Patents Issued in July 17, 2008
-
Publication number: 20080172689Abstract: Techniques for generating customized rating systems for use in a DVR are described. According to one technique, a user submits a rating system definition that comprises two or more different ratings of the user's choosing. The rating system definition is stored. The rating system definition defines a customized ratings system. That system's creator and other users may then associate various entities, such as channels, series, and episodes, with ratings from the customized rating system. DVRs may use these associations between entities and ratings for various purposes. For example, DVRs may use these associations to allow a user to search for entities that satisfy specified rating criteria. For another example, DVRs may use these associations to restricting which entities and information about those entities can be displayed or recorded when the DVR is in a restricted mode of operation. Customized rating systems may be modified by multiple users in collaboration.Type: ApplicationFiled: January 3, 2007Publication date: July 17, 2008Inventors: Adam Feder, Brian Beach, Wijnand Van Stam
-
Publication number: 20080172690Abstract: Idle video-on-demand (VOD) and/or other streaming media channel capacity is used to deliver promotional content to selected set-top boxes (STBs) in a cable television network. Commercial segment cues are used to instruct a set-top box to switch away from a broadcast program to the streaming media channel during a commercial segment, and then switch back again to the original broadcast program at the end of the segment. More particularly, a promotion server determines an asset to be distributed such as a targeted promotion item (e.g., a commercial), and a list of STBs that are to receive it. The promotion server causes the video promotion content to be stored in VOD/streaming media servers located at the head ends. A scheduler process then delivers schedule messages to head end message servers which identify each promotion asset, and an STB which is to receive it.Type: ApplicationFiled: June 19, 2007Publication date: July 17, 2008Inventors: Chaitanya Kanojia, Terri Swartz, Darren Wetzel, Mark Fagnani
-
Publication number: 20080172691Abstract: A broadcasting signal processing apparatus includes: a signal receiver which receives a broadcasting signal, the broadcast signal including an application program for providing broadcasting information; a signal processor which processes the broadcasting signal so that a video is displayed based on the broadcasting signal received by the signal receiver; and a controller which controls the signal processor so that execution of the application program is paused and the video is adjusted if an adjustment condition of the video being displayed is satisfied while the application program is executed.Type: ApplicationFiled: October 3, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., Ltd.Inventor: Chul-Mok LEE
-
Publication number: 20080172692Abstract: A program distribution system is disclosed. The system includes: a broadcast station; a recording and reproduction device that is capable of recording and reproducing data of program contents coming from the broadcast station by cable or by radio; and a content server that is capable of distributing, over a network, the data of the program contents to the recording and reproduction device through connection thereto over the network. In the system, the recording and reproduction device includes a storage section, a recording and reproduction control section, and a higher-quality data acquisition control section.Type: ApplicationFiled: January 11, 2008Publication date: July 17, 2008Applicant: Sony CorporationInventors: Kazumoto Kondo, Yasuhisa Nakajima, Kei Matsubayashi
-
Publication number: 20080172693Abstract: A video class is a programmatic interface and an abstraction of a receivable audio/video/data feed. A video object can be instantiated and thereafter referenced by computer applications running on the receiving device. The video object properties characterize the video object content source, and the presentation of the content on the display device. The video object includes methods to control the properties of the video object.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventor: Edward A. Ludvig
-
Publication number: 20080172694Abstract: A terminal can acquire information required for an image configuration by accessing actual Electronic Service Guide (ESG) information using linking information when broadcast providers transmit Lightweight Application Scene Representation (LASeR) content including the linking information related to the LASeR content and the ESG information provided in a Digital Video Broadcasting-Handheld (DVB-H) Convergence of Broadcast and Mobile Services (CBMS), Open Mobile Alliance Broadcasting (OMA-BCAST) or Open Air Interface (OAI) standard. The broadcast providers can directly control a configuration of a broadcast image to be displayed on the terminal, such that differentiated broadcast images can be provided on a broadcast provider-by-broadcast provider basis.Type: ApplicationFiled: January 15, 2008Publication date: July 17, 2008Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Byoung-Dai LEE, Young-Jip Kim, Joon-Ho Park, Chang-Hyun Lim
-
Publication number: 20080172695Abstract: Various technologies for selecting media (e.g., television media) are described. A media selection method displays a tool for selecting a category, such as a television genre, to a user. Upon receiving a user selection, the selected category having a number of channels is visually illustrated on a channel selection spectrum (e.g., a circular arc channel selection spectrum). For example, if the selected category is sports, then a number of channels corresponding to sports channels are highlighted on the channel selection spectrum. Moreover, in one example, the channel selection spectrum works in conjunction with a touchscreen device. Thus, a user can navigate with his or her finger to quickly select and browse the available channels. Also, optionally, non-highlighted channels are automatically bypassed to assist user navigation. Additionally, upon receiving user selection of a channel, in one example, the media content corresponding to the selected channel is played.Type: ApplicationFiled: January 5, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Charles Migos, Ron Morris, Davis Sloo
-
Publication number: 20080172696Abstract: A receiving unit 200 receives, from broadcast stations (10, 11), EPG information related to all the programs to be broadcast on a plurality of channels. A program recommendation unit (300) extracts, from the programs indicated in the EPG information, a recommended program, which is estimated to meet the user's preferences, in accordance with history of program recording or program viewing by the user. A subscription suggestion unit (400) counts the broadcast frequency for each of the channels of recommended programs and for each day, and then compares the counting result with a threshold value, thereby suggesting to the user, via a display unit (20), that he or she makes or cancels any one of subscriptions to the channels in accordance with the broadcast frequency of recommended programs.Type: ApplicationFiled: September 29, 2005Publication date: July 17, 2008Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.Inventors: Seiji Furusawa, Noriko Sugimoto, Soichiro Fujioka
-
Publication number: 20080172697Abstract: A program recording apparatus for recording a program transmitted in a transport stream, includes an information acquisition portion which acquires genre information about the program from each TS packet of transmitted transport stream data, a conversion portion which converts the transport stream data into data in a predetermined format, a recording portion which records the transport stream data or the data in the predetermined format on a record medium, a control portion which controls at least one of the information acquisition portion, the conversion portion and the recording portion, and a storage portion which stores profile data in which a recording format every genre is set. The control portion controls at least one of the information acquisition portion, the conversion portion and the recording portion based on the profile data when the genre information about the program acquired by the information acquisition portion is set in the profile data.Type: ApplicationFiled: January 14, 2008Publication date: July 17, 2008Inventors: Masato HANASHIMA, Yasunori Naruse, Toshiaki Miyawaki, Kazuhide Yanase, Kentaro Hirao
-
Publication number: 20080172698Abstract: Among other things, on a portable device on which one or more AV items received from an external source are performed for a user during performance periods, at least one support function other than performing AV items, including receiving schedule information related to AV items, is performed in a background mode.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Inventors: Adam L. Berger, Gregory C. Schohn
-
Publication number: 20080172699Abstract: A method and apparatus are described for allowing a user to select one of an analog signal source and a digital signal source in a signal processing device, wherein the signal processing device compares an analog channel number with a digital channel list, determines based on results of the comparison if a corresponding digital channel is available, and, if available, stores a corresponding digital channel number and selects the corresponding digital channel determined from the digital channel list in response to a command from a user. A method and apparatus are also described as above but further determining based on the comparison if a corresponding digital channel is available, and, if available, prompting the user via an onscreen display (OSD) to select the digital signal.Type: ApplicationFiled: February 16, 2006Publication date: July 17, 2008Inventor: Rajeev Madhukar Sahasrabudhe
-
Publication number: 20080172700Abstract: A system and method for monitoring direct broadcast satellite signals. In a most general embodiment, the invention (10) includes a mechanism (20) for receiving direct broadcast wireless signals encoded in accordance with a DSS transport protocol. The received signals are analyzed with respect to various parameters and an output is provided in response thereto. In a specific embodiment, the wireless signals are transmitted via satellite and plural integrated receiver decoders (20) are used, one with an associated channel, to receive the wireless signals and provide audio, video, program guide and conditional access signals in response thereto. These signals are analyzed by software (100) running on a computer (56) which outputs alarm data on the detection of anomalies in the received signals.Type: ApplicationFiled: March 17, 2008Publication date: July 17, 2008Inventors: Jason Jensen, Ronald D. Allen
-
Publication number: 20080172701Abstract: A method of transmitting/receiving digital contents and a digital content reception system are disclosed. In a case of receiving a service including digital contents through the Internet, first channel information for identifying an entry point and second channel information for identifying a service provided by a service server or a service provider for providing the service can be selectively received. The digital content reception system can receive and store the first channel information from the entry point and can receive and store the second channel information from the service provider or the service server. Accordingly, since another service can be provided by changing a channel, it is possible to provide convenience to a user.Type: ApplicationFiled: January 11, 2008Publication date: July 17, 2008Inventors: Ho Taek Hong, Joon Hui Lee, Jae Hyung Song, Jin Pil Kim
-
Publication number: 20080172702Abstract: A digital broadcasting receiver and a control method thereof. The method includes determining whether it is necessary to display a screen saver image on a display unit connected to the digital broadcasting receiver, and displaying the screen saver image on the display unit when it is necessary to display the screen saver image while receiving digital broadcasting signals to update EPG information.Type: ApplicationFiled: September 27, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., Ltd.Inventors: Jung Su KIM, Hyoung Nam Kim, Dong Youn Lee, Jae Wook Jeon
-
Publication number: 20080172703Abstract: A method and apparatus for transmitting and receiving graphical data are provided. The apparatus for transmitting includes a graphical data generating unit that generates graphical data; an encoder that converts the graphical data into a JPEG 2000 code stream; and a transmitting unit that transmits video streams and the code stream. The apparatus for receiving includes a receiving unit that extracts an JPEG 2000 code stream; a decoder that decodes the code stream; and a display unit that displays a video stream included in the received stream and the decoded code stream. The method for transmitting the graphical data includes generating graphical data; converting the data into a JPEG 2000 code stream; and transmitting video streams and the JPEG 2000 code stream. The method for receiving the graphical data includes extracting a JPEG 2000 code stream; decoding the code stream; and displaying the decoded code stream and a video stream.Type: ApplicationFiled: August 3, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., Ltd.Inventors: Si-cheol KIM, Ye-youl Lee, Yong-moo Shin, Sung-bin Hong
-
Publication number: 20080172704Abstract: An interactive audiovisual editing system (IAVES) for providing the possibility of customizing and personalizing audiovisual/multimedia (AVMM) data/media comprises a hardware/software component that can respond to users' command inputs and process an AVMM data/media accordingly to the users' intention and display the processed data/media back to them via an AVMM display. An AVMM display allows users to view and listen to AVMM data/media. A controller allows users to enter AVMM command inputs into the system and interact with AVMM data/media via defined AVMM parameters. The command inputs can introduce user-defined objects such as graphics, animations, pictures, text files, audio files, video files, or any user-defined digital content. A new recording/filming format gives the IAVES users the option of viewing and listening to AVMM data/media in different audio and video formats including two-dimensional and three-dimensional formats.Type: ApplicationFiled: January 15, 2008Publication date: July 17, 2008Inventor: Peyman T. Montazemi
-
Publication number: 20080172705Abstract: A user can create a video segment or employ an existing video segment, and then share it over a computer network. The user provides an indication that one or more particular video segments are to be shared over the network. The video segment(s) is/are then automatically assessed and determined to be compatible with streaming video, or not. If the video segment(s) is/are not compatible with streaming video, it/they are converted to a compatible format automatically. An identifier for the video segment is automatically created and the segment and the identifier are automatically uploaded to a host computer over the network such as the Internet. The video segment and the identifier (optionally with other identifying material such as an identity of the sender, an access authorization for the video, a number of accesses permitted, and a duration for the availability of the video) can be stored at the direction of the host computer.Type: ApplicationFiled: October 29, 2007Publication date: July 17, 2008Inventors: GAD LIWERANT, CHRISTOPHER DODGE, GUILLAUME BOISSIERE
-
Publication number: 20080172706Abstract: The present invention relates to an IPTV System for provisioning IPTV services to a subscriber of said IPTV system. The IPTV-system comprises an application server for provisioning IPTV services to the subscriber via a first client device that is associated to the subscriber and the first client device. The application Server is coupled to the first client device over a communications network. The IPTV system further comprises a location determination part that is adapted to determine an actual location of the subscriber and a service provisioning determination part that is adapted to determine alternative means for provisioning the IPTV services to the subscriber based on the location of the subscriber.Type: ApplicationFiled: December 17, 2007Publication date: July 17, 2008Applicant: Alcatel LucentInventors: David ROBINSON, Andrey Kisel, Christiaan Schutte
-
Publication number: 20080172707Abstract: This invention is directed to a transmission system having a broadcast data synchronization and transmission system including a stream unit which detects group of pictures (GOP) positions of a Motion Picture Expert Group (MPEG) stream to be broadcasted on a television, and a shot/scene unit which sets and marks Extendible Markup Language (XML) TAG information in the corresponding GOP positions detected by the stream unit.Type: ApplicationFiled: March 24, 2008Publication date: July 17, 2008Inventor: Bae Guen Kang
-
Publication number: 20080172708Abstract: A high definition video transmitter and receiver are disclosed. The transmitter provides high definition video to a one-point receiver or to multipoint receivers. The transmission network is asynchronous and the receiver re-synchronizes the video. The transmission can be wired or wireless.Type: ApplicationFiled: September 7, 2007Publication date: July 17, 2008Applicant: Avocent Huntsville CorporationInventors: Jedd Perry, James Pursel, Lawrence Lo, Phil Kent, Bob Seifert, Luis Reyes, Jeff Fore, Wes Wirth, Doug Collins, John Hoskyn, Edwin Wong, Mike Straub, John Reed, Keith Schuettpelz, Karl Mills
-
Publication number: 20080172709Abstract: Provided are an apparatus and method for generating personal broadcast content. A user terminal apparatus includes a broadcast reception unit receiving broadcast content through a broadcast network; a communication unit controlling connection with a server which provides an authoring tool for generating personal broadcast content and metadata required to obtain one or more pieces of content through the broadcast network and a bi-directional communication network; a user input unit receiving a user input signal; and a control unit configuring a personal broadcast screen, which contains the content, using the authoring tool and the metadata and generating personal broadcast content in response to the user input signal. When the apparatus and method are used, a user can generate personal broadcast content using content which can be obtained through a bi-directional communication channel and a broadcast channel.Type: ApplicationFiled: January 16, 2008Publication date: July 17, 2008Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ga-hyun RYU, Kyung-sun CHO, Sun-hee YOUM, Sung-il PARK, Jong-hwa KIM
-
Publication number: 20080172710Abstract: Provided is a method of improving a channel switching speed in a digital television (TV) receiver. The method includes: generating transport stream packets by channel tuning and demodulating a broadcasting signal of a channel selected by the channel change instruction; outputting the transport stream packets before completion of tuning and demodulating of the broadcast signal; and generating video and/or audio data by demultiplexing and decoding the outputted transport stream packets. In addition, a digital TV receiver applying the improvement of the channel switching speed is provided. The digital TV receiver includes a tuning and demodulating unit generating transport stream packets by tuning and demodulating a broadcasting signal of a broadcasting channel selected by a channel change instruction and outputting the transport stream packets before completion of the tuning and demodulation of the transport stream packets.Type: ApplicationFiled: July 17, 2007Publication date: July 17, 2008Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Hee-beom KANG, Kang-wook CHUN, Choon-sik JUNG
-
Publication number: 20080172711Abstract: Disclosed is a video/audio transmitter which frequency-converts a video input signal and an audio input signal into a signal on one channel in a frequency band for a television broadcast and transmits the frequency-converted video input signal and the frequency-converted audio input signal. The video/audio transmitter includes an antenna, an FM reception circuit, a frequency synthesizer, an FM reception circuit, a video transmission circuit, and an operation mode designation circuit. An unused channel among broadcast channels in other frequency bands is searched for using the FM reception circuit. Next, a video input signal and an audio input signal are frequency-converted into a signal in a searched unused channel.Type: ApplicationFiled: September 24, 2007Publication date: July 17, 2008Applicant: NEC AccessTechnica, Ltd.Inventors: MASAHIDE ISHINO, Kimihiko Nakaya
-
Publication number: 20080172712Abstract: The multimedia data transmitting apparatus according to the present invention includes: a message receiving unit which receives a request message including a transmission start requested position and a transmission end requested position; a transmission position adjustment unit which performs at least one of a first adjustment process of adjusting the transmission start position to a boundary of a unit of encryption immediately ahead of the transmission start requested position or to a position ahead of the boundary, and a second adjustment process of adjusting the transmission end position to a boundary of a unit of encryption immediately behind the transmission end requested position or to a position behind the boundary; a data transmitting unit which transmits, to a terminal, multimedia data from the adjusted transmission start position up to the adjusted transmission end position, and first information indicating the transmission start requested position and the transmission end requested position withinType: ApplicationFiled: January 10, 2008Publication date: July 17, 2008Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.Inventor: Toshihiko MUNETSUGU
-
Publication number: 20080172713Abstract: A network security enforcement system includes a central location adapted to send a challenge; and at least one client station, each of the client stations being provided with an agent and being in communication with the central location. The system includes a set of S independent one-time passwords, each of the one-time passwords being associated with an index value. In response to a challenge sent by the central location to at least one of the client station, the agent returns a one-time password to the central location corresponding to the correct response otherwise the central location considers the client station insecure.Type: ApplicationFiled: June 16, 2005Publication date: July 17, 2008Inventors: Guy-Armand Kamendje, Christian Richard
-
Publication number: 20080172714Abstract: A method for model, based verification of security policies for web service composition. The method includes corresponding to a verification generated by an information Row analysis. The method further includes obtaining an abstracted security qualifier. The method proceeds by presenting the abstracted security qualifier to an application model. The abstracted, security qualifier being presented to the application model as a security requirement. Subsequently, the method proceeds by farther including removing the data security requirement on data utilized in the service from the compliance rule. The method proceeds by processing flow in the application model, such processing being based upon the data security requirement. The method further includes verifying the consistency in response to the processing flow.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kouichi Ono, Yuhichi Nakumura, Fumiko Satoh, Takaaki Tateishi
-
Publication number: 20080172715Abstract: A portable processing device or system may permit a user to access a resource when a certain number of keys are present, according to an authentication policy and a context in which the certain number of keys are provided. In some contexts fewer or no keys may be required, while in other contexts more keys may be required. The authentication policy may be adaptable, such that a precautionary action may be taken when a previously unused combination of keys and a context are used. Further, the authentication policy may require a fewer number of keys close to a time of a last successful authentication and may require a larger number of keys as time passes since the last successful authentication. In some embodiments, a type of visual feedback of entered password text may change based on a security level.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Avi Rom Geiger, Brian Meredith Wilson, Jonathan David Friedman, Arnold Milton Lund, Kanchen Rajanna
-
Publication number: 20080172716Abstract: Customizable software provides assurances about the ability of an IP network to satisfy security, regulatory and availability requirements by comprehensive vulnerability and compliance assessment of IP networks through automated analysis of configurations of devices such as routers, switches, and firewalls. The solution comprises three main approaches for testing of IP device configurations to eliminate errors that result in vulnerabilities or requirements compliance issues. The first two fall in to the “static constraint validation” category since they do not change significantly for each IP network, while the last approach involves incorporation of each specific IP network's policies/requirements. These approaches are complementary, and may be used together to satisfy all the properties described above. The first approach involves checking the configurations of devices for conformance to Best-Current-Practices provided by vendors (e.g.Type: ApplicationFiled: September 12, 2007Publication date: July 17, 2008Inventors: Rajesh Talpade, Sanjai Narain, Yuu-Heng Cheng, Alexander Poylisher
-
Publication number: 20080172717Abstract: An information management system is described comprising one or more workstations running applications which allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or has just received from the network, and which determines an appropriate action to take regarding that data. The analyzer may consult policy data containing a supervisor-defined policy to govern the workstations in order to determine what action to take.Type: ApplicationFiled: December 17, 2007Publication date: July 17, 2008Inventor: Peter Malcolm
-
Publication number: 20080172718Abstract: Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager packages content into fragments and generates a manifest including policies and metadata associated with the content. A downloader obtains the manifest, and uses it to obtain the content from one or more uploaders. For example, a downloader might forward a search request to one or more trackers, which, in turn, are operable to locate one or more uploaders that can meet the request, subject to any relevant policy limitations. The uploaders forward fragments to the downloader, subject to any relevant policy. The downloader assembles the content from the fragments. The operations and interactions of the entities can be subject to policy limitations associated with the fragments, the content as a whole, or the like.Type: ApplicationFiled: January 17, 2008Publication date: July 17, 2008Inventor: William Benjamin Bradley
-
Publication number: 20080172719Abstract: The present invention discloses a method for realizing accurate billing in digital rights management, including: sending, by a rights issuing system, to a Device a rights object acquisition response message including a rights object; sending, by the Device, a rights object acquisition acknowledgement message to the rights issuing system, after validation of the rights object acquisition response message is passed; and initiating, by the rights issuing system, a billing function after receiving the rights object acquisition acknowledgement message. The invention also discloses an apparatus and a rights issuing system. With the inventive method and system, billing will be initiated only in the event that the Device has obtained the rights object successfully or has joined the domain successfully, thereby avoiding effectively the problem of billing error and improving the Quality of Service.Type: ApplicationFiled: March 3, 2008Publication date: July 17, 2008Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Jianyu ZHANG, Donghang Chen
-
Publication number: 20080172720Abstract: Methods, apparatus, and products for administering access permissions for computer resources that include: establishing, for active access permissions for a computer resource for a user, proposed alternative access permissions for the computer resource for the user; receiving, in an access control module of an operating system from the user, a request for access to the resource; determining, by the access control module, whether to grant access to the resource for the request in accordance with the active access permissions for the computer resource for the user; determining, by the access control module, whether access would have been granted for the request in accordance with the proposed alternative access permissions for the resource for the user; and recording, by the access control module, the result of the determination whether access would have been granted.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Inventors: Patrick S. Botz, Daniel P. Kolz, Garry J. Sullivan
-
Publication number: 20080172721Abstract: An Internet access time control method using an authentication assertion is provided. In the method, a user ID is registered in an asserting party site in a single sign-on (SSO) environment by using a user terminal. The asserting party site manages user IDs for providing an SSO service. Control setup values are set in the asserting party site by using the user terminal. Here, the control setup values include an Internet usage duration and an Internet access-restricted time band for the user. A service time of a relying party site accessed by the user terminal is controlled according to an authentication assertion containing the control setup values. Accordingly, the method makes it possible not only to control Internet usage time, but also to prevent the child from unreasonably using the Internet.Type: ApplicationFiled: February 24, 2005Publication date: July 17, 2008Inventors: Jong Hyouk Noh, Taesung Kim, Seung Hyun Kim, Dae Seon Choi, Sang Rae Cho, Yeong Sub Cho, Seung Hun Jin
-
Publication number: 20080172722Abstract: According to a cable installation support and management system of the present invention, each worker downloads the operation information which supports operations on cables authorized for use onto the portable terminal carried by the worker, the operation information being associated in advance with cable identification information and provided by the server. Then, the worker reads the cable identification information about a cable from the cabling data card attached to the end of the cable using the reading device of the portable terminal. Based on the cable identification information, the worker acquires operation information about the appropriate cable from the downloaded operation information and displays the acquired operation information on the display device of the portable terminal. This allows the worker to perform necessary operations by referring to the operation information displayed on the display device.Type: ApplicationFiled: January 2, 2008Publication date: July 17, 2008Applicant: HITACHI PLANT TECHNOLOGIES, LTD.Inventors: Hirotaka FUJITA, Sozo SAKATA, Kou FUKUI
-
Publication number: 20080172723Abstract: A method of collecting data in a lock system. The method includes providing each user with a credential that contains user information, presenting the credential at an off-line access point, and reading the user information from the credential. The method also includes analyzing the user information at the first off-line access point to determine if access to the first off-line access point should be allowed, sending event data from the off-line access point to the credential, and selectively overwriting existing event data and storing the sent event data on the credential. The invention further includes presenting the credential at an on-line access point and reading the user data and reading the event data.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Inventors: Dominic Pesapane, Michael Cote, Gary Lavelle
-
Publication number: 20080172724Abstract: A receiving unit receives authentication information unique to a terminal device with identification information from the terminal device. An authenticating unit authenticates the terminal device based on the authentication information. An acquiring unit acquires setting information for relaying a communication between a plurality of terminal devices, which is associated with the identification information of an authenticated terminal device from the storing unit. A transmitting unit transmits the setting information to the relay apparatus via a number of communication paths determined in advance, which is smaller than the number of terminal devices.Type: ApplicationFiled: August 17, 2007Publication date: July 17, 2008Inventors: Naoki Esaka, Yoshimichi Tanizawa
-
Publication number: 20080172725Abstract: A client apparatus transmits environmental information acquired from an environmental information acquisition device as well as a biometric authentication information matching result to a server apparatus. The server apparatus verifies the validity of the environmental information such as a luminance as well as the validity of the biometric authentication information matching result. If an environment is problematic, the server apparatus notifies the client apparatus that the environmental information is problematic. The client apparatus overcomes the problem of the environment such as the luminance based on the notification from the server apparatus and then retries a biometric authentication. The possibility of re-failure due to the environmental problem can be reduced during a retry of the biometric authentication.Type: ApplicationFiled: January 3, 2008Publication date: July 17, 2008Inventors: Yoshihiro FUJII, Minoru Nishizawa, Tatsuro Ikeda, Koji Okada, Tomoaki Morijiri, Hidehisa Takamizawa, Asahiko Yamada
-
Publication number: 20080172726Abstract: Tracking data operations associated with unauthenticated computing devices to enable subsequent identification and remediation thereof. In embodiments in which one computing device has to trust another computing device without authenticating the other computing device, a machine identifier and a credential group value are associated with data operations in communications from the unauthenticated computing device. The data operations may be subsequently identified based on the machine identifier and credential group value. Remedial action may be taken on the identified data operations to restore data integrity.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: MICROSOFT CORPORATIONInventors: John Leo Ellis, Ashutosh Badwe
-
Publication number: 20080172727Abstract: A system and method for using a declarative approach to enforce instance based security in a distributed environment is presented. The invention described herein includes security logic in declarative specifications that, in turn, decouples the security logic from distributed object administration logic. An access manager identifies access requirements by combining object name property keys included in a distributed object with property key specifications included in a declarative specification. In turn, the access manager compares a caller's access attributes with the access requirements to determine whether to create a distributed object instance and allow the caller to invoke a method on the distributed object instance. The access requirements may also include role specifications and method parameter specifications.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Inventors: Michael Cheng, Vishwanath Venkataramappa, Tom Zhongyu Zhou
-
Publication number: 20080172728Abstract: A method and apparatus are provided for authenticating a user attempting to establish a service which uses SIP. The user registers with the SIP server by providing the digital otoacoustic signature of the user. Thereafter, when the user attempts to initiate a session through the SIP server, the SIP server sends an Authorization Request message to the SIP client of the user. The SIP client reads the user's digital otoacoustic signature, generates a response based on the digital otoacoustic signature, and embeds the response in a second Invite message sent back to the SIP server. Meanwhile, the SIP server determines an expected response, based on the digital otoacoustic signature registered by the user. If the response provided by the SIP client matches the response expected by the SIP server, the SIP server allows establishment of the server.Type: ApplicationFiled: January 17, 2007Publication date: July 17, 2008Applicant: ALCATEL LUCENTInventors: Vinod Kumar Choyi, Bertrand Marquet
-
Publication number: 20080172729Abstract: An authentication device receives each authentication context including an output information block, an input information block, and an authenticator block. The output information block includes a process result and process result identification information. The input information block includes a process result and process result identification information. The authentication device verifies each authenticator block. The authentication device searches for the output information block having the same value of process result identification information as the value of process result identification information in the input information block from other authentication contexts based on process result identification information in the input information block included in each authentication context.Type: ApplicationFiled: August 17, 2007Publication date: July 17, 2008Inventors: Hidehisa TAKAMIZAWA, Asahiko YAMADA, Tomoaki MORIJIRI, Koji OKADA, Tatsuro IKEDA, Minoru NISHIZAWA, Yoshihiro FUJII
-
Publication number: 20080172730Abstract: A user instruction communicated over a communications network via a first communication channel to a relying entity for action, is confirmed by having a trusted entity receive verification information corresponding to the communicated user instruction from the user over the network via a second communication channel and/or verification information corresponding to a received user instruction from the relying entity via a third communication channel. If verification information is received from only the user, it is communicated to the relying entity. If from both, the trusted entity verifies the received user instruction based on the received verification information. If from only the relying entity, it is communicated to the user.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Applicant: TRICIPHER, INC.Inventors: Ravinderpal Singh Sandhu, Ravi Ganesan
-
Publication number: 20080172731Abstract: Systems for providing information on network firewall policy configuration facilitation include a firewall facilitation coordinator configured to receive a request to add an application not currently supported by a user's firewall policy, and to generate a time window during which a user can run the application and observe which types of packets are utilized by the application. A policy modification agent associated with the firewall is configured to communicate with the firewall facilitation coordinator. The policy modification agent is further configured to receive a firewall modification request from the firewall facilitation coordinator, to accomplish the observation of packets flowing through the firewall during the time window, and to subsequently modify the user's firewall policy such that the application is able to communicate as needed through the firewall, rather than being blocked. Other systems and methods are also provided.Type: ApplicationFiled: February 4, 2008Publication date: July 17, 2008Inventor: Jeffrey A. Aaron
-
Publication number: 20080172732Abstract: A system for ensuring quality of service (QoS) in a virtual private network and a method thereof are provided. The system includes a logical bearer network, which is formed by connecting label switch paths configured with preserving bandwidth to routers, and is dedicated to transmit QoS service data; and a bearer control network, which is used to maintain logical bearer network, allocate route, mark service priority, and route service data to opposite end. The method includes the steps of: A. constructing a logical bearer network to transmit QoS service data by configuring label switch paths with preserved bandwidth; B. providing a centralized resource controller to manage resources of the logical bearer network; C. if QoS service data is to be transmitted, marking service priority in QoS field of the routing labels of multi-protocol label switch data packets, and routing service data to the opposite end.Type: ApplicationFiled: January 12, 2005Publication date: July 17, 2008Inventors: Defeng Li, Guoping Li, Bin Li
-
Publication number: 20080172733Abstract: The instant invention relates to a method and system for identifying and verifying a user seeking access to a secured workstation. The inventive procedure comprising the following acts. First, the first personal identification data (PIDS) within a wireless identification device is spontaneously detected by a secure workstation when located within a predetermined proximity. Next, at least one database accessible to the workstation is queried to retrieve the first personal identification data set and a second PIDS. The second PIDS contains biometric data corresponding to the user. Once the biometric data from the user is obtained at the point of transaction it is compared with the second PIDS to verify the identity of user. If there is a match, the user is permitted access to the secured workstation.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Inventors: David Coriaty, Craig Casey
-
Publication number: 20080172734Abstract: There is described an information processing apparatus, which makes it possible to prevent a third party from stealing and using data owned by the correctly access-authorized person, so as to securely control the data concerned. The information processing apparatus includes: a data storage section to store data; an acquiring section to acquire positional information of an access-authorized person and a control section to determine whether or not an accessing operation for accessing to the data stored in the data storage section should be allowed, based on a determined result thereof. When the external terminal device tries to access into the data stored in the data storage section or the storing area of the data, the control section transmits a request of inputting authentication information to the external terminal device, in order to determine whether or not the accessing operation to be conducted by the external terminal device should be allowed.Type: ApplicationFiled: December 20, 2007Publication date: July 17, 2008Inventors: Yasuaki SUGIMOTO, Takeshi Nakajima
-
Publication number: 20080172735Abstract: A system and method for providing an alternate keypad arrangement in a virtual keypad is presented. In the alternate keypad arrangement, the virtual keys are laid out in a non-sequential arrangement. In one embodiment, the labels displayed on the virtual keys appear sequential, however the values registered when the user presses the virtual key does not match the label and, hence, the values are laid out in a non-sequential manner. Using alternate keypad arrangements arranged in patterns enables the user to use a common pattern, or patterns easily remembered by the user, for a wide variety of authentication data used to access a wide variety of systems. Rather than remembering the specific PIN codes and passwords, the user simply remembers a pattern and selects virtual keys that match the pattern.Type: ApplicationFiled: March 15, 2008Publication date: July 17, 2008Inventors: Jie Jenie Gao, Charles Ray Johns, Michael Fan Wang
-
Publication number: 20080172736Abstract: Methods, computer program products, and systems advertise multi-installer programs in a local system context with single installer deployment. A method involves initiating in a local system a custom action associated with a core installer of a multi-installer program, finding a satellite installer associated with the core installer, and gathering data associated with the local system on which the multi-installer program is to be advertised. The method also involves scheduling another custom action for later execution to advertise the satellite installer, spawning from within the custom action the other custom action by leveraging privileges associated with installing the core installer on the local system, impersonating a target user of the local system, accessing pre-generated scripts associated with the satellite installers, and advertising the satellite installers via the local system.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Paul C. Barr, Nnaemeka M.C. Nduaguba
-
Publication number: 20080172737Abstract: A method and system for providing secure access to a patient's medical records. In one embodiment, an access authorization account is received that specifies access parameters relating to the patient's medical records. The access authorization account specifies: an authorized user identification that specifies one or more user identification codes that may be utilized to access the patient's medical records; content scope authorization that specifies the scope of data content within the patient's medical records that is accessible using the authorized user identification; content access authorization that specifies the extent to which the accessible data content is modifiable using the authorized user identification; and an access period that specifies an access termination time. The access authorization account is processed by an access manager to determine and implement limited access to the patient's medical records.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Inventors: Jinmei Shen, Hao Wang
-
Publication number: 20080172738Abstract: A method for verifying the validity of a hyperlink, and determining whether the domain name of the website that the user is directed to is valid. In one embodiment, the method identifies a hyperlink, a URL within the hyperlink and a domain name within the URL. The identified domain name is then assigned a page rank parameter. If the page rank parameter is below a threshold value, then the method compares the identified domain name to a list of well-known or high page rank domain names. A similarity parameter is then assigned to the identified domain name to indicate if the hyperlink is misleading. If the link is misleading, the method may implement some configurable remedial action, such as alerting the user or disabling the hyperlink.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Inventors: Cary Lee Bates, James Edward Carey, Jason J. Illg