Patents Represented by Attorney, Agent or Law Firm Hickman Palermo
  • Patent number: 8255372
    Abstract: Data used and generated by the process of validating XML documents is divided into two categories: compile-time static data and runtime data. Runtime data may be specific to a particular XML document and changes when validating the XML document, while compile-time data does not change in this way. For example, compile-time data may be data that defines, according to a schema, the descendant elements and ordering between them. Runtime data is information generated to track which descendants occurred in a particular XML document being validated. Compile-time static data, once generated to validate a particular XML document, is cached within a shared volatile memory. Once the compile-time data is cached, the compile-time static data may be used to validate other XML documents without the need to regenerate the compile-time static data.
    Type: Grant
    Filed: January 18, 2010
    Date of Patent: August 28, 2012
    Assignee: Oracle International Corporation
    Inventors: Vijay Medi, Sam Idicula, Nipun Agarwal
  • Patent number: 8255955
    Abstract: A method and apparatus for highlighting a program listing in a set of program listings based on selection criteria. The selection criteria may indicate that the a broadcaster has agreed to pay a service provider in return for the service provider ensuring that a program listing, corresponding to the program of the broadcaster, is highlighted in a program page that displays a set of program listings, such as television program listings. If there are multiple program listings, listed in a program page, that are to be highlighted, then details of the respective contracts may be used to determine which program listing to highlight. Such details may include the total contract value, a ratio of contract value-to-page view, and/or the time of contract formation.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: August 28, 2012
    Assignee: TiVo Inc.
    Inventor: Kirk D. Wong
  • Patent number: 8255995
    Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 8255519
    Abstract: A system comprises a packet data processing element; first network resource tracking logic operable to perform monitoring data packets as the packets pass through the network element; detecting network resource identifiers within the data packets; forming network resource identifier report messages that carry the network resource identifiers; forwarding the network resource identifier report messages to a bookmark processing server; storing records of each of the network resource identifiers carried therein; storing counters that identify numbers of times that associated network resource identifiers were requested; determining interesting network resource identifiers based on the records and decision steps; generating and providing a report of the interesting network resource identifiers. As one result, interesting network resource identifiers can be automatically found in network traffic and provided to a social bookmarking site.
    Type: Grant
    Filed: October 10, 2007
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Robbie Allen, Marisa Chancellor
  • Patent number: 8255792
    Abstract: Techniques for providing information about an object through a graphical interface include providing in a document scalable vector graphics (SVG) statements associated with a graphical representation of the object. The SVG statements are bound to a pointer to a resource that includes information pertaining to the object. The pointer to the resource associated with the SVG statements may then be extracted from the document. Information is then retrieved from the resource based on the pointer. The SVG statements may then be modified based on the information. Then a second graphical representation of the object is presented based on the SVG statements after the modifying. The presentation provides information, or control, or both, for the object.
    Type: Grant
    Filed: April 20, 2007
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Yishay Mor
  • Patent number: 8254396
    Abstract: A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts. A router receives update messages to update routing information for the one or more other devices, wherein each of the update messages includes a checkpoint marker and a route. The router stores the route in a checkpoint repository and stores the checkpoint markers in association with information identifying the other routers from which the checkpoint markers were received. In response to a restart event, the router sends each of the stored checkpoint markers to respective other devices and receives from the respective other devices only route updates that occurred later in time than the checkpoint markers.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Chandrashekhar Appanna, John G. Scudder
  • Patent number: 8255793
    Abstract: To provide valuable information regarding a webpage, the webpage must be divided into distinct semantically coherent segments for analysis. A set of heuristics allow a segmentation algorithm to identify an optimal number of segments for a given webpage or any portion thereof more accurately. A first heuristic estimates the optimal number of segments for any given webpage or portion thereof. A second heuristic coalesces segments where the number of segments identified far exceeds the optimal number recommended. A third heuristic coalesces segments corresponding to a portion of a webpage with much unused whitespace and little content. A fourth heuristic coalesces segments of nodes that have a recommended number of segments below a certain threshold into segments of other nodes. A fifth heuristic recursively analyzes and splits segments that correspond to webpage portions surpassing a certain threshold portion size.
    Type: Grant
    Filed: January 8, 2008
    Date of Patent: August 28, 2012
    Assignee: Yahoo! Inc.
    Inventors: Deepayan Chakrabarti, Manav Ratan Mital, Swapnil Hajela, Emre Velipasaoglu
  • Patent number: 8255791
    Abstract: The invention relates to a method and apparatus for providing information in an easily customizable, interactive and collaborative format. The invention can be looked at as the combination of one or more functional components in one aspect, the invention features aggregating raw data on at least one DataServer connected to a communication network; performing analysis of that data using at least one AnalyticalServer that is connected to the network; maintaining a cache of the most recent data and analysis of that data from the AnalyticalServers on at least one ViewServer connected to the network; maintaining communications with the network for accessibility by users over the network; and maintaining an ApplicationServer on the network that, based either on requests of the user through the web server, or through an automatic refresh, generates display data using, for example, the cached information on the ViewServer.
    Type: Grant
    Filed: May 9, 2007
    Date of Patent: August 28, 2012
    Inventor: Dov Koren
  • Patent number: 8250648
    Abstract: A security system for a computer operating system comprising a processor (37) that is independent of the host CPU (13) for controlling access between the host CPU (13) and a security partition formed in the storage device (21) for storing the operating system. A program memory (41) that is independent of the computer memory and the storage device (21) unalterably stores and provides computer programs for operating the processor (37) in a manner so as to control access to the security partition in the storage device (21). All data access by the host CPU (13) to the data storage device (21) is blocked before initialization of the security system and is intercepted immediately after the initialization under the control of the processor (37). The processor (37) effects independent control of the host CPU (13) and configuration of the computer (11) to prevent unauthorised access to the security partition on the storage device (21) during the interception phase.
    Type: Grant
    Filed: March 29, 2004
    Date of Patent: August 21, 2012
    Assignee: Secure Systems Limited
    Inventors: Richard Kabzinski, Michael Alfred Hearn, Russell E. Powers
  • Patent number: 8249385
    Abstract: Techniques are described for causing digital image data to be interpreted according to a particular technique of a plurality of techniques. According to an embodiment, digital sensor data is received, and user input is received that specifies which technique of a plurality of techniques to use to generate a display that depicts an unmodified image from the sensor data, wherein each technique of the plurality of techniques generates a display from the sensor data in a different manner than each other technique of the plurality of techniques.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: August 21, 2012
    Assignee: Apple Inc.
    Inventors: Nikhil M. Bhatt, Curtis A. Bianchi
  • Patent number: 8250647
    Abstract: Automatic filter generation and maintenance comprises detecting, from network packets, an IP address and a first MAC address; the IP address and the first MAC address are used to determine that the IP address and another MAC address that are detected in second network packets is an illegal binding and the other MAC address is different from the first MAC address; causing a network element to create, in an ARP filter, based on the IP address and the first MAC address, rules that cause the network element to prevent an address resolution protocol table from including a binding that includes only one of the IP address and the first MAC address; in response to detecting the IP address and said another MAC address in the second network packets, preventing the address resolution protocol table from including the illegal binding that includes the IP address and the other MAC address.
    Type: Grant
    Filed: January 10, 2011
    Date of Patent: August 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Marco Foschiano, Christophe Paggen, Andrei Kouzmitch, Oleg Tabarovsky
  • Patent number: 8250062
    Abstract: A database system may perform a streaming evaluation of an XPath expression by utilizing an XPath evaluation component in tandem with an XML event-streaming component. For a more optimal filtered streaming evaluation, the XML event-streaming component may provide an interface whereby the evaluation component sends certain criteria to the event-streaming component when requesting an XML event. The criteria may be based on a next unmatched step in the XPath expression. In response to the request for an XML event, the event-streaming component may only return events that match the criteria. The evaluation component may be, for example, a compiled state machine for the XPath expression. The criteria may be pre-compiled for each possible state in the state machine. The event-streaming component may also utilize the criteria along with schema information to skip parsing of certain segments of XML data.
    Type: Grant
    Filed: November 9, 2007
    Date of Patent: August 21, 2012
    Assignee: Oracle International Corporation
    Inventors: Ning Zhang, Sivasankaran Chandrasekar, Nipun Agarwal, Sam Idicula
  • Patent number: 8250359
    Abstract: A packet forwarding process, on a data communications device, forwards a packet to a plurality of destinations within a network from that data communications device using an “encrypt, then replicate” method. The packet forwarding process receives a packet that is to be transmitted to the plurality of destinations, and applies a security association to the packet using security information shared between the data communications device, and the plurality of destinations, to create a secured packet. The secured packet contains a header that has a source address and a destination address. The source address is inserted into the header, and then the packet forwarding process replicates the secured packet, once for each of the plurality of destinations. After replication, the destination address is inserted into the header, and the packet forwarding process transmits each replicated secured packet to each of the plurality of destinations authorized to maintain the security association.
    Type: Grant
    Filed: April 14, 2010
    Date of Patent: August 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Brian E. Weis, Jan Vilhuber, Michael Lee Sullenberger, Frederic R. P. Detienne
  • Patent number: 8250630
    Abstract: A machine executed method comprising at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted.
    Type: Grant
    Filed: March 5, 2009
    Date of Patent: August 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Eduardo Mendonca
  • Patent number: 8243013
    Abstract: The disclosure relates to waveforms, circuits and methods for driving bistable displays.
    Type: Grant
    Filed: May 5, 2008
    Date of Patent: August 14, 2012
    Assignee: Sipix Imaging, Inc.
    Inventors: Robert Sprague, Wanheng Wang, Yajuan Chen, Andrew Ho, Bryan Hans Chan, Jialock Wong, Hong-Mei Zang
  • Patent number: 8244517
    Abstract: Content items are selected to be displayed on a portal page in such a way as to maximize a performance metric such as click-through rate. Problems relating to content selection are addressed, such as changing content pool, variable performance metric, and delay in receiving feedback on an item once the item has been displayed to a user. An adaptation of priority-based schemes for the multi-armed bandit problem are used to project future trends of data. The adaptation introduces experiments concerning a future time period into the calculation, which increases the set of data on which to solve the multi-armed bandit problem. Also, a Bayesian explore/exploit method is formulated as an optimization problem that addresses all of the issues of content item selection for a portal page. This optimization problem is modified by Lagrange relaxation and normal approximation, which allow computation of the optimization problem in real time.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: August 14, 2012
    Assignee: Yahoo! Inc.
    Inventors: H. Scott Roy, Raghunath Ramakrishnan, Pradheep Elango, Nitin Motgi, Deepak K. Agarwal, Wei Chu, Bee-Chung Chen
  • Patent number: 8238548
    Abstract: An echo canceller apparatus comprises a receive side attenuator coupled in a receive side signal path that is configured to couple from a conference call bridge to a caller; a convolution processor coupled to the receive side signal path at a convolution processor pick-off point; a double-talk detector coupled to the receive side signal path and to a sending side signal path that is configured to couple from the caller to the conference call bridge; and logic coupled to the receive side attenuator which when executed is responsive to a double-talk condition detected by the double-talk detector and operable to determine a level of echo canceled by the convolution processor, to determine an additional amount of attenuation to introduce, and to activate the receive side attenuator to introduce the additional attenuation.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: August 7, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: James C. Frauenthal, Michael A. Ramalho, Gary Skrabutenas, Herbert Wildfeuer
  • Patent number: 8239373
    Abstract: The approaches described herein provide an efficient way to process certain kinds of queries that retrieve XML data stored in an object-relational database. A technique determines whether a query comprises a plurality of iteration expressions that exhibit a particular relationship to one another, and if so, re-writes the query and produces an optimized query execution plan. The query execution plan specifies an XPath-based row source with caching enabled. A very small cache structure is used, and reference locators are stored in the cache that point into binary-encoded data rather than copying XMLType data into the cache. Row data may be cached on the first use of the path-based row source and re-used in subsequent requests for rows. Once there is a subsequent request for rows from the optimized path-based row source, the cache may be reorganized to efficiently produce the rows of the row source.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: August 7, 2012
    Assignee: Oracle International Corporation
    Inventors: Balasubramanyam Sthanikam, Sam Idicula, Nipun Agarwal
  • Patent number: 8239966
    Abstract: A method and apparatus for processing an electronic document in a secure manner is provided. A scanner may verify that the configuration state of a file server has not changed since a prior configuration state by issuing a request to a security server. The security server may process the request to determine whether the configuration state of the file server has changed since the file server was registered with the security server. The security server may also verify that the scanner issued a request to store an electronic document using a file server or that the file server received the request. A storage medium of a file server may be protected against unauthorized removal of the storage medium by storing, separate from the storage medium, a password required to access the storage medium, and when the file server is powered on, the password is provided to the storage medium.
    Type: Grant
    Filed: September 13, 2006
    Date of Patent: August 7, 2012
    Assignee: Ricoh Company, Ltd.
    Inventor: Brian Smithson
  • Patent number: 8239869
    Abstract: A method, system, and apparatus to divide a computing job into micro-jobs and allocate the execution of the micro-jobs to times when needed resources comply with one or more idleness criteria is provided. The micro-jobs are executed on an ongoing basis, but only when the resources needed by the micro-jobs are not needed by other jobs. A software program utilizing this methodology may be run at all times while the computer is powered up without impacting the performance of other software programs running on the same computer system.
    Type: Grant
    Filed: June 19, 2006
    Date of Patent: August 7, 2012
    Assignee: Condusiv Technologies Corporation
    Inventors: Craig Jensen, Andrew Staffer, Basil Thomas