09th week of 2014 patent applcation highlights part 64 |
Patent application number | Title | Published |
20140059616 | ON SCREEN DISPLAYS ASSOCIATED WITH REMOTE VIDEO SOURCE DEVICES - In some embodiments, an apparatus includes interface circuitry to receive signals including video signals and drawing commands, and a command interpreter to receive the drawing commands and provide on screen display (OSD) signals in response to the drawing commands. Video processing circuitry processes the received video signals to provide processed video signals, and a blender to blend the OSD signals and the processed video signals to produce blended video signals including the OSD signals and the processed video signals. Other embodiments are described and claimed. | 2014-02-27 |
20140059617 | INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM WITH PAY PROGRAM PACKAGE PROMOTION - A system is provided that allows a user to select a pay program for purchase from a program guide. The program guide determines whether the selected program is part of a package of pay programs. If the selected program is part of a package, information regarding the package is provided to the user so that the user may decide whether to purchase the package. If the selected program is part of several packages, information for all packages is provided. The system automatically sets reminders for packages containing repetitive programming. The system monitors whether the user has watched any of the programs in such packages. When the user watches a program from the package, the remaining reminders are cancelled. If a user does not watch any programs in a package of any type, purchase of the package is cancelled and the user is provided with the opportunity to reschedule. | 2014-02-27 |
20140059618 | COMMUNICATION TRANSMISSION METHODS AND SYSTEMS - Communication transmission methods and systems are provided. Firstly, user equipment is configured to transmit a video service request. Then, a base station is configured to configure encoded data in each layer of SVC video data to different Multicast/Broadcast Single Frequency Networks for generating configuration information and broad the configuration information corresponding to each of the Multicast/Broadcast Single Frequency Networks to the user equipment according to the video service request. | 2014-02-27 |
20140059619 | Video and Digital Multimedia Aggregator Content Coding and Formatting - A video and digital multimedia aggregator includes a content decoder, coder (codec) and formatter. The codec formatter receives coding and formatting requests that characterize input source content and desired output target content. Data conveyed about the source and target content may include parameters such as physical and/or logical addresses, coding and compression parameters, format descriptions, content size, description of auxiliary services, and other metadata elements that may be required for coding and formatting. | 2014-02-27 |
20140059620 | VIDEO BUFFER MANAGEMENT TECHNIQUE - The video data buffering apparatus and associated methods provide audio and video data buffering in a video processing device. Specifically, the system relates to the use of a circular buffer and linked list FIFO employed in a video processing system, wherein video data packets from multiple video streams are stored in a common buffer to compensate for transport packet jitter. The apparatus and methods enable the system to store multiple QAM video stream packets in a common memory buffer. Linked list FIFOS are generated to identify the packets and their location within the common memory buffer. The linked list information is used to transfer the data between the common memory buffer and a modulator. | 2014-02-27 |
20140059621 | LIFE EVENT AUGMENTATION USING AN INTELLIGENT BEVERAGE CONTAINER - Systems, devices, and methods for live event augmentation are provided. A central server computer system detects intelligent beverage containers at an event. The beverage containers include an integrated electronic display. Extrinsic data is received during the course of the event that is used to generate a message. The message is transmitted to the beverage containers at the event to update the electronic display. The extrinsic data may be related to the event or to an activity occurring separate from the event. The electronic display of the beverage containers may be changed periodically during the event. The beverage containers may be divided into one or more groups based on information stored in a user account associated with each beverage container. Different messages can be sent to the different groups to display different information on the beverage containers of each group. | 2014-02-27 |
20140059622 | METHOD FOR SWAPPING SINK DEVICE AND APPARATUS FOR PROVIDING CONTENTS USING THE SAME - A method for converting a sink device and an apparatus for providing a content using the same are provided. The method for converting the sink device includes receiving a sink device conversion command from a first sink device, transmitting the content to a second sink device if a conversion approval of the sink device is received from the second sink device, and transmitting a control authority related to a content provision from the first sink device to the second sink device. | 2014-02-27 |
20140059623 | METHODS AND SYSTEMS FOR PROVIDING PROGRAMMING ON DEMAND TO A SMART DEVICE - A system and method for obtaining access to multimedia programming transmissions while residing in a temporary dwelling is provided. The temporary dwelling includes a smart docking station in which a smart device may be placed and operably connected. The smart docking station, which houses the smart device, is attached to a server located in a remote geographic location, or in a “cloud.” The smart docking station is operably connected to the remote server wirelessly or via hard wiring, and is able to receive multimedia programming content delivered from content providers. The movie or other multimedia programming may be streamed from a content provider to the smart docking station in the temporary dwelling, via the remote server, to be viewed/listened to on the smart device operably connected to the smart docking station. | 2014-02-27 |
20140059624 | CLIENT-SERVER BASED INTERACTIVE GUIDE WITH SERVER STORAGE - An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for recording on a remote media server. Programs may also be recorded on a local media server. The program guide provides users with VCR-like control over programs that are played back from the media servers and over real-time cached copies of the programs. The program guide also provides users with an opportunity to designate gift recipients for whom programs may be recorded. | 2014-02-27 |
20140059625 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-02-27 |
20140059626 | SYSTEMS AND METHODS FOR PROVIDING VIDEO ON DEMAND IN AN INTELLIGENT TELEVISION - An intelligent television can provide various interfaces for providing video-on-demand (VOD). The user interfaces include unique visual representations and organizations that allow the user to utilize the intelligent television more easily and more effectively. Particularly, the user interfaces pertain to the display of VOD content and better organizations thereof. Further, the user interfaces provide unique process of transitioning between the VOD content. | 2014-02-27 |
20140059627 | METHOD AND APPARATUS FOR HIGH BANDWIDTH DATA TRANSMISSION IN CONTENT-BASED NETWORKS - Methods and apparatus for delivering data over extant infrastructure within a content-based network. In one embodiment, the network comprises a cable network, and the infrastructure comprises that nominally used for on-demand (OD) services such as VOD. The method includes the allocation of dedicated end-to-end network resources via a “session request, as well as data flow control and packet size adaptation, by a data server based on feedback from the requesting/receiving client device (e.g., DSTB) within the network. Mechanisms for retransmission requests for error recovery are also provided. | 2014-02-27 |
20140059628 | Internet TV Module for Enabling Presentation and Navigation of Non-Native User Interface on TV Having Native User Interface Using Either TV Remote Control or Module Remote Control - A display device such as a TV has both HDMI and IP network interfaces and uses the HDMI interface to exchange IP network parameters with an audio video application module (AVAM) upon HDMI connection. In this way, an IP-based peer-to-peer or client-server network connection can be automatically established to promote faster communication when sharing and executing applications between the devices than is typically available over the CEC link of HDMI. | 2014-02-27 |
20140059629 | TWO-WAY BROADCAST SERVICE PROVIDING SYSTEM AND METHOD INCLUDING MEDIA TRANSMISSION APPARATUS - Two-way broadcast service providing system and method including a media transmission apparatus are provided. The media transmission apparatus includes a data communication interface that receives participant media from at least one participant terminal via a communication network, a media conversion unit that converts the participant media received through the data communication interface in accordance with a broadcast media standard, and a broadcast interface that transmits the participant media converted through the media conversion unit to a broadcast apparatus so that the participant media is included in broadcast contents. | 2014-02-27 |
20140059630 | APPARATUSES FOR PROVIDING AND RECEIVING AUGMENTED BROADCASTING SERVICE IN HYBRID BROADCASTING ENVIRONMENT - An apparatus for providing an augmented broadcasting service and an apparatus for receiving the augmented broadcasting service in a hybrid broadcasting environment. The apparatus for providing the augmented broadcasting service includes: a real-time data provider configured to provide real-time data through a first transmission network; an augmented content provider configured to provide augmented content through a second transmission network, wherein the augmented content is to be synchronized with the real-time data; and a multiplexer configured to multiplex the real-time data, the augmented content metadata and timing information for synchronization between the real-time data and the augmented content metadata, and output resulting data. | 2014-02-27 |
20140059631 | User Communication Management Center - The present invention provides integration of separate functions, such as television viewing, Internet television viewing, gaming, video recording, telephone call handling, etc. in a user friendly way. For example, a system for providing unified services may comprise a server system utilizing a universal open protocol that provides the capability for different service providers to offer services over unified cable/TV/Internet network independent technologically from particular network providers, and a plurality of client systems, each client system utilizing the protocol to provide integrated services to a user. | 2014-02-27 |
20140059632 | Integrated Cable Modem - The present invention is an integrated cable modem tuner. In one embodiment, the upstream path and the downstream path are integrated on a common semiconductor substrate. The down-stream path can include a TV tuner and digital receiver portion that is integrated on a common semiconductor substrate with the power amplifier of the upstream path. In another embodiment, the TV tuner is implemented on a first semiconductor substrate and the digital receiver portion and the power amplifier are configured on a second semiconductor substrate. However, the two substrates are mounted on a common carrier so that the cable modem appears to be a single chip configuration to the user. | 2014-02-27 |
20140059633 | DIGITAL BROADCASTING RECEIVER AND METHOD FOR CONTROLLING THE SAME - According to one embodiment, a method of processing broadcast data in a broadcast transmitter includes: encoding the broadcast data for broadcast service; encoding signaling information for signaling the broadcast data; assigning the encoded broadcast data and the encoded signaling information into a signal frame; and transmitting a broadcast signal including the signal frame. The broadcast signal further includes a signaling table having access information of the broadcast data. The signaling table includes service id information for identifying the broadcast service and component information for indicating a number of components in the broadcast service. | 2014-02-27 |
20140059634 | Mitigating Potential Video Traffic Interference - A method includes detecting, at a video head-end of a video distribution network, a signal populating an ultra high frequency white space frequency. The method includes determining that the ultra high frequency white space frequency is one of a plurality of ultra high frequency white space frequencies with a potential to interfere with video traffic at the video head-end. The method also includes sending an alert from the video head-end to a network management system. The alert indicates the potential of the signal to interfere with video traffic delivered via the video head-end. | 2014-02-27 |
20140059635 | MEDIA CENTER PANELS FOR AN INTELLIGENT TELEVISION - An Intelligent TV can organize metadata about media items for display in a variety of contextual panels. The panels may be interactive or informational and may provide recommendations of other media items to the user. The Intelligent TV can receive a request to activate a panel through the reception of signals from a remote control or a user interface. Based on the request, the Intelligent TV can determine the type of panel requested by the user. The layout, information, and content of a panel may depend on the context and content of the media item with focus when a user activates the panel. The Intelligent TV can retrieve metadata for the requested panel and can then transition to the desired panel and provide the retrieved metadata. | 2014-02-27 |
20140059636 | METHODS AND APPARATUS THAT SUPPORT ADDRESSABLE INTERACTIVE APPLICATIONS - Methods and apparatus for supporting targeted advertising and/or other targeted applications in set top boxes which use data and/or applications, e.g., EBIF (Enhanced TV Binary Interchange Format) applications, are described. Application level targeting is supported in which an application running on different STBs presents different application behavior and/or presents different visual sub-elements depending on the content of a subscriber profile on the particular individual STB. In the case of addressability at the Application Layer an EBIF application can target different viewers by checking private User Preference Items at runtime. Addressability at the signaling/platform level is also supported allowing targeting of a specific application or a sub-element within an application to a specific target group. In this scenario the particular applications/sub-elements are loaded on the set-tops that belong to a target group, e.g., satisfy targeting constraints specified in private targeting metadata that is received in an MPEG stream. | 2014-02-27 |
20140059637 | SILO MANAGER - An Intelligent TV having a silo manager, a panel manager and a panel controller. The various managers and controllers managing a global panel and an application panel. The global panel includes various types of information and the various types of input and content available. The global panel includes various information including, for example, Live TV information, on demand information, media center information, application information, HDMI 1 information, HDMI 2 information, HDMI 3 information, component 1 information, component 2 information, AV 1 information, AV 2 information, VGA information, as well as an option to hide undetected inputs. The application panel is dynamic and can optionally change based on one or more of context and content of the underlying application being viewed. The application panel can include various subcategories of information, with the number and type of the subcategories also capable of being dynamic based on the underlying context or content. | 2014-02-27 |
20140059638 | Integrated Laser And Modulator Transmitter For CATV Applications - A cable television (CATV) optical transmitter includes a tunable laser having a phase bias input and a gain bias input. The tunable laser generates an optical beam at an output. A semiconductor optical amplifier includes an electrical bias input and an optical input that is optically coupled to the output of the tunable laser. The semiconductor amplifier amplifies the optical beam generated by the tunable laser. An integrated balanced modulator includes an electrical modulation input that receives analog CATV signals and an optical input that is connected to the output of the semiconductor amplifier. A third order pre-distortion circuit includes an output that is electrically connected to a modulation input of the integrated balanced modulator. The 3 | 2014-02-27 |
20140059639 | Methods, Systems, and Products for Control of Devices - Methods, systems, and products control external devices during presentation of multimedia content. When a description of the multimedia content is received, the description includes control data for controlling an external device. The control data is stripped therefrom and sent to the external device to alter a presentation of the multimedia content | 2014-02-27 |
20140059640 | Adapting Network Policies Based on Device Service Processor Configuration - Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems. | 2014-02-27 |
20140059641 | AUTOMATED FEEDBACK FOR PROPOSED SECURITY RULES - A computer receives entry of a proposed security rule during a security rule entry or editing session and determines that the proposed security rule requires review of a type of security data. The number of matches of the proposed security rule to the logged security data is determined and a user is notified as to the number of matches. The computer searches the security data and applies the proposed security rule to the security data to determine the predicted performance of the proposed security rule. The computer generates a report that may include warnings, recommendations, and information correlated to the security data. The report is presented to a user during the rule editing session, and based on the report a modification to the proposed security rule can be made. | 2014-02-27 |
20140059642 | METHOD AND SYSTEM FOR FACILITATING ISOLATED WORKSPACE FOR APPLICATIONS - A system maintains a workspace environment of enterprise applications on a mobile device. The system receives enterprise applications for installation on the mobile device, wherein functionality has been inserted into binary executables of the enterprise applications to force the enterprise applications to communicate with an application management agent to obtain a security policy including a validity time period value related to keeping the workspace valid. The application management agent provides cryptographic keys to the enterprise applications to share encrypted messages. Upon launching, an enterprise application stores a workspace expiration time value as an encrypted message. The workspace expiration time value is extended if the user continues its use or, by another enterprise application, if the other enterprise application is launched by the user before an expiration of the expiration time value. The application management agent requests authentication credentials from the user if the workspace expiration time value expires. | 2014-02-27 |
20140059643 | WIRELESS COMMUNICATION APPARATUS, RECORDING MEDIUM, AND METHOD - A wireless communication apparatus includes an optical wireless receiving unit receiving a pseudo random number; an authentication code generator generating an authentication code based on the pseudo random number received by the optical wireless receiving unit; and a wireless communication unit determining whether authentication using the authentication code with a given wireless communication apparatus is successful, and performing wireless communications with the given wireless communication apparatus when determining that the authentication using the authentication code with a given wireless communication apparatus is successful. | 2014-02-27 |
20140059644 | METHOD AND APPARATUS FOR SHARING CONTENT - A method and apparatus for sharing content by selecting a device with which the content is to be shared and performing authentication by using a device which is being called. The method of sharing content of a first device includes: performing authentication of a remote access service for sharing the content with a second device based on a call connection state between the first device and the second device; remotely accessing the second device according to a result of the authentication; and sharing the content based on the remote access. | 2014-02-27 |
20140059645 | Query Interface to Policy Server - A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether an access request is made by a user. Each user belongs to one or more user groups and each information resource belongs to one or more information sets. Access is permitted or denied according to access policies which define access in terms of the user groups and information sets. The first access filter in the path performs the access check, encrypts and authenticates the request; the other access filters in the path do not repeat the access check. The interface used by applications to determine whether a user has access to an entity is now an SQL entity. The policy server assembles the information needed for the response to the query from various information sources, including source external to the policy server. | 2014-02-27 |
20140059646 | Query Interface to Policy Server - A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether an access request is made by a user. Each user belongs to one or more user groups and each information resource belongs to one or more information sets. Access is permitted or denied according to access policies which define access in terms of the user groups and information sets. The first access filter in the path performs the access check, encrypts and authenticates the request; the other access filters in the path do not repeat the access check. The interface used by applications to determine whether a user has access to an entity is now an SQL entity. The policy server assembles the information needed for the response to the query from various information sources, including source external to the policy server. | 2014-02-27 |
20140059647 | ARRANGEMENT AND METHOD FOR ANONYMOUS USER PROFILING AND TARGETED CONTENT PROVISION - An electronic arrangement, optionally including at least one network server, including a media profile entity configured to store and maintain at least one user-adjustable personal media profile for a user capable of accessing a network, optionally the web, and related sites, services and/or applications via a number of terminal devices, wherein the personal media profile describes the user's interests preferably excluding identifiable information, optionally at least name and/or e-mail, and wherein the interests are represented on a number of levels including interest categories, such as automotive or travel categories, and further wherein the interests are at least partially determined based on monitoring the user behavior relative to the network, optionally the web, an authentication entity configured to associate a terminal utilized by the user with the media profile of the user based on profile-identifying data provided to/by the terminal, such as a numeric or alphanumeric, optionally encrypted, code. | 2014-02-27 |
20140059648 | METHODS FOR SECURE DISTANCE BOUNDING/RANGING BETWEEN TWO DEVICES - A method for communicating between a first device and a second device is shown. The devices are structured and configured for communicating via a communication channel by exchanging messages. The method comprises:
| 2014-02-27 |
20140059649 | APPARATUS, SYSTEM AND METHOD FOR ACCESSING INTERNET WEBPAGE - The present invention discloses an apparatus, system and method for accessing internet webpage. The system includes a user terminal and a proxy server. The user terminal is configured to initiate an access request to the proxy server, the access request including URL information of a target webpage which carries an identifier of requiring security authentication, and receive and display target webpage information outputted from the proxy server. The proxy server is configured to receive the access request, perform security authentication on the URL information of the target webpage which carries the identifier of requiring security authentication according to pre-stored webpage security database information; if the security authentication is passed, obtain the target webpage information and output the target webpage information to the user terminal. By applying the present invention, network delay overload for accessing the internet webpage can be reduced, and user experience can be improved. | 2014-02-27 |
20140059650 | DYNAMIC ROUTING OF AUTHENTICATION REQUESTS - Methods, systems, and computer readable media for dynamically routing authentication requests are described. An embodiment can include receiving, at one or more computing devices, a network authentication request. An embodiment can also include creating, at the one or more computing devices, an authentication context based on information in the authentication request. An embodiment can also include dynamically routing, using the one or more computing devices, the authentication request to an authentication server. | 2014-02-27 |
20140059651 | Account Elevation Management - Disclosed are various embodiments for elevating a user account by granting administrator permissions to workstations of network users. One embodiment of such a method comprises receiving authorization to provide a user temporary membership to an administrators group for a defined period of time; sending instructions to a workstation of the user to register as a member to the administrators group of the workstation; and in response to the membership having expired, sending instructions to remove the user as a member of the administrators group on the workstation. | 2014-02-27 |
20140059652 | APPARATUS FOR UPLOADING CONTENTS, USER TERMINAL APPARATUS FOR DOWNLOADING CONTENTS, SERVER, CONTENTS SHARING SYSTEM AND THEIR CONTENTS SHARING METHOD - A user terminal apparatus for uploading contents, a user terminal apparatus for downloading contents, a server, a content sharing system, and methods thereof are provided. The contents sharing method includes creating contents, uploading the created contents from the user terminal apparatus to a server, receiving, at the user terminal, storage location information corresponding to a location in the server where the uploaded contents are stored and access authorization information for accessing the uploaded contents from the server, and transmitting a message including the storage location information and the access authorization information from the user terminal apparatus to a second user terminal apparatus. | 2014-02-27 |
20140059653 | INTEGRATING OPERATING SYSTEMS WITH CONTENT OFFERED BY WEB BASED ENTITIES - Example embodiments are provided for integrating operating systems with content offered by internet based entities. | 2014-02-27 |
20140059654 | ACCESS PERMISSIONS ENTITLEMENT REVIEW - A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object. | 2014-02-27 |
20140059655 | Unauthorized Location Detection and Countermeasures - A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network. | 2014-02-27 |
20140059656 | FUNCTIONAL DEVICE, ACCESS APPARATUS, ACCESS SYSTEM, AND COMMUNICATION ESTABLISHING METHOD - A functional device can communicate with an access apparatus. The functional device includes an access controller that controls an additional device and obtains characteristic information of the additional device at an initialization process of the additional device, a memory that stores the obtained characteristic information, a communication unit that transmits and receives data to and from the access apparatus, and a communication controller that transmits the characteristic information stored in the memory to the access apparatus, when receiving a request for the initialization process from the access apparatus through the communication unit after transferring an exclusive right to the access apparatus, the exclusive right being a right to exclusively control the additional device. | 2014-02-27 |
20140059657 | METHOD AND SYSTEM FOR TRANSMITTING AUTHENTICATION CONTEXT INFORMATION - A system of the present invention uses an identity provider to provide the authentication services for multiple service providers. An identity provider communicates with one or more service providers. A user that wishes to gain access to a service provider is authenticated through the use of the identity provider. A user desiring to access a service provider is first authenticated by the identity provider. The identity provider determines if the user meets the desired class level and provides various information related to the authentication. When the user attempts to access a second service provider that is associated with the same identity provider, the second service provider accesses the identity provider and determines that the user was recently authenticated. The identity provider then transmits the relevant information regarding the authentication process to the second service provider, which can then allow or deny the user access to the second service provider. | 2014-02-27 |
20140059658 | PRIVACY BROKER - A brokered authentication request is received corresponding to an interaction between a particular user and a particular online entity. An identity provider corresponding to the particular user is identified that stores user data identifying the particular user. Confirmation is received that the identity provider has authenticated the particular user to a user profile maintained by the identity provider and a unique persistent user identifier is generated for the particular user that is unique within a system to a pairing of the first user with the first entity. The user identifier is caused to be communicated to the first entity for authenticating the first user in interactions with the first entity. | 2014-02-27 |
20140059659 | SYSTEM AND METHOD FOR AUTHENTICATING MANUAL INTERACTION IN A COMPUTING ENVIRONMENT - The present invention relates to a system and method for providing a secure manual interaction with one or more electronic devices in a network. An authentication module generates an authentication task to a user to input data using a user interface. The data is processed and a second security module generates security tasks to be responded by the user such that the security tasks are generated in real-time by using the input data fed by the user. A verification module correlates the input data with the security tasks responded by the user in order to check the data integrity before completing the interaction. | 2014-02-27 |
20140059660 | Controlling Access to an Accessible Object with an Online Access Control List - Software on a router receives configuration data that specifies a social networking service as a source for authentication according to an authentication protocol. Subsequently, the router software receives packet data from a client device for a destination other than the social networking service. The router software causes software on the client device to display a login view for the social networking service. The router software transmits the login data entered in the login view to the social networking service. And the router software receives an authorization code following a successful login by a user identified on an access control list (ACL). Then the router software transmits the packet data to the destination. | 2014-02-27 |
20140059661 | MANAGEMENT DEVICE, COMPUTER-READABLE RECORDING MEDIUM, AND MANAGEMENT METHOD - A management device includes an authentication unit and a control unit. If authentication information is received from a first device, the authentication unit included in the management device authenticates the received authentication information by using multiple pieces of authentication information that are stored in the first storing unit. If the authentication performed by the authentication unit is successful, the control unit included in the management device executes a login to the second device by using a single piece of login information that is stored in the second storing unit. | 2014-02-27 |
20140059662 | Shared circuit switched security context - Creation of update of a security context between user equipment and MSC/VLR (Mobile Switching Centre/Visitor Location Register) for circuit switched domain services is provided. The creation or update is based on conversion of the security context used in an evolved Universal Terrestrial Radio Access Network (E-UTRAN) in the Mobility Management Entity (MME) to a security context for the circuit switched domain target system and transferring it to a MSC/VLR. When user equipment is moved from E-UTRAN to GSM EDGE Radio Access Network/Universal Terrestrial Radio Access Network (GERAN/UTRAN), a MME does not need to perform authentication and key agreement procedures to establish shared circuit switched security context for the user equipment. | 2014-02-27 |
20140059663 | SYSTEM AND METHOD FOR CREATING AND IMPLEMENTING SCALABLE AND EFFECTIVE MULTI-MEDIA OBJECTS WITH HUMAN INTERACTION PROOF (HIP) CAPABILITIES - Embodiments of the invention provide a method and apparatus (“system”) that overcome the above-mentioned problems among others and provide an innovative solution aimed at creating an interactive, dynamic and effective multi-media object with HIP capabilities which may be used in online advertising, security, and user-defined security. The system leverages the existing HIP CAPTCHA real estate to create multi-media objects that guarantee a captivated audience, especially in online advertising. Combining interactive multi-media objects with HIP capabilities helps to meet a very critical need faced by advertisers and websites today—creating an effective impression of any multi-media object on a user (a guaranteed eyeball). Embodiments of the current invention introduce a variety of formats that involve interacting with a multi-media object to provide a more natural user interaction and ease of use while maintaining security. | 2014-02-27 |
20140059664 | Hardware-Based Credential Distribution - This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile. | 2014-02-27 |
20140059665 | FRAUD-PROOF LOCATION IDENTIFICATION SYSTEM - Systems and methods for facilitating check-ins that are resistant to common fraud scenarios while also being relatively inexpensive. One or more embodiments include displaying unique tokens in quick succession on a display positioned at the check-in location (e.g., a store, restaurant, or other business or location). Customers have a short period of time (e.g., a few seconds, five minutes, etc.) to scan a particular check-in token before a new token is displayed on the display. Each token may encode a pre-determined number or identification code that cannot be guessed by the user and that can be verified by the system to validate the check-in. By periodically changing the check-in token displayed to users and limiting each token to a single use within a short timeframe, users are prevented from checking in remotely. | 2014-02-27 |
20140059666 | METHODS, APPARATUSES & COMPUTER PROGRAM PRODUCTS FOR UTILIZING VISUAL AUTHENTICATION TOKENS AS CROSS-PLATFORM CREDENTIALS - An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to detect that a visual token includes data indicating one or more authentication credentials for accessing a communication device in response to scanning the visual token. The computer program code may further cause the apparatus to communicate the authentication credentials of the detected visual token to the communication device to request the communication device to determine whether the authentication credentials are valid for a user. The computer program code may further cause the apparatus to enable access to the communication device in response to receiving an indication from the communication device that the authentication credentials of the detected visual token are valid. Corresponding computer program products and methods are also provided. | 2014-02-27 |
20140059667 | IMAGE EXCHANGE METHOD AND SYSTEM FOR REMOTE SUPPORT - An image exchange method and system for remote support that can effectively provide remote support are provided. A manager terminal, after completing authentication through an authentication server, connects to a gateway server. A user terminal executes an application and receives gateway server connection information from the authentication server through a password input, connects to the gateway server based on the gateway server connection information, and transmits an image to the manager terminal. Accordingly, the manager can diagnose a problem regarding which the user has requested support, in real-time through the image, and the user can receive remote support through an image from the manager, thereby avoiding unnecessary costs. | 2014-02-27 |
20140059668 | METHODS AND APPARATUSES FOR PROVIDING INTERNET-BASED PROXY SERVICES - A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers. At least some of the origin servers belong to different domains and are owned by different entities. The proxy server and the origin servers are also owned by different entities. The proxy server analyzes each request it receives to determine whether that request poses a threat and whether the visitor belonging to the request poses a threat. The proxy server blocks those requests from visitors that pose a threat or in which the request itself poses a threat. The proxy server transmits the requests that are not a threat and is from a visitor that is not a threat to the appropriate origin server. | 2014-02-27 |
20140059669 | METHOD AND MOBILE TERMINAL FOR ENHANCING THE SECURITY OF A MOBILE TERMINAL - The present disclosure discloses a method and mobile terminal for enhancing mobile terminal security, and relates to the information security field. The method includes: a mobile terminal providing in advance a target list to a user, setting at least one user-selected target from the list to a hidden state, and storing a password for a protected space set by the user, monitoring a specified application for the user to enter the password for the protected space, when detecting the user entering the password for the protected space via the specified application, entering the protected space, and restoring the target from a hidden state to a visible state, wherein the target can be an application/file at the mobile terminal. The mobile terminal can include: a setting module and a controlling module. The present disclosure can greatly enhance the security of the applications/documents at the mobile terminal. | 2014-02-27 |
20140059670 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO APPLICATIONS ON MOBILE TERMINAL - Various embodiments provide methods and systems for controlling an access to applications on a mobile terminal. In an exemplary method, an opened application can be scanned and an application identification can be obtained. The application identification can be compared with a pre-stored target application identification. When the application identification is compared to be consistent with the pre-stored target application identification, an unlock interface can be displayed. An unlock command can be obtained to run the application on the mobile terminal. An exemplary system for controlling an access to an application on a mobile terminal can include a scanning module, a comparing module, a displaying module, and an executing module. | 2014-02-27 |
20140059671 | Device identification for externalizing password from device coupled with user control of external password service - Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server. In response to a trigger event on the mobile device, such as an unlocking action by the user, a request is sent by the mobile device to the password server to retrieve the corresponding server, and the corresponding password is returned to the mobile device. The mobile device can then use the password to access the protected information. If the user determines that the mobile device is lost, stolen, or out of the user's physical control, the user may access the password server and disable the sending of the password to the mobile device, thereby thwarting attempts to access the protected data on the mobile device. | 2014-02-27 |
20140059672 | METHOD FOR PRODUCING DYNAMIC DATA STRUCTURES FOR AUTHENTICATION AND/OR PASSWORD IDENTIFICATION - A method for generating a changing authentication input or password for a user is provided for accessing a computing device such as a smartphone or computer. Using objects displayed in sequential positions on a graphic display, and input strings of text or alphanumeric characters the user has related to each object, a password can be generated by placing the input strings in an order the same as the sequence. The password can be varied easily for each access attempt by changing the objects displayed and/or the sequence. | 2014-02-27 |
20140059673 | System and Method for Disabling Secure Access to an Electronic Device Using Detection of a Unique Motion - A system and method for providing secure authorization to an electronic device by combining two or more security features of authentication processed at substantially the same time where at least one of the factors is a “tolerant” factor. By combining two factors such as facial recognition and a screen gesture, these can be analyzed at substantially the same time except when a unique or individualized motion is detected. | 2014-02-27 |
20140059674 | AUTHENTICATION METHOD AND CODE SETTING METHOD AND AUTHENTICATION SYSTEM FOR ELECTRONIC APPARATUS - The present invention relates to an authentication method for electronic apparatus and authentication system, which comprises the steps of: enabling an electronic apparatus to be moved by a user from a first position to a second position; enabling an inertial sensor embedded in the electronic apparatus to detect and thus construct a three-dimensional continuous trajectory of the electronic apparatus's movement from the first position to the second position in a Cartesian coordination system composed of a first-direction axis, a second-second axis and a third-direction axis; and enabling a processor embedded in the electronic apparatus to perform either a process for registering the three-dimensional continuous trajectory as a standard movement trajectory; or a comparison between the three-dimensional continuous trajectory and a previously registered standard movement trajectory so as to authenticate the correctness of the three-dimensional continuous trajectory and thus authenticate the electronic apparatus. | 2014-02-27 |
20140059675 | BIOMETRIC AUTHENTICATION - A method of authenticating a user includes using at least one computer and connected scanner to obtain biometric measurements of a plurality of biometric parameters of the user. The parameters are stored as templates for comparison, as well as a sequence in which the plurality of biometric parameters are to be scanned in order to perform a valid authentication. Authentication is determined by comparing each biometric parameter submitted with the stored biometric templates, to determine if each biometric parameter matches a stored template. In addition, the sequence with which each matched template was presented is identified, and this sequence is compared with the stored sequence. If a predetermined number of biometric parameters match, and a predetermined number of elements in a sequence match, the user is authenticated. | 2014-02-27 |
20140059676 | SYSTEMS AND METHODS FOR DUAL READER EMULATION - Systems and methods for emulating credentials are disclosed. In some cases, the systems include an access credential reader and an access credential writer. The access credential reader is communicably coupled to the access credential writer. The access credential reader is operable to receive information from an access credential, and to transfer at least a portion of the information to the access credential writer. The access credential writer is operable to transfer at least the portion of the information to an emulation access credential. | 2014-02-27 |
20140059677 | MEDICAL DEVICE CUSTOMIZATION SYSTEM - A medical device customization system and method comprising medical device that receives signals from a biological probe having an operational parameter and that stores data based on the signals in a memory. The medical device receives a custom application and establishes a virtual machine to run the custom application. | 2014-02-27 |
20140059678 | ANALYSIS OF NETWORK OPERATION - A network device is configured to receive information from a number of different types of data collection devices. The information may relate to operation of devices in a network and communications in the network. The network device is configured to further analyze the information and determine that an issue exists relating to operation of the network. The network device is configured further to send a message to a policy device based on determining that the issue exists relating to the operation of the network. The policy device may generate or change a rule or policy associated with the operation of the network, based on the message, to instruct one or more other network devices to change the operation of the network. | 2014-02-27 |
20140059679 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server, a replacement protection control module to be used for updating a protection control module having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility. | 2014-02-27 |
20140059680 | LOCAL SECURE SERVICE PARTITIONS FOR OPERATING SYSTEM SECURITY - Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure service partition (LSSP), provides security services to other partitions. The service partitions (LSSPs) host those high assurance services that require strict security isolation, where the service can be shared across partitions and accessed even when the user is not connected to a network. The LSSP also can certify the results of any computation using a key signed by a TPM attestation identity key (AIK), or other key held securely by the hypervisor or a service partition. The LSSPs may be configured to provide trusted audit logs, trusted security scans, trusted cryptographic services, trusted compilation and testing, trusted logon services, and the like. | 2014-02-27 |
20140059681 | METHOD AND AN APPARATUS TO PERFORM MULTIPLE PACKET PAYLOADS ANALYSIS - A method and an apparatus to perform multiple packet payload analysis have been disclosed. In one embodiment, the method includes receiving a plurality of data packets, each of the plurality of data packets containing a portion of a data pattern, determining whether each of the plurality of data packets is out of order, and making and storing a local copy of the corresponding data packet if the corresponding data packet is out of order. Other embodiments have been claimed and described. | 2014-02-27 |
20140059682 | Determination of Adaptive Idle Timeout - In various embodiments, a method may be provided comprising: determining an adaptive idle timeout value based on the relationship between the number of established TCP connections to a server and the upper threshold value. | 2014-02-27 |
20140059683 | Cooperative intrusion detection ecosystem for IP reputation-based security - An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation influencing events information between or among the cooperating systems in real-time to enhance overall system response time and to prevent otherwise hidden attacks from damaging network resources. An IDS includes an IP reputation analytics engine to analyze new and existing events, correlate information, and to raise potential alerts. The IP reputation analytics engines may implement an algorithm, such as a pattern matching algorithm, a continuous data mining algorithm, or the like, to facilitate this operation. Clustering IDS endpoints to share IP reputation influencing events, using the cluster-wide view to determine IP reputation, and feeding the cluster-wide view back to the IDS endpoints, provides for enhanced and early detection of threats that is much more reliable and scalable as compared to prior art techniques. | 2014-02-27 |
20140059684 | SYSTEM AND METHOD FOR COMPUTER INSPECTION OF INFORMATION OBJECTS FOR SHARED MALWARE COMPONENTS - Embodiments of a system and method for computer inspection of information objects, for example, executable software applications for common components that may include elements of computer viruses, items from hacker exploit libraries, or other malware components. Information objects may contain identified sequences of instructions, each of which may be identified and hierarchically grouped based on their structural relationship(s). In the software context, programming languages may include multiple components that include functional code; these components are often shared between programmers. In some embodiments, an inspection of the hierarchical relationship of components (e.g., constituent functions) in the information objects may allow for identification of common components shared between programs. In some embodiments, authorship of objects or components in the objects may be identified by comparisons between component samples. In some embodiments, inspection of the relationship between components is limited to component groups having a specified structural size, complexity, or eccentricity. | 2014-02-27 |
20140059685 | System, Method and Computer Program Product for Monitoring and/or Analyzing at Least One Aspect of an Invocation of an Interface - A system, method and computer program product are provided. In use, execution of a portion of internal code of an interface is identified. Further, in response to the execution of the portion of internal code, at least one aspect of an invocation of the interface is monitored and/or analyzed. | 2014-02-27 |
20140059686 | System and Method for Detecting Behavior Anomaly in Information Access - A system and method for identifying anomalies in information requests. The information requests are modeled into a plurality of basic elements and association among the basic elements are tracked. The association of one information request is compared with a plurality of bitmap tables and counters representing a baseline information from a historical behavior information. If the association of this information request differs from the baseline information, an alert is issued. The system responds dynamically to changing baselines in assessment of which behaviors constitute an anomaly. | 2014-02-27 |
20140059687 | FILE SCANNING - For file scanning, a division module divides a file into plurality of subfiles. An access module maintains a status of each subfile and scans each subfile with a separate server. | 2014-02-27 |
20140059688 | DETECTION AND MITIGATION OF SIDE-CHANNEL ATTACKS - Methods, systems, and computer readable storage media for preventing side-channel attacks are disclosed. A computing resource, such as a virtual machine, operating on a computing device or within a computing environment may be duplicated. Properties associated with the computing resource and the duplicate computing resource may be monitored for discrepancies. The discrepancies may be indicative of a security event, such as a virus or side-channel attack. Detected security events may be handled by replacing a computing resource with a duplicate computing resource. | 2014-02-27 |
20140059689 | SYSTEMS AND METHODS FOR UPDATING CONTENT DETECTION DEVICES AND SYSTEMS - Systems, methods, and software for processing received network traffic in view of content detection data and configuration data that defines policies to either block, permit, or to further evaluate network traffic content on the policies when network traffic is entering a network. | 2014-02-27 |
20140059690 | Method for Scalable Analysis of Android Applications for Security Vulnerability - A method for scalable analysis of Android applications for security includes applying Android application analytics to an Android application, which in turn includes applying an application taint tracking to the Android application and applying application repacking detection to the Android application, and determining security vulnerabilities in the Android application responsive to the analytics. | 2014-02-27 |
20140059691 | METHOD AND DEVICE FOR PROMPTING PROGRAM UNINSTALLATION - The present disclosure discloses method and device for prompting program uninstallation and belongs to the field of the Internet. The method comprises: performing a security assessment of an application program installed on a mobile terminal, thereby obtaining a security assessment result; obtaining security identification information corresponding to the security assessment result based on pre-stored correlations between security assessment results and security identification information; establishing a correlation between the obtained security identification information and the application program, and displaying the correlation to a user. By performing a security assessment of an application program installed on a mobile terminal, obtaining security identification information, and establishing a correlation between the security identification information and the application program, a user can quickly uninstall and clean up malware with hidden security issues based on the security identification information, thereby safeguarding safe running of the mobile terminal. | 2014-02-27 |
20140059692 | SYSTEM AND METHOD FOR CROSS DOMAIN FLIGHT DATA IMPORT AND EXPORT - A computer system and method for automated export of classified flight data. The computer system can include a processor and a memory coupled to the processor. The memory can store software instructions that, when executed by the processor, cause the processor to perform operations. The operations can include receiving, in a classified security domain, a request for a dataset to be transmitted to an unclassified transponder device. A first subset and a second subset of the requested dataset can be determined such that the first subset contains classified data and the second subset contains unclassified data. An unclassified version of the first subset can be calculated by redacting non-geographic position (GPS) data and calculating a lower precision GPS value for GPS data. The unclassified version of the first subset can be combined with the unclassified second subset to create a downgraded dataset that can be transmitted to the transponder device. | 2014-02-27 |
20140059693 | ANONYMOUS SHIPMENT BROKERING - A request is received for a brokered shipment from a particular entity to an anonymous user. A shipping identifier is obtained from a shipping entity, on behalf of the particular entity, for the shipment from the particular entity to the anonymous user. The shipping identifier is communicated to the particular entity and the shipping identifier is associated with a unique user identifier unique, within a system, to a pairing of the anonymous user with the particular entity. Address information of the anonymous user is unknown to the particular entity, and address information is obtained from the shipping entity for the anonymous user. In some aspects, address information of the particular user is received from a second entity and applied to the shipment identifier in connection with delivery of the shipment to the particular user. | 2014-02-27 |
20140059694 | Privacy-Enhanced Car Data Distribution - In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner. This may provide enhanced privacy. At the same time, some types of the data may be encrypted for security and privacy reasons. Different information may be provided under different circumstances to different subscribers, such as the government, family members, location based services providers, etc. | 2014-02-27 |
20140059695 | SYSTEMS AND METHODS FOR MANAGING LOCATION DATA AND PROVIDING A PRIVACY FRAMEWORK - A computer-implemented method includes providing a user interface on an internet-protocol (IP) connected mobile device, the user interface configured to receive a user input corresponding to one or more data privacy parameters for geo-location data, and controlling a transferring of geo-location data to and from each of a plurality of mobile applications on the mobile device based on the user input. A change in one or more of the data privacy parameters can change how geo-location data is provided to each of the plurality of applications and can affect location data accuracy, location data reporting frequency, geo-functions, and more. The user interface can be configured to allow a user to view, manage, and delete a personal location history. Furthermore, one or more profiles can be associated with one or more of the plurality of mobile applications, where each of the one or more profiles is assigned individual data privacy parameters. | 2014-02-27 |
20140059696 | METHOD FOR REMOVING CUSTOMER PERSONAL INFORMATION FROM AN ELECTRONIC DEVICE - A system and method for processing electronic devices to determine removal of customer personal information (CPI). An electronic device is connected to a test device. A number of electronic devices including the electronic device are received for determining that the CPI is removed from a number of sources. The number of electronic devices include a number of makes and models of electronic devices. A determination of whether CPI is included on the electronic device is made. An identification of the electronic device is recorded in response to determining that CPI is included on the electronic device. The CPI is cleared form the electronic device in response to determining that the CPI is included on the electronic device. The identification of the electronic devices and metadata is reported in response to determining the CPI was included on the electronic device. | 2014-02-27 |
20140059697 | TESTING DEVICE FOR REMOVING CUSTOMER PERSONAL INFORMATION FROM AN ELECTRONIC DEVICE - A testing device, system, and method for removing customer personal information (CPI). The testing device includes a user interface for communicating information and receiving user input. The testing device also includes interfaces operable to communicate with the one or more electronic devices. The testing device also includes a memory configured to store a libraries providing information for removing CPI from electronic devices including a number of makes, models, and configurations. The testing device also includes logic operable to utilize the libraries to analyze CPI included on the one or more electronic devices, record an identification of the one or more electronic devices in response to determining the CPI is present on the one or more electronic devices, remove the CPI from the one or more electronic devices in response to determining the CPI is present on the one or more electronic devices, and report the identification and CPI information of the one or more electronic devices in response to determining the CPI was present on the one or more electronic devices. | 2014-02-27 |
20140059698 | INFORMATION PROCESSING DEVICE, LOCK CONTROLLING METHOD, AND LOCK CONTROLLING PROGRAM - In order to solve a problem in which the operation becomes complex when the user wants to view the data to which the lock is set, an information processing device includes lock temporal control means for bringing data which is locked into a lock canceled state based on a result of comparison between authentication request information input following a request for viewing the data and authentication information for canceling the lock, and display information creation means for creating display information to display the data brought into the lock canceled state, wherein the lock temporal control means locks the data brought into the lock canceled state again after the display information is displayed. | 2014-02-27 |
20140059699 | INDEXED SECURITY FOR USE WITH DATABASES - A computer-implemented method for providing security in a relational database hosted by a first server, and configured to interact with a second server, includes associating a first ownership vector with an object in the relational database, detecting a change to the object, and associating a second ownership vector with the object in response to detecting the change to the object. | 2014-02-27 |
20140059700 | DEVICE AND METHOD FOR DETERMINING CONTENT OF ACCESS CONTROL OF DATA - Determining the content of access control to data based on classification results obtained by classifying data includes recording setting information that sets a plurality of classification engines for predetermined conditions related to either data or to the access to the data and acquiring data subject to access when access to the data subject to access is requested. Responsive to satisfaction of predetermined conditions related to either the data subject to the access or access to the data subject to access, classification of data subject to access by the plurality of classification engines set for predetermined conditions in the setting information is indicated using a processor. Further, using the processor, the content of access control to the data subject to access based on classification results obtained by the plurality of classification engines classifying data subject to access is determined based on the indicating classification of data. | 2014-02-27 |
20140059701 | METHOD OF PROTECTING AND MANAGING DIGITAL CONTENTS AND APPARATUS THEREOF - A method and an apparatus for protecting and managing digital contents are provided. The method of protecting and managing digital contents includes receiving the digital contents, determining whether the digital contents are secure contents whose use is limited, and storing secure contents in a secure memory which is refreshed at a life cycle of a predetermined period when the digital contents are the secure contents. | 2014-02-27 |
20140059702 | System and Method to Associate a Private User Identity with a Public User Identity - The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time, To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record, if they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record. | 2014-02-27 |
20140059703 | Method and System to Impose Enterprise Security Mechanisms throughout a Mobile Application Lifecycle - Particular embodiments provide a method to authenticate a user of an application running on a mobile operating system (OS) installed on a mobile device, wherein the mobile OS invokes callback methods of the application upon making changes to an execution state of the application. Code embedded into the application causes the application to communicate with a management agent installed in the mobile OS upon invocation of a hooked callback method. Upon invocation of the hooked callback method, the embedded code assesses whether the user should be provided an authentication challenge prior to enabling the application to run in the foreground, and presents the authentication challenge if necessary. Finally, the embedded code returns execution control from the management agent back to the application wherein the application executes the at least one callback method prior to running in the foreground. | 2014-02-27 |
20140059704 | CLIENT DEVICE, SERVER, AND STORAGE MEDIUM - Provided is a client device, including an identification unit that identifies a person included in content information acquired by a content information acquisition unit, and generates first identification information indicating an identified person, a communication unit that associates and transmits the content information and the first identification information to an external device, and a generation unit that generates an access request for content information stored in the external device. The access request includes second identification information specifying a user who accesses the content information stored in the external device, and the communication unit transmits the access request to the external device, and from the external device receives content information that is at least partially access-restricted based on a comparison by the external device between the second identification information included in the access request and the first identification information associated with the content information stored in the external device. | 2014-02-27 |
20140059705 | DOCUMENT CONTROL APPARATUS AND DOCUMENT CONTROL METHOD - The document access authorization violation detection apparatus detects, for each of documents, whether or not there is any violation in access authorization to access the document, by using statistical values calculated from duty position levels, which represents height levels of corresponding official positions of users who are authorized to access the document, or inter-organization distances, which are obtained by digitizing inter-organization positional removes from respective groups, to which the users belong, to a group whose member number is larger than any other one of the groups. As a result, the document access authorization violation detection apparatus makes it possible to efficiently detect whether or not there is any violation in access authorization with respect to each of documents. | 2014-02-27 |
20140059706 | METHOD AND SYSTEM FOR FACILITATING DATA ACCESS AND MANAGEMENT ON A SECURE TOKEN - A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is provided in the smart card which allows data stored thereon to be shared by multiple parties. Access to data stored on the smart card is controlled by various access methods depending on the actions to be taken with respect to the data to be accessed. | 2014-02-27 |
20140059707 | ELECTRONIC DEVICE AND CONTENT SHARING METHOD - A method of sharing content for an electronic device is provided. The electronic device is capable of changing contents that are to be shared when a network changes. The content sharing method includes storing a list of contents shared between the electronic device and another electronic device via a network formed using an access point, such that the contents match the access point, and setting contents included in a list of contents stored to match the access point as contents to be shared in response to the electronic device being connected to the network via the access point. | 2014-02-27 |
20140059708 | APPARATUSES AND METHODS FOR PROTECTING PROGRAM FILE CONTENT USING DIGITAL RIGHTS MANAGEMENT (DRM) - An electronic device for protecting program file content using Digital Rights Management (DRM) is provided with a DRM agent module, a plug-in, and a web browser module. The DRM agent module is configured to process DRM-protected content associated with a program file. The plug-in is configured to enable execution of the program file. The web browser module is installed with the DRM agent module, and is configured to activate the processing of the DRM-protected content of the DRM agent module to obtain the program file portion-by-portion, and use the plug-in to execute the program file with the obtained portions. | 2014-02-27 |
20140059709 | CONTROL OF URIC ACID HOMEOSTASIS - The invention relates to vectors and mammalian cells in a system useful for switching on or switching off gene expression in response to uric acid. In a particular embodiment the invention relates to a mammalian cell useful in detecting and/or degrading a harmful excess of uric acid comprising (a) a vector comprising a genetic code for the uricase sensor-regulator HucR from | 2014-02-27 |
20140059710 | CALIBRACHOA PLANT WITH STAR PATTERN - The present disclosure embraces | 2014-02-27 |
20140059711 | BROCCOLI HYBRID PS05151639 - The invention provides seed and plants of broccoli hybrid PS05151639 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of broccoli hybrid PS05151639 and the parent lines thereof, and to methods for producing a broccoli plant produced by crossing such plants with themselves or with another broccoli plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants. | 2014-02-27 |
20140059712 | MULTIPLE-VIRUS-RESISTANT MELON - The invention relates to a melon plant, and parts thereof including seeds and fruit, that is resistant to Zucchini Yellow Mosaic Virus (ZYMV) and Watermelon Mosaic Virus (WMV). The melon plant may further comprise resistance to Cucumber Mosaic Virus (CMV) and/or further display a Brix measurement of ≧9.5° Bx, orange flesh color, and/or a fruit width to length ratio of ≧0.5. Methods for producing such a plant are also provided. | 2014-02-27 |
20140059713 | Maize Variety Hybrid X95A926 - A novel maize variety designated X95A926 and seed, plants and plant parts thereof, produced by crossing Pioneer Hi-Bred International, Inc. proprietary inbred maize varieties. Methods for producing a maize plant that comprises crossing hybrid maize variety X95A926 with another maize plant. Methods for producing a maize plant containing in its genetic material one or more traits introgressed into X95A926 through backcross conversion and/or transformation, and to the maize seed, plant and plant part produced thereby. This invention relates to the maize variety X95A926, the seed, the plant produced from the seed, and variants, mutants, and minor modifications of maize variety X95A926. This invention further relates to methods for producing maize varieties derived from maize variety X95A926. | 2014-02-27 |
20140059714 | ISOLATED POLYNUCLEOTIDES AND POLYPEPTIDES AND METHODS OF USING SAME FOR INCREASING PLANT YIELD, BIOMASS, GROWTH RATE, VIGOR, OIL CONTENT, ABIOTIC STRESS TOLERANCE OF PLANTS AND NITROGEN USE EFFICIENCY - Provided are isolated polynucleotides encoding a polypeptide at least 80% homologous to the amino acid sequence selected from the group consisting of SEQ ID NOs: 757, 456-756, 758-774, 8385-10836, and 10838-14462; and isolated polynucleotide comprising nucleic acid sequences at least 80% identical to SEQ ID NO: 377, 1-376, 378-455, and 775-8384. Also provided are nucleic acid constructs comprising same, isolated polypeptides encoded thereby, transgenic cells and transgenic plants comprising same and methods of using same for increasing yield, biomass, growth rate, vigor, oil content, fiber yield, fiber quality, abiotic stress tolerance, and/or nitrogen use efficiency of a plant. | 2014-02-27 |
20140059715 | PLASTIDIAL NUCLEOTIDE SUGAR EPIMERASES - Isolated polynucleotides and polypeptides and recombinant DNA constructs of plastidial sugar epimerases useful for conferring improved agronomic performance including yield and drought are disclosed. Compositions (such as plants or seeds) having these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs are also disclosed. | 2014-02-27 |