30th week of 2013 patent applcation highlights part 61 |
Patent application number | Title | Published |
20130191845 | LOAD CONTROL DEVICE AND LOAD CONTROL METHOD - A load control device controlling a load of an executed program includes an arithmetic processing unit configured to execute the program, a load detection unit configured to detect a load factor of the arithmetic processing unit, a load-difference detection unit configured to obtain a difference between a predetermined load factor and the load factor detected by the load detection unit and a load controller configured to control, for a predetermined time, the start or stop of the program executed by the arithmetic processing unit so that the arithmetic processing unit has the predetermined load factor on the basis of the difference detected by the load-difference detection unit. | 2013-07-25 |
20130191846 | DATA PROCESSING METHOD, DATA PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING DATA PROCESSING PROGRAM - A data processing method according to the present invention includes executing a third thread for performing a series of procedures (reception, operation, storage, and transmission), in which the series of procedures includes receiving a control signal transmitted from a first thread that supplies input data, then executing an operation using the input data, storing a result of the operation to a data region specified by the control signal, and transmitting the control signal to a second thread that uses the result. This guarantees exclusive data access without locking/unlocking data at the time of executing threads with data dependency and also reduces data transfer cost. | 2013-07-25 |
20130191847 | SAVING PROGRAM EXECUTION STATE - Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service. | 2013-07-25 |
20130191848 | Distributed Function Execution for Hybrid Systems - A system for distributed function execution, the system includes a host in operable communication with an accelerator. The system is configured to perform a method including processing an application by the host and distributing at least a portion of the application to the accelerator for execution. The method also includes instructing the accelerator to create a buffer on the accelerator, instructing the accelerator to execute the portion of the application, wherein the accelerator writes data to the buffer and instructing the accelerator to transmit the data in the buffer to the host before the application requests the data in the buffer. The accelerator aggregates the data in the buffer before transmitting the data to the host based upon one or more runtime conditions in the host. | 2013-07-25 |
20130191849 | DISTRIBUTED FUNCTION EXECUTION FOR HYBRID SYSTEMS - A method includes processing an application by a host including one or more processors and distributing at least a portion of the application to an accelerator for execution. The method includes instructing the accelerator to create a buffer on the accelerator and instructing the accelerator to execute the portion of the application, wherein the accelerator writes data to the buffer. The method also includes instructing the accelerator to transmit the data in the buffer to the host before the application requests the data in the buffer. The accelerator aggregates the data in the buffer before transmitting the data to the host based upon one or more runtime conditions in the host. | 2013-07-25 |
20130191850 | INTERCEPTING DATA - Disclosed herein is a technique that intercepts data transmitted from a first application executing in a first domain to a second application executing in a second domain. | 2013-07-25 |
20130191851 | Monitoring Operating Parameters In A Distributed Computing System With Active Messages - In a distributed computing system including a nodes organized for collective operations: initiating, by a root node through an active message to all other nodes, a collective operation, the active message including an instruction to each node to store operating parameter data in each node's send buffer; and, responsive to the active message: storing, by each node, the node's operating parameter data in the node's send buffer and returning, by the node, the operating parameter data as a result of the collective operation. | 2013-07-25 |
20130191852 | Multithreaded Computing - A system, method, and computer program product are provided for improving resource utilization of multithreaded applications. Rather than requiring threads to block while waiting for data from a channel or requiring context switching to minimize blocking, the techniques disclosed herein provide an event-driven approach to launch kernels only when needed to perform operations on channel data, and then terminate in order to free resources. These operations are handled efficiently in hardware, but are flexible enough to be implemented in all manner of programming models. | 2013-07-25 |
20130191853 | PROGRAM EXECUTION METHOD AND PROGRAM EXECUTION APPARATUS - In a terminal apparatus including a first application that runs on first middleware and a second application that runs on second middleware and performs management of billing, and so on, the second application receives an instruction to execute the first application, obtains billing information of the first application and judges whether or not the first application can be executed, and activates the first application through the second middleware and the first middleware when judging that the execution is possible. | 2013-07-25 |
20130191854 | HARDWARE COMPUTING SYSTEM WITH EXTENDED CALCULATION AND METHOD OF OPERATION THEREOF - A method of operation of a hardware computing system includes: receiving a command stream from a general purpose central processing unit; transferring a command from the command stream by an application manager; activating a programmable execution array, by the application manager, for processing the command; and providing a response through a result stateful multiplexer to the general purpose central processing unit for the command from the command stream. | 2013-07-25 |
20130191855 | Automatic Detection of a Cable Trap - Firmware is installed in a cable modem, enabling detection of the presence or absence of a cable trap in the feed of a customer location. Such a cable modem includes a trap-detection module and a trap-detection object. The trap-detection module is configured to determine whether a video signal is present at a cable-television frequency. The trap-detection object is configured to store data as to whether the video signal is present. For example, a first piece of data is stored if the video signal is present, indicating absence of a properly functioning cable trap between a cable head-end and the cable modem. A second piece of data is stored if the video signal is absent, indicating presence of a properly functioning cable trap between the cable head-end and the cable modem. | 2013-07-25 |
20130191856 | COUPON DISTRIBUTION SYSTEM, TELEVISION DEVICE AND SERVER - A coupon distribution system includes a television device and a server. The television device acquires program related information of a television program. The television device sends the program related information and a device ID of the television device via a network. The server has a user database that stores for each device a device ID and a device location. The server acquires the device ID of the television device via the network. The server searches in the user database for the device location of the television device based on the device ID of the television device. The server converts service information of a coupon providing store into a code image. The server sends the code image to the television device such that the television device displays the code image on a screen of the television device in response to receiving the code image from the server. | 2013-07-25 |
20130191857 | Method and System for a Vote Based Media System - Systems and methods for allowing a user to interact with a station so to have input into the selection of media to be broadcast. The user is able to vote on selections within a media library. The station tabulates the votes and broadcasts the highest ranked selection based on vote totals. The user is able to view the voting in real time and add additional votes, either positive or negative, to influence the ranking or can interact in other number of ways. The media can include audio or video broadcast over the internet via an internet radio station or through other types of networks. | 2013-07-25 |
20130191858 | Broadcast Encoding, Recording and Distribution System and Method - A method and system for capturing, storing, and streaming over the air broadcasts based on user requests is disclosed. The system and method utilize an antenna system that receives all the different frequency channels simultaneously. The received signals are then amplified and a series of filters are used to filter the signal to differentiate the different frequencies. The signals are then decoded and duplicated for each user based on user requests. | 2013-07-25 |
20130191859 | Time Shifting Enhanced Television Triggers - Enhanced television broadcasts including triggers with expires attributes may be utilized in a variety of situations where the expires attribute may adversely affect the utilization of the trigger. For example, in situations where the broadcast is recorded, playback may be enabled even after the trigger expiration. Similarly, local affiliates or FNOCs may rebroadcast enhanced television content by adjusting the expires attributes of the original trigger. | 2013-07-25 |
20130191860 | RECEIVER, RECEPTION METHOD, PROGRAM AND INFORMATION PROCESSING SYSTEM - Disclosed herein is a receiver including: a reception section operable to receive AV content transmitted by a broadcasting wave; a trigger acquisition section operable to acquire trigger information adapted to operate an application program to be executed in response to the received AV content; a table acquisition section operable to acquire a correlation table correlating the trigger information to commands adapted to control the operation of the application program; an application acquisition section operable to acquire, based on the acquired correlation table, the application program transmitted by the broadcasting wave when the command correlated to the trigger information indicates the acquisition of the application program; and a control section operable to control the operation of the acquired application program in accordance with the command correlated to the trigger information. | 2013-07-25 |
20130191861 | BROADCASTING-COMMUNICATIONS COLLABORATION SYSTEM, DATA GENERATING APPARATUS, AND RECEIVING APPARATUS - A data generating apparatus | 2013-07-25 |
20130191862 | TELEVISION RECEIVER - A television receiver includes a broadcast reception unit that receives broadcast signals from broadcasting stations, a judgment unit that judges whether or not an emergency alert broadcast signal is included in the broadcast signal received by the broadcast reception unit, a display unit that, when the judgment unit judges that the emergency alert broadcast signal is included in the broadcast signal, displays emergency alert information based on the emergency alert broadcast signal, an information transmission unit that, when the judgment unit judges that the emergency alert broadcast signal is included in the broadcast signal, wirelessly transmits to other television receivers an alert issuance information signal indicating that a broadcasting station is broadcasting an emergency alert, an information reception unit that wirelessly receives the alert issuance information signal from other television receivers, and a control unit. | 2013-07-25 |
20130191863 | Channel Family Surf Control - An interface for an interactive television application includes a graphical representation of a channel changing apparatus and is configured such that in response to a channel change request a channel change event limited to a channel change within a designated family of television channels is initiated. The graphical element may be labeled so as to indicate the presently viewed family of television channels. In various embodiment, the channel content may be scaled to fit within a window or may be full screen, in which latter case the interface may be overlaid on top of the full screen video. In one example, the graphical representation of the channel changing apparatus resembles a pair of channel up/down buttons. | 2013-07-25 |
20130191864 | METHOD AND SYSTEM FOR INTEGRATED MEDIA PLANNING AND AUTOMATED ADVERTISEMENT DISTRIBUTION AND INSERTION - A system and method for integrating a media plan and a targeted advertisement into a television or a radio channel. The system includes a user interface for receiving a media plan and a television program schedule. The system also includes a media server to integrate the television program schedule and the targeted advertisement based on the media plan and to generate a Mark-in and a Mark-out montage. The system further includes one or more edge devices for fetching the targeted advertisement, detecting the Mark-in and the Mark-out montage and inserting the targeted advertisement into the television channel. The method includes receiving a media plan from an advertiser. The method also includes selecting a television channel by the advertiser. The method further includes scheduling of a targeted advertisement. Furthermore, the method includes fetching and inserting the targeted advertisement for playing on the television channel based on the media plan. | 2013-07-25 |
20130191865 | METHOD AND SYSTEM FOR INSERTING A LOCAL TELEVISION CONTENT AND A REGIONAL ADVERTISEMENT UNDER CENTRALIZED CONTROL - A system and method for inserting a regional advertisement and a local television content under centralized control. The system includes a user interface for receiving a media plan from an advertiser. The system also includes a media server including a memory and a processor to insert at least one of a local television content and a regional advertisement from a centralized studio. Further, the system includes one or more edge devices for fetching and inserting at least one of the local television content and the regional advertisement into a central network feed for a pre-determined time period. The method includes fetching a local television content from a local storage device, specifying a pre-determined time period within the central network feed and inserting the local television content for the pre-determined time period into the central network feed. The system implementing the method is implemented for radio content and advertising. | 2013-07-25 |
20130191866 | METHOD AND SYSTEM FOR TRACKING OF ADVERTISEMENTS - A system and method for tracking of advertisements. The system includes a user interface for accessing information associated with commercial breaks and advertisements. The system also includes one or more edge devices for recording advertisements aired during commercial breaks on a television or radio channel. Further, the system includes a media server. The media server includes a memory, and a processor for storing recorded advertisements along with a stamp of region, channel, program and time of insertion associated with the advertisements in a repository of a media server, and providing access to the recorded advertisements for the advertisers. The method includes recording advertisements aired during commercial breaks on the television or the radio channel, storing recorded advertisements along with a stamp of region, channel, program and time of insertion associated with the advertisements in a repository of a media server, and providing access to the recorded advertisements for the advertisers. | 2013-07-25 |
20130191867 | DEVICE AND METHOD FOR GENERATING ELECTRONIC PROGRAM GUIDE AND DISPLAY APPARATUS FOR USE WITH THE SAME - a device and method for generating an electronic program guide (EPG), and a display apparatus for use with the same, are provided. The method includes receiving at least one of identification information and broadcasting information from each of a plurality of display apparatuses capable of displaying a broadcasting signal; transmitting to at least one of the plurality of display apparatuses a request for display information of the broadcasting signal that is currently displayed by a corresponding display apparatus; receiving display information from a display apparatus of the plurality of display apparatuses in response to the transmitted request for display information; and generating an EPG including the received display information. | 2013-07-25 |
20130191868 | Method for Displaying Information Associated with Television Program, Electronic Program Guide, and Processing Apparatus - The present invention relates to a method for displaying information associated with television program, which includes: acquiring at least one sequentially arranged program listings and corresponding program notes; generating an electronic program guide according to the program listings and corresponding program notes; and displaying the electronic program guide on a display screen. The electronic program guide includes a background area, at least one program listing, and a program note corresponding to one of the program listing. The background area is opaque and covers most of the display area. The present invention further provides an electronic program guide and a processing apparatus for generating the electronic program guide. The electronic program guide doesn't completely affect the normal television viewing. | 2013-07-25 |
20130191869 | TV Social Network Advertising - An advertising method involves displaying a plurality of social network thumbnails as an array of thumbnails on a television display, where said plurality of social network thumbnails represent social network videos that are posted or linked to a social network post; representing an advertisement as a thumbnail representation; displaying the advertisement thumbnail representation within the array of thumbnails on the television display; and receiving an instruction selecting of one of the thumbnails to navigate to and responsive thereto displaying either one of the social network videos or the advertisement. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2013-07-25 |
20130191870 | METHOD AND APPARATUS FOR PROVIDING BROADCAST SERVICE - A method and apparatus for providing broadcast services are disclosed. One aspect of the invention provides a broadcast receiving apparatus that is connected over a network with a head-end and is configured to output a content on a screen in response to a user's request. The broadcast receiving apparatus includes: a key input receiving part configured to receive a preset key signal as input; a content identification part configured to identify a content outputted on the screen at a time point of inputting the key signal; and an option interface decision part configured to decide an option interface for the identified content. | 2013-07-25 |
20130191871 | METHOD AND APPARATUS FOR INTERNET PROTOCOL TELEVISION MEDIA CONTENT SHARING - A method and apparatus for enabling IP service subscribers to share media contents with other IP service subscribers or Internet users in either a secured or open fashion are disclosed. In one embodiment, the present invention enables the sharing of home movies, pictures, and other media contents, where media could be stored media or media created in real-time. Namely, the present method allows IP service subscribers to effectively create their own TV station, e.g., complete with stored or live content programming and content scheduling. In turn, the method allows a viewing subscriber to select and view a shared media program created by another subscriber. | 2013-07-25 |
20130191872 | VIDEO MANAGEMENT AND CONTROL IN HOME MULTIMEDIA NETWORK - A system may include a video link and a hybrid link that connects a transmitting device to the receiving device, and at least one intermediate hop between the transmitting device and the receiving device. The intermediate hop may be configured to relay video content from the video source to the video sink through the hybrid link using one or more data relay modes. The hybrid link may be configured to perform hybrid link control signaling (HLCS) to manage a physical layer of the hybrid link. The video link between the video source and the video sink may be configured to transmit a video stream the from video source to the video sink over one or more video lanes. A video link training may be implemented for the video link and the hybrid link. | 2013-07-25 |
20130191873 | SYSTEM AND METHOD FOR PROCESSING AUDIO SIGNALS RECEIVED BY A COMMUNICATION DEVICE - A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to receive a media program signal from a set-top box (STB), monitor ambient sound, and suppress a portion of the ambient sound according to the media program signal. The media program signal can correspond to a media program presentable at least audibly by the STB. Other embodiments are disclosed. | 2013-07-25 |
20130191874 | SYSTEM AND METHOD FOR COMMUNICATION RESOURCE INFORMATION - A system for communicating resource information may include a resource reservation proxy module to receive a first signal including resource request information. The resource reservation proxy module may be associated with a first environment associated with a requesting application. The resource reservation proxy module may process the received resource request information into a resource request packet, and communicate the resource request packet utilizing an environmentally independent communication protocol. A resource reservation handler module may receive the communicated resource request packet. The resource reservation handler module may be associated with a second environment associated with a resource management application. The resource reservation handler module may process the received resource request packet into a second signal including the resource request information. | 2013-07-25 |
20130191875 | Systems And Methods For Remote Web Query And Image Selection Exchange To Video Screen - Systems and methods are disclosed for receiving a request to display, on an external display device, a media file, where the request comprises a first logical address for accessing the media file at a first storage location, transmitting to a set-top box, a second logical address for accessing a copy of the media file at a second storage location, where the second logical address differs from the first logical address, and where the second storage location differs from the first storage location. Other embodiments are disclosed. | 2013-07-25 |
20130191876 | REPRODUCING DEVICE, REPRODUCING METHOD, AND PROGRAM - Disclosed herein is a reproducing device, including: an acquiring portion, a storage control portion and a reproducing portion. The acquiring portion acquires stream data on contents which are streaming-delivered through a network in which a band is changed. The storage control portion controls temporary storage of the stream data thus acquired in an external storage device detachably connected. The reproducing portion reproduces the contents based on the stream data read out from the external storage device. | 2013-07-25 |
20130191877 | METHOD OF TRANSFORMING HFC CATV ANALOG FIBER TRANSMISSION TO DIGITAL FIBER TRANSMISSION - A method of converting legacy HFC CATV cable systems, which transmit data over the optical fiber portion of the system using the optical counterpart of analog RF waveforms, such as RF QAM waveforms transduced to corresponding optical QAM waveforms, to improved HFC CATV systems that transmit data over the optical fiber using optical fiber optimized protocols, such as Ethernet frames and other optical fiber optimized digital transport protocols. According to the method, most aspects of the legacy HFC CATV system may be retained, however at the CATV head end, the optical fiber transmitter system is replaced by an improved system that extracts the underlying symbols from legacy waveforms, packages these symbols into optical fiber optimized packets, and transmits downstream. The legacy optical fiber nodes are replaced with improved nodes capable of receiving the packets and remodulating the symbols into RF waveforms suitable for injection into the system's CATV cable. | 2013-07-25 |
20130191878 | ACCESSING ENTERPRISE RESOURCE PLANNING DATA FROM A HANDHELD MOBILE DEVICE - A user can access data from an ERP system, through a handheld mobile device, using claims-based authentication information. An authentication service authenticates the user, using an appropriate authenticator, given the claims-based authentication information. New users can register, and once registered, they can receive business data from ERP mobile data accessing system and push service. | 2013-07-25 |
20130191879 | METHODS AND SYSTEMS FOR INFORMATION ASSURANCE AND SUPPLY CHAIN SECURITY - In accordance with additional embodiments of the present disclosure, a method may include storing information regarding one or more components of the information handling system to a database, the database stored on a basic input/output system (BIOS) of the information handling system prior to shipment of an information handling system. The method may also include, between the time of shipment of the information handling system to receipt of the information handling system by an intended customer of the information handling system: logging events associated with one or more components of the information handling system, and storing information associated with the events in the database. The method may further include interfacing with an authorized user of the information associated with the events to allow the authorized user to access the information associated with the events. | 2013-07-25 |
20130191880 | DOCUMENT COMMUNICATION RUNTIME INTERFACES - A set of protocols support a common script object model for document interaction that crosses document types and runtime environments. A cross frame browser-based protocol may provide a secure, scalable, and asynchronous mechanism for transmitting script object model requests to document hosts and managing responses to developer code in standards-compliant browsers. A hostable runtime Application Programming Interface (API) may provide a secure, scalable, and asynchronous protocol to transmit script object model requests across process boundaries to document hosts back to developer code with minimum performance impact on the document host. | 2013-07-25 |
20130191881 | CLUSTER ARCHITECTURE FOR NETWORK SECURITY PROCESSING - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 2013-07-25 |
20130191882 | ACCESS CONTROL OF REMOTE COMMUNICATION INTERFACES BASED ON SYSTEM-SPECIFIC KEYS - A computer implemented method, computer program product, and computer system is provided for receiving a service request to obtain service from a second application, the service request including a client context and a signed ticket obtained by the first application from a system computer, validating the received signed ticket based on the key associated with the system, determining that the first application has authorization to obtain the requested service via the remote interface of the second application based on a comparison of one or more attributes of the received client context to an access control list associated with the second application, and sending a service reply from the second application to the first application to provide the requested service to the first application in response to determining that the first application has authorization to obtain the requested service via the remote interface of the second application. | 2013-07-25 |
20130191883 | DEVICE NETWORK SHARING METHOD AND DEVICE CONTROLLING METHOD THEREOF - A device network sharing method and a device controlling method for sharing and controlling a device with a hardware identifier in a network structure system by connecting the device to the network structure system, letting the device log in a server by the hardware identifier of the device, and completing a verification of the device and announcing connection information of the device in the network structure system. Therefore, a client can complete networking settings of the device without complex networking setting steps. A user can use a controller to log in the server by the hardware identifier of the device, and then acquire connection information of the device, for setting or sharing the device. Thus, a client can search a device desired to be controlled in the network structure system without inputting the URL network address which cannot represent device properties. | 2013-07-25 |
20130191884 | IDENTITY MANAGEMENT WITH LOCAL FUNCTIONALITY - A user equipment (UE) may perform functions locally, such as on a trusted module that resides within the UE. For example, a UE may perform functions associated with a single sign-on protocol, such as OpenID Connect for example, via a local identity provider function. For example, a UE may generate identity tokens and access tokens that can be used by a service provider to retrieve user information, such as identity information and/or user attributes. User attributes may be retrieved via a user information endpoint that may reside locally on the UE or on a network entity. A service provider may grant a user access to a service based on the information that it retrieves using the tokens. | 2013-07-25 |
20130191885 | SECURE MOBILE INTERFACE ACCESS SYSTEM - A method performed by one or more server devices connected to a mobile device via a network, the mobile device being connected to an electronic device is provided that can include sending, by the one or more server devices and to the mobile device, data initiating a session between the one or more server devices and the mobile device; sending a request for information about the electronic device; receiving the requested information about the electronic device; identifying device credentials for the electronic device and communication protocols for communicating with the electronic device; providing the device credentials for the electronic device and the communication protocols for communicating with the electronic device; automatically gathering information about the electronic device from data stored on the electronic device using the communication protocols and the mobile device; and providing support to the electronic device via the mobile device. | 2013-07-25 |
20130191886 | PROTECTING AUTHENTICATION INFORMATION OF USER APPLICATIONS WHEN ACCESS TO A USERS EMAIL ACCOUNT IS COMPROMISED - An email server provided according to an aspect of the present invention protects authentication information of user applications when access user's email account is compromised. In an embodiment, when an email message directed to a user contains content which provides access to authentication information for accessing a user application implemented external to said email server, the email server requires authentication credentials from the user before providing access to the content. As a result, even if the user's email account is compromised, additional controls are provided to reduce the probability of compromise of access to user applications implemented external to the email server. | 2013-07-25 |
20130191887 | Social network based trust verification Schema - A computationally implemented method includes, but is not limited to: for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2013-07-25 |
20130191888 | METHOD, APPARATUS, AND SYSTEM FOR SENDING CREDENTIALS SECURELY - A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed. | 2013-07-25 |
20130191889 | Direct Authentication System and Method via Trusted Authenticators - Fraud and identity theft are enabled by two faulty assumptions about the way that the identity of a person is verified in our society. The first is that someone who demonstrates knowledge of certain items of personal or financial information about a particular person is presumed to be that person. The second assumption, which gives rise to the first assumption, is that these items of information can be kept confidential. Because fraudsters and identity thieves often seek to use their victim's personal and financial information, this invention proposes a direct authentication system and method that does not depend on these assumptions. The proposed method enables businesses to determine whether the customer is truly the person who he says he is by adopting a new “two-factor” authentication technique and authenticating customer's identity utilizing customer's trusted authenticator. A customer's trusted authenticator can be found within the financial services community; in particular, a bank or other financial institution with whom the customer has a trusted relationship, such as a bank account. | 2013-07-25 |
20130191890 | METHOD AND SYSTEM FOR USER IDENTITY RECOGNITION BASED ON SPECIFIC INFORMATION - The invention relates to a method and a system for user identity recognition based on specific information, which involves identifying user temporary unique identification associated with specific information based on the specific information, which represents user access to the internet; acquiring user temporary unique identification and user identity information from a communication network side; and associating the user identity information with the specific information based on the user temporary unique identification, wherein the associated information is used for providing the user identity information to the external. The method and system can associate specific information with user identity information based on user temporary unique identification so as to provide internet applications with the user identity information corresponding to the specific information. The internet applications can thereby carry on subsequent actions, such as analysis of user behavior and precision marketing, and can also process user positioning against network security events. | 2013-07-25 |
20130191891 | AUTOMATIC PROVISIONING OF RESOURCES FOR MEETING COLLABORATION - A method may comprise maintaining by a computer system connected to a network an indication of availability dates and times of one or more output devices connected to the network. The computer system may receive an output device invitation indicating an output device to reserve for a meeting conducted over a conferencing system and determine whether the output device is available for reservation during a date and time period of the meeting. The computer system may be communicating over the network to the output device activation information indicating that the output device is to become active at a predetermined date and time related to the date and time period of the meeting and login information including a credential for the output device to use for logging into the conferencing system for the meeting. | 2013-07-25 |
20130191892 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURITY VERIFICATION OF COMMUNICATIONS TO TENANTS OF AN ON-DEMAND DATABASE SERVICE - In accordance with embodiments, there are provided mechanisms and methods for security verification of communications to tenants of an on-demand database service. These mechanisms and methods for security verification of communications to tenants of an on-demand database service can enable embodiments to allow tenants to selectively implement security measures with respect to inbound communications, etc. The ability of embodiments to provide such feature may allow tenants to efficiently and effectively implement security measures for in-bound emails. | 2013-07-25 |
20130191893 | System and Method for Ensuring Anonymity to Provide Self Help Guidance - User access to a help system is provided in an anonymous manner. A provider organization distributes unique pre-generated unique user access codes to potential users. The user access codes include a general information portion and a random portion. When accessing the system for the first time, the user enters their unique user access code, a username, and password. The system associates the username with the password and with the user access code. Subsequent, the user logs into the system using the username and password. Data may be compiled and stored in association with the user access code for later retrieval and analysis to calculate statistics for provider organizations. | 2013-07-25 |
20130191894 | Integrating Server Applications with Multiple Authentication Providers - Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications. | 2013-07-25 |
20130191895 | Recovery of Information from Commercial Web Portals - Novel tools and techniques for automated recovery of information from commercial web portals, including commercial web portals requiring credentials for access. In some instances images are captured and pushed to external processes for improving system performance. In some instances access to automated software agent remote control modules is balanced across a system comprising a plurality of processors hosting the automated software agent remote control modules. Some instances provide provisioning of credentials, in particular indicating credentials available for an unlimited or a select limited number of users and monitoring credential use of those credentials usable by a select number of users. Some instances provide cache management optimizes retrieval of data by external processes and ensures reliability of such data to reduce unnecessary web portal inquiries. | 2013-07-25 |
20130191896 | AUTOMATIC PROVISIONING OF RESOURCES FOR MEETING COLLABORATION - A system for provisioning an output device, may include a processor; a memory; and a records display program. The records display program may be executed by the processor to maintain an indication of availability dates and times of one or more output devices connected to the network; to receive an output device invitation indicating a first output device to reserve at a meeting conducted over a conferencing system; to determine whether the first output device is available for reservation during a date and time period of the meeting; and to communicate to the first output device activation information indicating that the first output device is to become active at a first predetermined date and time related to the date and time period of the meeting and login information including a first credential for the first output device to use for logging into the conferencing system for the meeting. | 2013-07-25 |
20130191897 | Field Provisioning a Device to a Secure Enclave - This invention includes apparatus, systems, and methods to add a new device to a secure enclave, without requiring the new device to enter close proximity to the security entity and protected area. A new device is able to gain access to the secure enclave by first obtaining a temporary credential from an existing device in the field. The new device presents the temporary credential to the security entity which authenticates, provisions, and if appropriate fully associates the new devices to the secure enclave. The invention also includes a process for creating and distributing the temporary credentials to existing devices in the field including using secure connections to transmit electronic version of the temporary credentials and methods to securely distribute physical copies of the credentials. This invention enables rapid deployment of new devices, or replenishment of lost or damaged devices in the field without compromising the security of the device or the secure enclave. The invention also reduces the resources required, provides a solution that is available at any time, and reduces the technical skill required to add a device to a secure enclave. | 2013-07-25 |
20130191898 | IDENTITY VERIFICATION CREDENTIAL WITH CONTINUOUS VERIFICATION AND INTENTION-BASED AUTHENTICATION SYSTEMS AND METHODS - A system providing features for facilitating the authentication and verification of a consumer, facilitating and sharing trust between the consumer and third parties, and for continuously updating such information. The system can create an online identity credential based on verifying the identity of an individual subject. The system can include adding first, second, and third party information to the credential, analyzing the data in the credential to create metadata stored within the credential, continuously and periodically updating the elements and metadata of the identity credential, and for sharing selected data and metadata elements of the credential with second and third parties. The system can be used as a standalone identity credential or in support of biometric identity applications. The system can include rewards to encourage subjects to continuously verify their identity. The system can include a Knowledge-Based-Authentication based on intention analysis derived from second-party data, rather than factual third-party data. | 2013-07-25 |
20130191899 | ONE-TIME PASSWORD AUTHENTICATION WITH INFINITE NESTED HASH CLAIMS - Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (−)) for updating a seed chain, a second hash function (h | 2013-07-25 |
20130191900 | COMMUNICATION APPARATUS, REMINDER APPARATUS, AND INFORMATION RECORDING MEDIUM - Provided is a communication apparatus ( | 2013-07-25 |
20130191901 | SECURITY ACTIONS BASED ON CLIENT IDENTITY DATABASES - Example embodiments disclosed herein relate to authentication based on Media Access Control (MAC) addresses. A network security device receives one or more client identity databases from one or more edge network devices. The client identity databases include MAC addresses of clients and secondary identification information for each of the clients. The network security device determines that a client device has been connected to one of the edge devices. A security action is performed based on whether the MAC address and respective secondary identification information of one of the clients matches the MAC address and respective secondary identification information of the connected client device. | 2013-07-25 |
20130191902 | NETWORK MEDIATED MULTI-DEVICE SHARED AUTHENTICATION - Described in an example embodiment herein is an apparatus, comprising a communication interface and authentication logic coupled with the wireless interface. The authentication logic authenticates with at least one neighboring device forming a trust relationship with the at least one neighboring device. The authentication logic obtains via the communication interface data representative of a user associated with a user device. The authentication logic sends a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device. The authentication logic receives a response to the challenge via the user interface and validates the response to the challenge. The authentication logic provides data to the at least one neighboring device indicating that the user associated with the user device has been authenticated, to enable access to the functionality and/or resources of the at least one neighboring device. | 2013-07-25 |
20130191903 | DUAL FACTOR AUTHENTICATION WITH A PROGRAMMABLE TERMINAL DEVICE - Systems, devices, methods, and software are described for managing virtual sessions based on dual factor authentication. A central server computer system may authenticate a user of a terminal device based on at least one user authentication credential and a unique device identifier received from the terminal device. The virtual session may be associated with the terminal device based on the received unique device identifier and the at least one user authentication credential. The virtual session may be updated according to at least one rule based on the association of the virtual session of the user with the terminal device | 2013-07-25 |
20130191904 | Systems and Methods for Universal Enhanced Log-In, Identity Document Verification and Dedicated Survey Participation - Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber server, and the log-in server receives registrant identification data, A first session is established between the log-in server and the subscriber server to validate the registrant identification data, and to generate a session password. A second session is established between the log-in server and the subscriber server. The second session is configured to authorize, based in part on the registrant identification data, access to at least a portion of a website associated with the subscriber server. | 2013-07-25 |
20130191905 | SECURE DATA EXCHANGE BETWEEN DATA PROCESSING SYSTEMS - A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server. | 2013-07-25 |
20130191906 | APPARATUS AND METHOD FOR SUPPORTING PORTABLE MOBILE VIRTUAL PRIVATE NETWORK SERVICE - An apparatus and method for supporting a portable mobile VPN service are provided. The method accesses a public network to generate a security tunnel, maps the generated security tunnel and a VPN address, stands by for authentication of a mobile terminal which desires to access a VPN, authenticates a mobile terminal which desires to access the VPN, and assigns an internal address which is used in the VPN according to the authentication result. | 2013-07-25 |
20130191907 | Method and System for Secure Data Transmission with a VPN Box - A VPN box is connected upstream of a field device. The VPN box uses a secret cryptographic key of the field device for authentication when setting up a VPN tunnel and/or when setting up a cryptographically protected communication link. | 2013-07-25 |
20130191908 | METHODS, DEVICES, AND SYSTEMS FOR UNOBTRUSIVE MOBILE DEVICE USER RECOGNITION - The present invention discloses methods, devices, and systems for unobtrusively recognizing a user of a mobile device. Methods including the steps of: unobtrusively collecting motion data from the mobile device during normal device usage by monitoring standard authorized-user interaction with the device, without any form of challenge or device-specified action; demarcating the motion data into user motion-sequences based on changes in a motion-state or an elapsed time-period without an occurrence of the changes, wherein the motion-state refers to a placement and speed of the mobile device at a point in time; calculating user motion-characteristics from the user motion-sequences; and generating a motion-repertoire from the user motion-characteristics, whereby the motion-repertoire enables unobtrusive recognition of the user. Preferably, the method further includes the step of: detecting unidentified motion-characteristics that are not associated with the motion-repertoire, thereby enabling unobtrusive recognition of unidentified usage. | 2013-07-25 |
20130191909 | Industrial Automation System and Method for Safeguarding the System - An industrial automation system comprising a digital fingerprint that is allocated to a unit requesting access to the automation system and which is based on one or more parameters of a communication between the unit and a fingerprint-determining component of the automation system, wherein the industrial automation system additional comprises the fingerprint-determining component which, during the operation of the automation system, grants the requesting unit access to the automation system and compares the determined fingerprint of the requesting unit with a stored fingerprint. | 2013-07-25 |
20130191910 | Device, Method, and Graphical User Interface for Accessing an Application in a Locked Device - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to entry of a correct passcode in the passcode entry interface, the device enters an unlocked state. | 2013-07-25 |
20130191911 | Device, Method, and Graphical User Interface for Accessing an Application in a Locked Device - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to entry of a correct passcode in the passcode entry interface, the device enters an unlocked state. | 2013-07-25 |
20130191912 | SECURE NETWORK TOPOLOGY ON A VIRTUALIZED SERVER - Generally, this disclosure describes a secure network topology on a virtualized server (and methods thereof). A virtualization management module is deployed as part of a software layer of a virtualized server system. The virtualization management module generates an internal network among the virtual machines and controls access to the network. The virtualization management module translates incoming and outgoing traffic between the virtual machines and an external internet IP address, thus keeping the virtual machines indirectly coupled to the external network. The virtualization management module also provides remote administration and control over each virtual machine (or collection of virtual machines). | 2013-07-25 |
20130191913 | DYNAMICALLY SCANNING A WEB APPLICATION THROUGH USE OF WEB TRAFFIC INFORMATION - Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output. | 2013-07-25 |
20130191914 | CLOUD-BASED GATEWAY SECURITY SCANNING - Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter. | 2013-07-25 |
20130191915 | METHOD AND SYSTEM FOR DETECTING DGA-BASED MALWARE - System and method for detecting a domain generation algorithm (DGA), comprising: performing processing associated with clustering, utilizing a name-based features clustering module accessing information from an electronic database of NX domain information, the randomly generated domain names based on the similarity in the make-up of the randomly generated domain names; performing processing associated with clustering, utilizing a graph clustering module, the randomly generated domain names based on the groups of assets that queried the randomly generated domain names; performing processing associated with determining, utilizing a daily clustering correlation module and a temporal clustering correlation module, which clustered randomly generated domain names are highly con-elated in daily use and in time; and performing processing associated with determining the DGA that generated the clustered randomly generated domain names. | 2013-07-25 |
20130191916 | DEVICE AND METHOD FOR DATA MATCHING AND DEVICE AND METHOD FOR NETWORK INTRUSION DETECTION - The present invention discloses a device and method for data matching and a device and method for network intrusion detection. The method for data matching includes: searching in a regular expression set one or more complex regular expressions causing a sharp increase in number of states generated based on a regular expression during interaction; constructing a corresponding simplified expression for each complex regular expression; compiling a simplified state machine; compiling one or more substate machines, wherein each of the one or more substate machines is compiled based on a corresponding one of the one or more complex regular expressions; and matching data based on the simplified state machine and the one or more substate machines. The present invention further discloses a device for data matching employing the method for data matching and a device and method for intrusion detection employing the device and method for data matching. | 2013-07-25 |
20130191917 | PATTERN DETECTION - Data is moved through a pipeline as processing of the data unrelated to detection of pattern is performed. The detector detects the pattern within the data at a predetermined location or based on a predetermined reference as the data is moved through the pipeline, in parallel with the processing of the data as the data is moved through the pipeline. The detector detects the pattern within the data as the data is moved through the pipeline without delaying movement of the data into, through, and out of the pipeline. | 2013-07-25 |
20130191918 | Identifying Trojanized Applications for Mobile Environments - Trojanized apps for mobile environments are identified. Multiple apps for a specific mobile environment are obtained from one or more external sources. Code and digital signers are extracted from the apps and stored. For each given specific one of the obtained apps, the code of the specific app is compared to the code of other obtained apps, to determine whether the specific app 1) contains at least a predetermined threshold amount of code in common with one of the other apps, and 2) contains additional code not contained therein. If so, the digital signer of the specific app is compared to the digital signer of the other app. If it is also the case that the digital signer of the specific app is not the same as the digital signer of the other app, the specific app is identified as being trojanized. | 2013-07-25 |
20130191919 | CALCULATING QUANTITATIVE ASSET RISK - A standardized vulnerability score is identified for a particular vulnerability in a plurality of known vulnerabilities, the standardized vulnerability score indicating a relative level of risk associated with the particular vulnerability relative other vulnerabilities. A vulnerability detection score is determined that indicates an estimated probability that a particular asset possess the particular vulnerability and a vulnerability composite score is determined for the particular asset to the particular vulnerability, the vulnerability composite score derived from the standardized vulnerability score and the vulnerability detection score. A countermeasure component score is identified that indicates an estimated probability that a countermeasure will mitigate risk associated with the particular vulnerability on the particular asset. A risk metric for the particular asset and the particular vulnerability is determined from the vulnerability composite score and the countermeasure component score. In some instances, aggregate risk scores can be calculated from a plurality of calculated risk metrics. | 2013-07-25 |
20130191920 | DYNAMICALLY SCANNING A WEB APPLICATION THROUGH USE OF WEB TRAFFIC INFORMATION - Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output. | 2013-07-25 |
20130191921 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - Systems and methods disclosed herein provide a local security component on a mobile device that may acquire data concerning a current configuration of the mobile device. The local security component may receive raw or partially processed data about events on the mobile device. The received data may be processed against a database containing identification data for security threats and against the current mobile device configuration data to assess a security state of the mobile device. The processing may include assigning a severity level for each event. The local security component may output to the mobile device the security state assessment results, including a first assessed security state of the mobile device. The raw or partially processed data about events on the mobile device may be transmitted to a server for processing. A second assessed security state of the mobile device may be received at the mobile device from the server. | 2013-07-25 |
20130191922 | USER PROMPTED METADATA REMOVAL - Methods and apparatuses for the removal of metadata include the removal of metadata from an artifact accompanying a message. In a mobile communication device, a method for removing metadata from an artifact accompanying a message includes displaying at least one prompt via a user interface of the mobile communication device. Further, the method includes receiving, from a user of the mobile communication device via the user interface in response to the at least one prompt, metadata removal preference data. Cleansing instructions based on the metadata removal preference data are created and the message, the cleansing instructions, and the artifact are sent to a delivery system. The delivery system removes metadata from the artifact based on the cleansing instructions. | 2013-07-25 |
20130191923 | SOFTWARE LICENSE MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated. | 2013-07-25 |
20130191924 | Approaches for Protecting Sensitive Data Within a Guest Operating System - Approaches for preventing unauthorized access of sensitive data within an operating system (OS), e.g., a guest OS used by a virtual machine. Dummy data may be written over physical locations on disk where sensitive data is stored, thereby preventing a malicious program from accessing the sensitive data. Alternately, a delete operation may be performed on sensitive data within an OS, and thereafter the OS is converted into a serialized format to expunge the deleted data. The serialized OS is converted into a deserialized form to facilitate its use. Optionally, a data structure may be updated to identify where sensitive data is located within an OS. When a request to access a portion of the OS is received, the data structure is consulted to determine whether the requested portion contains sensitive data, and if so, dummy data is returned to the requestor without consulting the requested portion of the OS. | 2013-07-25 |
20130191925 | Integrated Secure And Non-Secure Display For A Handheld Communications Device - A handheld communications device is created with a touch sensitive display, a secure computing component, and a non-secure computing component. The secure component may comprise a secure CPU executing a secure operating system. The non-secure component may comprise a separate non-secure CPU executing a separate non-secure operating system. The touch sensitive display on the handheld communications device is divided into a secure portion and a non-secure portion such that information displayed in the secure portion is provided by the secure operating system, and information displayed in the non-secure portion is provided by the non-secure operating system. Similarly, data entered through the secure portion of the display is provided to the secure operating system, and data entered through the non-secure portion of the display is provided to the non-secure operating system. | 2013-07-25 |
20130191926 | Method and Apparatus for Streaming Rights-Managed Content Directly to a Target Device over a Network - A content server ( | 2013-07-25 |
20130191927 | CONTENT MANAGEMENT DEVICE AND CONTENT MANAGEMENT METHOD - Provided is a content management device for protecting a content of a provider. A content management device | 2013-07-25 |
20130191928 | ENFORCING CONTENT BLACKOUT - A system includes a network interface, a memory, and a processor. The network interface is configured to communicate, over a network, with a user device associated with a user. The memory is configured to store instructions to be executed by the processor. The processor is configured to execute the instructions to: receive, from the user device via the one or more network interfaces, a request for content; initiate an upload of the requested content to the user device in response to the request; receive a request for a license key from the user device in response to the initiation of the upload; determine whether the user device is outside a blackout region associated with the content; generate a license key when the one or more processors determine that the user device is outside the blackout region; and send the license key to the user device. | 2013-07-25 |
20130191929 | FEDERATED AUTHENTICATION - A system may receive, at a site, a first message for authentication from a browser hosted on a user device; send, from the site, a redirect universal resource locator of a partner system to the browser; receive a response from the partner system via the browser, the response including a second message indicating whether an authentication of a user of a first device, at the partner system, was successful; determine whether the authentication has been successful based on the second message; and register the first device when it is determined that the authentication has been successful based on the second message. | 2013-07-25 |
20130191930 | SYSTEMS AND METHODS FOR GOVERNING CONTENT RENDERING, PROTECTION, AND MANAGEMENT APPLICATIONS - System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content. | 2013-07-25 |
20130191931 | FUMARYLACETOACETATE HYDROLASE (FAH)-DEFICIENT PIGS AND USES THEREOF - Described herein is the generation of Fah | 2013-07-25 |
20130191932 | METHODS OF SELECTING HOST RESISTANT ANIMALS - The present invention is directed to a method of selecting animals that are genetically resistant to one or more intestinal parasite infections by testing mucus samples for the presence of an antibody against one or more of said intestinal parasites and segregation and selecting the animals that test positive. The animals that test negative are less parasite resistant and can be subjected to parasite management regimes. | 2013-07-25 |
20130191933 | METHODS OF TREATING PAIN AND MORPHINE TOLERANCE VIA MODULATION OF HEDGEHOG SIGNALLING PATHWAY - Described herein are methods of treating nociception by administering to a subject in need thereof a therapeutic amount of one or more compounds which modulate the Hedgehog signaling pathway. | 2013-07-25 |
20130191934 | TREATMENT OF SYMPTOMS ASSOCIATED WITH MENOPAUSE - A method for treating symptoms associated with a dramatic reduction in reproductive hormone levels is provided, particularly in menopausal women and breast cancer survivors undergoing aromatase inhibitor therapy. The method comprises administered to a subject an inhibitor of orexin activity in an amount sufficient to reduce or decrease onset, progression, severity, frequency, duration or probability of one or more such symptoms. A method of detecting compounds having activity for relieving menopausal symptoms is also provided. | 2013-07-25 |
20130191935 | METHOD OF REGULATING GENE EXPRESSION - The present invention relates, in general, to gene expression and, in particular, to a method of inhibiting the expression of a target gene and to constructs suitable for use in such a method. | 2013-07-25 |
20130191936 | GENE EXPRESSION SIGNATURE FOR THE SELECTION OF HIGH ENERGY USE EFFICIENT PLANTS - Means and methods are provided to produce abiotic stress tolerant with improved yield based on the specific identification of a gene expression signature in said plants out of a population of said plants. | 2013-07-25 |
20130191937 | RESISTANCE AGAINST PERONOSPORA PARASITICA IN DIPLOTAXIS TENUIFOLIA - The invention relates to a rucola plant of the species | 2013-07-25 |
20130191938 | HERBICIDE TOLERANT COTTON EVENT pDAB4468.18.07.1 - Cotton event pDAB4468.18.07.1 comprises genes encoding AAD-12 and PAT, affording herbicide tolerance to cotton crops containing the event, and enabling methods for crop protection. | 2013-07-25 |
20130191939 | DOMINANT EARLINESS MUTATION AND GENE IN SUNFLOWER (HELIANTHUS ANNUUS) - The subject invention relates in part to the discovery of a spontaneous sunflower mutation. The subject invention involves an “early” mutation and related inbred/hybrid development. The subject invention further provides a single dominant gene that confers earliness in sunflower inbred isolines and near isogenic hybrids. There is no known prior teaching or suggestion of this gene's utility for hybrid development in the industry. The subject invention also provides a new and distinctive sunflower inbred line designated H120R. The invention includes seeds that possess this mutated gene, plants produced by growing these seeds, and progeny thereof that possess this mutated gene and the associated earliness trait. The subject invention also includes methods for producing such sunflower seeds and plants, including inbreds and hybrids. Such plants can be produced by, for example, crossing such an inbred line with itself or with another sunflower line. | 2013-07-25 |
20130191940 | DOMINANT EARLINESS MUTATION AND GENE IN SUNFLOWER (HELIANTHUS ANNUUS) - The subject invention relates in part to the discovery of a spontaneous sunflower mutation. The subject invention involves an “early” mutation and related inbred/hybrid development. The subject invention further provides a single dominant gene that confers earliness in sunflower inbred isolines and near isogenic hybrids. There is no known prior teaching or suggestion of this gene's utility for hybrid development in the industry. The subject invention also provides a new and distinctive sunflower inbred line designated H120R. The invention includes seeds that possess this mutated gene, plants produced by growing these seeds, and progeny thereof that possess this mutated gene and the associated earliness trait. The subject invention also includes methods for producing such sunflower seeds and plants, including inbreds and hybrids. Such plants can be produced by, for example, crossing such an inbred line with itself or with another sunflower line. | 2013-07-25 |
20130191941 | MODULATING LIGHT RESPONSE PATHWAYS IN PLANTS, INCREASING LIGHT-RELATED TOLERANCES IN PLANTS, AND INCREASING BIOMASS IN PLANTS - Methods and materials for modulating low light and/or shade tolerance, and red light specific responses in plants are disclosed. For example, nucleic acids encoding low light and/or SD+EODFR-tolerance polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having increased low light and/or SD+EODFR tolerance. In addition, methods and materials involved in increasing UV-B tolerance in plants and methods and materials involved in modulating biomass levels in plants are provided. | 2013-07-25 |
20130191942 | Transgenic Plants - Disclosed herein are transgenic plants having recombinant DNA which expresses a G1073 transcription factor which provides enhanced resistance and/or tolerance to water deficit. More specifically the DNA constructs comprise a polynucleotide which encodes at least a functional part of a G1073 transcription factor or a homologous transcription factor. | 2013-07-25 |
20130191943 | TRANSGENIC PLANTS HAVING ALTERED BIOMASS COMPOSITION - Methods and materials for modulating biomass composition in plants are disclosed. For example, nucleic acids encoding biomass composition-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having altered biomass composition and plant products produced from plants having altered biomass composition. | 2013-07-25 |
20130191944 | REGULATING METABOLISM BY MODIFYING THE LEVEL OF TREHALOSE-6-PHOSPHATE - Method for the inhibition of carbon flow in the glycolytic direction in a cell by increasing the intracellular availability of trehalose-6-phosphate. | 2013-07-25 |