48th week of 2010 patent applcation highlights part 71 |
Patent application number | Title | Published |
20100306807 | Content Reproduction Apparatus and Content Reproduction Method - According to one embodiment, a content reproduction apparatus comprises a receiving module that receives, from a server via a network, a channel including a plurality of contents arranged along a time base so as to be distributable, a reproduction module that selectively reproduces the contents included in the received channel, and a control module that shows, when reproduction of a final content on the time base in the channel is completed, that reproduction of the final content is completed, wherein the reproduction module further reproduces, after it is shown that reproduction of the final content is completed, another content included in the channel. | 2010-12-02 |
20100306808 | METHODS FOR IDENTIFYING VIDEO SEGMENTS AND DISPLAYING CONTEXTUALLY TARGETED CONTENT ON A CONNECTED TELEVISION - Systems and methods for identifying which video segment is being displayed on a screen of a television system. The video segment is identified by deriving data from the television signals, the derived data being indicative of the video segment being displayed on the screen. This feature can be used to extract a viewer's reaction (such as changing the channel) to a specific video segment (such as an advertisement) and reporting the extracted information as metrics. The systems and methods may further provide contextually targeted content to the television system. The contextual targeting is based on not only identification of the video segment being displayed, but also a determination concerning the playing time or offset time of the particular portion of the video segment being currently displayed. | 2010-12-02 |
20100306809 | METHOD FOR DISTRIBUTING A FILE CONTENT OF AN INTERACTIVE NETWORK TELEVISION SYSTEM - The present invention discloses a distributing method for a file content of an interactive network television system, including the following steps: a content preparation function module transmitting a distributing request of a file content to a content distribution and position control function module; the content distribution and position control function module producing a distributing task based on a distributing strategy after it receives the distributing request of the content preparation function module; after selecting the content delivery and storage function module, the content distribution and position control function module forwarding the file content distributing request from the content preparation function module to the content delivery and storage function module; and based on the response of the content delivery and storage function module transmitted by the content distribution and position control function module, the content preparation function module transmits the file content to the content delivery and storage function module. The respective parts of the interactive network television system, enhanced by the present invention, become less costly, more reliable and more expansible, and thus the core competence of the IPTV system is improved. | 2010-12-02 |
20100306810 | METHODS AND APPARATUS FOR FORMAT SELECTION FOR NETWORK OPTIMIZATION - Method and apparatus for optimizing network bandwidth utilization by delivering to users only the minimum number of programs required by service provider policies. In one embodiment, the method comprises switching some users from lower quality versions of programs to higher quality versions of the same programs, and removing those lower quality versions of programs from a given service group. In another embodiment, some users are switched from higher quality versions of programs to lower quality versions of those same programs, and the higher quality versions of programs removed from a given service group. | 2010-12-02 |
20100306811 | METHOD AND APPARATUS FOR NAVIGATING AND PLAYING BACK MEDIA CONTENT - An approach is provided for navigating media content by specifying a time to start playback of the media content. | 2010-12-02 |
20100306812 | SYSTEM FOR AND METHOD OF TARGETING BROADCAST MESSAGES - A system for and method of targeting a broadcast message to a subset of potential electronic receivers in a broadcast network is presented. The system and method may comprise collecting identifying information associated with designated electronic receivers of a targeted broadcast message, generating, using a computer processor, a data set structure using the identifying information, associating the data set structure with the targeted broadcast message, and broadcasting the targeted broadcast message and the data set structure to a plurality of electronic receivers, wherein the data set structure provides information allowing at least one of the plurality of electronic receivers to determine whether the targeted broadcast message is targeted to the at least one electronic receiver. | 2010-12-02 |
20100306813 | Qualified Video Delivery - A video server is configured to provide streaming video to players of computer games over a computing network. The video server can provided video of different games to different players simultaneously. This is accomplished by rendering several video streams in parallel using a single GPU. The output of the GPU is provided to graphics processing pipelines that are each associated with a specific client/player and are dynamically allocated as needed. A client qualifier may be used to assure that only clients capable of presenting the streaming video to a player at a minimum level of quality receive the video stream. | 2010-12-02 |
20100306814 | Integrated Set-Top Box with Daisy-Chaining - The present invention is an integrated set-top box having daisy-chaining capability. The set-top box includes a down-stream path having a tuner and a digital receiver portion and an up-stream path having a power amplifier. In one embodiment, the tuner, digital receiver, and power amplifier can all be disposed on a common substrate. In another embodiment, the tuner can be disposed on a first substrate, and the digital receiver and the power amplifier can be disposed on a second substrate. The set-top box includes a daisy-chain buffer having an input coupled to an input of the tuner and having an output coupled to an input of another receiving entity such as another set-top box, tuner, cable, etc., where the daisy-chain buffer is configured to provide a signal to drive the receiving entity. | 2010-12-02 |
20100306815 | SYSTEM AND METHOD FOR SHARING USER CONTENT THROUGH A SET-TOP BOX - A system and method for managing video content through a set-top box. User input is received to record the video content to a set-top box. Digital rights management parameters associated with the set-top box are determined. The video content is recorded directly to the set-top box in response to the DRM parameters. The video content is edited based on selections by a user in response to receiving a selection to edit the video content. Preferences for distributing the video content are determined. The video content is distributed from the set-top box to a number of addresses in response to the preferences. | 2010-12-02 |
20100306816 | AUTHENTICATION VIA MONITORING - Systems, methods, and other embodiments associated with authentication via monitoring are described. One example method includes detecting a data flow in which indicia of identity (DFWIOI) travel between a first endpoint and a second endpoint. The DFWIOI may be partially encrypted. The example method may also include collecting an identity data associated with the DFWIOI from the DFWIOI, the first endpoint, the second endpoint, and so on. The example method may also include making an authentication policy decision regarding the DFWIOI based, at least in part, on the identity data. The example method may also include controlling a networking device associated with the DFWIOI based, at least in part, on the authentication policy decision. | 2010-12-02 |
20100306817 | DELEGATION MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION - Role-based security architecture that facilitates delegated role assignments where role functionality is monotonically decreasing. In furtherance thereof decreasing monotonicity roles are arranged in a hierarchy. Moreover, delegated roles can be obtained by creating a derived role (from a parent role) and removing entries from the derived role to decrease the permissions for the derived role. Delegated role assignments are scoped (bounded), which automatically applies a given scope to the assignment created by the user receiving the delegation. | 2010-12-02 |
20100306818 | Computer-Implemented Method, Computer System, And Computer Program Product for Optimization Of Evaluation Of A Policy Specification - The present description relates to a computer-implemented method, computer system, and computer program product for optimization of evaluation of a policy specification. In one aspect, the computer-implemented method for optimization of evaluation of a policy specification may comprise receiving the policy specification represented as a tree, the tree comprising a plurality of nodes. A visiting history of the tree may be determined by computing a density at least for each node in a subset of the plurality of nodes having been visited. The density may be determined by a relationship between a position of a node v in the tree and a frequency F(v) in which the node v is visited. The tree may be transformed with respect to the visiting history into a similar tree such that sibling nodes in the subset of the plurality of nodes are sorted in decreasing order according to their density. | 2010-12-02 |
20100306819 | INTERACTIVE PHISHING DETECTION (IPD) - Systems and methods for use with a client device and a server provide interactive phishing detection at the initiation of the user. Detection of phishing is based on the user's comparison of a visual indicator sent from the server to the client device with a another identical looking visual indicator displayed, for example, on a trusted website. Several security measures may be employed such as changing the visual indicator periodically, generating the visual indicator in a random manner, and authenticating the client device to the server before the server will transmit the visual indicator to the client device. User comparison of the website-displayed visual indicator with the user's client device user interface-displayed visual indicator may facilitate user verification of authenticity of a software application. | 2010-12-02 |
20100306820 | CONTROL OF MESSAGE TO BE TRANSMITTED FROM AN EMITTER DOMAIN TO A RECIPIENT DOMAIN - For controlling a message to be transmitted by a sender linked to a sender domain, from a terminal connected to an emitter domain to at least one recipient linked to a recipient domain, the emitter domain requests an authentication of the sender of the message by the sender domain. In response to a first request transmitted from the emitter domain, the recipient domain transmits a second request to the sender domain that transmits it to the emitter domain if data previously transmitted from the sender domain to the emitter domain are identical to data contained in the second request. The emitter domain transmits a response to the recipient domain so that the recipient domain receives the message from the emitter domain and transmits it to a recipient having accepted the message. | 2010-12-02 |
20100306821 | ACCOUNT-RECOVERY TECHNIQUE - Embodiments of a computer system, a method, and a computer-program product (e.g., software) for use with the computer system are described. These embodiments may be used to evaluate a user request to regain control of an online account. For example, the user request may be submitted online using a web page, and may include information that establishes the user's identity or that substantiates that the user is the owner of the online account, such as a history of recent activities associated with the online account. This information may be evaluated by comparing it to stored information associated with the online account, such as a stored history of recent activities or one or more locations of a registered user when the registered user previously accessed the online account. After evaluating the user request, remedial action may be performed. | 2010-12-02 |
20100306822 | Communication System, Line Providing Apparatus And Communication Method - A line providing apparatus has an acceptance processor accepting a line use request from the terminal apparatus, a contract determiner determines a state of conclusion of a first contract, a second contract or a combined contract obtained by substantially combining the first contract and the second contract at the terminal apparatus which is a source of the line use request accepted by the acceptance processor, and an assistance processor performing an assisting process for conclusion of a contract found not to be concluded according to a result of determination on the state of conclusion of the first contract, the second contract or the combined contract by the contract determiner, whereby the user of the terminal apparatus which does not yet conclude can sign the contract for the communication service or the information providing service through the terminal apparatus. | 2010-12-02 |
20100306823 | Method and Apparatus for Controlling the Number of Devices Installed in an Authorized Domain - The number of devices installed in an Authorized Domain is controlled by a master device functionality. This master devices stores ceiling values for the total number Totaljimit of devices to be installed in the AD; the total number Localjimit of devices to be installed in a local proximity with the master device and the total number Remotejimit of devices to be installed remotely from said master device. The master device also stores current values of the number Local_count of devices installed in the AD in local proximity with the master device; and the number Remote_count of devices installed in the AD remotely from said master device. When a new device is to be installed in the AD, the ceiling values are checked with respect to the current values and it is checked whether the device is in local proximity with the master device to authorize or not its installation in the AD, either locally or remotely. | 2010-12-02 |
20100306824 | TRUST AND IDENTITY IN SECURE CALENDAR SHARING COLLABORATION - In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data. | 2010-12-02 |
20100306825 | SYSTEM AND METHOD FOR FACILITATING USER INTERACTION WITH A SIMULATED OBJECT ASSOCIATED WITH A PHYSICAL LOCATION - Systems and methods for facilitating user interaction with a simulated object that is associated with a physical location in the real world environment is herein disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of identifying the simulated object that is available for access based on location data. The location data can include a location of a device in a time period, the device for use by a user to access the simulated object. One embodiment includes, verifying an identity of the user; and in response to determining that the user is authorized to access the simulated object, providing the simulated object for presentation to the user via the device. | 2010-12-02 |
20100306826 | METHODS AND SYSTEMS FOR IMPLEMENTING A SELF DEFENDING/REPAIRING DATABASE - This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database management application. The database management application is configured to maintain the database. The method further includes determining that a code modification has occurred to the database management application. The method further includes checking the code modification for the presence of an authorization key, and in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized. Further, the method includes quarantining the modified code in a secure storage location, and automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application. | 2010-12-02 |
20100306827 | Opaque Quarantine and Device Discovery - Embodiments described herein provide communication control features and functionality, but are not so limited. In an embodiment, a computing environment includes an access control component that can use a number of access states to control access to computing data and/or services. In one embodiment, a server computer can control access to data and/or services using a number of access states including, but not limited to: an allowed state, a blocked state, a device discovery state, and/or a quarantined state. Other embodiments are available. | 2010-12-02 |
20100306828 | Method for Secure Validation Utilizing Existing Validation Framework - Granting secure access to stored digital medical information to patients or healthcare providers facilitates information exchange in healthcare. Payment for healthcare services can be accomplished with a credit card or other electronic payment means. Each payment transaction is assigned a unique ID number by financial services computer systems, itself being transmitted with temporal information to the medical record system at the time of issuance. Receiving medical record system(s) incorporate the ID number into the validation process by requiring it during validation in defined time frame from issuance. When correctly entered in the time frame allocated, patient medical information is displayed on the requestor's computer screen. If the ID is not entered in the determined time frame, access if not granted. Transaction ID number usage therefore provides a temporal limit on access to the patient's medical information and serves as an additional validation mechanism. | 2010-12-02 |
20100306829 | IMAGE FORMING APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION CONTROL METHOD, AUTHENTICATION CONTROL PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM HAVING AUTHENTICATION CONTROL PROGRAM - A disclosed image forming apparatus includes an authentication information reception unit configured to receive first authentication information input to the image forming apparatus, an authentication control unit configured to send the first authentication information to a first authentication apparatus connected to the image forming apparatus via a network and cause the first authentication apparatus to carry out a first authentication based on the first authentication information, and an authentication information recording unit configured to record, when the first authentication based on the first authentication information has succeeded, the first authentication information therein as second authentication information. In the image forming apparatus, the authentication control unit carries out, in a case where the first authentication apparatus is not available, a second authentication based on the second authentication information recorded in the authentication information recording unit in lieu of the first authentication based on the first authentication information. | 2010-12-02 |
20100306830 | Distributed Hierarchical Identity Management - A system and methods for identity management and authentication are provided herein. The present invention employs shadow domains to prove entity membership in an identity management system where responsibility for trust relationships is devolved to the user. The present invention additionally teaches doubly signed certificate transmission for authentication of assertions made by third parties in the identity management network. | 2010-12-02 |
20100306831 | METHOD FOR FINGERPRINTING AND IDENTIFYING INTERNET USERS - Various aspects of the present system provide methods and systems for tracing internet actions to a remote computer and to an individual who operates the computer. One aspect provides a technique to generate fingerprint of computer and its user based on the information collected through the actions a user conducts on internet. Another aspect of the system provides a technique to compute the fingerprints and find relations between users and computers. Another aspect of the system provides a trust ranking to a user based on the consistency of information collected from the user's various actions. | 2010-12-02 |
20100306832 | METHOD FOR FINGERPRINTING AND IDENTIFYING INTERNET USERS - Various aspects of the present system provide methods and systems for identifying an individual who operates a remote computer. One aspect provides a technique to generate fingerprint of computer and its user based on the information collected through the actions a user conducts on internet. Another aspect of the system provides a technique to compute the fingerprints and find relations between users and computers. Another aspect of the system provides a trust ranking to a user based on the consistency of information collected from the user's various actions. | 2010-12-02 |
20100306833 | AUTONOMOUS INTELLIGENT USER IDENTITY MANAGER WITH CONTEXT RECOGNITION CAPABILITIES - A remotely located, uniquely identified resource can serve an application utilized by the Web browser. Access to the application can require authentication including a userid and password. A memory for a record associated with the application can be queried. The memory can include a set of userids and passwords indexed against unique application identifiers that are independent upon server identifiers or URLs. Responsive to querying the memory, a match between the application requiring authentication and a unique application identifier in the memory can be determined. A userid and password can be provided without manual input from a user from memory that is associated with the unique application identifier to the remotely located. The uniquely identified resource can use the userid/password as authentication to access the served application. | 2010-12-02 |
20100306834 | SYSTEMS AND METHODS FOR MANAGING SECURITY AND/OR PRIVACY SETTINGS - Systems and methods for managing security and/or privacy settings are described. In one embodiment, the method may include communicably coupling a first client to a second client. The method may further include propagating a portion of a plurality of security and/or privacy settings for the first client from the first client to the second client. The method may also include, upon receiving at the second client the portion of the plurality of security and/or privacy settings for the first client, incorporating the received portion of the plurality of security and/or privacy settings for the first client into a plurality of security and/or privacy settings for the second client. | 2010-12-02 |
20100306835 | COMMUNICATING SECURITY CREDENTIALS BETWEEN CICS REGIONS - Various embodiments include at least one of systems, methods, software, and data structures for communicating security credentials between CICS regions in a container of a Customer Information Control System (CICS) channel data structure. Some embodiments include receiving a dataset from a first CICS application executing within a first CICS region, the dataset received from the first CICS application for transmission to a second CICS application in a second CICS region. When the dataset includes a channel, populating a container of the channel with credential data to authenticate the dataset within the second CICS region and forwarding the dataset to a CICS transformer process of the first CICS region to transform and communicate the dataset to the second application in the second CICS region. | 2010-12-02 |
20100306836 | Control and Management of Electronic Messaging - A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine ifs desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee. | 2010-12-02 |
20100306837 | COMMUNICATION APPARATUS, MOBILE TERMINAL, COMMUNICATION SYSTEM, NON-CONTACT COMMUNICATION DEVICE, NETWORK CONNECTION METHOD, AND PROGRAM - A communication apparatus includes: a wireless communication unit connecting to a network via another apparatus by wireless communication; a settlement processing unit executing settlement processing of connection fees to the network by controlling a non-contact communication unit capable of reading out information stored in a non-contact communication device via non-contact communication, and writing information to the non-contact communication device via non-contact communication so as to update monetary information stored in the non-contact communication device; an authentication information recording unit controlling the non-contact communication unit to write authentication information, provided from the other apparatus when settlement processing by the settlement processing device is completed, to the non-contact communication device; and an authentication processing unit controlling the non-contact communication unit to read the authentication information from the non-contact communication device, and executing authentication processing as to the other apparatus using the authentication information, thereby establishing network connection by the wireless communication unit. | 2010-12-02 |
20100306838 | METHOD AND APPARATUS FOR COPY PROTECTING A DIGITAL ELECTRONIC DEVICE - A device and a method of authenticating an electronic device are described. The method may comprise transmitting a token value and a parameter value to the electronic device and selecting a private key within the electronic device using the parameter value. The token value may be processed with a method selected by the parameter value to generate a processed token. The processed token may be compared with an expected processed token and the electronic device may be authenticated if the processed token compares favorably with said expected processed token. | 2010-12-02 |
20100306839 | ENTITY BI-DIRECTIONAL IDENTIFICATOR METHOD AND SYSTEM BASED ON TRUSTABLE THIRD PARTY - An entity bi-directional identification method and system based on a trustable third party thereof are provided. The system comprises a first entity, which is for sending a first message to a second entity, sending a third message to a third entity after receiving a second message sent by the second entity, verifying the fourth message after receiving a fourth message sent by the third entity, sending a fifth message to the second entity after the verification is finished; the second entity, which is for receiving the first message sent by the first entity, sending the second message to the first entity, verifying the fifth message after receiving the fifth message sent by the first entity; the third entity, which is for receiving the third message sent by the first entity, checking if the first entity and the second entity are legal, implementing the pretreatment according to the checking result, sending the first entity the fourth message after the treatment is finished. | 2010-12-02 |
20100306840 | DOCUMENT PROCESSING AUTOMATED SYSTEM AND IMAGE FORMING APPARATUS - It is facilitated to execute a workflow requiring user authentication. When an IC card reading/writing apparatus reads information recorded in an IC card owned by a user, an image forming apparatus transmits user credential information included in the read information to an authentication server. The authentication server performs authentication of the user based on the user credential information transmitted from the image forming apparatus. The image forming apparatus transmits workflow program information included in the information recorded in an authentication token and parameter information for the workflow program to an application server. The application server controls the image forming apparatus based on the workflow program information. | 2010-12-02 |
20100306841 | SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state is provided. The method includes: displaying a security access interface on a display unit, wherein the security access interface comprises a first image input field and a second image input field; selecting one first image and at least one second image; moving the at least one selected second image to the selected first image; recording at least one property in relation to the selected first image and the at least one selected second image; generating an input password according to at least one of the at least one recorded property; determining whether the input password matches a predetermined password; and granting access if the input password matches the predetermined password. A related security system is also provided. | 2010-12-02 |
20100306842 | Information Processing Apparatus Capable of Authentication Processing Achieving Both of User Convenience and Security, Method of Controlling Information Processing Apparatus, and Recording Medium Recording Program for Controlling Information Processing Apparatus - Whether a log-in button has been pressed or not is determined. When it is determined that the log-in button has been pressed, an ID selection screen is displayed. Whether an ID has been selected or not is determined. When it is determined that an ID has been selected, whether a secure printing job is present or not is determined. Thereafter, whether password matching is successfully achieved or not is determined. Thereafter, whether a password image function is ON or not is determined. Then, when it is determined that password matching was successfully achieved and a password image authentication function is ON, password image authentication is carried out. | 2010-12-02 |
20100306843 | IMAGE FORMING APPARATUS AND COMPUTER-READABLE STORAGE MEDIUM FOR COMPUTER PROGRAM - An image forming apparatus includes a first authentication portion performing a first authentication process on a user, a second authentication portion that performs a second authentication process on the user successfully authenticated by the first authentication portion, and thereby determines whether or not the user is permitted to log onto the apparatus, and a cooperative setting portion performing setting therethrough, on a user-by-user basis, whether or not the first authentication process and the second authentication process are performed in combination with each other. If the user for whom setting is performed such that the first authentication process and the second authentication process are performed in combination with each other is successfully authenticated by the first authentication portion, then the second authentication portion determines that the user is to be permitted to log onto the apparatus based on the associated information and ends the second authentication process. | 2010-12-02 |
20100306844 | APPLICATION INFORMATION TAMPERING MONITORING APPARATUS AND METHOD - A tampering monitoring apparatus ( | 2010-12-02 |
20100306845 | MANAGING POTENTIALLY PHISHING MESSAGES IN A NON-WEB MAIL CLIENT CONTEXT - Computer-readable media and computerized methods for governing treatment of digital communications (e.g., emails and instant messages) upon identifying the communications as potentially phishing emails are provided. A service provider is employed to control behavior of an account that is assigned to an intended recipient of the communications. Controlling the behavior of the account is described in the context of a non-web mail server that renders a UI display, which is not dynamically configurable by the service provider. In one solution, controlling behavior alerts a user to the presence of communications identified as potentially phishing by aggregating these communications in a separate folder. In another solution, controlling behavior facilitates protecting the user by replacing the content of the potentially phishing communications with a warning message. This warning message optionally includes a URL link to a web browser where the user can view the original content of the potentially phishing communications. | 2010-12-02 |
20100306846 | REPUTATION BASED LOAD BALANCING - Methods and systems for operation upon one or more data processors for efficiently processing communications based upon reputation of an entity associated with the communication. | 2010-12-02 |
20100306847 | IDENTIFYING SECURITY PROPERTIES OF SYSTEMS FROM APPLICATION CRASH TRAFFIC - Most machines in an organization's computer network connect to the Internet and create web traffic logs which allow analysis of HTTP traffic in a simple, centralized way. The web traffic logs may contain error reports and error reports contain significant information that can be used to detect network security. By reviewing the error reports, significant information about a network and its security can be found as common sources of network security weakness may be watched for in the error reports. | 2010-12-02 |
20100306848 | Method and Data Processing System to Prevent Manipulation of Computer Systems - The present invention relates to the field of computer technology, and relates in particular to a method and system to prevent computer programs and data of any kind stored in a computer system from being manipulated and in particular for preventing hacker attacks and virus infection in computer systems, wherein said computer system comprises a storage means able to be read from and to be written to, and a means for switching said storage means into a write-protected mode. In order to provide improved prevention, the following steps are proposed, either during boot or during an installation process of an application program: | 2010-12-02 |
20100306849 | ON-ACCESS ANTI-VIRUS MECHANISM FOR VIRTUAL MACHINE ARCHITECTURE - A tangible medium embodying instructions usable by a computer system to protect a plurality of guest virtual machines (VMs), which execute via virtualization software on a common host platform, from malicious code is described. A scan engine is configured to scan data for malicious code and determine a result of the scanning, wherein the result indicates whether malicious code is present in the data. A driver portion is configured for installation in an operating system of a target VM, which is one of the guest VMs. The driver portion intercepts an access request to a file, that originates within the target VM. The driver portion communicates information identifying a location of the data to be scanned by the scan engine without sending a copy of the data to the scan engine. The scan engine executes within the virtualization layer outside a context of the target VM. | 2010-12-02 |
20100306850 | BEHAVIORAL ENGINE FOR IDENTIFYING PATTERNS OF CONFIDENTIAL DATA USE - A client device hosts a behavioral engine. Using the behavioral engine, the client device analyzes behavior of a client application with respect to confidential information. The client device assigns a rating indicative of risk to the client application based on the behavior of the client application. The client device performs an action to mitigate risk of data loss if the rating exceeds a threshold. | 2010-12-02 |
20100306851 | METHOD AND APPARATUS FOR PREVENTING A VULNERABILITY OF A WEB BROWSER FROM BEING EXPLOITED - A method and an apparatus for preventing a vulnerability of a web browser from being exploited are disclosed. The method comprises: monitoring a file downloaded by a browser process; intercepting a process creating action initiated by the browser process; determining whether the intercepted process creating action is to launch the file downloaded by the browser process; and notifying a user that a vulnerability of the browser may be exploited, if the determining result is positive. | 2010-12-02 |
20100306852 | Apparatus and Methods for Assessing and Maintaining Security of a Computerized System under Development - A security assessment method for assessing security of a computerized system under development, the system including assets and being managed in accordance with an organization policy, the method including providing an organizational computerized system development policy; classifying said assets in said system under development, thereby to generate asset classification information; and automated creation of at least one security requirement based on said asset classification information and said organization policy. | 2010-12-02 |
20100306853 | PROVIDING NOTIFICATION OF SPAM AVATARS - The system monitors activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark or other audible signature when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner an offending avatar that they have been added to the black list or had a report filed against them, and a reason as to why (the methods used to identify them). Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score. | 2010-12-02 |
20100306854 | Generating Obfuscated Data - A method for obfuscating data includes: reading values occurring in one or more fields of multiple records from a data source; storing a key value; for each of multiple of the records, generating an obfuscated value to replace an original value in a given field of the record using the key value such that the obfuscated value depends on the key value and is deterministically related to the original value; and storing the collection of obfuscated data including records that include obfuscated values in a data storage system. | 2010-12-02 |
20100306855 | Content Processing Apparatus and Content Processing Method - Having received an addition notification of a piece of download content, a content processing apparatus registers the notified content as a piece of download-scheduled content. The apparatus recalculates the priority rank of the download execution by taking into consideration a change in the license information on each piece of content, including a piece of already-preregistered download-scheduled content and a piece of content whose download is underway at present. If the download-execution target content specified by the recalculated priority rank is different from the content whose download is underway at present, the apparatus changes the download-execution target to the content specified by the priority rank. | 2010-12-02 |
20100306856 | SYSTEM AND METHOD FOR FILTERING EMAIL DATA - A software and/or hardware facility for filtering email data. The facility receives an indication of an SMTP event associated with an email and processes a script corresponding to the SMTP event. The script is comprised of a language for processing emails and may include one or more filters. If the script includes one or more filters, the facility executes the one or more filters and takes action on the associated email in accordance with the executed one or more filters. The action taken by the facility includes configuring the email system to affect not only the associated email but other emails. | 2010-12-02 |
20100306857 | DATA STORAGE DEVICE AND DATA STORAGE SYSTEM INCLUDING THE SAME - A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently prevents unauthorized access to the security code by allowing command descriptor block (CDB) information to be read using only a read-only memory (ROM). | 2010-12-02 |
20100306858 | Multi-Level Authentication for Medical Data Access - Techniques for multi-level authentication for medical data access are supported. A system may include a central medical information management system that provides restricted access to medical data. An accessing device supports multiple different authentication levels. For example, the accessing device may use a combination of device identifiers, passwords, and quick access codes to ensure access only by authorized users. | 2010-12-02 |
20100306859 | SECURE MEDIA COPYING AND/OR PLAYBACK IN A USAGE PROTECTED FRAME-BASED WORK - A system and method of secure copy and/or playback control of a usage protected frame-based work is disclosed. The method includes accessing serial copy management system information for the usage protected frame-based work. In addition, the method validates the serial copy management system information. Copy management information of the usage protected frame-based work is also accessed. In so doing, the copy management information is utilized to determine if a secure copy/playback application is authorized to generate a copy of the usage protected frame-based work. Thus the copy management information acts as a technological measure which “effectively controls access to a work” by requiring the application of information, with the authority of the copyright owner, to gain access to the work. | 2010-12-02 |
20100306860 | USING A CUSTOM MEDIA LIBRARY TO SECURE DIGITAL MEDIA CONTENT - A system and method for using a custom media library to secure digital media content on a computing system is disclosed. The method includes directly linking the custom media library with a copyright compliance mechanism (CCM)-enabled playback/recording application. In addition, the custom media library generates a new pathway distinct from a commonly used data pathway of the CCM-enabled playback/recording application and a media rendering subsystem of an operating system. Also, a CCM is alerted to monitor a plurality of media subsystems of the computing system. In so doing, a raw media file may be securely passed from the CCM-enabled playback/recording application via the custom media library and over the new pathway to a media subsystem of the operating system that is monitored by the CCM, such that the raw media file is rendered, playable and copyable in a secure environment. | 2010-12-02 |
20100306861 | METHODS AND APPARATUSES FOR CONDUCTING ASSAYS IN ANIMALS - The invention provides apparatuses, systems, and methods for conducting assays in aquatic animals. The apparatuses, systems, and methods of the invention can be used to identify and/or characterize compounds that modulate morphological, anatomical, or behavioral characteristics. The apparatuses, systems, and methods of the invention can be used to identify and/or characterize compounds that modulate learning or memory. | 2010-12-02 |
20100306862 | NON-HUMAN ANIMAL MODEL FOR FRONTOTEMPORAL LOBAR DEGENERATION WITH UBIQUITIN-POSITIVE INCLUSIONS (FTLD-U) - Non-human animal models for frontotemporal lobar degeneration with ubiquitin-positive inclusions (FTLD-U) are disclosed. The invention relates to a transgenic mouse whose genome comprises a transgene operably linked to a neuronal specific promoter effective for an increased expression of the transgene in the brain of the mouse, in which the transgene comprises a nucleotide sequence encoding TAR DNA-binding protein 43 (TDP-43). The transgenic mouse exhibits reduced or impaired learning and memory capacity, and may further exhibits progressively impaired or reduced motor functions. Methods of using such animal models are also disclosed. | 2010-12-02 |
20100306863 | SCREENING, THERAPY AND DIAGNOSIS - A TREM-1 ligand is identified. This allows various derivatives to be provided/identified that are capable of binding to the TREM-1 receptor. The TREM-1 ligand or the derivatives can be used in screening for drugs/drug candidates. Substances that block or reduce binding of the TREM-1 ligand/derivative to a TREM-1 receptor may be useful for treating sepsis, particularly sepsis of bacterial or fungal origin. Antibodies to the ligand may be useful in diagnosing sepsis, particularly sepsis of bacterial or fungal origin. | 2010-12-02 |
20100306864 | POLYPEPTIDE HAVING ENHANCED EFFECTOR FUNCTION - Disclosed is a polypeptide having an enhanced effector function. Specifically disclosed are: a polypeptide having a modified Fc region; a nucleic acid encoding the polypeptide; a vector carrying the nucleic acid; a host cell or a host organism harboring the vector; a pharmaceutical composition comprising the polypeptide; a method for producing the polypeptide; a method for enhancing the effector function of an antibody; and a method for producing a cell capable of producing an antibody having a high effector function. | 2010-12-02 |
20100306865 | PENAEIDIN GENE PROMOTERS IN TIGER SHRIMP AND APPLICATIONS THEREOF - The present invention relates to new penaeidin gene promoters found in tiger shrimps and applications thereof. The promoters of the invention are useful for the development of transgenic shrimps and valuable for the shrimp culture industry. | 2010-12-02 |
20100306866 | Adropin deficient mice and uses thereof - Mice lacking expression of the Enho gene provide useful tools in the study of the Enho gene and to investigate possible treatments for glucose, lipid and energy metabolism. | 2010-12-02 |
20100306867 | TRANSGENIC ANIMALS PRODUCING MONOVALENT HUMAN ANTIBODIES AND ANTIBODIES OBTAINABLE FROM THESE ANIMALS - The invention relates to novel non-human transgenic animals, which upon antigenic stimulation are capable of producing monovalent antibodies binding to a selected antigen, modified heavy chain transgenes, methods for producing the non-human transgenic animals, methods for immunizing the non-human transgenic animals for as well as monovalent antibodies obtainable by such immunization methods. | 2010-12-02 |
20100306868 | QUADRUPLE TRANSGENIC NON-HUMAN ANIMAL - The present invention relates to a transgenic non-human animal whose genome comprises a) a first transgenic DNA sequence encoding a human APP Swedish or a human APP London protein, wherein said first transgenic DNA sequence is operably linked to a first promoter; b) a second transgenic DNA sequence encoding a human Presenilin 2 protein comprising a N141I substitution, wherein said second transgenic DNA sequence is operably linked to a second promoter; c) a third transgenic DNA sequence encoding a light chain of a antibody directed against the amyloid peptide, wherein said third transgenic DNA sequence is operably linked to a third promoter and; d) a forth transgenic DNA sequence encoding a heavy chain of said antibody, wherein said forth transgenic is operably linked to the third promoter or to a forth promoter, and methods for producing said animal. | 2010-12-02 |
20100306869 | MODULATING PRODUCTION TRAITS IN AVIANS - The present invention relates to methods of modulating traits, particularly production traits, in avians such as chickens. In particular, the invention relates to the in ovo delivery of a dsRNA molecule, especially siRNAs, to modify production traits in commercially important birds. | 2010-12-02 |
20100306870 | Tomato Hybrid 'Vespolino' - The invention relates to a new and distinctive tomato hybrid, designated ‘Vespolino,’ to the plants of tomato hybrid ‘Vespolino,’ to the plant parts of tomato hybrid ‘Vespolino’ including the fruit, and for producing a hybrid tomato plant by crossing tomato hybrid ‘Vespolino’ with itself or another tomato line. The invention further relates to methods for producing a tomato plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to the methods for producing other tomato lines derived from tomato hybrid ‘Vespolino.’ | 2010-12-02 |
20100306871 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH293284 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH293284. The invention thus relates to the plants, seeds and tissue cultures of the variety CH293284, and to methods for producing a corn plant produced by crossing a corn plant of variety CH293284 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH293284. | 2010-12-02 |
20100306872 | DOWNY MILDEW RESISTANT LETTUCE - The present invention relates to a lettuce cultivar having resistance to downy mildew ( | 2010-12-02 |
20100306873 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING MODULATED GROWTH RATE AND BIOMASS IN PLANTS GROWN IN SALINE CONDITIONS - The present invention relates to isolated nucleic acid molecules and their corresponding encoded polypeptides able confer the trait of improved plant size, vegetative growth, growth rate, seedling vigor and/or biomass in plants challenged with saline conditions. The present invention further relates to the use of these nucleic acid molecules and polypeptides in making transgenic plants, plant cells, plant materials or seeds of a plant having plant size, vegetative growth, growth rate, seedling vigor and/or biomass that are improved in saline conditions with respect to wild-type plants grown under similar conditions | 2010-12-02 |
20100306874 | YIELD ENHANCEMENT IN PLANTS BY MODULATION OF ZMPKT - Compositions and methods for modulating flower organ development, leaf formation, phototropism, apical dominance, fruit development, initiation of roots, and for increasing yield in a plant are provided. The compositions include a ZmPKT sequence. Compositions of the invention comprise amino acid sequences and nucleotide sequences selected from SEQ ID NOS: 1 and 2 as well as variants and fragments thereof. Nucleotide sequences encoding the ZmPKT polypeptides are provided in DNA constructs for expression in a plant of interest are provided for modulating the level of a ZmPKT sequence in a plant or a plant part are provided. The methods comprise introducing into a plant or plant part a heterologous polynucleotide comprising a ZmPKT sequence of the invention. The level of the ZmPKT polypeptide can be increased or decreased. Such method can be used to increase the yield in plants; in one embodiment, the method is used to increase grain yield in cereals. | 2010-12-02 |
20100306875 | RESISTANCE GENE AND USES THEREOF - The invention provides methods for producing a plant with altered resistance to powdery mildew, the methods comprising transformation of a plant with a genetic construct including a polynucleotide encoding of a polypeptide with the amino acid sequence of SEQ ID NO: 1 or a variant of fragment thereof. The invention also provides isolated polypeptides, polynucleotides, constructs and vectors useful for producing a plant cell and plants transformed to contain and express the polypeptides, polynucleotides and constructs. The invention also provides plants produced by methods of the invention. | 2010-12-02 |
20100306877 | FLAVONOID GLUCOSYLTRANSFERASE AND USE OF SAME - A novel flavonoid glucosyltransferase originating from rose, a nucleic acid encoding that enzyme, for example, a flavonoid glucosyltransferase having an amino acid sequence indicated in SEQ ID NO. 2 or SEQ ID NO. 4, a nucleic acid encoding that enzyme, a method for changing the color of a rose flower using that nucleic acid, and a rose plant capable of changing color, are provided. | 2010-12-02 |
20100306878 | HIGHLY EFFICIENT SUPPRESSOR-DEPENDENT PROTEIN EXPRESSION IN PLANTS WITH A VIRAL VECTOR - A series of viral vectors derived from foxtail mosaic virus, sunn hemp mosaic virus and white clover mosaic virus sequences, and which are capable of expressing heterologous proteins in plants, including the tobacco, | 2010-12-02 |
20100306879 | Polypeptides having cellobiohydrolase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having cellobiohydrolase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2010-12-02 |
20100306880 | NUCLEIC ACIDS FOR INDUCING EXPRESSION OF TRANSCRIPTS AND PROTEINS AND METHODS FOR MAKING AND USING THEM - The invention provides nucleic acids and polypeptides for enhanced expression of nucleic acids and proteins. In one aspect, the sequences serve as transcription and translation enhancers or stabilizers, and can be incorporated in expression constructs at or near the translation control elements. The invention provides methods of producing mRNA (transcripts) and proteins. The invention provides methods of discovering new enhancer elements. | 2010-12-02 |
20100306881 | Polypeptides having Cellulolytic Enhancing Activity and Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2010-12-02 |
20100306882 | PRODUCTION OF HYBRID LACTUCA SATIVA SEEDS - The present invention concerns hybrid | 2010-12-02 |
20100306883 | WATERMELON WITH IMPROVED PROCESSING QUALITIES - A watermelon plant that produces fruit having (i) ultra-firm flesh and/or liquid-retaining flesh and (ii) soluble solids of at least about 6 brix. | 2010-12-02 |
20100306884 | Scanning Probe Microscope having Improved Optical Access - A scanning probe microscope and method for using the same are disclosed. The Scanning probe microscope includes a probe mount for connecting a cantilever arm and a probe signal generator. The probe position signal generator generates a position signal indicative of a position of the probe relative to one end of the cantilever arm. The probe position signal generator includes a first light source that directs a light beam at a first reflector positioned on the cantilever arm and a detector that detects a position of the light beam after the light beam has been reflected from the first reflector. A second reflector reflects the light beam after the light beam is reflected from the first reflector and before the light beam enters the detector, the second reflector passing light from a second light source that illuminates the sample. | 2010-12-02 |
20100306885 | Cantilevers with Integrated Actuators for Probe Microscopy - An atomic force microscopy sensor includes a substrate, a cantilever beam and an electrostatic actuator. The cantilever beam has a proximal end and an opposite distal end. The proximal end is in a fixed relationship with the substrate and the cantilever beam is configured so that the distal end is in a moveable relationship with respect to the substrate. The electrostatic actuator includes a first electrode that is coupled to the cantilever beam adjacent to the proximal end and a spaced apart second electrode that is in a fixed relationship with the substrate. When an electrical potential is applied between the first electrode and the second electrode, the first electrode is drawn to the second electrode, thereby causing the distal end of the cantilever beam to move. | 2010-12-02 |
20100306886 | Probe Microscope - An object of the present invention is to provide a probe microscope that permits qualitative and quantitative evaluation on ions existing near the surface of a sample and permits to detect further simply and easily such as impurities, flaws and corrosion origins existing on the sample in high sensitivity. A probe microscope according to the present invention is provided with a test cell that holds a sample and permits to receive liquid, a probe, a counter electrode, a reference electrode, a drive mechanism that causes the probe to follow the surface of the sample as well as to scan the same, a potential control portion that controls a potential between the probe and the reference electrode and a current measuring portion that measures a current flowing between the probe and the counter electrode, and is characterized in that the material of the probe is constituted by a conductive body containing any of gold or gold alloy, carbon or carbon compound, boron, zinc, lead, tin and mercury. | 2010-12-02 |
20100306887 | Molded microfluidic fluid cell for atomic force microscopy - A microfluidic cell includes a compressible block and a cantilever. The compressible block includes a first horizontal surface, an opposite second horizontal surface and a plurality of vertical surfaces therebetween. A gasket structure depends downwardly from the second horizontal surface. The gasket structure defines an open cavity therein. The compressible block defines a fluid inlet passage and a fluid outlet passage each in fluid communication with the cavity and opening to a selected one of the first horizontal surface and one of the plurality of vertical surfaces. The cantilever includes body portion and a beam extending laterally therefrom. The body portion is embedded in the compressible block and a portion of the beam extends into the cavity defined by the gasket structure. | 2010-12-02 |
20100306888 | High Resolution Near Field Scanning Optical Microscopy - An optical fiber including a surface including a non-covalent multilayer including a light-absorbing material can be used to develop fluorescence microscopy with a lateral resolution of about 5 nm and possibly lower. The non-covalent multilayer can be a highly absorptive thin film, for example a film based on J-aggregates, which can be used with conventional Near-Field Scanning Optical Microscopy. | 2010-12-02 |
20100306889 | APPLE TREE NAMED 'BURNETT CULTIVAR' - A new and distinct variety of apple tree, | 2010-12-02 |
20100306890 | Katsura Tree Named 'Biringer' - ‘Biringer’ Katsura is a newly and distinct variety of Katsura tree ( | 2010-12-02 |
20100306891 | Calluna plant named 'SALSA' - A new cultivar of | 2010-12-02 |
20100306892 | DIANTHUS PLANT NAMED 'FLORIJADE' - A new cultivar of | 2010-12-02 |