32nd week of 2013 patent applcation highlights part 65 |
Patent application number | Title | Published |
20130205332 | Stream Messaging for Program Stream Automation - There is provided a content automation system and a method for use by the content automation system for issuing a content management message for use in a program stream. In one implementation, such a content automation system comprises a processor and a memory, and a stream messaging module residing in the memory. The stream messaging module is configured to issue the content management message by embedding a command sequence as metadata in a container data structure, and inserting the container data structure into the program stream. The command sequence authorizes a replacement of program stream content. | 2013-08-08 |
20130205333 | METHOD AND APPARATUS OF INTERACTIVE ADVERTISING SERVICE IN DIGITAL BROADCAST SYSTEM - A method and an apparatus of interactive advertising service are provided. The method includes: receiving first advertising contents from a broadcasting advertisement platform; displaying broadcasting according to the first advertising contents on the overall screen together with at least one second advertisement contents interactive indicator indicating that the first advertising contents are linked with second advertising contents; receiving indicated information triggering at least one second advertising contents interactive indicator from an input device; receiving the second advertising contents indicated by the at least one second advertising contents interactive indicator from the broadcasting advertisement platform; and displaying broadcasting according to the second advertisement contents. According to an exemplary embodiment of the present invention, it is possible to introduce opportunity of goods information acquisition and purchasing behaviors distributed to media other than broadcasting into a smart TV while improving concentration for advertisements in bidirectional digital broadcast. | 2013-08-08 |
20130205334 | METHOD AND APPARATUS FOR PROVIDING SUPPLEMENTARY INFORMATION ABOUT CONTENT IN BROADCASTING SYSTEM - A method and apparatus for providing supplementary information about content in a broadcasting system are provided. A method of a reception terminal providing supplementary information about content includes receiving content and metadata, extracting an indicator for indicating whether supplementary information about the content exists or not from the metadata, determining whether the supplementary information about the content exists or not based on the indicator, outputting the supplementary information about an appearance element of the content in association with the content based on the metadata, accessing a server for providing the supplementary information about the to appearance element, based on the metadata when an instruction to download the supplementary information about the appearance element is received, and downloading the supplementary information about the appearance element from the server and storing the downloaded supplementary information. | 2013-08-08 |
20130205335 | METHOD AND SYSTEM FOR IMPLEMENTATION OF RULES FOR OVERLAYS BASED ON AUTOMATIC CONTENT RECOGNITION - An automatic content recognition (ACR)-enabled connected TV device may be operable to present, utilizing an ACR system, an overlay during presentation of content, based on one or more rules. The one or more rules may be implemented utilizing information provided by the ACR system. The presented overlay may be associated with a sponsor, and the one or more rules may comprise a timing rule, an advertisement separation rule, an advertisement conflict rule and/or an auto-scaling rule. An ad server coupled to the ACR system may determine whether the overlay associated with the sponsor may be appropriate for presentation. The presented overlay may comprise interactive content for viewer interaction, and the one or more rules may comprise a viewer interaction rule which ensures that, when the interactive overlay is presented, the presented content may be scaled so that the scaled presented content is not covered by the overlay. | 2013-08-08 |
20130205336 | SYSTEM AND METHOD FOR REAL-TIME MARKETING USING CONVENTIONAL SCENE / TIMING METADATA-EMBEDDED VIDEO - A system and method for identifying an item in a video program including associated metadata. In operation, the correspondence between product information identifying the item, and a scene depicted in the video program in which the product appears, is stored in a database. The associated metadata, previously embedded in the video program, is also copied to the database, and indicates a correspondence between each said scene depicted in the program and the location therein of the scene. A specific scene of interest in the video program is identified by reference to the metadata in the database, and the item in the specific scene is then identified by correlating the metadata for the specific scene with the product information stored in the database, using the stored product/scene correspondence. | 2013-08-08 |
20130205337 | APPARATUS AND METHOD FOR PROVIDING EMERGENCY COMMUNICATIONS - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller operable to monitor for emergency messages over a broadcast network and over the Internet, obtain an emergency message based on the monitoring where the emergency message comprises text data, audio data, schedule data and location data and where the text and audio data correspond to a plurality of languages, generate an alert message comprising the schedule data, the location data and at least a portion of the plurality of languages of the text and audio data, and multicast the alert message over an Internet Protocol Television network to a plurality of set top boxes, wherein each of the set top boxes presents a text alert that is synchronized with an audio alert based on the multicast alert message when the location data corresponds with a location of the set top box. Other embodiments are disclosed. | 2013-08-08 |
20130205338 | METHOD AND SYSTEM FOR SYNCHRONIZATION OF MESSAGES TO CONTENT UTILIZING AUTOMATIC CONTENT RECOGNITION - An automatic content recognition (ACR) enabled (ACR-enabled) connected TV device may be operable to present, utilizing ACR, an overlay starting at a time that is synchronized to an identified event in presented content. The overlay may comprise one or more messages associated with an online social network. The presented content may comprise a program, a movie, a game or a commercial. The one or more messages may be pre-generated, before presentation of the content, for presentation synchronized to the identified event during the presentation of the content. The one or more messages may be generate during broadcast or streaming of a program or a movie, and the presented content, which comprises the program or the movie, may be presented during a time-delayed playback. The ACR-enabled connected TV device may track, utilizing the ACR, how each of the presented one or more messages is actually being viewed and/or interacted with. | 2013-08-08 |
20130205339 | DYNAMIC CONTENT ALLOCATION AND OPTIMIZATION - Systems and methods for the optimized allocation of content within a universe of inventory are described. For example, a method may include receiving content comprising at least one characteristic and at least one goal. A universe of inventory may be accessed that comprises a plurality of targets which may be assigned into a plurality of segments based on at least one demographic vector. An allocation optimization model may be generated based on the at least one content characteristic, the at least one goal and the plurality of segments. The content may be presented to the targets based on the allocation optimization model. Viewing data may be received that comprises data associated with target consumption of the content and the allocation optimization module may be re-optimized based on the viewing data. Additional factors, such as resource constraints and/or filtering rules, may be used when re-optimizing the allocation optimization module. | 2013-08-08 |
20130205340 | SYSTEM AND METHOD FOR MANAGING OUT OF COVERAGE BROADCASTS - A mobile content distribution system in an airplane, a train, or a bus is capable of determining if a mobile content distribution system is within an area authorized for the mobile content distribution system to receive content from a wireless service provider and displaying channels from the wireless service provider accordingly. If the system is not within the authorized area, the system displays a program guide including channels from locally stored content but no channel from the wireless service provider. If the system is within the authorized area and a user indicates live wireless program guide information is needed, the system acquires the live wireless program guide information and displays the program guide includes channels from the locally stored content and channels from the wireless service provider. | 2013-08-08 |
20130205341 | SYSTEM AND METHOD FOR WIFI VIDEO STREAMING - A video or multimedia distribution system receives multiple video streams and transcodes them into a single stream of UDP packets with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream. The UDP packets are routed to a plurality of Access Points (APs) for transmission. A User Equipment (UE) communicates with the APs and selects one of the video streams for viewing on the UE by selecting the port number corresponding to the desired video stream. A first processor in the UE identifies and stores UDP packet data having the selected port number and a second processor retrieves and plays the video stream on a display. The UE can “change channels” to view other video streams by changing the port number to the port number of the desired video stream. | 2013-08-08 |
20130205342 | PROGRAM GUIDE SYSTEM WITH ADVERTISEMENTS - An interactive television program guide is provided in which advertisements may be displayed on program guide screens. Banner advertisements may be displayed above and below program listings. Panel advertisements may be provided adjacent to program listings. The advertisements may contain video. The advertisements may be used to promote television programs and conventional goods and services. When a user selects an advertisement, the program guide provides the user with an opportunity to order products or services, request information, set reminders for upcoming programs, view program descriptions, record programs, or take other such actions. Embedded advertisements may be provided within the program listings region and may be automatically displayed immediately adjacent to related program listings. | 2013-08-08 |
20130205343 | Method & Apparatus for an Enhanced Television Viewing Experience - Embodiments of the invention include methods and systems to provide an enhanced television experience via a receiver that can access both broadcast and Internet content and can combine elements from both into a single enhanced display. Broadcast-delivered and Internet-delivered content elements are aligned in context by extending the data in an electronic program guide to include an Internet Universal Resource Locator (“URL”) for each program. The URL is used by the receiver to access the supplemental content on the Internet corresponding to a specific broadcast program. | 2013-08-08 |
20130205344 | METHOD AND DIGITAL BROADCASTING SYSTEM FOR TRANSMITTING AND RECEIVING ESG - A method and a digital broadcasting system for transmitting and receiving an Electronic Service Guide (ESG) are provided. When there are ESG fragments to be transmitted through a communication network among ESG fragments included in ESG data, a digital broadcast transmitter generates an ESG data session such that the ESG data session may include route information through the communication network of the relevant ESG fragments. Then, the digital broadcast transmitter transmits the generated ESG data session to a broadcast receiving terminal, which obtains the route information through the communication network of the relevant ESG fragments. Accordingly, a user can more easily and conveniently receive the ESG data by using the route information through the communication network obtained by the broadcast receiving terminal. | 2013-08-08 |
20130205345 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2013-08-08 |
20130205346 | DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs. | 2013-08-08 |
20130205347 | USER CLASSIFIABLE SET-TOP BOX - One embodiment may take the form of an apparatus for providing separate user classifications and interfaces to multiple users of a set-top box of the television system. Each user classification may be configurable to provide different interfaces, menus and available features to the users of the set-top box. Further, each user classification may include several sub-classifications to further personalize the set-top box to the various users of the system. Also, each user classification may also monitor the habits and usage of each class and store such information for use by the set-top box to suggest settings of the set-top box that the user may be interested in, such as a favorite channel list. | 2013-08-08 |
20130205348 | SYSTEM AND METHOD FOR INTERACTIVE VIDEO CONTENT PROGRAMMING - The present invention is directed to a system and method for interacting with video by displaying one or more interface links associated with video content being displayed, pausing the video content when an interface link is interacted with, allowing the user to view ancillary content the interface link is linked to over a network, and unpausing the video content after the user elects to continue viewing the video content. In one or more embodiments, the ancillary content may permit e-commerce, display additional video or other images, and/or include links to additional ancillary content. The present invention also includes a method for creating an interactive video. | 2013-08-08 |
20130205349 | METHOD AND SYSTEM FOR INTEGRATED STACKING FOR HANDLING CHANNEL STACKING OR BAND STACKING - A satellite reception assembly may comprise a housing configured to support receipt and handling of a plurality of satellite signals. The housing may comprise circuitry incorporating integrated stacking architecture for supporting and/or providing channel and/or band stacking whereby particular channels or bands, from multiple satellite signals that are received via the satellite reception assembly, may be combined onto a single output signal that may be communicated from the satellite reception assembly to a gateway device for concurrent distribution thereby to a plurality of client devices serviced by the gateway device. | 2013-08-08 |
20130205350 | METHOD AND SYSTEM FOR MONITORING, MANAGEMENT AND MAINTENANCE OF AN INTERNET PROTOCOL LNB - An Internet protocol low noise block downconverter (IP LNB) assembly, which is within a satellite dish assembly, may be operable to determine one or more baseline settings of the satellite dish assembly. The IP LNB assembly may monitor, periodically or aperiodically, one or more current settings that may correspond to the determined one or more baseline settings to identify deviations of the one or more current settings from the baseline settings. The results of the monitoring may be communicated to a satellite service provider. The satellite service provider may provide maintenance and/or service management for the satellite dish assembly based on the communicated results of the monitoring. The IP LNB assembly may determine a location setting via a GNSS module and determine an alignment setting via a directional sensor in the IP LNB assembly. The IP LNB assembly may determine a received signal strength based on a RSSI. | 2013-08-08 |
20130205351 | Device, System, and Method for Managing Television Tuners - A method at a first set top box includes transmitting to a second set top box a request to use a television tuner associated with the second set top box. The method further includes receiving a return recording option from the second set top box. The method also includes generating an indication of a rejection of the request from the second set top box based on the received return recording option. The indication includes a graphical message specifying the rejection of the request. | 2013-08-08 |
20130205352 | System and Method for Video Streaming to Display Device Using Parasitically Powered Receiver - A method and system for streaming to wirelessly stream multimedia content through computing devices to parasitically powered receivers without the use of an additional AC power cord. The computing devices access streaming content and wirelessly transmit the streaming content to parasitically powered receivers. The parasitically powered receivers decode and demodulate the streamed content and then transfer the streamed content to the display devices. | 2013-08-08 |
20130205353 | HOME NETWORK SYSTEM WITH TRANSMISSION ERROR RECOVERY - A client TV in a home entertainment network receives and buffers an audio/video stream from a server, before playing the stream. In the case of buffer underflow, the client TV requests the server to raise the transmission rate. If this causes an ensuing buffer overflow, the client TV requests the server to reset the transmission rate or stop transmitting altogether for a short time. | 2013-08-08 |
20130205354 | VCR CONTROL CAPABILITIES FOR INFORMATION PLAY SESSIONS - The present invention relates to communication networks and, more particularly, to information playback in communication networks. System and method for enabling Video Cassette Recording controls while information is being played to a user. A Media Gateway Controller indicates to a Media Server that the user could exercise Video Cassette Recording controls on the information while the information is being played to the user. The Media Server plays the information to the user and receives a Video Cassette Recording control command entered by the user. The Media Server performs an action on the information according to the Video Cassette Recording control command. The user is an Intelligent Network Application Part (INAP)/Customized Applications for Mobile networks Enhanced Logic (CAMEL) user. | 2013-08-08 |
20130205355 | REPRODUCTION APPARATUS, RECORDING/DELIVERY APPARATUS, REPRODUCTION METHOD, AND RECORDING/DELIVERY METHOD - A recording/delivery apparatus includes a receiver, a recorder, an information map creating unit, an information map supplying unit, and a stream data reply unit. The receiver receives a broadcast data stream. The recorder records the received data stream in a recording medium. The information map creating unit creates an information map based on the data stream. The information map identifies a changed packet in a target stream of the data stream. The information map creating unit records the information map in the recording medium. The information map supplying unit supplies the information map to a reproduction apparatus coupled to the recording/delivery apparatus. The stream data reply unit provides, in response to a request for the data stream from the reproduction apparatus, a start position of the data stream. | 2013-08-08 |
20130205356 | MEASUREMENT OF VIDEO QUALITY AT CUSTOMER PREMISES - A video signal is provided to a set top box. An instruction to record a specified portion of the video signal, thereby creating a video sample, is provided to the set top box. The video sample is received from the set top box. Reference video corresponding to the video sample is obtained. A comparison of the video sample and the reference video is performed. | 2013-08-08 |
20130205357 | IP MULTICAST MANAGEMENT AND SERVICE PROVISION SYSTEM AND METHOD | 2013-08-08 |
20130205358 | ELECTRICAL DEVICE HAVING A WIRELESS ROUTE FUNCTION - An electrical device having a wireless route function is provided. The electrical device comprises a signal processing module, a wireless route module and a wireless transceiver module electrically connected to the signal processing module and the wireless route module. The signal processing module is configured to generate a first signal. The wireless route module is configured to create a route mode. The wireless transceiver module is configured to build a plurality of first wireless connections with a plurality of first electrical products according to the route mode, and transmit the first signal to the first electrical products via the first wireless connections so that each of the first electrical products executes a first action in response to the first signal. | 2013-08-08 |
20130205359 | Policy and compliance management for user provisioning systems - A user provisioning system is extended to enable account reconciliation to occur in conjunction with a provisioning request. In response to a user provisioning request, a determination is made whether the user provisioning request is to be extended by including a reconciliation request. If so, the reconciliation request is piggy-backed on top of the provisioning request. This approach enables the reconciliation operation to be scoped to just the particular user account that is the subject to the provisioning operation, and it enables reconciliation to be carried out much more frequently as compared to the periodic, batch-oriented approach of prior techniques. | 2013-08-08 |
20130205360 | PROTECTING USER CREDENTIALS FROM A COMPUTING DEVICE - Protecting user credentials from a computing device includes establishing a secure session between a computing device and an identity provider (e.g., a Web service). Parameters of the secure session are communicated to a credential service, which renegotiates or resumes the secure session to establish a new secure session between the credential service and the identity provider. User credentials are passed from the credential service to the identity provider via the new secure session, but the computing device does not have the parameters of the new secure session and thus does not have access to the passed user credentials. The credential service then renegotiates or resumes the secure session again to establish an additional secure session between the credential service and the identity provider. Parameters of the additional secure session are communicated to the computing device to allow the computing device to continue communicating securely with the identity provider. | 2013-08-08 |
20130205361 | DYNAMIC THREAT PROTECTION IN MOBILE NETWORKS - In general, techniques are described for dynamic threat protection in mobile networks. A network system comprising a network security device and a management system may implement the techniques. The management system includes a network server having a shared database. A mobile device manager (MDM) of the management system receives a report message from a mobile device, specifying a threat to a mobile network. The MDM publishes the threat to the shared database. A network management system (NMS) of the management system receives data from the shared database identifying the threat and generates a security policy that specifies actions to address the threat. The NMS then installs the security policy in the network security device so that the network security device performs the actions of the security policy to address the threat. | 2013-08-08 |
20130205362 | CENTRALIZED OPERATION MANAGEMENT - A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application. | 2013-08-08 |
20130205363 | CENTRALIZED OPERATION MANAGEMENT - A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application. | 2013-08-08 |
20130205364 | CENTRALIZED OPERATION MANAGEMENT - A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application. | 2013-08-08 |
20130205365 | Policy and compliance management for user provisioning systems - A user provisioning system is extended to enable account reconciliation to occur in conjunction with a provisioning request. In response to a user provisioning request, a determination is made whether the user provisioning request is to be extended by including a reconciliation request. If so, the reconciliation request is piggy-backed on top of the provisioning request. This approach enables the reconciliation operation to be scoped to just the particular user account that is the subject to the provisioning operation, and it enables reconciliation to be carried out much more frequently as compared to the periodic, batch-oriented approach of prior techniques. | 2013-08-08 |
20130205366 | DYNAMIC CATEGORIZATION OF APPLICATIONS FOR NETWORK ACCESS IN A MOBILE NETWORK - Systems and methods of dynamic categorization of applications for network use and access in a mobile network are disclosed. Using application profile information, applications can be categorized into one of multiple categories that define restrictions on the application's access to the wireless network or cellular network. One example of such categories is the concept of black, white and grey listings. The “white” listed applications may be always allowed access, “black” listed application may never or almost never be granted network access (e.g., application may be malware like or otherwise consumes large amounts of network/device resources), and grey listed applications may be granted access based on one or more criteria. | 2013-08-08 |
20130205367 | Methods and Systems for Active Data Security Enforcement During Protected Mode Use of a System - Systems and method are provided for enforcing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method disables the access to the database of secure information upon detecting a predefined security enforcement violation associated with an activity by the user during access to the database. The method being executed by a processor. | 2013-08-08 |
20130205368 | RETROSPECTIVE POLICY SAFETY NET - These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. The method comprises the further steps of submitting a second policy to the access control mechanism, comparing the log entries to the second policy, and based on the results of the comparing step, taking one of a predetermined number of actions. | 2013-08-08 |
20130205369 | DIRECT MODE COMMUNICATION SYSTEM AND DISCOVERY INTERACTIVE METHOD THEREOF - A direct-mode communication system having a user direct-mode communication apparatus and a serving direct-mode communication apparatus is provided. The user direct-mode communication apparatus connects to an operating server, and authenticates with the operating server to obtain a user authenticated identification. The serving direct-mode communication apparatus connects to the operating server, and authenticates with the operating server to obtain a serving authenticated identification. The user direct-mode communication apparatus broadcasts a discovery signal based on the user authenticated identification. The serving direct-mode communication apparatus receives the discovery signal after the user direct-mode communication apparatus enters a default serving range, and provides interactive information to the user direct-mode communication apparatus according to the discovery signal and based on the serving authenticated identification. | 2013-08-08 |
20130205370 | MOBILE HUMAN CHALLENGE-RESPONSE TEST - Methods and systems for verifying whether a user requesting an online account is likely a human or an automated program are described. A request for an online account may be received from a mobile device. A human challenge-response test adapted for displaying on a mobile device is displayed on the mobile device. Upon viewing the human challenge-response test, the user enters the user's solution to the human challenge-response test on the mobile device. A response hash value is created based on the user's solution. The response hash value is sent to an account request server for verification. | 2013-08-08 |
20130205371 | Method for Securing Digital Data and Identities in Particular in a Process Using Information and Communication Technologies - A method of securing and controlling data and identities within a communication process between an author and at least one recipient comprises at least: inserting at least one stamp in the computer or communication protocol associated with the data stream by means of a stamping system, the protocol containing the identity of the author, said stamp being a distinctive sign and a sign of recognition and a means of access to a secured account; the author using said secured account, administered by an anonymization authority, and said stamp being used to identify itself with said authority; the data stream comprising at least one instruction; at least one additional instruction having been registered with the anonymization authority and placed in the secured account; reading, at at least one recipient, of said protocol by means of a reading system capable of detecting the presence of said stamp and then in extracting all or part of the additional instruction from the anonymization authority or from the secured account, said extraction being carried out from the secured account by the means of said stamp. | 2013-08-08 |
20130205372 | AUTHORIZATION OF DEVICE ACCESS TO NETWORK SERVICES - The invention provides for authorization of devices entering a network. A new device entering a network sends an authorization request. Another device in the network may receive the request and display a User Interface (UI) which prompts the user to approve the device. The user can use a device identifier provided by the new device in approving the new device. Assuming the identifier provided by the new device matches an identifier accessible by the authorizing device, the user authorizes the new device. A key is then generated for the new device, which allows access to an appropriate range of network services. Authorization decisions can be synchronized among the various devices in a network, so even if an authorizing device leaves the network, the new device key can be validated. A security service can be replicated in a new device once the device is authorized to access the network. | 2013-08-08 |
20130205373 | ADAPTING AUTHENTICATION FLOW BASED ON WORKFLOW EVENTS - Systems, devices, and methods are disclosed for managing virtual sessions. A plurality of workflow events may be received at a central server computer system from a plurality of different terminal devices. A context of a user associated with a virtual session at the central server computer system may be determined, and an authentication flow for the user may be determined based on the context of the user and at least one of the received workflow events. The user may be authenticated for access to the virtual session at a terminal device according to the determined authentication flow. | 2013-08-08 |
20130205374 | METHOD AND SYSTEM FOR NETWORK ACCESS CONTROL - A method and a system for network access control are provided, which are based on cipher code mechanism. After a visitor has raised an access request, an access controller in the destination network processes the access request and initiates an authentication request on the visitor identity to an authentication server through the visitor. The access controller in the destination network accomplishes the authentication on the visitor identity according to the public authentication result of the authentication server transferred by the visitor, and performs according to the authorization policy the authorization management on the successfully authenticated visitor. The present invention solves the problem of incapableness of performing the access control when the access controller can not directly use the authentication service provided by the authentication server. The present invention can sufficiently satisfy the real application requirements of access control on visitor. | 2013-08-08 |
20130205375 | AUTHORIZING AN ELECTRONIC DEVICE TO CONTROL A MEDIA RENDERING UNIT - A method performed in a media aggregating node and a media aggregating node is provided for authorizing a second electronic device to control a media rendering unit included in a local network environment. The media aggregating node is network environment, e.g. a DLNA network, comprising a gateway, which is the communication interface between the media aggregating node and the media rendering units comprised in the local network environment. The media aggregating node is further connected to first electronic device, which controls a media rendering unit, in the local network environment, and the media rendering upon it. The media aggregating node is further connected to a second electronic device or to a set of second electronic devices, which can be associated with a second user. The media aggregating node receives an instruction, from the first electronic device to authorize a second electronic device to control the media rendering unit. Thereafter, the media aggregating node authorizes the second electronic device to control the media rendering unit. After being authorized by the media aggregating node, the second electronic device can control the media rendering unit and the media rendering upon it. Furthermore, methods for first and second electronic devices, as well as first and second electronic devices are provided. | 2013-08-08 |
20130205376 | SYSTEM AND METHOD FOR SECURING DISTRIBUTED EXPORTING MODELS IN A NETWORK ENVIRONMENT - A method is provided in one example implementation and includes identifying a plurality of exporters that are authorized to communicate data to a collector on behalf of a secure domain; generating secure credentials for the secure domain; communicating the secure credentials to the collector; and authenticating the exporters using the secure credentials. In more particular implementations, the method can include receiving the secure credentials; receiving certain data that includes identifying information, which further includes an Internet protocol (IP) address of a source associated with the certain data; accepting the certain data if the secure credentials validate the identifying information; and rejecting the certain data if the secure credentials do not validate the identifying information. | 2013-08-08 |
20130205377 | METHODS USING BIOMETRIC CHARACTERISTICS TO FACILITATE ACCESS OF WEB SERVICES - Methods for facilitating access of a web service are provided. In an embodiment, a first web device first obtains at least one reference biometric characteristic. Then, the first web device receives at least one parameter for the web service. Next, the first web device associates the at least one reference biometric characteristic with the at least one parameter. Thereafter, a second web device obtains at least one biometric characteristic. Then, the at least one biometric characteristic obtained by the second web device is compared with the at least one reference biometric characteristic. If the at least one biometric characteristic obtained by the second web device matches the at least one reference biometric characteristic, the second web device applies the at least one parameter to the web service. | 2013-08-08 |
20130205378 | COMMUNICATION APPARATUS, SERVER APPARATUS, RELAY APPARATUS, CONTROL APPARATUS, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a communication apparatus is connected to a server apparatus that issues first authentication information used in communication. The communication apparatus includes a receiving unit configured to receive an execution instruction to execute a bootstrap authentication process of issuing the first authentication information. The bootstrap authentication process includes validation of capability information indicating a capability of the communication apparatus. The communication apparatus also includes a first authentication processing unit configured to execute the bootstrap authentication process with the server apparatus based on second authentication information including the capability information, when the receiving unit receives the execution instruction. | 2013-08-08 |
20130205379 | AUTHENTICATION METHOD BETWEEN CLIENT AND SERVER, MACHINE-READABLE STORAGE MEDIUM, CLIENT AND SERVER - An authentication method between a server and a client is provided. The authentication method includes transmitting, to the client, an inquiry message including a first modified secret key generated based on a first secret key and a first blinding value, receiving, from the client, a response message including a response value generated based on the first blinding value, a second secret key, and an error value, calculating the error value from the response value, and determining whether authentication of the client has succeeded based on the error value. | 2013-08-08 |
20130205380 | IDENTITY VERIFICATION - A method of verifying the identity of a user comprising: initiating ( | 2013-08-08 |
20130205381 | Service Protection - A method and system for determining whether user accounts in a client-server architecture are legitimate is described, the method and system including determining a first integer value, hereinafter denoted N, and a second integer value, hereinafter denoted K, such that K2013-08-08 | |
20130205382 | Resource Access Based on Multiple Credentials - A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. A determination is made as to whether access to a resource is permitted, by at least comparing the collection of multiple user credentials to a threshold combination of user credentials to be satisfied to access the resource. An indication of whether access to the resource by a requesting user is permitted is returned or provided to another device. | 2013-08-08 |
20130205383 | CONSOLIDATING DISPARATE CLOUD SERVICE DATA AND BEHAVIOR BASED ON TRUST RELATIONSHIPS BETWEEN CLOUD SERVICES - A method for consolidating cloud service data and behaviors can begin with the compilation of user/service membership data that associates requesting entities with subscribed cloud services by a trusted cloud service consolidator. A federated trust library housing inter-service trust information for the cloud services contained in the user/service membership data can be created. In response to a service request from a requesting entity, trusted secondary cloud services can be identified for the requesting entity. Identification of the trusted secondary cloud services can be based upon trust factors synthesized from data contained in the federated trust library. Data satisfying the service request and associated behaviors from each trusted secondary cloud service can then be consolidated into a unified data structure. A behavior can be an executable action supported by a trusted secondary cloud service. The unified data structure can be conveyed to the requesting entity in a service response. | 2013-08-08 |
20130205384 | Secure System for Interconnection Between Two Public Networks - A secure interconnection system between two public networks comprises at least one first router, a first firewall, a second router, a second firewall and a blade server, and a first virtual local area network containing the data streams exchanged between a first communications facility and a second communications facility, a second virtual local area network containing the management and maintenance streams of said system which are exchanged between a supervision centre and the blade server and a third virtual local area network containing the authentication streams for said first communications facility which are exchanged between the said second firewall and said blade server, said virtual local area networks being designed so as to exhibit an empty intersection. | 2013-08-08 |
20130205385 | PROVIDING INTENT-BASED ACCESS TO USER-OWNED RESOURCES - An access system is described herein which allows an application to access a system-level and/or application-specific user-owned resource based on a user's interaction with an intent-based access mechanism. For example, the intent-based access mechanism may correspond to a gadget that is embedded in an application user interface provided by the application, and/or logic for detecting a permission-granting input sequence. The access system accommodates different types of intent-based access mechanisms. One type is a scheduled intent-based access mechanism. Another type provides access to two or more user-owned resources. Further, the access system includes a mechanism for determining whether the application is permitted to use an intent-based access mechanism. | 2013-08-08 |
20130205386 | METHOD AND SYSTEM FOR VERIFICATION OF HUMAN PRESENCE AT A MOBILE DEVICE - A method and system is provided for verifying human presence at a mobile device. The method includes receiving a request for verification. Further, the method includes sending a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) challenge to the mobile device. Further, the method includes receiving a response to the CAPTCHA challenge. Finally, the method includes verifying the human presence by matching the response received to the CAPTCHA challenge sent. | 2013-08-08 |
20130205387 | Method and Apparatus to Authenticate a User to a Mobile Device Using Mnemonic Based Digital Signatures - A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action. | 2013-08-08 |
20130205388 | SELECTIVE RANDOMIZATION FOR NON-DETERMINISTICALLY COMPILED CODE - A method and an apparatus for runtime compilation that generates non-deterministic and unpredictable code to protect against un-trusted code attacks are described. The runtime compilation may be based on heuristic rules without requiring deterministic behavior reduction operations for all the code generated. The heuristic rules may include estimations on, for example, runtime overhead or cost incurred for code protection, amount of code protection required and/or other applicable factors and their relationships. | 2013-08-08 |
20130205389 | DATA PROCESSING APPARATUS AND METHOD FOR PROTECTING SECURE DATA AND PROGRAM CODE FROM NON-SECURE ACCESS WHEN SWITCHING BETWEEN SECURE AND LESS SECURE DOMAINS - A data processing apparatus includes processing circuitry and a data store including a plurality of regions including a secure region and a less secure region. The secure region is configured to store sensitive data accessible by the circuitry when operating in a secure domain and not accessible by the circuitry when operating in a less secure domain. The data store includes a plurality of stacks with a secure stack in the secure region. Stack access circuitry is configured to store predetermined processing state to the secure stack. The processing circuitry further comprises fault checking circuitry configured to identify a first fault condition if the data stored in the predetermined relative location is the first value. This provides protection against attacks from the less secure domain, for example performing a function call return from an exception, or an exception return from a function call. | 2013-08-08 |
20130205390 | NETWORK ASSISTED FRAUD DETECTION APPARATUS AND METHODS - Methods and apparatus for detecting fraudulent device operation. In one exemplary embodiment of the present disclosure, a device is issued a user access control client that is uniquely associated with a shared secret that is securely stored within the network and the access control client. Subsequent efforts to activate or deactivate the access control client require verification of the shared secret. Each change in state includes a change to the shared secret. Consequently, requests for a change to state which do not have the proper shared secret will be disregarded, and/or flagged as fraudulent. | 2013-08-08 |
20130205391 | Formal Analysis of the Quality and Conformance of Information Flow Downgraders - Mechanisms for evaluating downgrader code in application code with regard to one or more security guidelines are provided. Downgrader code in application code is identified, where the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code. Processes of the downgrader code are evaluated against security guidelines to determine if the processes violate the security guidelines. A notification is generated in response to the evaluation indicating that the processes of the downgrader code violate the security guidelines. The notification is output to a computing device for consideration. | 2013-08-08 |
20130205392 | METHOD AND SYSTEM FOR CONTENT DISTRIBUTION NETWORK SECURITY - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 2013-08-08 |
20130205393 | Increasing Availability of an Industrial Control System - A mechanism is provided to improve the availability of an ICS and an external system that uses data from the ICS by ensuring operation of the ICS and opera on of the system even if an anomaly has occurred in a device in the ICS. The mechanism receives measured data from the plurality of devices, calculates prediction data by using the measured data and correlation information used for deriving prediction data for correlated devices, and provides the measured data and the prediction data. | 2013-08-08 |
20130205394 | Threat Detection in a Data Processing System - A mechanism is provided for resolving a detected threat. A request is received from a requester to form a received request, statistics associated with the received request are extracted to form extracted statistics, rules validation is performed for the received request using the extracted statistics, and a determination is made as to whether the request is a threat. Responsive to a determination that the request is a threat, the requester is escalated using escalation increments, where the using escalation increments further comprises increasing user identity and validation requirements through one of percolate to a next user level or direct entry to a user level. | 2013-08-08 |
20130205395 | PRE-BOOT FIRMWARE BASED VIRUS SCANNER - The present disclosure relates to allowing the utilization of a virus scanner and cleaner that operates primarily in the pre-boot phase of computer operation and, more particularly, to allowing the utilization of a virus scanner and cleaner that operates primarily during the loading of an operating system. | 2013-08-08 |
20130205396 | Detecting Malicious Software - A computer implemented method, apparatus, and program code for detecting malicious software components. A series of calls made by a software component is monitored to identify an identified respective series of call types to components named in said calls. A determination is made as to whether the identified respective series of call types to components named in said calls is indicative of malicious behavior. | 2013-08-08 |
20130205397 | ADAPTIVE FUZZING SYSTEM FOR WEB SERVICES - Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page that is an indication of the page's potential for hosting a vulnerability. When a page is discovered with a vulnerability score that indicates the page has the potential for a vulnerability a depth first search and expanded fuzzing testing is performed on one or more branches of the web site that begin with the page with the potential vulnerability. | 2013-08-08 |
20130205398 | AUTOMATIC SYNTHESIS OF UNIT TESTS FOR SECURITY TESTING - Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output. | 2013-08-08 |
20130205399 | AUTOMATIC SYNTHESIS OF UNIT TESTS FOR SECURITY TESTING - Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output. | 2013-08-08 |
20130205400 | PRIVACY-BASED IDENTITY - The present disclosure relates to a privacy-based representation of a user identity within an online system. A method for representing a user identity within an online system is provided, comprising: requesting a user identity of a user of the online system by a viewer; retrieving a status of the viewer with regard to the user; based on the status of the viewer, determining a representation of the user identity; and providing the representation of the user identity to the viewer. Furthermore, an online system and a data structure representing a user identity of a user of an online system are defined. | 2013-08-08 |
20130205401 | Apparatuses and methods for content protection using digital rights management (DRM) in webview or webkit - An electronic device for digital content protection using DRM is provided with a DRM agent, a plug-in, and a web browser. The DRM agent processes DRM-protected content associated with an electronic file or a web page. The plug-in enables access of the electronic file. The web browser comprises a WebView SDK installed with the DRM agent or a WebKit engine installed with the DRM agent. The WebView SDK activates the processing of the DRM-protected content of the DRM agent to obtain the web page portion-by-portion, and displays the web page with the obtained portions. The WebKit engine activates the processing of the DRM-protected content of the DRM agent to obtain the electronic file portion-by-portion, and uses the plug-in to execute the electronic file with the obtained portions, or displays the web page with the obtained portions. | 2013-08-08 |
20130205402 | Apparatuses and methods for content protection using Digital Rights Management (DRM) in WebView or WebKit - An electronic device is provided with a DRM agent, a plug-in, and a web browser. The DRM agent processes DRM-protected content associated with an electronic file or a web page. The plug-in enables access of the electronic file. The web browser comprises a WebView SDK installed with the DRM agent or a WebKit engine installed with the DRM agent. The WebView SDK activates the processing of the DRM-protected content of the DRM agent to obtain the web page portion-by-portion, and displays the web page with the obtained portions. The WebKit engine activates the processing of the DRM-protected content of the DRM agent to obtain the electronic file or web page portion-by-portion, and uses the plug-in or a native media player to access the electronic file with the obtained portions, or displays the web page with the obtained portions. | 2013-08-08 |
20130205403 | MAINTAINING SECURE DATA ISOLATED FROM NON-SECURE ACCESS WHEN SWITCHING BETWEEN DOMAINS - A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different secure levels, at least one secure region (for storing sensitive data accessible by the data processing circuitry operating in the secure domain and not accessible by the data processing circuitry operating in a less secure domain) and a less secure region (for storing less secure data). The circuitry is configured to determine which stack to store data to, or load data from, in response to the storage location of the program code being executed. In response to program code calling a function to be executed, the function code being stored in a second region, the second region having a different secure level to the first region, the data processing circuitry is configured to determine which of the first and second region have a lower secure level. | 2013-08-08 |
20130205404 | PROTECTING PRIVACY OF SHARED PERSONAL INFORMATION - Methods and apparatus are described to protect personal information by decoupling it from user identity. According to specific embodiments, this is accomplished by associating each user with an anonymous token that is decoupled from the user's identity. Personal information (e.g., a user's physical or geographic location) is stored in association with this anonymous token, with no apparent connection to the user. Those allowed to access the personal information—including the owner himself—are granted the ability through a variety of mechanisms to connect the anonymous token back to the owner. The personal information can then be retrieved by locating the data stored in association with the anonymous token in the data store. | 2013-08-08 |
20130205405 | DATA PROCESSING SYSTEM AND DATA PROCESSING METHOD - Provided is a system that improve security of data processing by determining whether processing of the data received from an image processing apparatus is restricted, communicating with the image processing apparatus when processing of the data is restricted, and receiving a response whether the processing of the data is permitted. It is determined in the portable terminal whether processing of the data received from the image processing apparatus is restricted. If processing of the data is restricted, the portable terminal communicates with the image processing apparatus, and the portable terminal processes data when it received information that indicates the processing of the data is permitted. If processing of the data is restricted, the portable terminal processes the data without communicating with the image processing apparatus. | 2013-08-08 |
20130205406 | Data protection method and device - An apparatus and method for encoding and decoding additional information into a digital information in an integral manner. More particularly, the invention relates to a method and device for data protection. | 2013-08-08 |
20130205407 | USER INTERFACE, MACHINE AND METHOD - A user interface ( | 2013-08-08 |
20130205408 | LIVE REPRESENTATION OF USERS WITHIN ONLINE SYSTEMS - The present disclosure relates to representation of users within online systems, such as social networks, online services, and platforms. A method for representing a user within an online system is provided, comprising receiving by the online system a live recording of a first user of the online system, the first user defining permissions to access the live recording; requesting a representation of the first user by a second user of the online system; determining if the second user is authorized to access the live recording based on the permissions; and if the second user is authorized, providing the live recording to the second user as the representation of the first user. Furthermore, an online system and a data structure representing a user of an online system are defined. | 2013-08-08 |
20130205409 | APPARATUS, AND ASSOCIATED METHOD, FOR ALERTING USER OF COMMUNICATION DEVICE OF ENTRIES ON A MAIL MESSAGE DISTRIBUTION LIST - Apparatus, and an associated method, for alerting a respondent that generates a reply to a received mail message of addressing of the reply message to a non-secure address. A detector detects reception of a received mail message, and a correlator determines whether any of the entries on a distribution list associated with the received mail message is of selected characteristics, i.e., non-secure. If determined to be non-secure, an annunciator generates an annunciation requiring the respondent to elect whether to include the identified address as a recipient of the reply message. | 2013-08-08 |
20130205410 | Methods and Systems for Securing Data by Providing Continuous User-System Binding Authentication - Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method proceeds to authenticating of the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method further includes providing access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method binds the captured image data of the user to the recorded data to produce audit data for the user when accessing the database of secure information. The method is executed by a processor. | 2013-08-08 |
20130205411 | METHOD FOR PROTECTING DATA CONTENT - A method is provided for protecting data content against illegal copying. The data content is provided by an entertainment system and is output to output units in an authorized playback environment for playing back the data content. The method includes transmitting the data content in the authorized playback environment from the entertainment system to an output unit, and adding an interference signal to the data content such that, during playback of the data content outside the authorized playback environment a disruption is induced. | 2013-08-08 |
20130205412 | ON BOARD VEHICLE MEDIA CONTROLLER - The present disclosure describes a microprocessor executable media controller on board a vehicle operable (a) to determine a first spatial location of an external communication device, the external communication device being in wireless communication with the on board media controller and the first spatial location being associated with a first set of restrictions, the first set of restrictions being at least one of a control on connectivity access by the external communication device, a restriction on the connectivity access, and a restriction on one or more functions of the external communication device and (b), in response, to apply the first set of restrictions. | 2013-08-08 |
20130205413 | DATA PROCESSING APPARATUS AND METHOD USING SECURE DOMAIN AND LESS SECURE DOMAIN - A data processing apparatus | 2013-08-08 |
20130205414 | METHOD FOR NEAR FIELD COMMUNICATION OPERATION, A DEVICE AND A SYSTEM THERETO - A method, a user terminal and a system for performing a NFC operation by a NFC equipped user terminal. According to a method a common application residing in a secure element of the user terminal can be authenticated by receiving, in the common application, an authentication request message including identification information on at least service provider of the NFC reader. Based on the identification information authentication related data on a service provider of NFC service is retrieved from a database. Furthermore, a data request message is received from the NFC reader. The data is retrieved, on the basis of identification information on at least service provider of the NFC reader and identification information for data, from the database residing in the secure element of the user terminal. The data requested is delivered to the NFC reader. | 2013-08-08 |
20130205415 | NETWORK LINKER FOR SECURE EXECUTION OF UNSECURED APPS ON A DEVICE - An app is made secure using an app wrapping security technique and a network linker that creates an executable binary file of the wrapped app that does not use custom dynamic libraries. The network linker includes a client-side linker component and a server-side linker component. When the app is created and the developer decides to have it security wrapped, an extra parameter is inserted in the client-side linker component for invoking the network linker of the present invention. If a call is being made from app security wrapping code, then the invocation resolves to normal system libraries and the call is not shimmed. Once all the symbols have been resolved on the server-side linker, the executable binary is transmitted back to the client-side linker component where it is digitally signed by the app developer and put in a suitable form for uploading to an app store or marketplace. | 2013-08-08 |
20130205416 | ANTI-VIRAL AGENT - The present invention provides an agent, in particular a peptide, of formula A, comprising an amino acid sequence X1-X2-X3-X4-X5-X6 (SEQ ID NO 1) wherein X1 can be phenylalanine, isoleucine or tryptophan; X2 can be leucine or phenylalanine or alanine; X3 can be tyrosine or valine; X4 can be leucine, phenylalanine or isoleucine; 10 X5 can be phenyalanine or alanine; and X6 can be valine, arginine or tyrosine, or a fragment or variant of the peptide, wherein said peptide fragment or variant is capable of specifically binding to haemagglutinin, to inhibit the binding of a virus having haemagglutinin on its surface, for use in the treatment of a virus, for example influenza. | 2013-08-08 |
20130205417 | HAIRLESS NOD SCID MOUSE - Hairless, immunodeficient mice on a non-obese diabetic (NOD) background and methods for their production are disclosed herein. The mice are hairless and have multiple immunodeficiencies, including B-cell and T-cell deficiencies, as well as impaired macrophage and complement function. The mice also have a further deficit in natural killer and dendritic cells of the immune system. The mice are useful for biomedical research, for example, in studies involving xenograft transplantation, spontaneous tumors, cancer cell tumorigenesis, tumor angiogenesis, tumor metastatic potential, tumor suppression therapy, carcinogenesis regulation, and tumor imaging. | 2013-08-08 |
20130205418 | PEPPER HYBRID PX11423782 - The invention provides seed and plants of pepper hybrid PX11423782 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PX11423782 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-08-08 |
20130205419 | PEPPER HYBRID PS 16376104 - The invention provides seed and plants of pepper hybrid PS 16376104 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PS 16376104 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-08-08 |
20130205420 | SPINACH HYBRID RX 06682141 - The invention provides seed and plants of spinach hybrid RX 06682141 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of spinach hybrid RX 06682141 and the parent lines thereof, and to methods for producing a spinach plant produced by crossing such plants with themselves or with another spinach plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the leaf and gametes of such plants. | 2013-08-08 |
20130205421 | PLANT TRANSACTIVATION INTERACTION MOTIFS AND USES THEREOF - This disclosure concerns compositions and methods for increasing the expression of a polynucleotide of interest. Some embodiments concern novel transactivation polypeptides and variants thereof that have been identified in plants, and methods of using the same. Particular embodiments concern the use of at least one DNA-binding polypeptide in a fusion protein to target at least one transactivation polypeptide or variant thereof to a specific binding site on a nucleic acid comprising the polynucleotide of interest, such that its expression may be increased. | 2013-08-08 |
20130205422 | SOYBEAN VARIETY DLL1182 - The soybean variety DLL1182 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1182 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1182 and to plants of DLL1182 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1182. | 2013-08-08 |
20130205423 | SOYBEAN VARIETY DLL1311 - The soybean variety DLL1311 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1311 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1311 and to plants of DLL1311 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1311. | 2013-08-08 |
20130205424 | SOYBEAN VARIETY DLL1069 - The soybean variety DLL1069 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1069 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1069 and to plants of DLL1069 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1069. | 2013-08-08 |
20130205425 | SOYBEAN VARIETY DLL1291 - The soybean variety DLL1291 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1291 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1291 and to plants of DLL1291 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1291. | 2013-08-08 |
20130205426 | SOYBEAN VARIETY DLL0859 - The soybean variety DLL0859 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL0859 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL0859 and to plants of DLL0859 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL0859. | 2013-08-08 |
20130205427 | SOYBEAN VARIETY DLL1206 - The soybean variety DLL1206 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1206 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1206 and to plants of DLL1206 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1206. | 2013-08-08 |
20130205428 | SOYBEAN VARIETY DLL1348 - The soybean variety DLL1348 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1348 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1348 and to plants of DLL1348 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1348. | 2013-08-08 |
20130205429 | SOYBEAN VARIETY DLL1298 - The soybean variety DLL1298 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1298 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1298 and to plants of DLL1298 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1298. | 2013-08-08 |
20130205430 | SOYBEAN VARIETY DLL0840 - The soybean variety DLL0840 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL0840 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL0840 and to plants of DLL0840 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL0840. | 2013-08-08 |
20130205431 | SOYBEAN VARIETY DLL1347 - The soybean variety DLL1347 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1347 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1347 and to plants of DLL1347 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1347. | 2013-08-08 |