, and various network elements installed throughout the network. The communication gateways and network elements operate in conjunction with the internet control points to restrict or allow access to specified Internet sites and to manage efficient distribution of content such as music, video, games, broadband data, real-time audio and voice applications, and software to subscribers. | 2012-08-16 |
20120210342 | POLICY DECISION POINT OVERRIDE FOR CONTENT RATING - A policy decision point override for content rating. Parental controls may be modified at a decision point. A content rating decision point includes memory configured for maintaining content metadata, wherein the memory includes a first field for storing a content provider assigned rating and a second field for storing a locally generated content rating for each of a plurality of content. A processor is coupled to the memory to receive input from a subscriber defining a locally generated content rating for rating presentation and rating-based control of content. | 2012-08-16 |
20120210343 | METHOD AND APPARATUS FOR CONTENT PLAYBACK USING MULTIPLE IPTV DEVICES - An apparatus and method for resuming playback of media content from more than one Internet Protocol Television (IPTV) device. The playback of a media asset or media content typically contains an asset ID and a start time. Based on the architecture of a second display device (e.g., a second IPTV device) the IPTV system determines the identity of an account and its associated IPTV devices. When a user pauses an asset, the system sends the asset identification (ID) and the stop time to a server operatively coupled to the system. The next time (within a predefined duration) the user requests the same asset ID, the pause time and the asset ID are returned. Using the pause time and the asset ID, the user can resume playback of the asset. | 2012-08-16 |
20120210344 | METHOD AND APPARATUS FOR MANIPULATING VIDEO CONTENT - An apparatus and method for manipulating video content that includes accessing, from a server, a list of one or more Internet Protocol television (IPTV) devices and selecting an IPTV device from the list. The server provides a content list of content that may be played on the selected IPTV device. The secondary device provides a control function and reachability (availability to communicate) of the selected IPTV device is determined by the server. The execution of the control function provided by the secondary device is independent of whether the selected IPTV device is reachable or not. | 2012-08-16 |
20120210345 | SYSTEM AND METHOD PROVIDING A FREQUENTLY-ACCESSED SERVICE OR ASSET LIST ON A SECOND DISPLAY - Apparatus and methods are provided to implement a technique for using a second display with a content playback device. In one implementation, this feature provides users a frequently-accessed service or asset list when browsing on a second display. Such systems and methods may be particularly advantageous when a user normally only visits a few services in an entire list of available services on a regular basis. The frequently-accessed list of services or assets may be populated by the user through the second display or may be populated by the server that is tracking service access by the user. The frequently-accessed service or asset list (or both) may be specific to the user account, a user profile within the user account, the second display, or the content playback device. In some implementations, the second display may be a smart phone that can often be found beside the user, a laptop or tablet PC, or the like. | 2012-08-16 |
20120210346 | METHOD AND APPARATUS FOR REDIRECTING AN IPTV DEVICE - A system and method for receiving user authentication information from a secondary device and sending a list of IPTV devices associated with the user authentication information to the secondary device. IPTV device selection is received from the secondary device and device identification information corresponding to a selected IPTV device is sent to the secondary device. A content selection from an asset list is received at a server and post execution instructions for the selected IPTV device are generated. Next asset information is sent to the selected IPTV device. The asset information includes content associated with the content selection and the post execution instructions. The post execution instructions determine further IPTV device functionality. | 2012-08-16 |
20120210347 | SYSTEMS AND METHODS FOR DETECTING INCONSISTENT USER ACTIONS AND PROVIDING FEEDBACK - Systems and methods are provided for detecting inconsistent user actions and providing feedback about assets. A user may perform a first action restricting access to a first asset. The system may detect whether a second action performed relative to a second asset that has a similar attribute as the first asset is inconsistent with the first asset. The inconsistency may be detected when the second action removes or is an inaction that does not place access restrictions on the second asset. The system may alert the user about the inconsistency and the user may act on the alert by providing feedback about the inconsistency and/or the first/second asset, ignoring the inconsistency and/or placing an access restriction or other action consistent with the first action relative to the second asset. The user may also provide detailed feedback about an inconsistency or asset through a website accessed on another device. | 2012-08-16 |
20120210348 | SYSTEM AND METHODS PROVIDING SPORTS EVENT RELATED MEDIA TO INTERNET-ENABLED DEVICES SYNCHRONIZED WITH A LIVE BROADCAST OF THE SPORTS EVENT - An electronic device can be synchronized with a broadcast of a live sporting event to obtain supplemental sports data over a data network from a server storing data associated with the live sporting event. Supplemental sports data is obtained from the server for display on the electronic device following a triggering activity associated with the broadcast of the live sporting event. Supplemental sports data can be transmitted for rendering on a display associated with the electronic device. Supplemental sports data can include display of an instant replay video of a sports athlete combined with audio of a pre-recorded statement by the sports athlete associated with the instant replay video, an announcement of a score change for a sporting event monitored by the electronic device, and a display of a football widget providing updates on football game status (possession, ball location, current score) monitored by the electronic device. | 2012-08-16 |
20120210349 | MULTIPLE-SCREEN INTERACTIVE SCREEN ARCHITECTURE - A method and system are provided for supporting multiple-screen interactivity between at least a first screen on a first device and a second screen on a second device. The system includes an interactivity server for providing complementary content for display on the second screen relative to primary content displayed on the first screen. The system further includes a communication device for communicating the complementary content to the second device to display on the second screen thereof. | 2012-08-16 |
20120210350 | METHOD AND APPARATUS FOR IDENTIFYING AVAILABLE IPTV DEVICES ON A NETWORK - An apparatus and a method for determining reachability of a device in a network. The method includes accessing an account from a secondary device and requesting device information of each device associated with the account. Address information of each device is obtained from the device information and a message is transmitted, to each device, requesting an indication of reachability from each device. The message is transmitted according to the address information of the device and the indication of reachability is based on device communication availability. An indication of reachability is received from each device. | 2012-08-16 |
20120210351 | PRESENTATION OF CUSTOMIZED DIGITAL MEDIA PROGRAMMING - In one disclosed embodiment, presentation of customized programming includes receiving an input of information related to a first digital media content series from which to obtain an episode for inclusion as a first segment in a customized programming presentation for a user, receiving an input of information related to a second digital media content series from which to obtain an episode for inclusion as a second segment in the customized programming presentation, and storing the information in a data structure representing customized digital media programming for the user. The embodiment further includes receiving from the user an input of a request to play the customized programming presentation, obtaining an episode of the first digital media content series, obtaining an episode of the second digital media content series, and providing the episodes within the customized programming presentation. | 2012-08-16 |
20120210352 | INTERFACE FOR BROWSING AND PLAYING CONTENT OVER MULTIPLE DEVICES - Browsing and displaying content over multiple devices, including: displaying a graphical user interface program on a second device; associating the second device with a main device; receiving transactions performed by a user on the second device with the graphical user interface; sending at least one command to the main device after the transactions performed by the user on the second device with the graphical user interface are received by the second device; and executing the at least one command on the main device. Keywords include visual BIVL interface and IPTV client without GUI. | 2012-08-16 |
20120210353 | SECOND DISPLAY INTERACTION WITH SOCIAL NETWORKING FEED - Systems and methods are disclosed for publishing data to one or more social networking services in which data pertaining to a user's behavior in browsing, selecting, and playing an asset (e.g., media) from particular sources on a particular Internet television platform (IPTV), is tracked so that a feed representative of such behavior may be transmitted to the social networking services for publication as recommendations. In response to the feed, information pertaining to the user, the platform, the selected media, and the service providing the media may be presented on one or more pages provided by the social networking service. Viewers of the pages can add a recommended asset to an IPTV list for playback, add the user as an IPTV friend on their social networking page, and launch an application on a second display which may be used to control the platform. | 2012-08-16 |
20120210354 | GRAPHICAL NATIVE USER INTERFACE AND CONTROL FOR DEVICES WITHOUT GRAPHICAL USER INTERFACE - Managing settings for a first network-connected device using a second device, including: accessing the first network-connected device configured as an IPTV client from the second device, wherein the IPTV client is configured without a GUI and the second device is configured with a GUI; retrieving current settings of the IPTV client; modifying and/or controlling settings of the IPTV client using a display of the second device; and communicating the modifications and/or controls of the settings to the IPTV client. Keywords include setting controls and network-connected device. | 2012-08-16 |
20120210355 | MULTI-FUNCTIONAL DISPLAY DEVICE HAVING AN ELECTRONIC PROGRAMMING GUIDE AND METHOD FOR CONTROLLING THE SAME - A multi-functional display device and a method for displaying an electronic programming guide (EPG) in the same are disclosed herein. The multi-functional display device may include a display for displaying broadcast programs or data, a network interface configured to receive event information associated with a social network service (SNS) account for an individual or entity, a storage device configured to store at least one channel number and at least one SNS account information assigned to the at least one channel number, and a controller for controlling the multi-functional display device. The controller may map the event information to one of the at least one channel numbers and may construct an EPG that includes the mapped event information and the corresponding channel number for display on the display. | 2012-08-16 |
20120210356 | Image Sampling from Multicast Streams - The disclosed methods and system may gain access to a plurality of content streams, and periodically capture still images from each stream. The captured stills may be stored in a predetermined location, and the location may be made available to various clients. By discovering the locations, application clients can issue requests to receive the latest image for a current stream, and use that image to improve a user interface or enhance a user experience in consuming the content. | 2012-08-16 |
20120210357 | Mechanism for Distributing Content Data - The current invention provides a system for distributing content data to user locations. The content data preferably includes digital video data that is available on demand from a requesting location. A system server stores user accounts and generated customized program schedules for the user account based on user criteria which includes user preferences. Authorized users access their accounts to modify user criteria and to select program transmissions. Preferably, a computer and a television set receive program transmissions from a system network, wherein the computer provides a logical interface between the television set and content data transmitted over the system network. | 2012-08-16 |
20120210358 | SOURCE-INDEPENDENT CONTENT RATING SYSTEM AND METHOD - A source-independent content rating system and method are provided. The system includes an electronic program guide extractor for extracting program guide information relating to at least one of, programs and channels, from multiple content subscription services. A filter generates identifying information that identifies at least one of a content and a category of the content based on the received program guide information. A subscription manager receives user specified ratings and the identifying information, and manages user interface information displayed to a user. The user interface information includes at least one of the content and the category identified by the identifying information and further includes a user specified rating there for. The subscription manager migrates any user specified ratings provided with respect to a particular one of the multiple content subscription services to all other relevant ones of the multiple content subscription services. | 2012-08-16 |
20120210359 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - A digital television (DTV) data stream includes PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT including a descriptor including a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length; and at least one category selection code for an associated event in a DTV data stream. | 2012-08-16 |
20120210360 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - A digital television (DTV) data stream includes a virtual channel table (VCT) and an event information table (EIT), the EIT including: a descriptor including: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length field, and at least one category code for an associated event in a DTV data stream. | 2012-08-16 |
20120210361 | INFORMATION PROCESSING DEVICE, METHOD, AND PROGRAM - An information processing device includes: extraction means for extracting, from program information, a category feature word being a keyword representing a category feature; identification means for identifying a channel by category based on the category feature word extracted from the program information for a program to be broadcast on the channel; and display control means for exercising control over the channel to be displayed after category classification. | 2012-08-16 |
20120210362 | SYSTEM AND METHOD FOR PLAYING INTERNET PROTOCOL TELEVISION USING ELECTRONIC DEVICE - An electronic device controls a client to play videos using internet protocol television (IPTV). The electronic device includes a display. The display displays a program list that includes a plurality of programs, a play option for activating play of a user selected television program and a browse option for activating display of information of the user selected television program. Videos of the programs are stored in an IPTV server connected to the client. In response to the user selects a television program on the display, the client obtains a video of the selected television program and displays the video on the client. If the user selects the browse option, the client obtains the information of the selected television program. The display of the electronic device displays the information of the selected television program. | 2012-08-16 |
20120210363 | MULTIPLE DATABASE, USER-CHOICE-COMPILED PROGRAM AND EVENT GUIDE - An electronic programming guide generator utilizes filters to select only programming filtered to display in an electronic programming guide display. | 2012-08-16 |
20120210364 | METHOD AND SYSTEM FOR PROVIDING PERSONALIZED SERVICE IN IPTV - A method for providing a personalized service in an Internet Protocol Television (IPTV) includes pairing a mobile terminal with the IPTV. The method also includes receiving personalized data from the paired mobile terminal, and searching the Internet for contents satisfying the received personalized data and providing the searched contents. | 2012-08-16 |
20120210365 | METHOD AND APPARATUS FOR SEARCHING OVER A NETWORK - A method and apparatus for performing global searching using second display devices. In an IPTV system, a second display application is typically a more complex application. There are typically many features, which increase complexity when a user attempts to find an asset, a service, a utility, a shortcut, or other information and/or content of the second display application. The use of a global search tool enhances the usage of the second display application, especially when a utility is buried in the second display application, making that utility more difficult to access. | 2012-08-16 |
20120210366 | INTERNET CONTENT SUBSCIPTION SERVICE VIA MULTIPLE DEVICES - Subscribing to channels and playing content, including: selecting an available subscription channel with an application on a second device; modifying a user's, subscription list based on the selected subscription-channel; and executing commands on any of the subscription channels of the user's subscription list. Keywords include: media, internet content, BIVL subscription and device infrastructure. | 2012-08-16 |
20120210367 | DISPLAY APPARATUS FOR PERFORMING VIRTUAL CHANNEL BROWSING AND CONTROLLING METHOD THEREOF - A display apparatus for performing virtual channel browsing and controlling method thereof are disclosed, by which hardware design can be simplified using a virtual channel browsing scheme and by which a channel browsing data processing speed can be increased. | 2012-08-16 |
20120210368 | CONTROLLING PLAYBACK OF RECORDINGS - A method of operating a user device for receiving and recording media content. The method includes receiving a media content stream, and initial timing data, such as EPG data, indicative of the time at which a selected program contained within the media content stream is scheduled to begin. At least a portion of the media content stream containing the selected program is recorded to a memory using the initial timing data to determine the recording start and finish time. Second updated timing data, indicative of the time at which the program began, is also received. A portion of the recorded media content stream is then deleted between the beginning of the recording and the beginning of the program as identified by the second timing data. A corresponding apparatus and appropriate computer program are also provided. | 2012-08-16 |
20120210369 | Systems And Methods For Generating Interactive Video Content - The present invention is directed towards systems and methods for generating interactive content from video content. The method according to one embodiment of the present invention comprises identifying at least one product within the video content and converting the product into an interactive element within the video content. The method then assigns a plurality of controlling parameters to said at least one interactive element at least one of said controlling parameters includes outline identification indicia of said interactive element consistent with movement of the product within the video content and assigns a product information identifier with the product and retrievable via the controlling parameters. Finally the at least one interactive element is integrated onto the video, such that when the video is displayed, the displayed video includes the outlined interactive element therein. | 2012-08-16 |
20120210370 | MULTI-PURPOSE DISPLAY DEVICE HAVING A CHANNEL SCAN INTERFACE AND METHOD FOR CONTROLLING THE SAME - A multi-functional display device having a channel scan interface and a method of controlling the same are disclosed herein. The method may include registering a first individual at the multi-functional display device to create an account that is associated with at least one first social network service (SNS) account for the first individual. A menu may be displayed for selecting among a plurality of channel scan modes for scanning channels of the multi-functional display device, including a channel scan mode for broadcast content and SNS content. For channel scan mode for SNS content, information for at least one second SNS account for a second individual associated with the at least one first SNS account may be retrieved, and a channel number assigned to the at least one second SNS account. | 2012-08-16 |
20120210371 | METHOD AND APPARATUS FOR PROVIDING RECOMMENDED CONTENT PLAYBACK ON A DISPLAY DEVICE - An IPTV (Internet Protocol Television) as a first display device may be controlled in part by user on a second display device. The second display device can set start and end times for content which the user of the second display device recommends to the IPTV device. | 2012-08-16 |
20120210372 | SEAT RAIL COUPLING - The present invention relates to a supporting structure, particularly a seat rail, to which passenger seats are mounted. The seat rail has a wave guide for wireless transmission of data signals in at least one direction, and the seat rail includes openings for the transmission of data signals. A wave guide of the seat rail and a coupling wave guide establish a wireless data connection between the supporting structure and the passenger seat. | 2012-08-16 |
20120210373 | SESSION SYNCHRONIZATION OF INACTIVE IPTV DEVICE WITH SECOND DISPLAY DEVICE - Synchronizing a session of an inactive first device with a second device, including: generating a temporary session for the second device when the first device configured as an IPTV client becomes inactive; associating the temporary session with the inactive IPTV client to allow the second device to continue transactions while the IPTV client is inactive; searching for the temporary session associated with the IPTV client when the IPTV client becomes active again; and assigning the temporary session to the IPTV client. Keywords include session synchronization and transfer credentials. | 2012-08-16 |
20120210374 | Video-On-Demand (VOD)-Augmented eBook - A system and method for providing an environmentally enhanced experience to a user reading an electronic book (eBook) on an eBook reader in proximity to a television. An application program in the eBook reader causes the eBook reader to send an indication to a Video On Demand (VOD) television delivery system identifying a page of the eBook displayed on the eBook reader. The VOD television delivery system accesses an eVODBook package that defines start, stop | 2012-08-16 |
20120210375 | SYSTEM AND METHOD TO EASILY RETURN TO A RECENTLY-ACCESSED SERVICE ON A SECOND DISPLAY - Apparatus and methods are provided to implement a technique for using a second display with a content playback device. In one implementation, this feature allows users to easily return to a recently-accessed service when browsing on a second display. The most recent service may appear at the top of the list. Such systems and methods may be particularly advantageous when a user normally only visits a few services in an entire list of available services on a regular basis. The recently-accessed service may be specific to the user account, a user profile within the user account, the second display, or the content playback device. In some implementations, the second display may be a smart phone that can often be found beside the user, a laptop or tablet PC, or the like. | 2012-08-16 |
20120210376 | USING PROGRAM CLOCK REFERENCES TO ASSIST IN TRANSPORT OF VIDEO STREAM TO WIRELESS DEVICE - Processing a video stream using upon Program Clock References (PCRs) contained therein in preparation for transmission to a wireless device. Operation includes receiving video frames of the video stream, buffering the video frames, and extracting PCRs from at least some of the video frames of the video stream. Operation further includes, based upon at least the values of the PCRs, determining transmission parameters, and transmitting video frames of the video stream to the wireless device according to the transmission parameters. Operation may further include determining a round trip delay of transmissions to the wireless device and acknowledgements from the wireless device, adjusting PCRs of at least some video frames of the video stream based upon the round trip delay, and transmitting the video frames of the video stream to the wireless device. | 2012-08-16 |
20120210377 | SOCIAL NETWORKING FEEDBACK VIA SECOND DISPLAY SELECTIONS - Systems and methods are disclosed for publishing data to one or more social networking services in which data pertaining to the user's behavior in browsing, selecting, and playing media, from particular sources on a particular IPTV platform, is tracked so that a feed representative of such behavior may be transmitted to the social networking services for publication. Accordingly in response to the feed, information pertaining to the user, the platform, the selected media, and the service providing the media may be presented on one or more pages provided by the social networking service. By embedding special tags in the feed that are compliant with protocols and methods that are supported by an API exposed by a server in the social networking service, the data from the feed can be displayed on the pages with the same look and feel and user experience as native social networking content. | 2012-08-16 |
20120210378 | METHOD AND APPARATUS FOR IDENTIFYING CONTENT USING IPTV DEVICES - A method and apparatus for identifying content using one or more Internet Protocol Television (IPTV) devices by accessing a user's account using a secondary device and selecting content provided by a service provider. The service provider sends an identifier that specifies the selected content to a first IPTV device that will display content. The selected content is added to a user's content list in the user's account; and played on the first IPTV device. During the time of playback on the first IPTV device, the user is able to browse content using the secondary device or another IPTV device. Thus, the user is able to browse and search for additional content without disturbing the display of the selected content. | 2012-08-16 |
20120210379 | METHOD AND APARATUS FOR SHARING INTERNET ASSETS OR CONTENT URLs VIA A SECOND DISPLAY DEVICE - A user can share Internet assets or content URLs via a second display device with other Internet content service users. Thus, the other users will be able to view the same content on their own internet protocol televisions (IPTV), as first display devices, without the need to search for the content in the content providing service. When the shared content is URLs, the recipient can even preview the content from the URL on the second display device before sending it to the recipient's internet protocol television (IPTV). | 2012-08-16 |
20120210380 | SYSTEM AND METHOD FOR ENHANCING RECORDED RADIO OR TELEVISION PROGRAMS WITH INFORMATION ON THE WORLD WIDE WEB - The present invention is directed to a system, method and computer program for enabling a user ( | 2012-08-16 |
20120210381 | DISTRIBUTION SYSTEM, GATEWAY, DISTRIBUTION METHOD, AND PROGRAM - A distribution system includes a gateway that, if a content temporary storage device does not store a moving image stream or moving image file that can be read, requests an external distribution server to transmit moving image content specified by a request message, generates a plurality of moving image streams or moving image files including a moving image stream or moving image file which has a bit rate receivable by the content requesting terminal and equal to or lower than a bit rate obtained from the bearer QoS information, transmits the moving image stream or moving image file, which has a bit rate receivable by the content requesting terminal and equal to or lower than a bit rate obtained from the bearer QoS information, to the terminal, and stores the plurality of generated moving image streams or moving image files in a predetermined content temporary storage device. | 2012-08-16 |
20120210382 | Content Archive Model - An archive model can be used for managing networked storage of recorded content, such as network DVR (digital video recorder) content. Content may be initially recorded to an active storage device, with individual duplicate copies recorded for each requesting user, and subsequently archived to an archive storage device. For playback, the content can be reconstituted into the active storage device prior to delivery to the requesting user. Content can be predictively reconstituted in anticipation of user needs, and the reconstitution capacity of the system can be dynamically reallocated for load balancing. | 2012-08-16 |
20120210383 | PRESENTING STREAMING MEDIA FOR AN EVENT - Systems, methods, and computer-readable and executable instructions are provided for presenting streaming media for an event. Presenting streaming media for an event can include receiving an outgoing message. Presenting streaming media for an event can also include evaluating the outgoing message to determine if the message is related to the event. Furthermore, presenting streaming media for an event can include taking an action with respect to presenting streaming media based on the relation to the event. | 2012-08-16 |
20120210384 | HIGH DEFINITION VIDEO EXTENDER AND METHOD - An apparatus and method for extending high definition multimedia signals from a source to a display over long distances (e.g., up to 300 feet) using a single cable medium having a plurality of twisted pair conductors contained therein. The extender transparently supports HDMI and/or DVI signaling, which allows encrypted video content to be displayed at the remote display (or other sink device). Display data channel control (DDC) information is sampled and transferred in packet from the local unit to a remote unit to comply with high-bandwidth digital content protection (HDCP). | 2012-08-16 |
20120210385 | HIGH DEFINITION VIDEO EXTENDER AND METHOD - An apparatus and method for extending high definition multimedia signals from a source to a display over long distances (e.g., up to 300 feet) using a single cable medium having a plurality of twisted pair conductors contained therein. The extender transparently supports HDMI and/or DVI signaling, which allows encrypted video content to be displayed at the remote display (or other sink device). Display data channel control (DDC) information is sampled and transferred in packet from the local unit to a remote unit to comply with high-bandwidth digital content protection (HDCP). | 2012-08-16 |
20120210386 | MULTI-FUNCTIONAL DISPLAY DEVICE HAVING A CHANNEL MAP AND METHOD OF CONTROLLING THE SAME - A multi-functional display device having a channel map and a method for controlling the same are disclosed herein. The multi-functional display device may include a display, an input interface, a network interface for communicating with at least one second multi-functional display device, and a controller for controlling a display of the channel map and content associated with a channel selected in the channel map. The channel map may include a first channel number associated with a broadcast channel and a channel name for the first channel, and a second channel number associated with a social network service (SNS) account for an individual or entity and an SNS channel name for the second channel. | 2012-08-16 |
20120210387 | Airport Security System - A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network data processing system is identified at the airport based on the threat level identified for the airport in response to identifying the threat level for the airport. Enforcement of the number of policies is initiated in the network data processing system. | 2012-08-16 |
20120210388 | SYSTEM AND METHOD FOR DETECTING OR PREVENTING DATA LEAKAGE USING BEHAVIOR PROFILING - Various embodiments provide systems and methods for preventing or detecting data leakage. For example, systems and methods may prevent or detect data leakage by profiling the behavior of computer users, computer programs, or computer systems. Systems and methods may use a behavior model in monitoring or verifying computer activity executed by a particular computer user, group of computer users, computer program, group of computer programs, computer system, or group of computer systems, and detect or prevent the computer activity when such computer activity deviates from standard behavior. Depending on the embodiment, standard behavior may be established on past computer activity executed by the computer user, or past computer activity executed by a group of computer users. | 2012-08-16 |
20120210389 | AUTOMATIC SECURITY ACTION INVOCATION FOR MOBILE COMMUNICATIONS DEVICE - In one embodiment, there is provided a mobile communications device comprising: a processor; a communications subsystem operable to exchange signals with a wireless network; a storage element having application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect policy messages received by the device, and to perform a security action if a first policy message to enforce a first data protection policy is received and a subsequent policy message to enforce a second data protection policy is not received within a predetermined duration from the time at which the first policy message is received; wherein the security action comprises erasing or encrypting at least some of the data on the storage element. | 2012-08-16 |
20120210390 | Extensible and Programmable Multi-Tenant Service Architecture - An extensible, multi-tenant software-as-a-service business application platform is provided for hosting multiple organizations. Organization services are provided by virtual or physical servers with dedicated data stores assembled in scalable groups. Distributed interaction between components of the scalable groups may enable extensibility and reliability, while changes in locations of organization services are provided to the client(s) for seamless continuation of the client's access to the services. Customizable and dynamic APIs for accessing each organization's data and applications isolated from the others and pluggable third party authentication services may also be integrated into the platform. | 2012-08-16 |
20120210391 | Automated Device Provisioning and Activation - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device stores a set of device credentials for activating the communications device for a service on a network; and sends an access request to the network, the access request including the set of device credentials. | 2012-08-16 |
20120210392 | ACCESS METHOD AND ACCESS DEVICE - An access method and an access device are provided in the invention, and the method includes the step of: an Authentication, Authorization and Accounting (AAA) server sending indication information to a Wireless Local Area Network Access Network (WLAN AN), wherein the indication information is used for indicating that the WLAN AN determines the direct accessing by a user equipment to the Internet without passing through an Evolved Packet Core (EPC) network. The user experience can be improved by the invention. | 2012-08-16 |
20120210393 | RESPONSE DETERMINATION APPARATUS, RESPONSE DETERMINATION METHOD, RESPONSE DETERMINATION PROGRAM, RECORDING MEDIUM, AND RESPONSE DETERMINATION SYSTEM - The present invention includes: acquiring a question including text information and a correct answer to the question; converting part of a character string or character in the question into a different character string or character, and generating a character-converted question ( | 2012-08-16 |
20120210394 | CIRCUIT DEVICE AND A COMMUNICATION APPARATUS - An application program relating to a process of an integrated circuit is stored in a virtual integrated circuit storage area server apparatus. Following a mutual authentication between the IC and the virtual storage area server apparatus through a portable communication function unit, the server apparatus executes the application program. Additionally, through the IC, the portable communication function unit, a wireless communication line, and a network, communicate with an IC_R/W apparatus and perform a process relating to a service in collaboration with each other. | 2012-08-16 |
20120210395 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 2012-08-16 |
20120210396 | PROCESSING EXTENSIBLE MARKUP LANGUAGE SECURITY MESSAGES USING DELTA PARSING TECHNOLOGY - Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security message is parsed for variable values using the template. A transition sequence is generated that represents the entire markup language security message. Each transition in the transition sequence is associated with a portion of the markup language security message. A lightweight data model of the markup language security message is populated using the transition sequence. The lightweight data model includes nodes for the variable values and a set of selected constant values. | 2012-08-16 |
20120210397 | METHOD AND SYSTEM FOR MANAGING SECURITY IN MOBILE COMMUNICATION SYSTEM - A method, an apparatus, and a system for solving and managing security problems, which may occur during a handover of a User Equipment (UE) between PLMNs in a mobile communication network, by using a Non-Access Stratum (NAS) protocol are provided. By the method, a UE can perform a security mode command and an authentication with a network. Further, the method can prevent interruption of communication due to authentication or security during a handover of a UE between Public Land Mobile Networks (PLMNs). | 2012-08-16 |
20120210398 | Enhanced Backup and Retention Management - An enhanced backup and retention management module associated with an entity may track access and changes made to configuration files that specify backup and/or retention policies for servers located on a network. The management module may also prevent unauthorized users from accessing or making changes to the configuration files. Additional features of the system may include a reporting capability that alerts appropriate personnel of who accessed and/or attempted to modify a backup/retention policy for a server, the name of the server whose policy may have been affected, and specific details of the file modifications that were made/attempted. | 2012-08-16 |
20120210399 | LOCATION-ENABLED ACCESS CONTROL LISTS FOR REAL-WORLD DEVICES - Systems and methods are disclosed for providing an accessor with access to an accessed device through a network. In one embodiment, location-based access control rights of the accessor to the accessed device are obtained. The location-based access control rights define at least one location criterion such that access rights are to be granted to the accessor for the accessed device when a location of the accessor complies with one or more of the at least one location criterion. Upon determining that the location of the accessor device complies with the at least one location criterion, the accessor device of the accessor is granted access to the accessed device through the network. In this manner, an administrator of the accessed device can regulate from where the accessor can access the accessor device. | 2012-08-16 |
20120210400 | METHOD OF MANAGING AUTHORIZATION OF PRIVATE NODE B IN A WIRELESS COMMUNICATION SYSTEM AND RELATED DEVICE - A method of managing authorization of a private node-B coupled to a packet core network terminal in a wireless communication system. The method includes performing positioning measurement for the private node-B to generate a position information of the private node-B, providing the position information for the packet core network terminal, determining authorization validity of the private node-B according to the position information and home network coverage of the private node-B, and then rejecting the authorization of the private node-B when the position information indicates that the private node-B is located out of the home network coverage. | 2012-08-16 |
20120210401 | Device and Method for Managing Access Rights to a Wireless Network - A device and a method for managing access rights to a wireless network uses wireless connection devices advantageously based on a smart card, which enable the wireless connection to the network once connected to a terminal. These devices include devices for time and/or geographical management of access to the network and authentication device. These devices can be easily preprogrammed by the entity managing the service and then distributed to the users. | 2012-08-16 |
20120210402 | Protecting Information on a Computer System Using Multiple Authentication Methods - In one embodiment, a method includes receiving, for a user, first user authentication information for a first authentication method and receiving, for the user, second user authentication information for a second authentication method. The second authentication method is different from the first authentication method. Upon authenticating the first user authentication information and the second user authentication information, the method moves a subset of data stored on a back-end storage device to a front-end storage device. The front-end storage device is directly connected to the user via a network and the back-end storage device not being directly connected to the network. The method then allows access to the subset of data for a period of time, wherein after the period of time expires, the subset of data is removed from the front-end storage device. | 2012-08-16 |
20120210403 | Mobile communications device-operated electronic access system - A mobile communications device is disclosed for use in an electronic access system for communicating with a central server for processing at least access authorization for an application running on the server. In at least one embodiment, an optical identification signal in the form of a barcode or a photographic recording of the user is captured on the mobile communications device in the form of an identification code and sent together with the mobile number to the server for further processing. The access authorization of the user for the respective application can therefore be verified on the central server. At least one embodiment relates in particular to medical and healthcare-related applications. | 2012-08-16 |
20120210404 | Seamless Wi-Fi Subscription Remediation - The exemplary embodiments include a method to perform, based on at least one of hypertext transport protocol and non-hypertext transport protocol traffic tests failing, sending an hypertext transport protocol message to a subscription remediation server URI that carries a package1 message, receiving an hypertext transport protocol response from the subscription mediation server with a package2 message, and automatically replacing a password with a new value, automatically initiating creation of a new client certificate, or launching a browser to a URI provided in the response to enable user intervention. In addition, to receive an access request from a device, determining whether credentials are valid, and if the credentials are determined valid, sending an access-accept message with a success indication, and if the credentials are determined not valid, sending an access-accept message with a success indication and an indication that access by the device is limited to only a subscription remediation server. | 2012-08-16 |
20120210405 | SYSTEM AND METHODS FOR UNIVERSAL PASSWORD CONTROL - A system and method is described for controlling the password(s) of one or more programs through a universal program. The universal control program allows access to one or more other programs and allows editing of the passwords of the other programs directly through the universal access program. | 2012-08-16 |
20120210406 | FORMING CREDENTIALS - Techniques are disclosed for issuing inoperative credentials, and making the inoperative credential operative at a subsequent point in time. For example, a method of forming a credential comprises the step of forming, at a first point in time, an inoperative credential. The inoperative credential is adapted to become operative, at a second point in time, to form an operative credential. The second point in time occurs after the first point in time. | 2012-08-16 |
20120210407 | ENABLING AUTHENTICATION OF OpenID USER WHEN REQUESTED IDENTITY PROVIDER IS UNAVAILABLE - A method and computer program product for enabling authentication of an OpenID user when a requested identity provider is unavailable. A relying party receives a login request from the OpenID user, where the login request includes a username. The relying party reads a list of trusted identity providers that are associated with the received username and selects one of those identity providers. The relying party generating an OpenID identifier using an identification (e.g., Uniform Resource Locator) of the selected identity provider and the username. The relying party transmits an authentication request (request to authenticate the OpenID user) to the selected identity provider using the formed OpenID identifier. If the selected identity provider is unavailable, then the relying party selects another identity provider from the list of identity providers that are associated with the received username and repeats the above process. | 2012-08-16 |
20120210408 | VERIFICATION METHOD AND SYSTEM THEREOF - The invention discloses an authenticating method and a system thereof, which relates to information security field and solves the problem that the user information is not safe in transaction process. The embodiment of the invention comprises that the server side receives user data information and a first dynamic password sent from the user side; the server side generates the first authenticating dynamic password according to the user data information; server side verifies the first dynamic password according to the first authenticating dynamic password and generates the second authenticating dynamic password after successful verification; the server side sends the second authenticating dynamic or the first password to the user side; the server side executes the transaction data in the user data information or permits the user to log on after using a third authenticating dynamic password generated by the server side to verify the user data information or the third dynamic password sent from the user side successfully. The invention enhances the safety of transaction for the user and prevents the user from loss caused by logging on phishing website by the user. | 2012-08-16 |
20120210409 | NON-TEXTUAL SECURITY USING PORTRAITS - A user is authenticated using portraits of known contacts. During a challenge-response process, a collection of portraits are presented, some known to an authenticated user and some randomly selected. Responsive to correctly identifying the known portraits, the user is granted access to a system. | 2012-08-16 |
20120210410 | NETWORK SECURITY MANAGEMENT FOR AMBIGUOUS USER NAMES - A method of managing network security can include receiving a user input comprising a user name and a password, determining whether the input user name potentially corresponds to a plurality of user accounts, determining whether the password is valid, and determining whether each of the user accounts is locked. The method can include selecting a security response to the user input based upon whether the input user name potentially corresponds to the plurality of user accounts, whether the password is valid, whether each of the user accounts is locked, and outputting the security response. | 2012-08-16 |
20120210411 | PROCESS FOR AUTHENTICATING AN END USER - A process for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device. | 2012-08-16 |
20120210412 | Information Processor, Authentication Control Method, And Storage Medium - An information processor is disclosed that includes an authentication part configured to authenticate a user based on predetermined information; an information obtaining part configured to obtain first information to be used to authenticate the user from an external device; and an authentication control part configured to cause the authentication part to authenticate the user by inputting information based on the first information to the authentication part as the predetermined information. The information obtaining part is configured to obtain the first information using a program module whose correlation with the information obtaining part is recorded in a recording medium. | 2012-08-16 |