1461177504-451f9931-4c2c-43c9-b16b-9f66324512c0

1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
detecting a network intrusion event for a network caused at least by a particular device;
responsive to detecting the network intrusion event:
estimating a current physical location of the particular device;
based on the current physical location, estimating one or more predicted locations of the particular device; and
processing a video stream comprising images of the estimated one or more predicted locations of the particular device.
2. The medium of claim 1, wherein the network intrusion event comprises a client device with a particular role connecting to an access point, wherein no client devices with the particular role are expected to connect to the access point.
3. The medium of claim 1, wherein the one or more predicted locations correspond to one or more physical pathways by which a device, causing the network intrusion, may exit a physical environment from the current physical location.
4. The medium of claim 1, wherein the one or more predicted locations are estimated based on the current physical location and a detected direction of travel of the particular device.
5. The medium of claim 1, wherein the one or more predicted locations comprise one or more of: a high security zone near the current physical location of the particular device, a high priority zone near the current physical location of the particular device, or a second current physical location for an individual near the current physical location of the particular device.
6. The medium of claim 1, wherein processing the video stream comprises activating at least one video camera associated with the one or more predicted locations.
7. The medium of claim 1, wherein processing the video stream comprises prioritizing data for the video stream over other data on the network.
8. The medium of claim 1, wherein processing the video stream comprises selecting the video stream for presentation to one or more users.
9. The medium of claim 1, wherein processing the video stream comprises storing a portion of the video stream, that includes images of the one or more predicted locations, separately from other portions of the video stream.
10. The medium of claim 1, wherein processing the video stream comprises transmitting a portion of the video stream, that includes images of the one or more predicted locations, on a separate network data path than other portions of the video stream.
11. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
detecting a network intrusion event for a network caused at least by a particular device;
responsive to detecting the network intrusion event:
determining one or more physical locations associated with the particular device;
processing video data collected by a surveillance system using one or more of a plurality of video processing steps that are selected for each particular portion of the video data based on whether or not that particular portion corresponds to the one or more physical locations.
12. The medium of claim 11, wherein processing the video data comprises discarding portions of the video data that do not correspond to the one or more physical locations and storing portions of the video data that correspond to the one or more physical locations.
13. The medium of claim 11, wherein processing the video data comprises processing portions of the video data that do not correspond to the one or more physical locations with a first priority and processing portions of the video data that correspond to the one or more physical locations with a second priority, wherein the second priority is higher than the first priority.
14. The medium of claim 11, wherein processing the video data comprises selecting the portions of the video data that correspond to the one or more physical locations for display to one or more users and refraining from selecting the portions of the video data that do not correspond to the one or more physical locations.
15. The medium of claim 11, wherein processing the video data comprises storing portions of the video data that do not correspond to the one or more physical locations separately from portions of the video data that correspond to the one or more physical locations.
16. The medium of claim 11, wherein processing the video data comprises transmitting portions of the video data that correspond to the one or more physical locations without transmitting portions of the video data that do not correspond to the one or more physical locations.
17. The medium of claim 11, wherein processing the video data comprises transmitting portions of the video data that correspond to the one or more physical locations on a first network data path and transmitting portions of the video data that do not correspond to the one or more physical locations on a second network data path that is different than the first network data path.
18. The medium of claim 11, wherein the one or more physical locations comprise (a) a current physical location of the particular device andor (b) a predicted physical location of the particular device.
19. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
determining that a first device is travelling toward a particular location;
responsive to determining that the first device is travelling toward the particular location, obtaining a video stream associated with the particular location; and
presenting the video stream on the first device.
20. The medium of claim 19, wherein determining that the first device is travelling toward a particular location comprises detecting that a signal strength of signals received by a second device, located at the particular location, from the first device is increasing.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method of profiling a computer program, comprising the steps of:
using a utility application to execute the computer program;
on the basis of said execution of the computer program, identifying specific performance requirements of the computer program;
determining a profile of the computer program from said identified performance requirements; and
based on said determined profile, selecting resources for the computer program from a grid of computer services.
2. A method according to claim 1, wherein said specific performance requirements are selected from the group including: memory allocation requirements, IO intensiveness, network usage, CPU, and math operation.
3. A method according to claim 1, wherein the step of selecting resources includes the steps of:
presenting selected parameters of the computer program to an administrator; and
said administrator having an option to override any particular selection of resources.
4. A method according to claim 3, wherein the step of selecting resources includes the further step of said administrator defining a relative priority for the distribution of resources from the grid.
5. A method according to claim 1, wherein the step of using the utility application includes the step of using the utility application to build a configuration file for the computer program.
6. A method according to claim 1, wherein the computer program has an associated configuration file that provides application specific data needed to execute the application using services from the grid.
7. A system for profiling a computer program, comprising:
a utility application to execute the computer program;
means, acting on the basis of said execution of the computer program, for identifying specific performance requirements of the computer program;
means for determining a profile of the computer program from said identified performance requirements; and
means using said determined profile, to select resources for the computer program from a grid of computer services.
8. A system according to claim 7, wherein said specific performance requirements are selected from the group including: memory allocation requirements, IO intensiveness, network usage, CPU, and math operation.
9. A system according to claim 7, wherein the means to select resources includes:
means for presenting selected parameters of the computer program to an administrator; and
means providing said administrator with an option to override any particular selection of resources.
10. A system according to claim 9, wherein the means to select resources further includes means to enable said administrator to define a relative priority for the distribution of resources from the grid.
11. A system according to claim 7, wherein the utility application includes means to build a configuration file for the computer program.
12. A system according to claim 7, wherein the computer program has an associated configuration file that provides application specific data needed to execute the application using services from the grid.
13. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for profiling a computer program, said method steps comprising:
using a utility application to execute the computer program;
on the basis of said execution of the computer program, identifying specific performance requirements of the computer program;
determining a profile of the computer program from said identified performance requirements; and
based on said determined profile, selecting resources for the computer program from a grid of computer services.
14. A program storage device according to claim 13, wherein said specific performance requirements are selected from the group including: memory allocation requirements, IO intensiveness, network usage, CPU, and math operation.
15. A program storage device according to claim 13, wherein the step of selecting resources includes the steps of:
presenting selected parameters of the computer program to an administrator; and
said administrator having an option to override any particular selection of resources.
16. A program storage device according to claim 15, wherein the step of selecting resources includes the further step of said administrator defining a relative priority for the distribution of resources from the grid.
17. A program storage device according to claim 13, wherein the step of using the utility application includes the step of using the utility application to build a configuration file for the computer program.

1461177492-972ce582-ee25-4749-93b4-a2db3015b54f

1. A method of transmitting rights object information between a device and a portable storage, which is performed by the portable storage, the method comprising:
receiving a request from the device;
generating a current permission status format including information of a rights object designated by the request; and
transmitting the current permission status format to the device.
2. The method of claim 1, wherein the request is one of a request for permission information of the rights object, a request for playback of a particular content, and a request for update of the rights object.
3. The method of claim 2, wherein the generating the current permission status format comprises:
finding the rights object;
determining a type of the rights object; and
generating the current permission status format that includes the permission information of the rights object according to the type of the rights object.
4. The method of claim 3, wherein the current permission status format comprises a content ID field for a content ID identifying an encrypted content that can be played back using the rights object, a content encryption key (CEK) field for a CEK used to decrypt the encrypted content, a message digest field for a message digest value for integrity of transmitted data, and a permission information field for the permission information of the rights object.
5. The method of claim 4, wherein if the request received from the device is the request for the permission information of the rights object or the request for update of the rights object, the CEK field is set to a null value.
6. The method of claim 4, wherein if the type of the rights object is a general rights object, the current permission status format comprises at least one permission information field, and the permission information field comprises type information indicating that the rights object is a general rights object, a rights object index for identifying the rights object in the portable storage, a permission index for identifying a type of permission, constraint information of the permission, and a number of constraint information items.
7. The method of claim 4, wherein if the type of the rights object is a child rights object, the CEK field and the message digest field are set to a null value, and the permission information field comprises type information indicating that the rights object is a child rights object, a parent rights object ID for identifying a parent rights object of the child rights object, and an address indicating a position of an issuer of the child rights object.
8. The method of claim 4, wherein if the type of the rights object is a parent rights object, the permission information field comprises type information indicating that the rights object is a parent rights object, a parent rights object ID for identifying the parent rights object, a permission index for identifying a type of permission set for the rights object, constraint information of the permission, and a number of constraint information items.
9. The method of claim 4, wherein if a general rights object and a child rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the child rights object.
10. The method of claim 4, wherein if a general rights object and a parent rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the parent rights object.
11. The method of claim 1, wherein the current permission status format is transmitted between the device and the portable storage using an application protocol data unit comprises an encrypted send sequence counter indicating a send sequence of the application protocol data unit and encrypted data to be transmitted.
12. A method of transmitting rights object information between a device and a portable storage, which is performed by the device, the method comprising:
transmitting a request to the portable storage; and
receiving a current permission status format including information of a rights object designated by the request from the portable storage.
13. The method of claim 12, wherein the request is one of a request for permission information of the rights object, a request for playback of a particular content, and a request for update of the rights object.
14. The method of claim 13, wherein the current permission status format comprises a content ID field for a content ID identifying an encrypted content that can be played back using the rights object, a content encryption key (CEK) field for a CEK used to decrypt the encrypted content, a message digest field for a message digest value for checking integrity of transmitted data, and a permission information field for the permission information of the rights object.
15. The method of claim 14, wherein if the request transmitted to the portable storage is the request for the permission information of the rights object or the request for update of the rights object, the CEK field is set to a null value.
16. The method of claim 14, wherein if the rights object is a general rights object, the current permission status format comprises at least one permission information field, and the permission information field comprises type information indicating that the rights object is a general rights object, a rights object index for identifying the rights object in the portable storage, a permission index for identifying a type of permission, constraint information of the permission, and a number of constraint information items.
17. The method of claim 14, wherein if the rights object is a child rights object, the CEK field and the message digest field are set to a null value, and the permission information field comprises type information indicating that the rights object is a child rights object, a parent rights object ID for identifying a parent rights object of the child rights object, and an address indicating a position of an issuer of the child rights object.
18. The method of claim 14, wherein if the rights object is a parent rights object, the permission information field comprises type information indicating that the rights object is a parent rights object, a parent rights object ID for identifying the parent rights object, a permission index for identifying a type of permission set for the rights object, constraint information of the permission, and a number of constraint information items.
19. The method of claim 14, wherein if a general rights object and a child rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the child rights object.
20. The method of claim 4, wherein if a general rights object and a parent rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the parent rights object.
21. The method of claim 1, wherein the current permission status format is transmitted between the device and the portable storage using an application protocol data unit comprising an encrypted send sequence counter indicating a send sequence of the application protocol data unit and encrypted data to be transmitted.
22. A recording medium having a computer readable program recorded therein, the program executing a method of transmitting rights object information between a device and a portable storage, which is performed by the portable storage, the method comprising:
receiving a request from the device;
generating a current permission status format including information of a rights object designated by the request; and
transmitting the current permission status format to the device.
23. A recording medium having a computer readable program recorded therein, the program executing a method of transmitting rights object information between a device and a portable storage, which is performed by the device, the method comprising:
transmitting a request to the portable storage; and
receiving a current permission status format including information of a rights object designated by the request from the portable storage.
24. A portable storage comprising:
an interface module which is connectable to a device for communication;
a storage module which stores a rights object;
a control module which determines whether to generate a current permission status format according to a request received from the device through the interface module; and
a data format generation module which searches the storage module to find a rights object designated by the request, and generates the current permission status format including information of the rights object according to a result of the determination performed by the control module.
25. The portable storage of claim 24, wherein if the request is one of a request for permission information of the rights object, a request for playback of a particular content, and a request for update of the rights object, the control module determines to generate the current permission status format.
26. The portable storage of claim 25, wherein the current permission status format comprises a content ID field for a content ID identifying an encrypted content that can be played back using the rights object, a content encryption key (CEK) field for a CEK used to decrypt the encrypted content, a message digest field for a message digest value for integrity of transmitted data, and a permission information field for the permission information of the rights object.
27. The portable storage of claim 26, wherein if the request received from the device is the request for the permission information of the rights object or the request for update of the rights object, the data format generation module sets the CEK field to a null value.
28. The portable storage of claim 26, wherein if the rights object is a general rights object, the current permission status format comprises at least one permission information field, and the permission information field comprises type information indicating that the rights object is a general rights object, a rights object index for identifying the rights object in the portable storage, a permission index for identifying a type of permission, constraint information of the permission, and a number of constraint information items.
29. The portable storage of claim 26, wherein if the rights object is a child rights object, the CEK field and the message digest field are set to a null value, and the permission information field comprises type information indicating that the rights object is a child rights object, a parent rights object ID for identifying a parent rights object of the child rights object, and an address indicating a position of an issuer of the child rights object.
30. The portable storage of claim 26, wherein if the rights object is a parent rights object, the permission information field comprises type information indicating that the rights object is a parent rights object, a parent rights object ID for identifying the parent rights object, a permission index for identifying a type of permission set for the rights object, constraint information of the permission, and a number of constraint information items.
31. The portable storage of claim 26, wherein if a general rights object and a child rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the child rights object.
32. The portable storage of claim 26, wherein if a general rights object and a parent rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the parent rights object.
33. The portable storage of claim 24, wherein an application protocol data unit for communication with the device connected to the interface module comprises an encrypted send sequence counter indicating a send sequence of the application protocol data unit and encrypted data to be transmitted.
34. A device comprising:
an interface module which is connectable to a portable storage for communication; and
a control module which generates a request to be transmitted to the portable storage through the interface module, and obtains information of a rights object designated by the request from a current permission status format that includes the information of the rights object and is received through the interface module in response to the request.
35. The device of claim 34, wherein the request is one of a request for permission information of the rights object, a request for playback of a particular content, and a request for update of the rights object.
36. The device of claim 35, wherein the current permission status format comprises a content ID field for a content ID identifying an encrypted content that can be played back using the rights object, a content encryption key (CEK) field for a CEK used to decrypt the encrypted content, a message digest field for a message digest value for checking integrity of transmitted data, and a permission information field for the permission information of the rights object.
37. The device of claim 36, wherein if the request transmitted to the portable storage is the request for the permission information of the rights object or the request for update of the rights object, the CEK field is set to a null value.
38. The device of claim 36, wherein if the rights object is a general rights object, the current permission status format comprises at least one permission information field, and the permission information field comprises type information indicating that the rights object is a general rights object, a rights object index for identifying the rights object in the portable storage, a permission index for identifying a type of permission, constraint information of the permission, and a number of constraint information items.
39. The device of claim 36, wherein if the rights object is a child rights object, the CEK field and the message digest field are set to a null value, and the permission information field comprises type information indicating that the rights object is a child rights object, a parent rights object ID for identifying a parent rights object of the child rights object, and an address indicating a position of an issuer of the child rights object.
40. The device of claim 36, wherein if the rights object is a parent rights object, the permission information field comprises type information indicating that the rights object is a parent rights object, a parent rights object ID for identifying the parent rights object, a permission index for identifying a type of permission set for the rights object, constraint information of the permission, and a number of constraint information items.
41. The device of claim 36, wherein if a general rights object and a child rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the child rights object.
42. The device of claim 36, wherein if a general rights object and a parent rights object are found as the rights object, the permission information field comprises permission information of the general rights object and permission information of the parent rights object.
43. The method of claim 34, wherein an application protocol data unit for communication with the portable storage connected to the interface module comprises an encrypted send sequence counter indicating a send sequence of the application protocol data unit and encrypted data to be transmitted.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A cable management system, comprising:
a patch panel having a first connectivity interface configured to connect with cables; and
a wire manager located proximate said patch panel, said wire manager having a body with a curved interior contour defining a cavity configured to hold cables, said wire manager being oriented in a non-orthogonal relation to said patch panel such that said body extends at a non-orthogonal angle from said first connectivity interface.
2. The cable management system of claim 1, wherein said patch panel and said wire manager extend along a common non-linear path.
3. The cable management system of claim 1, wherein said patch panel and wire manager extend along a common circular arc.
4. The cable management system of claim 1, further comprising a pair of wire managers mounted on opposite sides of said patch panel, said pair of wire managers and said patch panel forming a C-shape.
5. The cable management system of claim 1, wherein said patch panel and wire manager are joined to one another to be free-standing independent of a frame.
6. The cable management system of claim 1, wherein said wire manager and patch panel include adjoining sides that abut against one another, said adjoining sides extending along a radial axis through a center of the cable management system.
7. The cable management system of claim 1, wherein said body of said wire manager includes a convex back wall that bows into an interior cavity of said body.
8. The cable management system of claim 1, wherein said body of said wire manager includes back, side and front walls formed integral with one another, said side walls flaring outward from one another as said side walls extend from said back wall toward said front wall.
9. The cable management system of claim 1, wherein said body includes walls surrounding a cavity configured to hold cables, said walls having an semi-circular interior contour.
10. The cable management system of claim 1, further comprising a plurality of patch panels stacked on one another and first and second stacks of said wire managers provided along opposite sides of said plurality of patch panels.
11. The cable management system of claim 1, further comprising a plurality of said wire managers, each wire manager including a mounting post projecting transversely in one direction from said body and a post receptacle opening transversely in an opposite second direction from said body, said mounting posts and post receptacles on adjacent being configured to mate when said plurality of said wire managers are stacked on one another.
12. The cable management system of claim 1, further comprising a frame, at least one of said patch panel and wire manager being mounted to said frame.
13. The cable management system of claim 1, further comprising a frame extending upward through said wire manager, wire manager being secured to said frame.
14. A wire manager for retaining cables in a cable management system having a connectivity interface configured to connect with cables, said wire manager comprising:
side walls, at least one of said side walls being configured to be located proximate the connectivity interface of the cable management system;
a front wall joined to said side walls; and
a back wall joined to said side walls, said front, back and side walls surrounding a cavity having a curved interior contour, said front and back walls extending at non-orthogonal angles from said side wall located proximate the connectivity interface such that said front and back walls extend at a non-orthogonal angle from the connectivity interface when the wire manager is located proximate the connectivity interface.
15. The wire manager of claim 14, wherein said front, back and side walls form a semi-circular interior contour about said cavity.
16. The wire manager of claim 14, wherein said side wall proximate the connectivity interface extends along a radial axis outward from a center of the cable management system.
17. The wire manager of claim 14, wherein said back wall is convex and bows into said cavity.
18. The wire manager of claim 14, wherein said back, side and front walls are formed integral with one another.
19. The wire manager of claim 14, wherein said side walls flare outward from one another as said side walls extend from said back wall toward said front wall.
20. The wire manager of claim 14, wherein at least one of said front, back and side walls further comprises a mounting post projecting transversely in one direction there from and a post receptacle opening transversely in an opposite second direction there from, said mounting post and post receptacle being configured to mate on adjoining wire managers when a plurality of wire managers are stacked on one another.
21. The wire manager of claim 14, further comprising a bracket on one of said side walls, said bracket being configured to be secured to a frame.
22. The wire manager of claim 14, further comprising an opening through one of said front, back and side walls to receive cables.