29th week of 2013 patent applcation highlights part 58 |
Patent application number | Title | Published |
20130185727 | METHOD FOR MANAGING TASKS IN A MICROPROCESSOR OR IN A MICROPROCESSOR ASSEMBLY - This method includes steps for the parallel management of a first list and of a second list. The first list corresponds to a list of tasks to be carried out. The second list corresponds to a list of variables indicating the presence or absence of tasks to be carried out. The list of tasks is managed in a “FIFO” manner, that is to say that the first task inputted into the list is the first task to be executed. A task interruption is managed using a “Test And Set” function executed on the elements of the second list, the “Test And Set” function being a function which cannot be interrupted and including the following steps: reading the value of the element in question, storing the read value in a local memory, and assigning a predetermined value to the element which has just been read. | 2013-07-18 |
20130185728 | SCHEDULING AND EXECUTION OF COMPUTE TASKS - One embodiment of the present invention sets forth a technique for assigning a compute task to a first processor included in a plurality of processors. The technique involves analyzing each compute task in a plurality of compute tasks to identify one or more compute tasks that are eligible for assignment to the first processor, where each compute task is listed in a first table and is associated with a priority value and an allocation order that indicates relative time at which the compute task was added to the first table. The technique further involves selecting a first task compute from the identified one or more compute tasks based on at least one of the priority value and the allocation order, and assigning the first compute task to the first processor for execution. | 2013-07-18 |
20130185729 | ACCELERATING RESOURCE ALLOCATION IN VIRTUALIZED ENVIRONMENTS USING WORKLOAD CLASSES AND/OR WORKLOAD SIGNATURES - Systems, methods, and apparatus for managing resources assigned to an application or service. A resource manager maintains a set of workload classes and classifies workloads using workload signatures. In specific embodiments, the resource manager minimizes or reduces resource management costs by identifying a relatively small set of workload classes during a learning phase, determining preferred resource allocations for each workload class, and then during a monitoring phase, classifying workloads and allocating resources based on the preferred resource allocation for the classified workload. In some embodiments, interference is accounted for by estimating and using an “interference index”. | 2013-07-18 |
20130185730 | MANAGING RESOURCES FOR MAINTENANCE TASKS IN COMPUTING SYSTEMS - Methods for managing resources for maintenance tasks in computing systems are provided. One system includes a controller and memory coupled to the controller, the memory configured to store a module. The controller, when executing the module, is configured to determine an amount of available resources for use by a plurality of maintenance tasks in a computing system and divide the available resources between the plurality of maintenance tasks based on a need for each maintenance task. One method includes determining, by a central controller, an amount of available resources for use by a plurality of maintenance tasks in a computing system and dividing the available resources between the plurality of maintenance tasks based on a need for each maintenance task. Computer storage mediums including a computer program product method for managing resources for maintenance tasks in computing systems are also provided. | 2013-07-18 |
20130185731 | DYNAMIC DISTRIBUTION OF NODES ON A MULTI-NODE COMPUTER SYSTEM - I/O nodes are dynamically distributed on a multi-node computing system. An I/O configuration mechanism located in the service node of a multi-node computer system controls the distribution of the I/O nodes. The I/O configuration mechanism uses job information located in a job record to initially configure the I/O node distribution. The I/O configuration mechanism further monitors the I/O performance of the executing job to then dynamically adjusts the I/O node distribution based on the I/O performance of the executing job. | 2013-07-18 |
20130185732 | PROVIDING BY ONE PROGRAM TO ANOTHER PROGRAM ACCESS TO A WARNING TRACK FACILITY - A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. | 2013-07-18 |
20130185733 | SUBSCRIBER-BASED EVENT SUBSCRIPTION - An event subscriber subscribes to an event. When the event occurs, the publisher calls into a framework to look for subscriber attributes on program entities and raises the event with program entities that contain the correct attributes. | 2013-07-18 |
20130185734 | SUBSCRIBER-BASED EVENT SUBSCRIPTION - An event subscriber subscribes to an event. When the event occurs, the publisher calls into a framework to look for subscriber attributes on program entities and raises the event with program entities that contain the correct attributes. | 2013-07-18 |
20130185735 | WARNING TRACK INTERRUPTION FACILITY - A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. | 2013-07-18 |
20130185736 | USE OF A WARNING TRACK INTERRUPTION FACILITY BY A PROGRAM - A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. | 2013-07-18 |
20130185737 | PROVIDING BY ONE PROGRAM TO ANOTHER PROGRAM ACCESS TO A WARNING TRACK FACILITY - A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. | 2013-07-18 |
20130185738 | USE OF A WARNING TRACK INTERRUPTION FACILITY BY A PROGRAM - A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. | 2013-07-18 |
20130185739 | WARNING TRACK INTERRUPTION FACILITY - A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. | 2013-07-18 |
20130185740 | INFORMATION PROCESSING APPARATUS, IC CHIP, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - There is provided an information processing apparatus, including a multi-platform capable of managing a plurality of applications, and an operating system which operates on the multi-platform, and is capable of being activated by a command of the multi-platform. | 2013-07-18 |
20130185741 | SLIM-TYPE OPTICAL DISC DRIVE - A slim-type optical disc drive includes a casing and a tray. A first circuit board is disposed within the casing. A second circuit board is disposed on the tray. A spring switch is disposed on the second circuit board. A first end of the spring switch is fixed on the second circuit board. A resistor is connected between the first end of the spring switch and a first power source. A second end of the spring switch is extended outside the second circuit board. In a tray-out status, the second end of the spring switch is not contacted with any object, so that a first status signal is generated. In a tray-in status, the second end of the spring switch is contacted with a conducting zone of a second power source, so that a second status signal is generated. | 2013-07-18 |
20130185742 | OPTICAL PICKUP AND OPTICAL SYSTEM USING THE SAME - Provided are an optical pickup and an optical system using the same. The optical pickup may include an aperture that is disposed at a side where a light beam is incident on an objective lens. The aperture may limit a range of the light beam such that a width of the light beam incident on the objective lens in a first direction is less than a width in a second direction that is perpendicular to the first direction. | 2013-07-18 |
20130185743 | TRANSACTION MANAGEMENT FOR RACING ENTERTAINMENT - A system and method are provided to perform operations for racing entertainment, including providing each of multiple racers with devices to capture images and sounds as perceived by the racer during a race, obtaining information pertaining to each of multiple users such as account information and selection of a racer whom the user wants to get connection with, managing transactions, processing the images and sounds, and transmitting the processed images and sounds from the racer to a client terminal of the user who selected the racer. | 2013-07-18 |
20130185744 | METHOD AND SYSTEM FOR USING COHERENCE OF BIOLOGICAL RESPONSES AS A MEASURE OF PERFORMANCE OF A MEDIA - Various embodiments of the present disclosure create a novel system for rating an event in a media based on the strength of the emotions viewers feel towards the event. The viewer's responses to the media can be measured and calculated via physiological sensors. The metric for rating the strength of the media is created based on the mathematical coherence of change (up or down) of all pertinent physiological responses across multiple viewers. Such rating offers an objective ability to compare the strengths of events of the media, as there is a strong correlation between high coherence of physiological responses (all viewers feel the same thing at the same time) and strong ratings of emotionality, engagement, likeability, success in the marketplace/on screen. | 2013-07-18 |
20130185745 | METHOD, SYSTEM AND TELEVISION FOR PICTURE REPRODUCTION - A method, system, and television for television picture reproduction via a network is provided. The television receives picture reproduction request information sent from a terminal device, real-time encodes video and audio data inputted from a multimedia server, respectively packs the encoded video and audio data into video data packets and audio data packets, and sends the video data packets and the audio data packets to the terminal device. The terminal device performs playback according to the video data packets and the audio data packets. Thus, the method accomplishes television picture reproduction through a network to fulfill short-distance picture reproduction requirements without occupying resources and network bandwidth of the multimedia server. | 2013-07-18 |
20130185746 | SERVER, CLIENT APPARATUS, AND SERVICE PROVIDING METHOD AND CONTROL METHOD THEREOF - A server controlling method is disclosed. The server controlling method includes receiving uploading of a preferable channel list, and reconfiguring a preferable channel list based on location information received from a user and providing the reconfigured preferable channel list, in a case where there is a request by the user. | 2013-07-18 |
20130185747 | METHOD AND SYSTEM FOR DOWLOADING CONTENT TO A CONTENT DOWLOADER - A content downloader system including a display for displaying a user interface enabling a user to select content to be downloaded and initiate downloading; a set-top-box coupled to the display for providing the user interface and for receiving an indication of the content to be downloaded; and a content downloader coupled to and separate from the set-top-box, the content downloader for receiving the content. The content downloader has at least one memory component for storing content, at least one input/output connection for communicating to electronic devices, optionally including a removable memory card and optionally including an encryption/decryption unit. The content downloader may have an identification whereby its identity is authenticated by the content provider. The content downloader downloads the content selected by the user after successful authentication whereby the selection is made using the display and the set-top-box, and the content downloaded to the content downloader separate than the set-top-box. | 2013-07-18 |
20130185748 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An image processing apparatus and a control method thereof are provided. The image processing apparatus includes: an interface which is connectable to a plurality of Common Interface Conditional Access Modules (CICAMs) which descrambles a scrambled broadcasting signal; a storage unit which stores a plurality of operator profiles corresponding to the plurality of CICAMs; and a controller which, if a CICAM from among the plurality of CICAMS is connected to the interface, obtains identification information from the CICAM connected to the interface, selects an operator profile corresponding to the obtained identification information among the plurality of operator profiles, generates a list of channels capable of being descrambled by receiving additional information about the channels capable of being descrambled from the connected CICAM via the selected operator profile. | 2013-07-18 |
20130185749 | Mechanism for Rendering Advertising Objects into Featured Content - Systems and methods are provided for inserting advertisements into a video. In accordance with one implementation, a method is provided that includes processing a data stream including a video content selection to extract a metatag that models a template object appearing within a first content segment featuring primary content of the video content selection, the template object enabling a transformation of an advertising object. Further, the method includes identifying an advertising descriptor based on characteristics of a scene and the metatag extracted from the first content segment and selecting the advertising object based on the identified advertising descriptor. The method also includes modifying the video content selection by inserting the advertising object in the data stream such that the advertising object is integrated into a scene of the video content selection and transmitting the video content selection to a recipient. | 2013-07-18 |
20130185750 | CONTEXT BASED CORRELATIVE TARGETED ADVERTISING - A method for selectively distributing content from a backend content distribution system (CDS) to at least one subscriber device includes: receiving information from a monitored environment corresponding to a subscriber device of the at least one subscriber device; correlating, using a processor of the backend CDS, a context identified by the received information to one or more specific content; inserting the specific content into a content stream being transmitted to the subscriber device; and transmitting along with the specific content at least one of (a) correlative information explaining a context surrounding why the specific content is being presented and (b) a selectable affordance by which access to the correlative information is provided. The received information includes at least one of (a) sensor information received from a sensor located within the monitored environment and (b) detected subscriber behavior captured by the subscriber device, and (c) subscriber-provided context information. | 2013-07-18 |
20130185751 | INTERACTIVE ADVERTISEMENT - Implementations discussed herein are directed to providing interactive advertisements to a viewer of a broadcast or other program service transmission. Interactive advertisements include product offering advertisements that give details regarding sales of specific products or retailers that offering specific products for sale. A user may create a shopping list or other indicator that specifies which product offering advertisements are displayed. Product offering advertisements may be displayed concurrently with content from a program service transmission. Extended product offering advertisement that provide further details regarding a product for sale may be displayed in response to user selections of particular product offering advertisements. Product offering advertisements and/or extended product offering advertisements may be displayed on a front panel screen of a receiver or on a television or other output device used to display program service content. | 2013-07-18 |
20130185752 | Wireless Terminal, System and Information Processing Method - A recording apparatus comprises a broadcasting-wave receiving device which receives broadcasting waves containing identification information for specifying program and video and audio information of program, a program reservation device which prepares, when setting of a program contained in broadcasting waves is received, reservation information containing identification information of program of which setting is received and information concerning setting, a wireless terminal, a communication device of the wireless terminal which transmits and receives reservation information and a recording device which records video and audio information of program identified by identification information contained in reservation information on the basis of information concerning setting. | 2013-07-18 |
20130185753 | Data Management and Selection/Control System Preferably for a Video Magazine - A data management control and selection system for use with electronic display and preferably touch sensitive devices for video (and often accompanying audio) signal selections available from memory. In the preferred embodiment the system is a screen-spanning and integrated set of visual segments forming a toroid (although other geometric shapes can be used) having arc-shaped segments which extend in length or degrees around the toroid corresponding to the length in minutes and seconds of the video signal selections. The segments of the toroid are also color coded and collected/coordinated to the genre of the video signal selection to which it corresponds. By aligning (rotating or spinning of the toroid by one's finger on the touch sensitive screen or other cursor-like movement and selection mechanism) the selected segment, associated with the video signal selection will be displayed on the display screen. As the display screen then converts from prominent display of the toroid “menu wheel” to the display of the selected video signal selection, the balance of the display screen will display still videos of one or more of the other video signal selections which are available for viewing. | 2013-07-18 |
20130185754 | PROGRAM GUIDE SYSTEM WITH COMBINATION CATEGORY SEARCH - An interactive television program guide system is provided in which the program guide may provide the user with a selectable list of combination categories. Combination categories are composed of multiple simple Categories such as sports, news, comedy, movies, children, etc. Program listings are supplied to the program guide. At least some of the program listings are associated with combination categories. A combination category build process may be used to assign combination categories to program listings. The user is able to use the selectable categories list to quickly identify programming of interest. | 2013-07-18 |
20130185755 | LONG TERM EVOLUTION WIRELESS COMMUNICATION SYSTEM AND RELATED METHODS - An LTE wireless communication system includes an LTE base station, and mobile wireless communications devices. Each mobile wireless communications device exchanges video data with another mobile wireless communications device via the LTE base station and by sending at least one of a PTV request and an RTV request to the LTE base station. The LTE base station is configured, when network traffic is below a threshold value, to allocate bandwidth for a PTV connection between a given mobile wireless communications device and a given other mobile wireless communications device, and, when the network traffic exceeds the threshold value, to allocate bandwidth for an RTV connection between the given mobile wireless communications device and the given other mobile wireless communications device. | 2013-07-18 |
20130185756 | Client, a Content Creator Entity and Methods Thereof for Media Streaming - The embodiments of the present invention relate to methods and arrangements for accomplishing trick modes. This is achieved by assigning samples within a track to sample groups, wherein all samples within a sample group belong to one temporal level and by allowing the client to access one temporal level independently of lower temporal levels. In this way, the flexibility for the client regarding play out of different frame rates is increased which can result in a lower bandwidth utilization. | 2013-07-18 |
20130185757 | METHOD FOR GENERATING TIME BASED PREVIEW IMAGE FOR A VIDEO STREAM - Systems and methods for rewinding a video to a point before the video was first viewed. Video transmitted by a media source is cached by a remote server. Upon a trick-play request for the video, the server generates a rewind stream that includes the video that was transmitted by the media source before the user started to view the video. Upon receiving the rewind stream, the user's equipment may cache the rewind stream in a rewind buffer and rewind or play from the rewind buffer. The server may also generate and transmit a forward stream of the video that the media source has not yet transmitted. The user's equipment may cache the forward stream in a forward buffer. To perform trick-play operations with the video, the user's equipment may migrate the playback of the video to the rewind and forward buffers and rewind or fast-forward the video from the buffers. | 2013-07-18 |
20130185758 | RECEPTION APPARATUS, RECEPTION METHOD, AND PROGRAM - Disclosed herein is a reception apparatus including: a reception block configured to receive AV content; a definition information acquisition block configured to acquire definition information defining the life cycle of an application program to be executed in linkage with the AV content; an application acquisition block configured to acquire the application program distributed over a network in accordance with the acquired definition information; and a control block configured to control the performance of the acquired application program. | 2013-07-18 |
20130185759 | METHOD FOR TRANSFERRING VIDEO CHUNKS, SERVER ENTITY, CLIENT ENTITY AND INTERMEDIATE NETWORK ENTITY REALIZING SUCH A METHOD - Method to provide video chunks to a client entity (C) using a request-response protocol. Each video chunk is available at a server entity (S) as a plurality of encoded video chunks encoded according to respective quality levels. The method includes the steps of: —the server entity sending to the client entity information on the different quality levels, —the client entity making a selection of one quality level of the different quality levels based on criteria related to local transfer bandwidth related parameters, —the client entity requesting the server entity to transfer to it encoded chunks encoded in that one chunk quality level and —the server entity sending the encoded chunks encoded according to that one chunk quality level to said client entity, —the server entity sending to the client entity additional information related to a transfer time of the encoded chunks from the server entity to the client entity, and —the client entity in making the selection of the one quality level taking into account also the additional information. | 2013-07-18 |
20130185760 | STREAMING DISTRIBUTING DEVICE AND METHOD, STREAMING RECEIVING DEVICE AND METHOD, STREAMING SYSTEM, PROGRAM, AND RECORDING MEDIUM - Disclosed herein is a streaming distributing device including: a content fragment generating section configured to generate a fragment storing data of a content to be distributed by streaming, the fragment being defined by an MP4 file format; and a subtitle fragment generating section configured to generate a fragment storing a TTML (Timed Text Markup Language) document instance relating to a subtitle to be displayed in the content, the fragment being defined by the MP4 file format, wherein the subtitle fragment generating section adds, to header information of the fragment, instance classification distinguishing information for distinguishing whether the TTML document instance stored in the fragment is a TTML document instance specifying a rendering context relating to the subtitle. | 2013-07-18 |
20130185761 | Set Top Box For Performing Diagnostic Functions - The present application relates to set top boxes and relates to the inclusion of a diagnostic function in the set top box which may be activated remotely or respond internally to the detection of faults or changes in status. The diagnostic function may emulate key presses from an infrared remote control to perform a test. | 2013-07-18 |
20130185762 | METHOD, APPARATUS, SIGNALS AND MEDIUM FOR ENFORCING COMPLIANCE WITH A POLICY ON A CLIENT COMPUTER - A method and system for enforcing compliance with a policy on a client computer in communication with a network is disclosed. The method involves receiving a data transmission from the client computer on the network. The data transmission includes status information associated with the client computer. The data transmission is permitted to continue when the status information meets a criterion. | 2013-07-18 |
20130185763 | DISTRIBUTED PROCESSING SYSTEM, DISTRIBUTED PROCESSING METHOD AND COMPUTER-READABLE RECORDING MEDIUM - A distributed processing system | 2013-07-18 |
20130185764 | FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS - Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed environment. One or more applications are restricted by an access control system, which can be, for example, a trusted software component of an operating system. In one embodiment, the bookmarks or other identifiers allow an application to have access to a file even if the file is renamed or moved by a user while the application has been terminated. In one embodiment, a resource manager, or other trusted access control system, can interact with an application to allow for the use of bookmarks in an environment in which a sandbox application controls access to the files such that each application must make a request to the sandbox application in order to obtain access to a particular file or folder. | 2013-07-18 |
20130185765 | METHODS AND SYSTEMS FOR RESTRICTING ELECTRONIC CONTENT ACCESS BASED ON GUARDIAN CONTROL DECISIONS - Methods, computer-readable media, and systems are provided to facilitate a second user to allow or deny a first user, such as a child, from accessing content by proving the second user with a content profile based on decisions made by other users with respect to the content. In one implementation, a system allows the second user to set a threshold to automatically allow or deny access based on the other users' decisions. The decisions made by other users are aggregated into information that may be based on similarities between the child and other children from whom other users have previously made decisions regarding the particular content. In addition, the aggregation may more heavily weight decisions by users that have a history of making similar decisions to the second user. | 2013-07-18 |
20130185766 | COMMUNICATIONS RELAY APPARATUS - A communications relay apparatus for relaying communications between an electronic control unit (ECU) connected to the apparatus via an in-vehicle local area network (LAN) and an external device connected to the apparatus via a communication path different from the in-vehicle LAN. In the apparatus, a data transfer unit forwards relay data received from the ECU to the communication path and forwards relay data received from the external device to the in-vehicle LAN. But the data transfer unit is inhibited from forwarding reprogramming data for reprogramming the ECU received from the external device to the in-vehicle LAN. An authentication unit authenticates a vehicle user, and when the vehicle user is successfully authenticated, then permits the data transfer unit to forward the reprogramming data to the in-vehicle LAN. | 2013-07-18 |
20130185767 | CLUSTERED AAA REDUNDANCY SUPPORT WITHIN A RADIUS SERVER - In general, techniques are described for supporting interchassis redundancy (ICR) by a plurality of network access servers (NASes) that are members of an ICR. For example, techniques may be used to associate, within a RADIUS server, multiple NAS identifiers for the NASes with a single NAS identifier alias. The RADIUS server is configured to handle RADIUS protocol messages from any member of the ICR cluster as though the RADIUS protocol messages issued from a single NAS having the NAS identifier alias. | 2013-07-18 |
20130185768 | Monetization of a Media Channel Network - The disclosed embodiments relate to a media or communication network or platform that facilitates communication via one or more media or communication channels. Moreover, the disclosed embodiments allow one or more third-party content sources to determine how their content is transmitted or conveyed, when their content is transmitted or conveyed, and/or which channels should be used to transmit or convey their content. One or more third-party content sources may, for instance, target one or more specific channels based on, for example, the one or more channel operators, the audience of the one or more channels, or the like. This allows one or more third-party content sources to leverage their content against channel operators or content from other third-party content sources. One or more third-party content sources may, for example, bid against other third-party content sources for the ability to transmit or convey their content via the one or more channels. | 2013-07-18 |
20130185769 | NEAR FIELD COMMUNICATION ELECTRONIC DEVICE, LOGIN SYSTEM USING THE SAME AND METHOD THEREOF - A near field communication (NFC) electronic device, a login system using the same and a method thereof are disclosed. The NFC electronic device includes a reading module, an embedded controller and a matching module. The reading module receives identification information transmitted from a readable component when the readable component approaches. The embedded controller is connected to the reading module and stores the identification information. The matching module is connected to the embedded controller and performs a matching authentication according to the identification information. If the matching authentication is successful, the matching module searches whether required account confidential information exists in a database according to the identification information. If yes, the matching module selects and transmits the required account confidential information to the embedded controller. The embedded controller outputs a hardware signal corresponding to the account confidential information to an application program of a user login screen. | 2013-07-18 |
20130185770 | METHODS AND SYSTEMS FOR PROVIDING ACCESS TO AN ONLINE SYSTEM - Methods and systems are provided for enabling access to a secure system from a remote system without directly logging into the secure system for debugging purposes. The secure system and the remote system may login to a host system with a session ID and establish a session. The secure system starts a Hyper Text Transport Protocol (HTTP) enabled debugger to enable debugging of the web browser traffic. The HTTP enabled debugger may be displayed on the remote system via the host system. The remote system may enter debug commands from a web browser on the remote system. The debug commands are then applied on the web browser of the secure system. | 2013-07-18 |
20130185771 | NETWORK SYSTEM - A network system includes network relay devices including a master device for administrating the network system, and a member device to be administrated by the master device. When the master device receives an authentication request from an external terminal connected to the network system, the master device performs an authentication processing for authorizing or denying the authentication request. When the authentication request is authorized, one network relay device connected to the external terminal in the network system performs a communication-authorizing processing for authorizing a communication between the external terminal and the one network relay device, and performs a transmission processing for transmitting a communication authorization data to an other network relay device which is not connected to the external terminal in the network system. When the other network relay device receives the communication authorization data, the other network relay device performs the communication-authorizing processing. | 2013-07-18 |
20130185772 | DYNAMICALLY UPDATING A SESSION BASED ON LOCATION DATA FROM AN AUTHENTICATION DEVICE - Systems, devices, methods, and software are described for dynamically updating a session based on location data from an access device, such as an access card reader. In one example, a method of managing at least one centrally hosted virtual session may include: associating a user with a virtual session, a first terminal device, and a first location at a central server computer system; receiving a notification at the central server computer system that an access token associated with the user has been received at an access device associated with a second terminal device and a second location; associating the virtual session with the second location in response to the notification; and updating the virtual session at the first terminal device according to at least one location-based rule associated with the second location. | 2013-07-18 |
20130185773 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING, SHARING, AND STORING SEISMIC DATA - Implementations described and claimed herein provide a system and methods for managing a flow of and access to proprietary data in a cloud storage array. In one implementation, a plurality of uploads of the proprietary data is received. An association of the proprietary data is maintained across the plurality of uploads. A role is assigned to a party with an interest in the proprietary data. The role is defined by a set of access permissions. The access of the party to the proprietary data is controlled based on the assigned role. The proprietary data may be multi-dimensional data sets, such as raw, processed, and/or interpreted seismic data sets. | 2013-07-18 |
20130185774 | Systems and Methods of Managing Access to Remote Resources - A method and system are provided for managing access to resources available remotely from at least one computing device. The resources include at least one software application and at least one hardware component. The method and system involve storing access level indicators for indicating different types of access; storing identifiers for identifying different users with access to the at least one computing device and possible access to the resources; for each resource and each identifier, storing an access level indicator for that resource and that user; and before granting access to a resource for a user seeking access to the resource, operating a processor to: determine an identifier identifying the user; determine the access level indicator stored in the storage module for the identifier and the resource; and if access is consistent with the determined access level indicator, grant access to the resource, otherwise, deny access to the resource. | 2013-07-18 |
20130185775 | MULTI FACTOR AUTHENTICATION - In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel. | 2013-07-18 |
20130185776 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING MEDIA CONTENT BY CAPTURING MEDIA CONTENT AT A CLIENT DEVICE AND STORING THE MEDIA CONTENT AT A NETWORK ACCESSIBLE MEDIA REPOSITORY - Media content is managed by defining a list of authorized recipients in a network accessible security information repository, recording media content at a client device, obtaining the list of authorized recipients at the client device, associating at least one of the authorized recipients with the media content, and transmitting the media content along with information identifying the at least one of the authorized recipients associated therewith from the client device to a network accessible media repository for storage therein. The media content includes audio, video, and/or image content. | 2013-07-18 |
20130185777 | Methods And Apparatus For Reliable And Privacy Protecting Identification Of Parties' Mutual Friends And Common Interests - Systems and techniques for authenticating joint friends of users of wireless devices. An authenticating authority delivers a token to a wireless device for each party identified as a friend of a user of the wireless device, such as through relationships in an online social network. Two wireless devices can use information relating to the tokens to determine information relating to joint friends of the users of the devices, such as the identities of joint friends or simply the numbers of joint friends. Tokens can be further refined to allow for analysis that provides information relating to the degree of intimacy of the relationship between a user and a party identified as a friend. | 2013-07-18 |
20130185778 | SYSTEM, METHOD AND PROGRAM FOR OFF-LINE TWO-FACTOR USER AUTHENTICATION - Provided is an off-line two-factor user authentication system with a reduced risk of leakage of authentication information. The two-factor user authentication system is designed to use, as a password, a one-time-password derivation rule to be applied to certain pattern elements included in a presentation pattern at specific positions so as to create a one-time password, and further use, as a second authentication factor, information identifying a client to be used by a user. A plurality of pattern seed values each adapted to uniquely specify a presentation pattern in combination with a client ID, and a plurality of verification codes corresponding to respective ones of the pattern seed values, are stored in an off-line two-factor authentication client. A presentation pattern is created based on a selected one of the pattern seed values and a client ID, and an entered one-time password is verified based on a verification code corresponding to the selected pattern seed value. | 2013-07-18 |
20130185779 | SYSTEM AND METHOD FOR TWO-FACTOR USER AUTHENTICATION - Provided is a two-actor user authentication system with a reduced risk of leakage of authentication information. | 2013-07-18 |
20130185780 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR GENERATING A ONE TIME PASSWORD - This technology provides methods, non-transitory computer readable medium and apparatuses that generate a OneTime Password (OTP) such that no hardware token is used. The technology uses some functions and parameters generated and transmitted to the client machine, by the server. The server generates a token for each session, cyclic groups G | 2013-07-18 |
20130185781 | METHOD AND DEVICE FOR REALIZING REMOTE LOGIN - The present disclosure provides a method and a device for realizing remote login. The method includes: a terminal server responding to a login request to an internal system from an end user, and recording and saving login information of the end user for logging in to the internal system; and the terminal server judging and analyzing the way the end user logs in to the internal system according to the login information and pre-configured rule, and allowing the end user to log in to and access the internal system if the analyzed result matches the pre-configured rule. The method and device allows for implementations of the SSO authentication and user bind authentication on the aspect of the data flow in the terminal server, simplifies the process of logging in to and accessing the internal system, and improves the information security of the system. | 2013-07-18 |
20130185782 | SYSTEMS AND METHODS FOR DUAL READER EMULATION - Systems and methods for emulating credentials are disclosed. In some cases, the systems include an access credential reader and an access credential writer. The access credential reader is communicably coupled to the access credential writer. The access credential reader is operable to receive information from an access credential, and to transfer at least a portion of the information to the access credential writer. The access credential writer is operable to transfer at least the portion of the information to an emulation access credential. | 2013-07-18 |
20130185783 | SYSTEM AND METHOD FOR CONFIRMING IDENTITY AND AUTHORITY BY A PATIENT MEDICAL DEVICE - A system and method for confirming identity and authority by a patient medical device is provided. Master credentials are issued to a requesting device and a receiving device from an authorizing agent. The master credentials include a public key of the authorizing agent and a digital signature of a root certification authority. Device credentials are issued to the requesting device from the authorizing agent. The device credentials include a public key of the requesting device and a digital signature of the authorizing agent. Identification credentials are provided to the receiving device and include the device credentials and a digital signature of the requesting device. The requesting device is authenticated. The digital signature of the authorizing agent in the device credentials is checked using the public key of the authorizing agent in the master credentials of the receiving device. The digital signature of the requesting device in the identification credentials is checked using the public key of the requesting device in the device credentials. | 2013-07-18 |
20130185784 | AUTHORITY DELEGATE SYSTEM, SERVER SYSTEM IN AUTHORITY DELEGATE SYSTEM, AND CONTROL METHOD FOR CONTROLLING AUTHORITY DELEGATE SYSTEM - An authority delegate system including a first server system to manage specific information, a second server system to provide a service, an authentication device, and a client operated by a first user who is authorized to use the service, includes a reception unit, a transmission unit, a management unit, a determination unit, and a provision unit. The reception unit receives an authorization token shared range for authorizing specific information usage. The transmission unit transmits to the client a setting screen for setting whether to permit users within the shared range to share the authorization token. The management unit manages the setting screen set shared range, and the authorization token issued by the authentication device. The provision unit provides, in response to determining that the second user is included in the shared range and confirmation that the authorization token is valid, the service to the second user using the specific information. | 2013-07-18 |
20130185785 | SYSTEM AND METHOD FOR INITIALIZING AND MAINTAINING A SERIES OF VIRTUAL LOCAL AREA NETWORKS CONTAINED IN A CLUSTERED COMPUTER SYSTEM - A system and method for sharing network resources; the system comprising at least one network switch, at least one computing device comprising at least one network connection and at least one storage device containing software capable of initializing and maintaining: (i) a management local area network (MLAN) comprising a virtual or physical firewall; and (ii) a plurality of client virtual local area networks (VLANs), wherein each client VLAN comprises a virtual firewall and a plurality of network resources. | 2013-07-18 |
20130185786 | WIRELESS INTERNET PRODUCT SYSTEM - Low resource internet devices such as consumer electronics products connect to web service by means of a proxy method where the connected device does not need to maintain the expensive and fragile web service interface itself, but rather uses simple low level protocols to communicate through a gateway that executes software to translate a low level proprietary wireless protocol to a proprietary low level internet protocol that can pass through a firewall to proxy servers that translate the low level protocols thus presenting an interface that makes the internet device appear to have a full web service interface to enable communication between the internet devices and the web server. | 2013-07-18 |
20130185787 | Safely Executing an Untrusted Native Code Module on a Computing Device - A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects. | 2013-07-18 |
20130185788 | TRAVERSAL OF A SOFT BAR TO UNLOCK AN APPLICATION - Illustrated is a system and method to receiving input at a soft bar, the input received at a middle position on the soft bar equal distance from a first position and a second position on the soft bar. The system and method also including a traversing of the soft bar from the middle position to one of the first or second position, using the input, a plurality of times to generate a candidate password, each traversal to generate a position value that is part of the candidate password. Further, the system and method to include unlocking a Graphical User Interface (GUI) for use, the unlocking to occur where the candidate password is equivalent to a stored password. | 2013-07-18 |
20130185789 | METHOD AND APPARATUS FOR PROTECTING A PASSWORD OF A COMPUTER HAVING A NON-VOLATILE MEMORY - A method for protecting a password of a computer having a non-volatile memory is disclosed. A password is stored in a non-volatile memory of a computer. The computer is then transitioned to a power saving state. In response to a detection of an unauthorized access to the non-volatile memory during the power saving state transition, a password input is requested from a user. The computer returns to a power-on state from the power saving state when there is a success in authentication of the input password. | 2013-07-18 |
20130185790 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 2013-07-18 |
20130185791 | VOUCHING FOR USER ACCOUNT USING SOCIAL NETWORKING RELATIONSHIP - Trusted user accounts of an application provider are determined. Graphs, such as trees, are created with each node corresponding to a trusted account. Each of the nodes is associated with a vouching quota, or the nodes may share a vouching quota. Untrusted user accounts are determined. For each of these untrusted accounts, a trusted user account that has a social networking relationship is determined. If the node corresponding to the trusted user account has enough vouching quota to vouch for the untrusted user account, then the quota is debited, a node is added for the untrusted user account to the graph, and the untrusted user account is vouched for. If not, available vouching quota may be borrowed from other nodes in the graph. | 2013-07-18 |
20130185792 | DYNAMIC EXECUTION PREVENTION TO INHIBIT RETURN-ORIENTED PROGRAMMING - A method, apparatus, and/or system for execution prevention is provided. A state indicator for a first subset of a plurality of memory pages of executable code in a memory device is set to a non-executable state. A state indicator for a second subset of the plurality of memory pages is set to an executable state, where the second subset of the plurality of memory pages includes indirection stubs to functions in the first subset of the plurality of memory pages. Upon execution of an application, a function call is directed to a corresponding indirection stub in the second subset of the plurality of memory pages which modifies the state indicator for a corresponding function in the first subset of the plurality of memory pages prior to directing execution of the called function from the first subset of the plurality of memory pages. | 2013-07-18 |
20130185793 | Apparatus and Method for Tracking Network Path - An apparatus and method for effectively tracking a network path by using packet information generated when visiting a Web page are provided. | 2013-07-18 |
20130185794 | BASE STATION FOR DETECTING DENIAL-OF-SERVICE ATTACKS IN COMMUNICATION SYSTEM AND METHOD FOR CONTROLLING THE SAME - Provided is a base station for detecting Denial-of-Service (DoS) attacks in a communication system and a method for controlling the same. The base station includes a first estimator for estimating, for a predetermined time, a reception rate of data that is received at the base station from a communication network to be transmitted to at least one wireless terminal; a second estimator for estimating, for a predetermined time, a bandwidth allocated for transmission of data to the at least one wireless terminal, based on at least one of feedback information transmitted from the at least one wireless terminal and channel capacity of the base station; and a controller for calculating a ratio of the bandwidth to the reception rate for the at least one wireless terminal, and determining whether there is a DoS attack, using the calculated ratio. | 2013-07-18 |
20130185795 | METHODS AND SYSTEMS FOR PROVIDING NETWORK PROTECTION BY PROGRESSIVE DEGRADATION OF SERVICE - Systems and methods are provided for protecting a defense with a self defending intrusion system. Data packets may be monitored to detect a pattern of activity indicating a potential attack. Upon detection of a threat, a countermeasure or progressive degradation of network services may be initiated on a selected basis so controllable reduce performance of data communication of the device. | 2013-07-18 |
20130185796 | METHOD AND APPARATUS FOR SECURE AND RELIABLE COMPUTING - In one embodiment, the invention is a method and apparatus for secure and reliable computing. One embodiment of an end-to-end security system for protecting a computing system includes a processor interface coupled to at least one of an application processor and an accelerator of the computing system, for receiving requests from the at least one of the application processor and the accelerator, a security processor integrating at least one embedded storage unit and connected to the processor interface with a tightly coupled memory unit for performing at least one of: authenticating, managing, monitoring, and processing the requests, and a data interface for communicating with a display, a network, and at least one embedded storage unit for securely holding at least one of data and programs used by the at least one of the application processor and the accelerator. | 2013-07-18 |
20130185797 | WHITELIST-BASED INSPECTION METHOD FOR MALICIOUS PROCESS - A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective. | 2013-07-18 |
20130185798 | IDENTIFYING SOFTWARE EXECUTION BEHAVIOR - The present invention extends to methods, systems, and computer program products for identifying software execution behavior. Embodiments of the invention can be used to assist a user in a making a reasoned and informed decision about whether the behavior of executable code is malicious. Data indicative of executable code behavior can be collected statically without having to execute the executable code. Behavior data can be collected essentially automatically with little, if any, user involvement. A user initiates analysis of executable code and is provided a visual categorized representation of behavior data for the executable code. | 2013-07-18 |
20130185799 | TRUSTED INSTALLATION OF A SOFTWARE APPLICATION - The trust reputation of the combination of an installation package and installer, as a pair, and the combination of a file and an installer, as a pair, is used to store the identity of a file in a persistent cache. An entry in the persistent cache indicates the trust worthiness of a file that does not contain malware thereby avoiding a scan of the file for malware. The trust worthiness of a file may be determined from known trust reputations of the installation package, installer, and file from a network of computing resources. By relying on the known trust reputation of the combination of the installation package and installer and the combination of the file and installer, the identity of the file may be stored in persistent cache quickly. | 2013-07-18 |
20130185800 | ANTI-VIRUS PROTECTION FOR MOBILE DEVICES - A computing device, machine-readable medium, and method associated with identifying viruses on a mobile device are disclosed. In embodiments, a computing device may include a communication interface, one or more storage media containing instructions, and a processing unit coupled to the communication interface and the one or more storage media. The instructions, when executed by the processor, may configure the computing device to analyze files, received by the computing device, for the presence of a virus. The instructions, when executed by the processor, may further notify the mobile device when the presence of a virus is detected. | 2013-07-18 |
20130185801 | SECURE DATA STORAGE AND RETRIEVAL - A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage device. The field programmable gate array can be configured to include a data storage section for performing a data storage operation and a data retrieval section for performing a data retrieval operation. The data storage operation can include obtaining a seed value and retrieving one or more algebraic operations based on the seed value. The storage operation can also include processing input data according to the one or more algebraic operations to generate pseudorandom output data, prepending the seed value to the output data and storing the output data in the electronic data storage device. | 2013-07-18 |
20130185802 | Online Fraud Detection Dynamic Scoring Aggregation Systems and Methods - In some embodiments, an online fraud prevention system combines the output of several distinct fraud filters, to produce an aggregate score indicative of the likelihood that a surveyed target document (e.g. webpage, email) is fraudulent. Newly implemented fraud filters can be incorporated and ageing fraud filters can be phased out without the need to recalculate individual scores or to renormalize the aggregate fraud score. Every time the output of an individual filter is calculated, the aggregate score is updated in a manner which ensures the aggregate score remains within predetermined bounds defined by a minimum allowable score and a maximum allowable score (e.g., 0 to 100). | 2013-07-18 |
20130185803 | MARKING AND OBSCURING SENSITIVE VALUES IN TRACES - In one embodiment, a method for processing trace data is provided. The method generates trace data during execution of the target application and obtains criteria for identifying whether a value in the trace data is sensitive. An initial occurrence of a sensitive value in the trace data is identified based on the obtained criteria. The method then stores the sensitive value in a data structure accessible by an obscuring process. The obscuring process receives the trace data and obscures occurrences of the sensitive value in the trace data prior to providing the trace data for display. | 2013-07-18 |
20130185804 | METHOD AND APPARATUS FOR GENERATING PRIVACY RATINGS FOR APPLICATIONS - An approach is provided for generating privacy ratings for applications. A privacy ratings platform determines use information associated with one or more applications executing on one or more devices. By way of example, the use information is determined based, at least in part, on usage data associated with one or more input sources, one or more components, one or more categories of personal information, or a combination thereof associated with the one or more devices. The privacy ratings platform then processes and/or facilitates a processing of the use information to determine one or more privacy ratings for the one or more applications. | 2013-07-18 |
20130185805 | METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE - Usage rights for a digital work are established prior to creation of the corresponding content. The rights can be associated with the content after the content is created. A content creation, such as a video recorder or a still camera, device can store labels of the rights and can associate usage rights with content in real time as the content is created. | 2013-07-18 |
20130185806 | PERSONAL-INFORMATION TRANSMISSION/RECEPTION SYSTEM, PERSONAL-INFORMATION TRANSMISSION/RECEPTION METHOD, PERSONAL-INFORMATION PROVISION APPARATUS, PREFERENCE MANAGEMENT APPARATUS AND COMPUTER PROGRAM - Disclosed is a personal-information (PI) transmission/reception system and the like which makes it possible to, even when the number of apparatuses possessing PI has increased, reduce a burden of a user who sets preferences (PRFs) with respect to disclosures of the PI on the individual apparatuses. | 2013-07-18 |
20130185807 | End User License Agreement Detection and Monitoring - An approach is provided for detecting and monitoring end user license agreement (EULA) compliance is provided. A request to access a executable software code is received from an end user. A EULA version corresponding to the requested executable software code is identified. A determination is made as to whether the end user has accepted the identified EULA. If the end user has not accepted the identified EULA, then an out of date EULA notification is sent to the end user, the EULA is sent to the end user requesting an acceptance to the EULA. A EULA response is received from the end user. If the end user accepts the EULA, then the end user is allowed access to the executable software code. | 2013-07-18 |
20130185808 | APPARATUS AND METHOD FOR PROTECTING DATA STORED IN DATA STORAGE DEVICE - A computerized method protects data stored in a data storage device. One or more safe destinations are set and correlated with predetermined data of the data storage device. When target data correlated with the safe destinations is needed to be transmitted to a target destination, whether the target destination matches with one of the safe destinations is determined. A data transmission program of the data storage device is executed, and the target data is transmitted to the target destination using the data transmission program, when the target destination matches with one of the safe destinations. If the target destination does not match with any of the safe destinations, a user is notified to input a password and the target data is transmitted to the target destination when the user has input a valid password within a predetermined time period. | 2013-07-18 |
20130185809 | SYSTEM FOR DELEGATION OF AUTHORITY, ACCESS MANAGEMENT SERVICE SYSTEM, MEDIUM, AND METHOD FOR CONTROLLING THE SYSTEM FOR DELEGATION OF AUTHORITY - In sequential processing including issuance of an approval token from a user to a cooperation source service via an access management service, a system for delegation of authority confirms whether each of the user and the cooperation source service has a sufficient authority to execute a service of a cooperation destination before issuing the approval token. | 2013-07-18 |
20130185810 | CONTROLLED SERIALIZATION AND/OR DESERIALIZATION - Among other things, one or more techniques and/or systems are provided for controlling the serialization of data into a serialized structure and/or the deserialization of data from the serialized structure. That is, a first client may request serialization of data comprising one or more entities. Entities that the first client has permission to serialize may be serialized for inclusion within a serialized structure, which may be encrypted. A set of deserialization permissions specifying which entities may be accessed by which clients may be defined for the serialized structure. In this way, one or more entities within the serialized structure may be deserialized for a second client based upon evaluating the second client against the set of deserialization permissions to determine which entities the second client has permission to access. The serialized structure may otherwise remain encrypted to provide sustained protection of serialized data comprised therein. | 2013-07-18 |
20130185811 | SUSTAINED DATA PROTECTION - Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access levels associated with content within data using a set of access policies (e.g., a partial access level to inventory data for an inventory server, a full access level to inventory data and billing data for a shopping website server, etc.). The data protector may secure (e.g., encrypt) the data to create protected data, so that clients may be unable to access content of the protected data without obtaining access through the data protector. In this way, the data protector may selectively provide clients with access to content within the protected data according to respective access levels for the different clients (e.g., access to inventory data, but not billing data, may be provided to the inventory server by the data protector). | 2013-07-18 |
20130185812 | SYSTEM AND METHOD FOR SECURE CLOUD COMPUTING - In a method for secure cloud computing, a virtual machine (VM) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the VM is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client. Subsequently, at the same computer or at a different computer within the trusted computing cloud, the stored image may be retrieved; a freshness hash of the retrieved image may be determined; the freshness hash of the retrieved image may be sent to the client; and an indication may be received from the client verifying the integrity of the freshness hash of the stored image. | 2013-07-18 |
20130185813 | ACTIVATION OF DEVICE HAVING LIMITED USER INTERFACE - An electronic device performing device activation includes: a wireless communication module operated in an access point (AP) mode to perform communication with a mobile terminal or operated in a client mode to perform communication with a server; an input unit configured to receive a signal requesting conversion of a mode of the wireless communication module; and a controller configured to convert a mode of the wireless communication module and generate device identification information, wherein when a mode conversion request signal is received by the input unit, the controller converts the wireless communication module to the AP mode, and when user authentication information is received from the mobile terminal, the controller converts the wireless communication module into the client mode and transmits an activation request for requesting performing a registration to a device management server based on the user authentication information and the device identification information. | 2013-07-18 |
20130185814 | TECHNIQUES FOR PRESENTING AND COLLECTING END USER LICENSE AGREEMENT ACCEPTANCE - Techniques are disclosed for presenting and collecting end user license agreement acceptance for software applications or firmware components executed on a computing appliance. A sentry component allows only certain commands to be executed before the relevant end user license agreements are accepted, e.g., commands to configure a network interface and web server on the appliance executed on a shell over a serial interface. Once configured the web server is used to provide a rich interface for presenting end user license agreements and obtaining acceptance thereof. Once the user accepts the terms of the relevant license agreements, then the appliance is made active and all configuration commands become operational, including commands needed to configure the device and start services which would otherwise be prohibited by the sentry component prior to license acceptance. | 2013-07-18 |
20130185815 | PASSWORD-LESS LOGIN - User profiles stored on a server control access to private data. Access control to the user profiles themselves is provided without a password. In more detail, the user profile is functionally handicapped by at least a portion of digital data (or a cryptographic key) associated with the user profile being removed and discarded after being sent to an enabling device. A human gesture from the user first provides a key to reconstitute the key or restore the missing data portion in the enabling device which is then transmitted to the server to reconstitute the key or restore the missing data portion in order to reconstitute the user profile for access. | 2013-07-18 |
20130185816 | INFORMATION PROCESSING APPARATUS, METHOD, PROGRAM, AND INTEGRATED CIRCUIT - A content display apparatus which processes protected information configured, with an aim to prevent access from any unauthorized program, to include: a process managing unit which manages a plurality of processes operable in the content display apparatus; and an access detecting unit configured to detect access to the protected-information access detecting unit which detects access to the protected information. The process managing unit includes an application execution control unit which temporarily stops the operation of each of at least one process other than a process which accesses the protected information among the plurality of processes when the access to the protected information is detected by the protected-information access detecting unit. | 2013-07-18 |
20130185817 | Microencapsulated Volatile Insect Repellent and/or Insecticide Agent and Methods of Making and Using the Same - This disclosure is particularly directed to arthropodal compositions in the form of capsules containing an active arthropod agent, more particularly to capsules containing an active arthropod agent and methods of making and using the same. The active arthropod agent may be an insect repellent and/or an insecticide agent. | 2013-07-18 |
20130185818 | METHOD TO TRIGGER RNA INTERFERENCE - A method to generate siRNAs in vivo is described, as are constructs and compositions useful in the method. The method does not depend on the use of DNA or synthetic constructs that contain inverted duplications or dual promoters so as to form perfect or largely double-stranded RNA. Rather, the method depends on constructs that yield single-stranded RNA transcripts, and exploits endogenous or in vivo-produced miRNAs or siRNAs to initiate production of siRNAs. The miRNAs or siRNAs guide cleavage of the transcript and set the register for production of siRNAs (usually 21 nucleotides in length) encoded adjacent to the initiation cleavage site within the construct. The method results in specific formation of siRNAs of predictable size and register (phase) relative to the initiation cleavage site. The method can be used to produce specific siRNAs in vivo for inactivation or suppression of one or more target genes or other entities, such as pathogens. | 2013-07-18 |
20130185819 | Genetically Modified Major Histocompatibility Complex Animals - The invention provides genetically modified non-human animals that express chimeric human/non-human MHC I polypeptide and/or human or humanized β2 microglobulin polypeptide, as well as embryos, cells, and tissues comprising the same. Also provided are constructs for making said genetically modified animals and methods of making the same. Methods of using the genetically modified animals to study various aspects of human immune system are provided. | 2013-07-18 |
20130185820 | Genetically Modified Major Histocompatibility Complex Animals - The invention provides genetically modified non-human animals that express a humanized MHC II protein (humanized MHC II α and β polypeptides), as well as embryos, cells, and tissues comprising the same. Also provided are constructs for making said genetically modified animals and methods of making the same. Methods of using the genetically modified animals to study various aspects of human immune system are provided. | 2013-07-18 |
20130185821 | Common Light Chain Mouse - A genetically modified mouse is provided, wherein the mouse expresses an immunoglobulin light chain repertoire characterized by a limited number of light chain variable domains. Mice are provided that express just one or a few immunoglobulin light chain variable domains from a limited repertoire in their germline. Methods for making bispecific antibodies having universal light chains using mice as described herein, including human light chain variable regions, are provided. Methods for making human variable regions suitable for use in multispecific binding proteins, e.g., bispecific antibodies, and host cells are provided. Bispecific antibodies capable of binding first and second antigens are provided, wherein the first and second antigens are separate epitopes of a single protein or separate epitopes on two different proteins are provided. | 2013-07-18 |
20130185822 | TOMATO HYBRID EX01420200 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid EX01420200 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid EX01420200 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-07-18 |
20130185823 | MESOPOROUS SILICA NANOPARTICLE-MEDIATED DELIVERY OF DNA INTO ARABIDOPSIS ROOT - Transient gene expression is a powerful tool for plant genomics studies. Recently, the use of nanomaterials has drawn great interest. Delivery with mesoporous silica nanoparticles (MSNs) has many advantages. We used surface-functionalized MSNs to deliver and express foreign DNA in | 2013-07-18 |
20130185824 | Method of Increasing Resistance Against Soybean Rust in Transgenic Plants by ADR-1-Gene - The present invention relates to a method of increasing resistance against soybean rust in transgenic plants and/or plant cells. In these plants, the content and/or the activity of an ADR-1-protein are increased in comparison to the wild-type plants not including a recombinant ADR-1-gene. | 2013-07-18 |
20130185825 | USE OF A SEED SPECIFIC PROMOTER TO DRIVE ODP1 EXPRESSION IN CRUCIFEROUS OILSEED PLANTS TO INCREASE OIL CONTENT WHILE MAINTAINING NORMAL GERMINATION - A recombinant DNA construct comprising a polynucleotide encoding an ODP1 polypeptide operably linked to a sucrose synthase 2 promoter where this construct can be used to increase oil content in the seeds of a cruciferous oilseed plant while maintaining normal germination is disclosed. A method for increasing oil content in the seeds of a cruciferous oilseed plant while maintaining normal germination using this construct is also disclosed. | 2013-07-18 |
20130185826 | MATERIALS, SYSTEMS, ORGANISMS, AND METHODS FOR ENHANCING ABIOTIC STRESS TOLERANCE, INCREASING BIOMASS, AND/OR ALTERING LIGNIN COMPOSITION - The present disclosure relates, in some embodiments, to materials, systems, organisms, and methods for enhancing abiotic stress tolerance (e.g., cold, salinity, drought, wind), increasing biomass, and/or altering lignin composition in plants. For example, enhancing abiotic stress tolerance may be achieved using a plant-specific family of transcription factors is APETALA2 (AP2), that includes c-repeat binding factor (e.g., CBF1, CBF3) and AP37 nucleic acids and/or polypeptides. In some embodiments, increasing biomass may be achieved by altering expression of gibberellin oxidases (e.g., GA3ox3/GA2ox4) nucleic acids and/or polypeptides. Altering lignin composition may be achieved by suppression of stem-thickening in pith (e.g., STP1) nucleic acids and/or polypeptides. | 2013-07-18 |