39th week of 2012 patent applcation highlights part 64 |
Patent application number | Title | Published |
20120246616 | BUILD PROCESS MANAGEMENT SYSTEM - A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build system. The software build process can include executable process steps, metadata, and/or environmental parameter values. An executable process step can utilize a build artifact, representing an electronic document that supports the software build process. The acquired data can then be synthesized into an immutable baseline build process and associated baseline artifact library. The baseline artifact library can store copies of the build artifacts. The immutable baseline build process can include baseline objects that represent data values and dependencies indicated in the software build process. In response to a user-specified command, an operation can be performed upon the baseline build process and associated baseline artifact library. | 2012-09-27 |
20120246617 | BUILD PROCESS MANAGEMENT SYSTEM - A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build system. The software build process can include executable process steps, metadata, and/or environmental parameter values. An executable process step can utilize a build artifact, representing an electronic document that supports the software build process. The acquired data can then be synthesized into an immutable baseline build process and associated baseline artifact library. The baseline artifact library can store copies of the build artifacts. The immutable baseline build process can include baseline objects that represent data values and dependencies indicated in the software build process. In response to a user-specified command, an operation can be performed upon the baseline build process and associated baseline artifact library. | 2012-09-27 |
20120246618 | METHOD AND A SYSTEM FOR GENERATING A SOFTWARE PRODUCT - A computer-implemented method executed by a server processor for generating a software product comprises generating modules, each module being described by module metadata, and for each generated module, adding dependencies on other modules to the module metadata, creating a nest, the nest comprising data describing a development environment of a client processor for the module, and adding the nest to the module metadata, and further comprising storing the module metadata with a database connected to the server processor, providing a created nest to the client processor for being loaded into the development environment of the client processor, and building the module and publishing the built module to a publication repository connected to the server processor. Furthermore, there is provided a system for generating a software product and being adapted for performing the computer-implemented method. | 2012-09-27 |
20120246619 | AUTOMATED TESTING OF BROWSER BASED RICH INTERNET APPLICATIONS (RIA) DELIVERED THROUGH PROPRIETARY FRAMEWORKS - Facilitating automated testing of browser based Rich Internet Applications (RIA) delivered through proprietary frameworks. According to one aspect, code modules of an RIA designed to not make user interface components accessible to an automated testing platform are modified by adding instructions such that the modified modules when executed makes the components accessible to the testing platform. The testing platform accordingly is enabled to access the data representing the components to check whether the performance of the RIA is according to an expected operation. According to another aspect, the different user interface components are made addressable by the testing platform by inserting unique values for an attribute common to all the components (as part of the modified modules). According to one more aspect, the modified modules are compiled along with a pre-defined set of libraries required to make the components accessible by the testing platform. | 2012-09-27 |
20120246620 | Automatic Calculation of Orthogonal Defect Classification (ODC) Fields - A method and system for Orthogonal Defect Classification (ODC) analysis in a computing system, is provided. One implementation involves determining a defect in a software application, providing a defect fix to the software application, linking the source code fix to the defect, and automatically performing ODC analysis and calculating ODC information has based on calculations against the source code linked to the defect fixed. | 2012-09-27 |
20120246621 | COMMAND LINE INTERFACE ROBUSTNESS TESTING - One embodiment of the present invention sets forth a method for generating one or more tests for testing a command provided by a command line interface. The command is specified in a pre-determined meta-language. The meta-language is then converted in the tokenized post-fix notation, which is processed to generate a direct acyclic graph (DAG) that represents the different permutations of the command. By traversing the DAG from a root node to a leaf node, a test can be generated. The test is then executed within the command line interface, and the result analyzed to determine whether the command line interface is operating correctly. | 2012-09-27 |
20120246622 | STORAGE OF SOFTWARE EXECUTION DATA BY BEHAVIORAL IDENTIFICATION - A method and system for identifying behavioral uniqueness of software execution sequence. The method comprises the steps of executing a software program and continuously producing an execution sequence of execution information, determining if the execution information is within a functional boundary of the software program, and determining if the execution sequence of the execution information is a new execution sequence or a repeat execution sequence. The system comprises a functional boundary detector for continuously analyzing an execution information of a software program to determine if the execution information is within a functional boundary of said software program, and a comparator provided for determining if an execution sequence of the execution information is a new execution sequence or a repeat execution sequence and producing a unique detection signal if the new execution sequence is detected. | 2012-09-27 |
20120246623 | APPLICATION INTEGRATED ISSUE MANAGEMENT - The disclosed embodiments relate to an application integrated issue management system wherein a given computer software program includes, in addition to the particular functionality for which the program was designed, integrated issue reporting and tracking functions which allow a user to both report issues, e.g. bugs, defects, enhancements, new function requests, user inquiries, user comments, or combinations thereof, to the software developer's project management system, as well as track previously submitted issue reports in the developer's project management system, without having to leave or otherwise terminate the computer software program. Thereby, a convenient mechanism for reporting and tracking issues is provided which encourages participation by the user of the computer software program. Additional functionality may also be provided, also within the context of the computer software program, such as allowing the user to view issue reports submitted by other users or to assist the developer in selecting which issues to address first, such as by voting on, or ranking, those issues which the user thinks are significant. Further, automated monitors may monitor operation of the computer software program to look for operational patterns, such as inter-operational latencies, which may be indicative of a problem. Upon detection of a suspect pattern of operation, an issue report may be automatically generated and submitted. Suspect patterns may be defined by the developer and/or by the user, such as based on provisions of a service level agreement between the user and the developer defining, for example, tolerances for inter-operational latencies or other operational parameters. | 2012-09-27 |
20120246624 | DEBUGGER-SET IDENTIFYING BREAKPOINTS AFTER COROUTINE YIELD POINTS - A debugger can step through target code in a computer program. The debugger can identify a coroutine yield point in the target code, and can obtain identifying information to identify continued processing of a coroutine instance triggered by the operator. The debugger can set a breakpoint at a location for continued stepping after the coroutine yield point. The breakpoint can have a condition of matching the identifying information with runtime information. The debugger can perform the coroutine instance and resume execution of the target code after the coroutine yield point. The debugger can also encounter the breakpoint in the target code, and can determine whether the condition of the breakpoint is met. If so, the debugger can pause execution of the target code at the breakpoint. If not, the debugger can continue execution of the target code past the breakpoint without pausing at the breakpoint. | 2012-09-27 |
20120246625 | SYSTEM AND METHOD OF SOFTWARE EXECUTION PATH IDENTIFICATION - A method and system for creating uniquely representative execution path identifiers of software program. The method comprises the steps of running the software program, continuously accessing execution information of the software program, identifying execution sequences of the execution information, and creating a unique execution path identifier of each of the execution sequences by summing the execution information when the execution information is within a functional boundary thereof so as to create an execution path identifier representing a unique execution sequence of the execution information. The system comprises an execution path identification creator continuously receiving and accessing execution information of the software program, identifying execution sequences of the execution information and creating the unique execution path identifier of each of the execution sequences. | 2012-09-27 |
20120246626 | DONUT DOMAINS - EFFICIENT NON-CONVEX DOMAINS FOR ABSTRACT INTERPRETATION - A computer implemented program analysis method employing a set of new abstract domains applicable to non-convex invarients. The method analyzes programs statically using abstract interpretation while advantageously considering non-convex structures and in particular those situations in which an internal region of an unreachable state exists within a larger region of reachable states. The method employs a new set of non-convex domains (donut domains) based upon the notion of an outer convex region of reachable states (Domain D1) and an inner region of unreachable states (Domain D2) which advantageously permits capture of non-convex properties by using convex regions and operations. | 2012-09-27 |
20120246627 | Adding Instrumentation to a Body of Code to Enable Generation of Code Coverage Data - A method apparatus and computer program product is disclosed for adding instrumentation to a body of code to enable generation of code coverage data for said body of code in which used instrumentation code is arranged to be optimized out by a compiler. | 2012-09-27 |
20120246628 | FIRMWARE UPDATING SYSTEM AND METHOD - A computing system and method updates firmware to a baseboard management controller (BMC) of a motherboard. The computing system updates firmware of the BMC according to the parameters, wherein the parameters includes a predetermined number of times to update the firmware of the BMC. The computing system counts a number of successful updates, in response to a determination that a current update of the firmware is successful. The computing system records information of each of the successful updates and generates a log file for storing the information, in response to a determination that counted number of the successful updates equal to the predetermined number of times. | 2012-09-27 |
20120246629 | METHOD AND SYSTEM FOR AUTOMATIC FIRMWARE UPDATES IN A PORTABLE HAND-HELD DEVICE - Firmware of a hand-held device may be updated automatically dependent on the execution status of an update application resident in the memory of the hand-held device. The execution of the update application is abstracted from the user to provide an enhanced user experience. | 2012-09-27 |
20120246630 | System and Method for Automating Installation and Updating of Third Party Software - A software application installation system facilitates automatic installation and/or updating of software applications without requiring a user to have any specific knowledge of the configuration of the computer system upon which the software application is to be installed and/or updated. The software applications to be installed may be supplied by third party providers. The installation is based on automatically derived knowledge of the computer system on which the software applications are to be installed. The software applications may be installed automatically using a standardized user interface (UI), and/or without requiring substantial user input. | 2012-09-27 |
20120246631 | SERVER FOR SENDING NEW APPLICATION PORTIONS TO MOBILE WIRELESS COMMUNICATIONS DEVICES AND RELATED METHODS - A communications system is to communicate with an application server storing a plurality of applications. The communications system includes a mobile wireless communications device configured to store at least one application from among the plurality of applications, the at least one application having stored version information associated therewith. An intermediate server is configured to update the mobile wireless communications device by at least obtaining respective current version information for associated current versions of the plurality of applications and obtaining the stored application version information from the mobile wireless communications device for the at least one stored application. The stored application version information is compared with the current version information for the at least one stored application. New application portions are downloaded from a current application associated with the current version information, and the new application portions are sent to the mobile wireless communications device. | 2012-09-27 |
20120246632 | Device Flags - Device flag techniques are described. In one or more implementations, responsive to detection by a computing device that a device has been communicatively coupled to bus of the computing device, a database is queried by the computing device to determine whether one or more flags have been set for the device. Responsive to a determination made as a result of the querying that the one or more flags have been set for the device identifier, information associated with the one or more flags is communicated to software that is associated with the device to configure the software. | 2012-09-27 |
20120246633 | ELECTRONIC BOOK AND SYSTEM FOR FIRMWARE UPGRADE OF ELECTRONIC BOOK - The present invention relates to an electronic book and system for firmware upgrade of electronic book, the system comprising: an electronic book terminal executing and installing an automatic upgrade program in a case terminal information, subscriber information and firmware version information are transmitted to a connected computer and version-up firmware is transmitted from the computer; and a computer obtaining terminal information, the subscriber information and firmware version by requesting the terminal information, the subscriber information and the firmware version from the electronic book terminal in a case the electronic book terminal is connected, receiving the subscriber information of the terminal from an upgrade sever and receiving a latest firmware from the upgrade server if the subscriber is identified by checking whether the subscriber information is matched, and downloading to the electronic book terminal. | 2012-09-27 |
20120246634 | PORTABLE VIRTUAL APPLICATIONS - In accordance with the present disclosure, a method for operating a virtual application comprises loading an image of the virtual application into a memory of an information handling system from a deployment package is disclosed. A shared library that is required for executing the virtual application is loaded. An address for a memory location corresponding to an entry point for a function in the shared library is saved to an address table for the virtual application. The virtualization data from the deployment package is used to determine whether the address for the memory location corresponding to the entry point for a function in the shared library should be adjusted. | 2012-09-27 |
20120246635 | Platform Independent Imaging Method And System - A method and system for defining a platform independent image on a medium readable by an information handling system determines a core operating system, enterprise configurations and a driver file for each of plural platform model types with one or more installation functions operable to install the enterprise configurations in an operating system of an information handling system having one of the plural platform model types. The installation function determines the platform model type of an information handling system loaded with the platform independent image and configures the core operating system with the enterprise configurations and a driver file associated with the determined platform model type. | 2012-09-27 |
20120246636 | METHOD AND ARRANGEMENT FOR INSTALLING AND CONFIGURING A COMPUTER SYSTEM - Exemplary systems and methods for installing and configuring a computer include stipulating configuration rules and transmitting all programs to be installed to the memories of the computers of the computer system, selecting and executing functions which are intended to be executed by the computer system, in a sequence, and checking to determine whether a running function which is currently being executed contravenes a configuration rule. | 2012-09-27 |
20120246637 | Distributed load balancer in a virtual machine environment - In one embodiment, a method includes receiving a request packet at a flow director in communication with a plurality of servers, each server comprising a virtual load balancer module and one or more virtual machines and forwarding the request packet to one of the virtual load balancer modules at one of the servers. The virtual load balancer module is configured to select one of the virtual machines to receive the request packet and transmit a response packet. The response packet is transmitted without passing through the flow director. An apparatus for load balancing in a virtual machine environment is also disclosed. | 2012-09-27 |
20120246638 | FORECASTING BASED SERVICE ASSIGNMENT IN CLOUD COMPUTING - A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment. | 2012-09-27 |
20120246639 | CONFIGURATION OF VIRTUAL APPLIANCES - Embodiments of the invention relate to post-install configuration of virtual appliances in a virtual machine. A packaging and distribution format is provided with two tools to support the configuration of the virtual machine. The first tool is employed to support configuration of the virtual machine, and employs an activation script during a boot operation. The second tool is employed by a call from the first tool. The second tool configures a virtual application in communication with the virtual machine with use of a configuration script. The configuration script is separate from the activation script and disassociated from an image binary of the virtual machine. The disassociation of the configuration script from the activation script supports changes to the configuration script without affecting the image binary. | 2012-09-27 |
20120246640 | Replication of Machine Instances in a Computing Environment - Disclosed are various embodiments for replication of machine instances in a computing environment. A clone machine instance is instantiated from a machine image associated with an original machine instance. A stored execution state of the original machine instance is applied to the clone machine instance. At least a portion of a series of stored events received by the original machine instance is applied to the clone machine instance. | 2012-09-27 |
20120246641 | Method for Switching Between Virtualized and Non-Virtualized System Operation - A method performed by an embedded system controlled by a CPU and capable of operating as a virtualized system under supervision of a hypervisor or as a non-virtualized system under supervision of an operating system, is provided. The embedded system is executed in a normal mode if no execution of any security critical function is required by the embedded system, where the normal mode execution is performed under supervision of the operating system. If a security critical function execution is required by the embedded system, where protected mode execution is performed under supervision of the hypervisor, the operating system is switching execution of the embedded system from normal mode to protected mode, by handing over the execution of the embedded system from the operating system to the hypervisor, and when execution of the security critical function is no longer required by the embedded system is switched from protected mode to normal mode, under supervision of the hypervisor. | 2012-09-27 |
20120246642 | Management of File Images in a Virtual Environment - A method, system, and computer program product provides effective management and deployment of image files within a Virtual Input/Output (I/O) Server (VIOS) cluster. An Image Management (IM) utility utilizes a discovery process to establish connections with objects in order to manage these objects. Following discovery of an ICP client, the IM utility enables creation of a virtual server partition and initiates the importing of a captured image to a VIOS cluster Storage Pool (SP). The IM utility creates logical units (LUs) within the Image Management Fileset (IMF) for each file within the captured image. The IM utility maps the LUs to the VIOS Cluster SP using unique image file handles. The IM utility configures the new storage that comprises the created LUs. The IM utility copies image files to the appropriate storage device/LU. When import/copy of the image is completed, the IM utility activates the virtual server partition. | 2012-09-27 |
20120246643 | FILE SYSTEM FOR STORAGE AREA NETWORK - Methods and apparatus are disclosed for managing access to data in a data storage system. For example, an apparatus comprises at least one processing platform associated with a distributed virtual infrastructure. The processing platform comprises at least one processing device having a processor coupled to a memory. The processing platform is operative to instantiate a meta data management process that is configured to provide at least one client process with information to allow the client process to perform one or more operations in accordance with one or more data storage devices through a storage area network. The information provided to the client process may comprise one or more data block descriptors. Each of the one or more data block descriptors may comprise path information for at least one of the data storage devices and an offset address in the at least one data storage device. The one or more data block descriptors may correspond to one or more data blocks of a given data file that is stored or storable across the one or more data storage devices. | 2012-09-27 |
20120246644 | VIRTUAL COMPUTER SYSTEM AND CONTROLLING METHOD OF VIRTUAL COMPUTER - A method of controlling a virtual machine of a computer, the computer comprising: a physical machine comprising an I/O adapter having a physical function that creates a virtual function; a virtualization unit that provides computer resources of the physical machine to the virtual machine; and an OS that is executed on the virtual machine, the virtualization unit creating a virtual machine to which the virtual function is assigned, the virtual machine running the OS thereon, the method comprising: a first step of detecting, by the virtualization unit, a state change of the I/O adapter; a second step of identifying, by the virtualization unit, when a state of the I/O adapter becomes a predetermined state, the virtual machine to which the virtual function is assigned; and a third step of notifying, by the virtualization unit, the OS running on the identified virtual machine of the state of the I/O adapter. | 2012-09-27 |
20120246645 | METHOD FOR MANAGING VIRTUAL MACHINE, INFORMATION PROCESSING APPARATUS, AND MEDIUM FOR VIRTUAL MACHINE MANAGEMENT PROGRAM - A method of managing a virtual machine by an information processing system including one or more information processing apparatuses, the method includes: comparing one or more files used for operation of the virtual machine with one or more template files; and generating configuration information indicating a setting state of the virtual machine based on a result of the comparing. | 2012-09-27 |
20120246646 | METHOD, SYSTEM AND APPARATUS FOR CALCULATING CHARGEBACK FOR VIRTUALIZED COMPUTING RESOURCES - Method, system and apparatus for calculating chargeback for virtualized computing resources in a virtualized environment allowing efficient use of computing resources, improving costs recovery including fixed and over-usage cost of utilizing computing resources. | 2012-09-27 |
20120246647 | MANAGING SOFTWARE CONTENT IN VIRTUAL DESKTOP ENVIRONMENTS - Software is managed in a virtual desktop environment by discovering virtual appliances contained in the virtual desktop environment, and for each virtual appliance discovering the virtual machines belonging to the virtual appliance. Software is further managed by discovering the standalone virtual machines comprised in the virtual desktop environment, and for each discovered virtual machine, introspecting each virtual machine to detect non-virtual applications and virtualized applications running in the virtual machine. For each detected application, identification is made of the operating system on which the application is running | 2012-09-27 |
20120246648 | MANAGING A PORTAL APPLICATION - A method of managing a portal application includes, in a device comprising at least one processor that executes a portal application, establishing a trigger for preserving resources for the device; determining in the device that the trigger has occurred; and pausing operations of a portlet module within the portal application executed by the device. | 2012-09-27 |
20120246649 | Synchronizing Access To Resources In A Hybrid Computing Environment - Synchronizing access to resources in a hybrid computing environment that includes a host computer, a plurality of accelerators, the host computer and the accelerators adapted to one another for data communications by a system level message passing module, where synchronizing access to resources includes providing in a registry, to processes executing on the accelerators and the host computer, a key associated with a resource, the key having a value; attempting, by a process, to access the resource including determining whether a current value of the key represents an unlocked state for the resource; if the current value represents an unlocked state, attempting to lock access to the resource including setting the value to a unique identification of the process; determining whether the current value is the unique identification of the process; if the current value is the unique identification accessing the resource by the process. | 2012-09-27 |
20120246650 | METHOD FOR PROCESSING INFORMATION AND ACTIVITIES IN A CONTROL AND/OR REGULATING SYSTEM WITH THE AID OF A MULTI-CORE PROCESSOR - A method for processing information and activities in a control and/or regulating system in which the control and/or regulating tasks are performed by a microcontroller, the control/regulating system including different components and the microcontroller receiving information which is evaluated and processed thereby, and at least one output signal being output as the result of control/regulating calculations. In a method for processing information and activities in a control and/or regulating system which may be implemented cost-effectively and nevertheless permits high computing power, the control and regulating tasks of the system are divided into component-specific task complexes, a first component-specific task complex being processed by a first processor core of the microcontroller and a second component-specific task complex being processed by a second processor core of the microcontroller. | 2012-09-27 |
20120246651 | SYSTEM AND METHOD FOR SUPPORTING BATCH JOB MANAGEMENT IN A DISTRIBUTED TRANSACTION SYSTEM - A system and method can support batch job management in a distributed system using a queue system with a plurality of queues and one or more job management servers. The queue system can represent a life cycle for executing a job by a job execution component, with each queue in the queue system adapted to receive one or more messages that represent a job status in the life cycle for executing the job. The one or more job management servers in the distributed system can direct the job execution component to execute the job, with each job management server monitoring one or more queues in the queue system, and performing at least one operation on the one or more messages in the queue system corresponding to a change of a job status for executing the job. | 2012-09-27 |
20120246652 | Processor Management Via Thread Status - Various systems, processes, and products may be used to manage a processor. In particular implementations, managing a processor may include the ability to determine whether a thread is pausing for a short period of time and place a wait event for the thread in a queue based on a short thread pause occurring. Managing a processor may also include the ability to activate a delay thread that determines whether a wait time associated with the pause has expired and remove the wait event from the queue based on the wait time having expired. | 2012-09-27 |
20120246653 | GENERIC COMMAND PARSER - A requesting processing unit includes a generic-parser is described, which is adapted to operate together with a specifically configured one or more command-files. A command-file includes one or more structured data elements descriptive of a command, which is available for execution by the processing unit. The data included in the command-file is registered in the computer memory associated with the processing unit. In general generic-parser is configured, in response to an issued command to search, in the computer memory, for data comprised in the data-elements, which is now registered in the computer memory, including information corresponding to the command and use this data in order to generate a request to perform the command. | 2012-09-27 |
20120246654 | Constant Time Worker Thread Allocation Via Configuration Caching - Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads. | 2012-09-27 |
20120246655 | AUTOMATED TIME TRACKING - In a method for automatically tracking time, a computer receives a user identification. The computer automatically starts a first task, based on the received user identification. The computer records a start time for the first task. The computer monitors a state of the first task. The computer automatically records an end time for the first task in response to determining that the state of the first task has changed. | 2012-09-27 |
20120246656 | SCHEDULING OF TASKS TO BE PERFORMED BY A NON-COHERENT DEVICE - A method for scheduling tasks to be processed by one of a plurality of non-coherent processing devices, at least two of the devices being heterogeneous devices and at least some of said tasks being targeted to a specific one of the processing devices. The devices process data that is stored in local storage and in a memory accessible by at least some of the devices. The method includes the steps of: for each of a plurality of non-dependent tasks to be processed by the device, determining consistency operations required to be performed prior to processing the non-dependent task; performing the consistency operations for one of the non-dependent tasks and on completion issuing the task to the device for processing; performing consistency operations for a further non-dependent task such that, on completion of the consistency operations, the device can process the further task. | 2012-09-27 |
20120246657 | EXECUTING INSTRUCTION SEQUENCE CODE BLOCKS BY USING VIRTUAL CORES INSTANTIATED BY PARTITIONABLE ENGINES - A method for executing instructions using a plurality of virtual cores for a processor. The method includes receiving an incoming instruction sequence using a global front end scheduler, and partitioning the incoming instruction sequence into a plurality of code blocks of instructions. The method further includes generating a plurality of inheritance vectors describing interdependencies between instructions of the code blocks, and allocating the code blocks to a plurality of virtual cores of the processor, wherein each virtual core comprises a respective subset of resources of a plurality of partitionable engines. The code blocks are executed by using the partitionable engines in accordance with a virtual core mode and in accordance with the respective inheritance vectors. | 2012-09-27 |
20120246658 | Transactional Memory Preemption Mechanism - Mechanisms for executing a transaction in the data processing system are provided. A transaction checkpoint data structure is generated in internal registers of a processor. The transaction checkpoint data structure stores transaction checkpoint data representing a state of program registers at a time prior to execution of a corresponding transaction. The transaction, which comprises a first portion of code that is to be executed by the processor, is executed. An interrupt of the transaction is received while executing the transaction and, as a result, the transaction checkpoint data is stored to a data structure in a memory of the data processing system. A second portion of code is then executed. A state of the program registers is restored using the data structure in the memory of the data processing system in response to an event occurring causing a switch of execution of the processor back to execution of the transaction. | 2012-09-27 |
20120246659 | TECHNIQUES TO OPTIMIZE UPGRADE TASKS - Techniques to prioritize and optimize the execution of upgrade operations are described. A technique may include determining the size of data blocks that are to be copied from one storage medium to another, and the dependencies of upgrade tasks on the data blocks and on other tasks. A task may be prioritized according to a weight that includes the cumulative sizes of the data blocks that it and its dependent tasks depend on. A data block copying may be prioritized according to the cumulative weights of the tasks that depend on that data block. Some embodiments may perform several data copying and/or tasks in parallel, rather than sequentially. Other embodiments are described and claimed. | 2012-09-27 |
20120246660 | OPTIMIZED MULTI-COMPONENT CO-ALLOCATION SCHEDULING WITH ADVANCED RESERVATIONS FOR DATA TRANSFERS AND DISTRIBUTED JOBS - Disclosed are systems, methods, computer readable media, and compute environments for establishing a schedule for processing a job in a distributed compute environment. The method embodiment comprises converting a topology of a compute environment to a plurality of endpoint-to-endpoint paths, based on the plurality of endpoint-to-endpoint paths, mapping each replica resource of a plurality of resources to one or more endpoints where each respective resource is available, iteratively identifying schedule costs associated with a relationship between endpoints and resources, and committing a selected schedule cost from the identified schedule costs for processing a job in the compute environment. | 2012-09-27 |
20120246661 | DATA ARRANGEMENT CALCULATING SYSTEM, DATA ARRANGEMENT CALCULATING METHOD, MASTER UNIT AND DATA ARRANGING METHOD - A data arrangement calculating system including a master unit and a plurality of slave units connected with said master unit. The master unit includes a data arranging section and a job allocating section. The data arranging section includes a data dividing section and an arranging section configured to arrange a first block of the blocks in a first slave unit of the plurality of slave units as an owner block, and arrange the replica block of a second block of the blocks next to the first block in the first slave unit. The first slave unit includes a data retaining section configured to retain said first block and the replica block of said second block and a job executing section. The job executing section executes the sliding window calculation by using the first block and the replica block of the second block. | 2012-09-27 |
20120246662 | Automatic Verification of Determinism for Parallel Programs - Automatic verification of deteiminism in structured parallel programs includes sequentially establishing whether code for each of a plurality of tasks of the structured parallel program is independent, outputting sequential proofs corresponding to the independence of the code for each of the plurality of tasks and deteimining whether all memory locations accessed by parallel tasks of the plurality of tasks are independent based on the sequential proofs. | 2012-09-27 |
20120246663 | HIERARCHICALLY DISASSEMBLING MESSAGES - The present invention extends to methods, systems, and computer program products for hierarchically disassembling messages. The functionality of disassemblers and framers is decoupled such that framers for different types of messages can be utilized at the same level in a hierarchy without having to also change disassemblers. Virtually any level of disassembly is possible to address any corresponding level of message nesting. Disassembly can be performed on a per message or per session basis. | 2012-09-27 |
20120246664 | METHOD FOR PROVIDING STAND-IN OBJECTS - A method for providing stand-in objects, where relationships among objects are automatically resolved in an object oriented relational database model without the necessity of retrieving data from the database until it is needed. A “fault” class is defined, as well as fault objects whose data haven't yet been fetched from the database. An object that's created for the destination of a relationship whenever an object that includes the relationship is fetched from the database. When an object is fetched that has relationships, fault objects are created to “stand-in” for the destination objects of those relationships. Fault objects transform themselves into the actual enterprise objects—and fetch their data—the first time they're accessed. Subsequently, messages sent to the target objects are responded to by the objects themselves. | 2012-09-27 |
20120246665 | Optical Pickup Assembly - An optical pickup assembly that has flexible beams that support an objective lens for adjustment in a focusing direction and a tracking direction. The flexible beams are used to support and move the objective lens. A controller operates electromagnetic actuators that move the flexible beams. | 2012-09-27 |
20120246666 | PRESSURE-SENSITIVE ADHESIVE SHEET FOR OPTICAL DATA RECORDING MEDIUM, OPTICAL DATA RECORDING MEDIUM, AND METHOD AND DEVICE FOR REPRODUCING DATA FROM OPTICAL DATA RECORDING MEDIUM - A pressure-sensitive adhesive sheet | 2012-09-27 |
20120246667 | System and Method of Using Symbology to Purchase Broadcast Media - A method, controller and system in accordance with various aspects of the present disclosure facilitate automatic acquisition of broadcast content for a user. Within the method, controller and system, a user device having a digital imaging device, a controller, and at least one network interface is configured to scan a visual code overlaid on visual broadcast content displayed on a display device. The user device interprets the scanned visual code to identify the visual broadcast content, and retrieves user preferences stored on the user device to facilitate acquisition of the stored content by the user. The user preferences identify a user-preferred site for acquiring the broadcast content, and may identify other parameters as well. The user device then establishes a transaction between the user device and the user-preferred site to acquire the broadcast content. In an embodiment, mere acceptance of the transaction by the user completes the transaction. | 2012-09-27 |
20120246668 | INTERNET PROTOCOL TELEVISION VIDEO ON DEMAND METHOD, APPARATUS, AND SYSTEM - Embodiments of the present invention provide an IPTV VOD method, apparatus, and system. The method includes: sending the VOD request to IPTV media entertainment management middleware (IPTV-MEM); sending the fee deduction request to a charging apparatus through the SMG; receiving, from the SMG a fee deduction response sent by the charging apparatus in response to the fee deduction request; and if fee deduction succeeds, notifying the IPTV-MEM of pushing a VOD media steam to a target Set Top Box (STB) according to the VOD request. The payment modes for IPTV VOD are diversified and the flexibility of payment for IPTV VOD is enhanced. | 2012-09-27 |
20120246669 | MULTIPLE AUDIO/VIDEO DATA STREAM SIMULATION - A multiple audio/video data stream simulation method and system. A computing system receives first audio and/or video data streams. The first audio and/or video data streams include data associated with a first person and a second person. The computing system monitors the first audio and/or video data streams. The computing system identifies emotional attributes comprised by the first audio and/or video data streams. The computing system generates second audio and/or video data streams associated with the first audio and/or video data streams. The second audio and/or video data streams include the first audio and/or video data streams data without the emotional attributes. The computing system stores the second audio and/or video data streams. | 2012-09-27 |
20120246670 | CONTENT DISTRIBUTION SYSTEM AND METHOD FOR OPTIMIZING MULTIPLEXED TRANSPORT CHANNELS - A content distribution system includes a distribution center, a processor, a switch, and first and second multiplexers. The distribution center receives and applies program content on program channels. The processor identifies subsets of the program channels in response to a respective score associated with the program channels. The switch couples the distribution center to the multiplexers. The switch applies program channels to respective inputs of the first and second multiplexers in response to the processor. A method for optimizing a multiplexed transport channel includes the steps of identifying a set of program channels designated for distribution via the multiplexed transport channel, arranging the set of program channels in subsets, the program channels within a subset grouped in accordance with a viewing score, multiplexing the program channels of the subsets to a respective transport channel and applying the respective transport channels to a distribution medium for delivery to the destination. | 2012-09-27 |
20120246671 | DETECTING PERIODIC ACTIVITY PATTERNS - A method of detecting periodic activity patterns associated with the viewing of audio video content is described. The method includes: recording activity data in an activity log; suppressing the activity log one or more times to suppress non-relevant activity data thereby producing one or more sets of suppressed activity data; passing the one or more sets of suppressed activity data through a signal processing function to convert the one or more sets of suppressed activity data to one or more frequency responses; and analysing the one or more frequency responses to detect the periodic activity patterns. Related apparatus and methods are also described. | 2012-09-27 |
20120246672 | SYSTEM AND METHOD FOR PROTECTING ADVERTISING CUE MESSAGES - An apparatus and method for encoding and decoding a broadcast data stream that includes encrypted advertisement cue messages. The encrypted advertisement cue message data representing a advertisement to be inserted into a stream and data representing an insertion time within said broadcast data stream that is associated with said advertisement. The advertisement cue messages are encrypted and encrypted using a encryption technique. The encrypted advertisement cue message masks the insertion time for the advertisement and prevents automatically skipping of the advertisement data. | 2012-09-27 |
20120246673 | Apparatus for Insertion of Local Signals into a CATV Output - Apparatus for switching and combining based on external signaling is provided wherein a locally generated modulated carrier (or carriers) is inserted into a CATV system between the cable head end and video decoding/rendering device without requiring unused channels or the loss of any incoming services. An RF switch is controlled by a switch control processor based on knowledge of the video decoding/rendering device current tuning requirements to select between the full spectrum coming from the CATV system the locally generated and inserted channel. Current tuning requirements for the attached video decoding/rendering device may be input to the switch control processor from the video decoding/rendering device itself or from a separate device with knowledge of the current service requirements. | 2012-09-27 |
20120246674 | DATA DRIVEN TEST FIXTURE FOR SYSTEMS OF WEB SERVICES - A data driven test system for web service or other service dependent on message exchange between service points or other communicating entities is contemplated. The testing system may be configured as a multi-stage tester having capabilities to conduct sequence, structure, and content test in order to narrowly identify errors of service points while subjected to a test protocol. | 2012-09-27 |
20120246675 | SYSTEMS AND METHODS FOR DYNAMIC EVENT PRODUCTION AND MANAGEMENT - Apparatus and methods for dynamically producing and managing events are disclosed. In various embodiments, an event sequence generator is used to generate a production schedule or script that includes content elements and event milestones. Methods of generating a production schedule and a promotion schedule are also disclosed. The production schedule and reports based on the event can be produced and accessed remotely. | 2012-09-27 |
20120246676 | TARGETING ADS IN CONJUNCTION WITH SET-TOP BOX WIDGETS - A network device receives selection of a widget, for execution at a set-top box (STB) associated with a customer, from multiple widgets stored at a server, where each of the multiple widgets includes a software application that the STB can execute to render graphics or images on a screen or to perform other functions associated with the STB. The network device analyzes information associated with the customer and the widget, and selects an ad for the customer based on the analysis, where the ad relates to a product or service available for purchase. The network device causes the selected widget and the selected ad to be delivered to the STB. | 2012-09-27 |
20120246677 | INTERACTIVE NETWORK AND/OR DEVICES AND/OR METHODS THEREOF - Networks and/or devices for enabling and/or providing live or non-live interactivity with televised programming and/or its viewers and/or fans and/or hosts and/or actors and/or contestants. In certain (non-limiting) embodiments, mobile or handheld devices (e.g., mobile phones or laptops) communicably connected or connectable to networks having platforms thereon for permitting or providing live or real-time interactivity with televised programming and/or its viewers/fans/hosts/actors/contestants. In other embodiments, methods for performing or providing the interactivity described herein. In still other embodiments, software, residing on a data storage device, which directs a processor to perform actions in accordance with and/or to obtain one or more of the objectives of the technologies and methods described herein. | 2012-09-27 |
20120246678 | Distance Dependent Scalable User Interface - A graphical user interface control for a home entertainment system. The distance between a user and a display is determined. The informational content of the graphical user interface and the size of the text and graphic images shown on the display are scaled based on the distance of the user from the display. | 2012-09-27 |
20120246679 | Method and Apparatus for Initiating and Executing a Joint Viewing Session of a Programming Event - Various mechanisms for initiating and/or executing a joint viewing session across a network are disclosed herein. A first user may provide an instruction to an entertainment device to send an invitation to a remote device corresponding to a second user, requesting that the second user participate in a joint viewing session of a programming event. A calendar event may be added to a calendar application at the entertainment and/or the remote device. In some embodiments, during the joint session, the programming event may be simultaneously presented at both the entertainment device and the remote device. A communications session may be established between the entertainment device and the remote device, and communications from the first user may be transmitted from the first entertainment device to the remote device for presentation to the second user during the joint viewing session. | 2012-09-27 |
20120246680 | PROGRAM-INFORMATION DISPLAYING DEVICE, PROGRAM-INFORMATION DISPLAYING METHOD, PROGRAM, AND RECORDING MEDIUM - Provided is a program-information displaying device characterized by including: a program-information acquiring unit configured to acquire program information pieces; a full-program-display processing unit configured to respectively display the program information pieces in a plurality of program cells in a full-program display region, the program cells being defined by a temporal axis and a channel axis crossing the temporal axis; a recommended-program-information selecting unit configured to select particular program information pieces from the program information pieces acquired by the program-information acquiring unit; a recommended-program storage unit configured to store therein program information pieces of selected recommended programs in a manner associable the program information pieces for displaying the full-program display region; and a recommended-program-display processing unit configured to display the program information pieces of the recommended programs stored in the recommended program storage unit in a recommended-program display region in alignment with the temporal axis of the full-program display region. | 2012-09-27 |
20120246681 | Method for Content Presentation - A system and method is presented of personalizing the organization of a product set, automating the organizing and displaying of content. | 2012-09-27 |
20120246682 | System and Method for Preferred Placement Programming of iTV Content - Preferred placement of programming content is provided by a system and method to organize or sequence the display of a set of programmable content elements of an iTV application to a viewer, using business rules that describe the preferred placement conditions or criteria. Such criteria include brand, content owner, application location, current channel, current channel family, current channel category, time of day, content category, current program, current program genre, current iTV application, current content type, and/or subscriber and set-top box profile and behavior data. In one implementation, the present invention allows for managing the ‘shelf space’ within and for iTV applications. | 2012-09-27 |
20120246683 | FREE-WHEEL SYSTEM - A method including receiving a request to start recording a sequence of navigational inputs to be received by a user device; storing each navigational input of the sequence when each navigational input is received; receiving a request to stop recording the sequence of navigational inputs; stopping the recording of the sequence of navigational inputs; receiving an assignment of a trigger to invoke an execution of the recorded sequence of navigational inputs; storing the assignment of the trigger; identifying when the trigger is received or occurs; and executing the recorded sequence of navigational inputs on the user device based on the identifying. | 2012-09-27 |
20120246684 | SYSTEMS, APPARATUS AND METHODS USING PROBABILISTIC TECHNIQUES IN TRENDING AND PROFILING AND TEMPLATE-BASED PREDICTIONS OF USER BEHAVIOR IN ORDER TO OFFER RECOMMENDATIONS - An embodiment of the present invention provides a method of using probabilistic techniques in trending and profiling of user behavior in order to offer recommendations, comprising detecting patterns in user behavior over time thereby enabling a personal device associated with said user to predict what the user is likely to do on a given day or what the user intends to accomplish in an action that has begun. | 2012-09-27 |
20120246685 | Video Object Tag Creation and Processing - Methods, and systems, including computer programs encoded on computer-readable storage mediums, including a method for presenting a video content item in a first display area; concurrently presenting, with the video content item in the first display area, objects that are displayed during the presentation of the video content item in a second display area, wherein the objects persist in the second display area after the object is no longer displayed during the presentation of the video content item in the first display area; receiving an indication identifying one of the objects presented in the first display area or the second display area; and processing a tag associated with the object, the tag comprising a reference to a media item, wherein the processing comprises: accessing the media item referenced by the tag; and presenting the media item at least partially in the first display area or the second display area. | 2012-09-27 |
20120246686 | Mobile Terminal and Sleep Method in MBBMS Module of Mobile Terminal - The present invention provides a mobile terminal and a method for dormancy of a mobile broadcast business management system (MBBMS) module in the mobile terminal. The method comprises: before the MBBMS module enters into dormancy, extracting working state information and firmware information of the MBBMS module and storing the working state information and firmware information into a non-volatile memory in a form of file; and after the MBBMS module is awakened, reading the working state information and firmware information from the non-volatile memory, configuring the MBBMS module based on the working state information and firmware information and restoring working context of the MBBMS module. | 2012-09-27 |
20120246687 | PORTABLE TERMINAL, INFORMATION PROCESSING APPARATUS, CONTENT DISPLAY SYSTEM AND CONTENT DISPLAY METHOD - A portable terminal includes a receiving unit which receives content information, an external device communication unit which conducts communication with an external information device, a display unit which displays the content information received by the receiving unit, an acquiring unit which acquires identification information identifying the content information displayed by the display unit, an operation unit which receives an operation indication from a user, and a control unit which conducts control such that if a transmission indication of the identification information is received by the operation unit while the content information is being displayed, the identification information acquired by the acquiring unit is transmitted to the external information device and the display of the content information by the display unit is terminated. | 2012-09-27 |
20120246688 | ALGORITHM FOR IMPROVING TRANSPONDER SCANNING IN A SATELLITE SET-TOP BOX - The present invention concerns a method and associated apparatus for reducing the time required to scan an incoming satellite trans-mission power spectrum for available signals and to determine the characteristics of those signals. The frequency range of interest is scanned in narrow slices to determine approximate input power within each slice. Center frequencies and symbol rates of individual transponders are then estimated based upon these input power approximations. | 2012-09-27 |
20120246689 | BUFFERING CONTENT ON A HANDHELD ELECTRONIC DEVICE - A handheld device receives a wireless RF transmission that includes multiple video streams and buffers all video streams or selected video streams based on an identification of video streams to buffer. The device might also buffer all or selected audio streams or other real-time data content that is received in the wireless RF transmission. The wireless RF transmission may include a set of video streams (and/or audio streams, and/or other real-timed data) for the handheld device to buffer. A head end that sends the RF transmission may determine which streams to buffer based on operator input, user preferences, and other factors. Alternatively, the handheld device may automatically determine which streams to buffer based on information such as user preferences and information in the RF transmission. Alternatively, a user may select which streams to buffer. | 2012-09-27 |
20120246690 | Apparatus and Method for Tuning to a Channel of a Moving Pictures Expert Group Transport Stream (MPEG-TS) - A method and apparatus for tuning to a channel of a Moving Pictures Expert Group transport stream (MPEG-TS), for example used in an Internet Protocol Television (IPTV) network, are provided for optimising a channel change procedure. The method comprises the steps of receiving a MPEG transport stream at a first bit rate, the MPEG transport stream comprising a plurality of television channels. Program clock reference (PCR) values are identified in the received MPEG transport stream, and one or more of the program clock reference (PCR) values are adjusted. The MPEG transport stream, including the adjusted program clock reference values, are transmitted at a second bit rate, for example to a receiver device such as a set top box, thereby enabling the set top box to perform a channel change procedure more quickly. | 2012-09-27 |
20120246691 | METHODS AND SYSTEMS FOR VIDEO CONTENT DELIVERY - A set top box computer system for delivering video content is provided. The set top box computer system includes a memory device configured to store channel information including a channel identifier and a video source for each of a plurality of video content channels, a user input interface configured to receive a channel selection, and a processor coupled to the memory device and the user input interface, the processor configured to acquire video content based on a comparison of the channel information and the channel selection, the video content acquired from a corresponding video source located on the Internet, the processor further configured to transmit the video content to a media display device such that the transmitted video content is displayed on the media display device without displaying other content from the corresponding video source. | 2012-09-27 |
20120246692 | QUIET PERIOD MANAGEMENT FOR EMERGENCY AD HOC NETWORKS IN TV WHITE SPACES - Technologies are generally described for quiet period management in secondary opportunistic networks. Access Points (APs) in close proximity may form an ad hoc network (e.g., IEEE 802.11af) and instead of sensing and detecting idle channels in TV white spaces, listen to the broadcast messages from a co-existence manager, which broadcasts periodic intraframe sensing (IRFS) and interframe sensing (IFS) information in Medium Access Control (MAC) packets. The APs may extract information regarding the operating channels of the active cognitive base stations and their scheduled IRFS and IFSs on these channels. According to one scheme, short IRFS intervals over active channels may be allocated in a dedicated manner using a unique access request packet (ARP) by emergency network APs. According to another scheme, contention-based access may be provided to longer IFS intervals on multiple channels. | 2012-09-27 |
20120246693 | Enabling Communication Connections Related to Received Content - A content receiver determines that a communication connection recipient identifier is associated with content received from a content provider. An associated communication device is identified by the content receiver. The content receiver then signals the communication device to initiate a communication connections utilizing the communication identifier. In some implementations, the content receiver may provide a user with a notification and may signal the communication device after receiving a responses to the notification. In one or more implementations, the communication connection recipient identifiers may be telephone numbers, the communication devices may be telecommunication devices, and the communication connections may be telephone connections. The content receiver may determine that a communication connection recipient identifier is associated with content based on analysis of metadata that accompanies or that otherwise corresponds to the received content or by audio and/or image recognition performed on the content. | 2012-09-27 |
20120246694 | TELEVISION APPARATUS AND DISPLAY CONTROL METHOD - According to one embodiment, a television apparatus includes: a specific receiver configured to receive, from a communication apparatus connected via a network, list information of a plurality of network services each of which provides data, destination information indicating a connection destination for each of the network services, and setting information corresponding to each of the network services and indicating a setting to a display to receive the data from each of the network services; a display controller configured to control displaying of the list information; a selection receiver configured to receive a selection of the network service included in the list information that is displayed; and a setting controller configured to set the display according to the setting information corresponding to the selected network service and configured to control the display to display the data received from the connection destination for the selected network service indicated by the destination information. | 2012-09-27 |
20120246695 | ACCESS CONTROL OF DISTRIBUTED COMPUTING RESOURCES SYSTEM AND METHOD | 2012-09-27 |
20120246696 | SYSTEM AND METHOD FOR DATA MASKING - A system and computer-implemented method for providing security rules to an existing enterprise database system. The disclosed system and computer-implemented method intercepts database connection requests provided by third-party applications and end-users and determines what, if any, security rules to be applied to the request, including masking, scrambling and unmasking the data, as well as whether the requesting user has a need to know the requested data. Accordingly, personally identifiable and other sensitive information is not provided to an unauthorized requesting application and/or end-user. | 2012-09-27 |
20120246697 | Method and Node in a Telecommunications Network - During a registration procedure by a User Equipment (UE) via a Proxy Call Session Control Function (P-CSCF) node and a Serving Call Session Control Function (S-CSCF) node, the S-CSCF node provides a policy indicator in a response message to a register request message. The policy indicator enables subsequent operation of the node to be controlled according to whether or not a registered UE has an associated policy. As such, delays (such as delays associated with retrieving an associated policy) are only experienced by UEs that have previously been determined as having such an associated policy, rather than all UEs being affected in the same way. | 2012-09-27 |
20120246698 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2012-09-27 |
20120246699 | DISPLAY APPARATUS, CONTROL METHOD THEREOF AND CONTROL METHOD OF EXTERNAL DEVICE - A display apparatus, a control method thereof and a control method of an external device are provided. The display apparatus includes a contents processing unit which reproduces contents, a communication unit which communicates with an external device which reproduces contents, and a control unit which receives reproduction information of the contents reproduced in the external device from the external device through the communication unit, and controls the contents processing unit to reproduce contents corresponding to the contents reproduced in the external device, based on the received reproduction information. | 2012-09-27 |
20120246700 | QoS CHANNELS FOR MULTIMEDIA SERVICES ON A GENERAL PURPOSE OPERATING SYSTEM PLATFORM USING DATA CARDS - A SIP (session initiation protocol) service activation abstraction layer that provides a unified interface to upper layer applications for discovering, establishing, and managing the QoS connectivity. In one implementation, this is IP Multimedia Subsystem-centric, further supporting applications that utilize SIP for session control. This capability extends to the data card universe allowing UMTS data card vendors to establish concurrent QoS-based sessions using multiple primary PDP (packet data protocol) contexts based on a set of SIP triggers, further allowing applications running on a computing system to transparently utilize the established pipes based on the individual QoS requirements. | 2012-09-27 |
20120246701 | Programming, Verifying, Visualizing, and Deploying Browser Extensions with Fine-grained Security Policies - An environment is described which enables the generation, analysis, and use of secure browser extensions. Each browser extension includes an extension body and a policy expressed in a logic-based specification language. The policy specifies the access control and dataflow privileges associated with the extension body in a fine-grained manner by leveraging the structure and content of resources that are accessible to the browser extension. A suite of analysis tools for testing the safety of the browser extension includes a visualization module identifies features of a resource that are accessible to the policy. A static analysis module uses a static analysis technique to determine whether the extension body satisfies the policy. The environment also includes a conversion module for converting the browser extension, once deemed safe, into a form for use by a particular type of browser. The browser can execute that extension without performing runtime safety checks. | 2012-09-27 |
20120246702 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESS AUTHENTICATION - According to one aspect of the present disclosure, a method and technique for access authentication is disclosed. The method includes: responsive to receiving an access request from a user for a secure resource, logging an Internet Protocol (IP) address of the access request; transmitting a uniform resource locator (URL) to the user via an electronic mail message; responsive to receiving a request for the URL, logging an IP address corresponding to the URL request; and responsive to validating the IP address corresponding to the URL request with the IP address of the access request, providing access to the secure resource. | 2012-09-27 |
20120246703 | EMAIL-BASED AUTOMATED RECOVERY ACTION IN A HOSTED ENVIRONMENT - Email-based recovery actions may be provided. A request from a user to perform an action may be received. If the user is determined not to have permission to perform the action, a message may be sent to a second user to approve the requested action. If the second user approves the requested action, the requested action may be performed. | 2012-09-27 |
20120246704 | MOBILE SOFTWARE ENTITLEMENTS MANAGER - A mobile entitlements manager implemented on a mobile device stores the software entitlements belonging to a user of the mobile device. The mobile device communicates with client computers on which the user wishes to run software applications. Messages are exchanged between the client and the mobile device to enable activation, continued running, and to deactivate client applications in accordance with the entitlements available to the user. The mobile entitlements manager updates its entitlement information by communicating with a remote entitlements server, and informs the entitlement server of the status of programs running on clients in communication with the device. The entitlements manager handles entitlements for multiple applications and for multiple licensed entities, such as individual users, sites, client computers, or organizations. | 2012-09-27 |
20120246705 | Object-Based Access Control for Map Data - Embodiments allow access to geographic data objects on a per-object basis. A client may send a plurality of requests for geographic data to display within a view frustum. Map data may include a layer with a plurality of assets. Each request may be authenticated by an access control filter, which determines whether the user is authorized to view the data requested. | 2012-09-27 |
20120246706 | SYSTEMS, DEVICES, AND METHODS FOR SECURELY TRANSMITTING A SECURITY PARAMETER TO A COMPUTING DEVICE - Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein. | 2012-09-27 |
20120246707 | METHOD FOR INDICATING ABNORMAL DATA-INPUTTING BEHAVIOR - A method for indicating abnormal data-inputting behavior includes inducting and connecting an identification end with a control system. The control system receives a procedure selecting command to allow input of registration data or a log-in data. The control system generates identification information based on the registration data when the procedure selecting command is the input of registration data. The identification information is stored in the identification end and includes the registration data, a template of keystroke, and an identification code. The control system generates a keystroke dynamic based on the long-in data when the procedure selecting command is the input of log-in data. The control system compares the keystroke dynamic of the log-in data with the template of keystroke of the identification information. The control system sends out a warning message when the keystroke dynamic of the log-in data does not match the template of keystroke of the identification information. | 2012-09-27 |
20120246708 | PREVENTING INADVERTENT LOCK-OUT DURING PASSWORD ENTRY DIALOG - One embodiment provides a computer-implemented method for providing controlled access to electronic content. A password is associated with electronic content, such as by password-protecting an electronic file that contains the electronic content. At least one password attempt is received in an effort to access the electronic content. Each password attempt is compared to the password at a selected subset of “trap” character positions. Up to a threshold number of password entries is allowed that have incorrect characters at any of the trap character positions. A greater number or even an unlimited number of incorrect password entries are allowed having incorrect characters at non-trap character positions. Access to the electronic content is allowed only if one of the password entries exactly matches the password. | 2012-09-27 |
20120246709 | LIGHTWEIGHT AUTHENTICATION FOR ON-PREMISE RICH CLIENTS - The subject disclosure relates to lightweight authentication for on-premise rich clients. The lightweight authentication mitigates the amount of software that is installed on a client machine for authentication purposes. A portion of an external website is hosted on an application executing on the rich client. The user can interact with the portion of the external website in order to enter credentials or other identification information. The entry of the credentials or other identification information is relayed to the external website for verification. If the verification is successful, the user can interact with various external websites utilizing the single verification. | 2012-09-27 |
20120246710 | DYNAMIC, TEMPORARY DATA ACCESS TOKEN - Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user. | 2012-09-27 |
20120246711 | PORTABLE MULTI-MEDIA AUTOMATIC AUTHENTICATING ROUTER AND METHOD FOR AUTOMATICALLY ROUTING STORED DATA - A computer program product and automatic authenticating router device for automatically routing stored data from a single device to at least one remote storage location is provided. The router device includes the computer program product. The computer program product includes a computer readable medium bearing software instructions for enabling predetermined operations. The predetermined operations include detecting an availability of a proximal network; automatically establishing a connection with the at least one remote storage device based on the availability of the proximal network; automatically recognizing a data type of a data file stored on the single device; associating routing information with the data file based on the data type; and automatically uploading the data file from the single device to the remote storage device based on the routing information. | 2012-09-27 |
20120246712 | FIREWALL INTERFACE CONFIGURATION TO ENABLE BI-DIRECTIONAL VOIP TRAVERSAL COMMUNICATIONS - Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to internal hosts against unauthorized access by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall changes data in headers of VoIP packets and corresponding data contents of the VoIP packets, to enable bi-directional VoIP communications. An external VoIP interface of the firewall receives incoming VoIP packets having a user alias (e.g., an email address) and an indication regarding a VoIP port of external interface. The packets are directed to an appropriate internal host by the firewall performing port address forwarding based on the port indication to a Media Gateway Control Protocol (MGCP) media gateway within the internal network that maintains a mapping of user aliases to private addresses of the internal hosts. | 2012-09-27 |
20120246713 | METHOD AND APPARATUS FOR CONTROLLING ACCESS OF A SECURE DIGITAL MEMORY CARD - A method for controlling access of a secure digital memory card includes inserting the secure digital memory card into a card reader; an electronic device performing an application program to detect whether a first password is stored in the secure digital card when a write protection function of the secure digital memory card is enabled; inputting a second password when the first password is not stored in the secure digital memory card; and sending a first command embedded with the second password to disable a read access function of the secure digital memory card. | 2012-09-27 |
20120246714 | Dynamic Password Strength Dependent On System State - An approach is provided by detecting password entries by a user of a system with each of the password entries corresponding to a password entered when invoking a password enabled application on the system. A password strength is calculated corresponding to each of the detected password entries. A strongest password is identified based on the password strength calculations. A device lock request is received from the user of the system, with the device lock request being received at a user interface, such as a GUI control. The system is set into a locked state. The locked state prevents data stored on the information handling system from being accessed while the information handling system is in the locked state. The system is subsequently unlocked by entry of the identified strongest password by the user. | 2012-09-27 |
20120246715 | RECORDING DEVICE AND CONTROL METHOD THEREFORE - One embodiment provides a recording device, including: a data storage module; an authentication information storage module configured to store authentication information; a receiving module configured to receive authentication information from a higher level apparatus; an authenticating module configured to perform authentication of access to the data storage module by comparing the received authentication information with the stored authentication information; a command tendency storage module configured to store a command tendency; a command tendency determinator configured to determine whether or not a command tendency relating to commands being transmitted from the higher level apparatus is similar to the previously-stored command tendency; and a use disabling module configured to render the data stored in the data storage module substantially unusable based on a determination of the command tendency determinator. | 2012-09-27 |