01st week of 2013 patent applcation highlights part 79 |
Patent application number | Title | Published |
20130007811 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2013-01-03 |
20130007812 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2013-01-03 |
20130007813 | METHOD AND APPARATUS FOR SIMULATING HEAD-END CONNECTIVITY ON A SET-TOP BOX - An approach is provided for simulating a connection to a head-end system to enable execution of content and features of a set-top box. A simulation platform stores a plurality of control data signals associated with a head-end system. In response to a determined loss of connectivity to the head-end system, the platform invokes a head-end simulation process using the control data signals, including timing information, dynamic data and channel map data. | 2013-01-03 |
20130007814 | DYNAMIC ADAPTIVE STREAMING PROXY FOR UNICAST OR BROADCAST/MULTICAST SERVICES - Techniques are provided for a dynamic adaptive streaming proxy for unicast or broadcast/multicast service. For example, a method for controlling an encoding format of multimedia content for a multimedia client of a wireless communications network (WCN) includes modifying, at a proxy component of the WCN network entity, a data structure that associates one or more different locators for multimedia content with respective different encoding formats for the multimedia content, to obtain a modified data structure. The method may include controlling an encoding format for the multimedia content provided to at least one multimedia client, at least in part by the modified data structure. | 2013-01-03 |
20130007815 | ADVANCED EVENT TRIGGERING - An event trigger data string is formulated and added to digital content for distribution to an audience via broadcast, satellite, cable or any other technology. The event trigger data string includes identification of an event source, identification of an operation to be performed, and a payload. A controller reads the data string and outputs a command to an appropriate event source for alteration of a digital content stream based upon the identified operation. The payload may, for example, identify an advertisement or notice to be spliced into or out of the digital content stream. Such event trigger data strings may be added to many different digital content streams, and a router or switching component may distribute the streams to systems that disseminate them to the audience. The technique enables interaction with different event sources, and allows command of multiple different operations by these event sources. | 2013-01-03 |
20130007816 | PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience. | 2013-01-03 |
20130007817 | WIRELESS COMMUNICATION APPARATUS AND CONTROL METHOD THEREOF - A wireless communication apparatus and a control method thereof are provided. The wireless communication apparatus includes: a first communication unit which receives a video signal from an image device; a video processor which processes the video signal; a second communication unit establishes a wireless connection with another device; and a controller receives wireless connection information from the image device through the first communication unit, and controls the second communication unit to establish the wireless connection with the other device based on the received wireless connection information. | 2013-01-03 |
20130007818 | PROVISIONING INTERACTIVE VIDEO CONTENT FROM A VIDEO ON-DEMAND (VOD) SERVER - A system may send a request for video content to a server device; obtain, in response to the request, control information, associated with the video content, where the control information may include one or more digital versatile disc (DVD) features that correspond to one or more portions of the video content; and present the control information, for display, via a user interface, where presenting the control information for display may enable a user, of the video client device, to interact with the control information as though the video content was being played by a DVD player. The system may also receive selection of a DVD feature, of the one or more DVD features; and obtain, from the server device, a portion of the video content, of the one or more portions of the video content, that begins at a point that corresponds to the selected DVD feature. | 2013-01-03 |
20130007819 | METHOD AND SYSTEM FOR SYNCHRONIZING CONTENT BETWEEN TERMINALS - A synchronization apparatus and method for synchronizing playback time of a media provided to multiple devices during service transfer and replication process are provided. The content synchronization system for providing a receiving terminal with content of a sending terminal, the content synchronization system includes the sending terminal; the receiving terminal; and a server configured to provide content to the sending terminal and the receiving terminal and to comprise a communication unit configured to communicate the sending terminal and the receiving terminal and to transmit a message and information about time point at which the message is sent, and a content playback time point calculating unit configured to calculate a first content playback start time point of the receiving terminal in an effort to provide the content of the sending terminal that is synchronized with the receiving terminal. | 2013-01-03 |
20130007820 | METHODS AND APPARATUSES FOR PROGRAMMING USER-DEFINED INFORMATION INTO ELECTRONIC DEVICES - A device for programming user-defined information into an electronic device is provided. The programmer allows a user to program customized information, such as user-selected audio, video, or Internet access information into his or her programmable device. Such electronic devices include wireless telephones, pagers, and personal digital assistants. The programmer allows a user to, among other things, customize the device to suit his or her particular taste. | 2013-01-03 |
20130007821 | APPLICATION STRUCTURE FOR WEB-ENABLED COMPUTER ELECTRONICS DEVICES - An electronic device, such as a web-enabled television has a device layer that defines certain hardware, firmware, and software constraints of the device, and a superapplication that interfaces with the device layer. The superapplication defines certain functionality that may be utilized by one or more applications that provide specifics of the user experience, such as colors and placement of text and graphics, functions that may be called by reference to the superapplication, and so forth. The structure may facilitate or eliminate the need for approval of applications once a superapplication is approved for use on the device. Multiple applications may be designed to function with the superapplication, such as to facilitate development and offering of applications, such as for different stations of television offerings. | 2013-01-03 |
20130007822 | METHOD AND APPARATUS FOR MERGING VOICE AND DATA FEATURES WITH INTERNET PROTOCOL TELEVISION - A method and apparatus that enable the use of a multi-service endpoint device to integrate features and functions of voice and/or data services with IPTV service through a TV console are disclosed. For example, the method connects a multi-service endpoint device (MSED) to a plurality of networks, where at least one of the plurality of networks provides a voice service, and where at least one of the plurality of networks provides an Internet Protocol Television (IPTV) service. The method then integrates the voice service with the IPTV service using the MSED. | 2013-01-03 |
20130007823 | METHOD FOR RETRANSMISSION USING CHECKSUMS FOR IDENTIFYING LOST DATA PACKETS - The present invention relates to a method for retransmission of lost data, a receiving device operating according to the invented method and a retransmission server. In the absence of a unique identifier per data packet or data frame, there is obviously a problem to directly identify a specific data packet, data block or data frame in the stream and retransmission can't take place with current technologies. The object of the present invention is to offer a retransmission method and means for making said retransmission of missing data packets possible in the absence of a unique identifier. | 2013-01-03 |
20130007824 | Match-rule based service message transfer method and system - The disclosure provides a match-rule based service message transfer method and system in the IPTV, to address the problems in the IPTV message system of message storing and backlog, low push efficiency and poor usability. In the disclosure, match fields are arranged in a set-top box and a service message to be sent, the service message is sent by means of broadcast or multicast, the set-top box performs matching for the match fields based on the match rule, and filters the message. The disclosure avoids sending a service message by means of unicast, increases the push efficiency and can greatly reduce the storage load of offline messages in a message system. The formed message may be sent according to a single or combined policy which depends on a specific service attribute, thereby greatly facilitating the service operation. | 2013-01-03 |
20130007825 | System and Method of Delivering Video Content - A method includes receiving data from a set-top box device at an access system via an access network, the data indicating a selection of a channel at the set-top box device, the data including a multicast group address. The method also includes sending copies of video data packets of the channel from the access system for storage in a first-in first-out cache associated with the channel. The method further includes automatically connecting the set-top box device to a multicast stream of the selected channel after a particular number of video data packets are sent to the set-top box device from the cache. The particular number of video data packets corresponds to a time period between communicating successive random access point packets of the channel and is less than a capacity of the cache. | 2013-01-03 |
20130007826 | VIRTUAL SET-TOP BOX - A virtual set-top box (vSTB) for executing a middleware component, designed originally for use with the physical STB, including emulating hardware capabilities of the physical STB to process IPTV content received over a connection for presenting the IPTV content on a display of the electronic device. | 2013-01-03 |
20130007827 | RECEIVING A BROADCAST STREAM - An apparatus and method for receiving a broadcast stream is provided. The apparatus is configured to receive key information and additional information through the broadcast stream, select one of a plurality of predetermined functions based on the additional information, and perform the selected function in response to a control signal identified by the key information. The additional information may include link information such as a URL or telephone number, and the function may be selected based on a type of the link information. In some embodiments, the link information may be extracted from audio-visual data of a selected programme, using optical character recognition. The apparatus may connect to a secondary device to transmit information to the secondary device, and may receive information relating to the selected programme from the secondary device. | 2013-01-03 |
20130007828 | Presentation of User Alert with Extraneous Information on Electronic Device - An electronic device associated with a particular user includes a controller coupled to a display interface and to a receiver. The controller is configured to present a visual image on the display interface of the electronic device, and to present a foreground image on the display interface upon receipt of information indicative of a communication for the user associated with the electronic device, wherein the foreground image includes information indicative of the communication for the user associated with the electronic device and extraneous information. | 2013-01-03 |
20130007829 | WIRELESS VIDEO UPLINK SYSTEM THAT INCLUDES A RESERVATION SYSTEM - A wireless video device operates in a video uplink system having a plurality of wireless access systems. The wireless video device displays a geographic map and receives user inputs indicating a geographic location and a time period. The wireless video device transfers a video uplink request that indicates a wireless video device identifier, the geographic location, and the time period. The wireless video device may receive a video uplink grant. The wireless video device optically receives video and generates corresponding video data. The wireless video device wirelessly transfers the video data to one of the wireless access systems serving the geographic location during the time period. | 2013-01-03 |
20130007830 | SYSTEMS AND METHODS FOR EFFICIENT ALLOCATIONS OF TRANSPORT STREAMS - Systems and methods for allocating transport streams to allow simultaneous delivery of at least two media assets using a single stream selector are provided. In particular, a user's request to simultaneously receive more than two media assets may be received. An indicator may indicate to the control circuitry that the requested media assets are linked as a block of media asset. The control circuitry may identify a transport stream with enough bandwidth to transport the block of linked media assets. After identifying such a transport stream, the control circuitry may allocate the linked media assets to the transport stream. To conserve system bandwidths, control circuitry may advantageously determine which transport stream should transport the media assets in such a way that the utilizations of all transport streams are efficiently maximized. | 2013-01-03 |
20130007831 | BIT RATE ADJUSTMENT IN AN ADAPTIVE STREAMING SYSTEM - A method and apparatus for adaptively streaming multiple video bit streams through a network node is disclosed. In particular, a system is taught where at least one of the video bit streams is scaled in response to a bandwidth limitation or availability, where the selection of the bit stream selected for scaling in made in response to at least one of a user defined, service provider defined, and usage analysis defined priority list. | 2013-01-03 |
20130007832 | Dynamic Application Loader for Set Top Box - Set top boxes (STBs) in a cable system are configured on a box-by-box basis to facilitate beta and trial testing of new or updated services. STBs are assigned to deployment groups identified by a deployment group identifier. Features configurations including hierarchies of features can be defined individually for different deployment groups. Configuration files for provisioning the STBs are provided by a cable system head end according to the deployment group the STB is assigned to. STBs can be configured at the time they boot and register with the system or in a “hot” manner to avoid rebooting. | 2013-01-03 |
20130007833 | IMAGE DATA TRANSMITTER, IMAGE DATA TRANSMISSION METHOD, IMAGE DATA RECEIVER, AND IMAGE DATA RECEPTION METHOD - [Object] To facilitate the introduction of 3D broadcasting within broadcasting with limited bandwidths such as terrestrial broadcasting. | 2013-01-03 |
20130007834 | METHOD AND APPARATUS FOR TRANSMITTING AND DOWNLOADING SETUP INFORMATION - Multiple channel maps are embedded in a television transmission and the appropriate channel corresponding to the particular television service used by the viewer is downloaded for use with the television receiver. Each channel map is accompanied by a channel map identifier which identifies the source of the television transmission and a geographic identifier. The source of a television transmission is automatically detected by monitoring the radio-frequency spectrum allocations of telecast stations. The geographic area identifier is determined by comparison with a user inputted geographic area identifier. The channel map having a channel map identifier corresponding to the detected television transmission source and the user inputted geographic area identifier is downloaded and stored for future use. | 2013-01-03 |
20130007835 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 2013-01-03 |
20130007836 | METHOD AND SYSTEM FOR PROVIDING INFORMATION FROM THIRD PARTY APPLICATIONS TO DEVICES - A method and system of making information from an application accessible to an electronic device, comprising: checking, via a log monitor, a third party log file for a new log entry; sending any new log entries in the third party log file to a rules engine, the rules engine comprising at least one rule; determining if any of the new log entries violate any rules in the rules engine; making accessible any new log entries that violate any rules to the electronic device; creating an alert based on the new log entry that violates at least one rule; and notifying users of the alert using alert criteria to determine who should receive the alerts and when, wherein different users receive different alerts based on the alert criteria. | 2013-01-03 |
20130007837 | HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES - A method, a multi-tenant security server apparatus and associated system for securing wireless communication of devices. The method includes transferring security policy configuration information from the security server to wireless devices. The method also includes ascertaining compliance of wireless activity of the wireless devices with the security policy configuration using client software modules installed on the wireless devices. | 2013-01-03 |
20130007838 | COMMUNICATIONS SECURITY SYSTEMS - A method of establishing secure communications between a first computer, e.g. a client computer, and a second computer, e.g. a web server, whereby the client computer receives one or more security policies relating to the web server. A client application examines the client computer and preferably configures one or more aspects of the client computer in order to make it comply with the security policies. Once the web server receives the results of this examination and/or configuration process, it can determine whether the secure communications are to be established and whether any restrictions need to be placed on this communication and/or the activity conducted via the communication. | 2013-01-03 |
20130007839 | ROUTING A PACKET BY A DEVICE - Methods and apparatus for transferring packets in a packet switched communication system. A system is provided that includes an L2 device including a controller determining for each packet received whether the received packet is to be inspected, an inspection device operable to inspect and filter packets identified by the controller including using a zone specific policy and an L2 controller for transferring inspected packets in accordance with L2 header information using L2 protocols. | 2013-01-03 |
20130007840 | TECHNIQUES FOR PREVENT INFORMATION DISCLOSURE VIA DYNAMIC SECURE CLOUD RESOURCES - Techniques for preventing information disclosure via dynamic secure cloud resources are provided. Data (information) remotely housed on a particular cloud resource of a particular cloud is periodically, randomly, and dynamically changed to a different cloud resource within the same cloud or to a different cloud resource within an entirely different cloud. A requesting principal for the data is dynamically authenticated and a current location for the data is dynamically resolved and the principal is securely and dynamically connected to the current cloud resource and current cloud hosting the data for access. | 2013-01-03 |
20130007841 | CLIENT SERVER COMMUNICATION SYSTEM - A method for communicating with a server application. A first request is received by a first agent application on a first client computer system from the server application to request that a second agent application on a second client computer system communicate with the server application. Responsive to receiving the first request, a second request is sent by the first agent application to the second agent application on the second client computer system to communicate with the server application. | 2013-01-03 |
20130007842 | MOBILE TERMINAL AND DISPLAY CONTROLLING METHOD THEREIN - A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configured to store at least first and second operating systems including at least first and second modes, respectively; and a controller configured to execute the first operating system and activate the first mode corresponding to the first operating system, display a first information screen on a display unit of the mobile terminal corresponding to the activated first mode, display an application execution history for the first mode and the second mode on a prescribed region of the first information screen of the first mode, and identifiably display whether applications included in the application execution history were executed in the first mode or the second mode. | 2013-01-03 |
20130007843 | Method, Program Product, and System of Network Connection in a Wireless Local Area Network - Disclosed is a method of network connection in a wireless local area network. The wireless local area network comprises a client, an access point, and an authentication database coupled to the access point. The authentication database comprises a plurality of collections of data entries, wherein each of the collections of data entries comprises a plurality of data entries. The network connection method comprises: passing messages containing queries relating to data entries in the authentication database and receiving responsive answer tags. | 2013-01-03 |
20130007844 | NODE AUTHENTICATION - A system and method of accessing a service on a terminal node. The system includes a chain of nodes, the chain comprising a first node, one or more intermediate nodes, and the terminal node, the terminal node maintaining the service, wherein the first node is arranged to initiate an access request and to transmit the access request to an adjacent node, each intermediate node is arranged to authenticate the transmitting node and to transmit the access request to an adjacent node, and the terminal node is arranged to authenticate the transmitting node and to execute the access request. | 2013-01-03 |
20130007845 | Authentication and authorization methods for cloud computing security platform - An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud. | 2013-01-03 |
20130007846 | Methods and Arrangements for Authorizing and Authentication Interworking - This disclosure relates to a portable communication device and a network-side authorization server, and to methods therein. By splitting the functionality of an OAuth authorization server and moving the authorization endpoint into, for instance a mobile phone, an authorization server within the mobile phone is provided. This mobile phone authorization server does not need to communicate with the network-side for getting an authorization code or an access token. | 2013-01-03 |
20130007847 | Communication Protocol for a Containment-Aware Discovery Service - In general, methods and apparatus, including computer program products, implementing and using techniques for providing a discovery service in a unique identifier network are described. Said discovery service is suitable for tracking and tracing a query item represented by a unique identifier in a unique identifier network. In particular, a communication protocol for a containment-aware discovery service is described. | 2013-01-03 |
20130007848 | MONITORING OF SMART MOBILE DEVICES IN THE WIRELESS ACCESS NETWORKS - A method for smart mobile devices monitoring in wireless local area networks. The method includes installing a wireless security monitoring system or a wireless access system in a local area network. The method includes configuring the wireless security monitoring system or the wireless access system to communicate with a mobile device management (MDM) system. The method includes detecting a wireless client connecting to the wireless local area network and identifying the wireless client to be a smart mobile device. Moreover, the method includes receiving an indication at the wireless security monitoring system or the wireless access system from the MDM system regarding whether the wireless client is a managed device or not. The method also includes classifying the wireless client as approved or unapproved smart mobile device based at least upon the indication received from the MDM system. | 2013-01-03 |
20130007849 | SECURE CONSUMER AUTHORIZATION AND AUTOMATED CONSUMER SERVICES USING AN INTERMEDIARY SERVICE - A transaction processing service that operates as an intermediary between aggregators of transaction requests, service providers, consumers, and third-party recipients of data, is disclosed. As used herein, a transaction request is a request for consumer services to be provided to a consumer or third-party, a consumer's authorization of such consumer services, and/or a consumer's authorization of applicable terms, policies, contracts, or agreements. The intermediary service utilizes a consumer's mobile device as an out-of-band communication channel to notify a consumer of a received transaction request and to receive a consumer's authorization of the transaction. Once a transaction is authorized, the intermediary service facilitates the consumer services related to the transaction and provides a service response from one or more service providers to the user's mobile device and/or another service target. | 2013-01-03 |
20130007850 | Verifying Server Identity - The present disclosure describes techniques for verifying server identity. In some aspects a grant to access resources associated with a server is received from the server via a wireless network through which an address of the server is undeterminable. The grant includes the address of the server, and the server is verified as a granting authority for the resources based on the address of the server and known address information for the granting authority of the services. | 2013-01-03 |
20130007851 | Method and System for Managing Secure Sharing of Private Information Across Security Domains Using an Authorization Profile - In a method of granting a user in a first organization access to private information stored within an authorization profile of a second organization, an access agreement between the two organizations is formed. Authorization is requested for the user, the authorization profile is retrieved, and authorization to private information is granted if authorized by the access agreement. | 2013-01-03 |
20130007852 | System And Method For Information Handling System Multi-Level Authentication For Backup Services - Access to backup information, such as at network attached storage compliant with NDMP, is managed by interfacing a backup authentication mechanism with a primary authentication system and responding to requests for backup information according to permissions defined by the primary authentication system. A data management application requests access to backup information with an NDMP MD | 2013-01-03 |
20130007853 | MOBILE DEVICE AND METHOD FOR AUTOMATIC CONNECTIVITY, DATA OFFLOADING AND ROAMING BETWEEN NETWORKS - Embodiments of a mobile device and methods automatically connecting to a Wi-Fi Hotspot 2.0 are generally described herein. In some embodiments, subscription information for one or more service providers (SP) that operate Wi-Fi networks is stored in a subscription data object of the mobile device. The subscription information includes home service provider information, policy information and pre-provisioned credentials. The mobile device may be configured to determine, without user interaction, if the subscription information is applicable to an available Wi-Fi network and perform without user interaction, an extensible authentication protocol (EAP) based authentication using the pre-provisioned credentials with the available Wi-Fi network to establish a Wi-Fi connection with the available Wi-Fi network. This automatic connectivity may allow a mobile device to roam across Wi-Fi hotspots of Wi-Fi networks and offload traffic to Wi-Fi networks. | 2013-01-03 |
20130007854 | Storage Gateway Activation Process - Methods, apparatus, and computer-accessible storage media for activating a gateway to a remote service provider. The gateway serves as an interface between processes on a customer network and the provider, for example to store customer data to a remote data store. A gateway sends a public key and metadata describing the gateway to the provider. The gateway receives an activation key from the provider and exposes the activation key on the customer network. The customer obtains the key and communicates to the provider using the key to provide customer information including a name for the gateway and to authorize registration of the gateway. The provider provides the customer information to the gateway. The gateway requests security credentials from the provider using the customer information and the key. The provider sends a security credential to the gateway. The gateway may then obtain configuration information from the customer via the provider. | 2013-01-03 |
20130007855 | POWERLINE COMMUNICATION DEVICE SUPPORTING SECURE DATA EXCHANGE - A Power Line Communications (PLC) device includes a processing module, memory, a Wireless Local Area Network interface (WLAN I/F), and a PLC communication interface (PLC I/F). When operating as a client device, the PLC device establishes communications with a premises communication device via the PLC I/F, requests WLAN service from the premises communication device via the PLC I/F, receives WLAN access credentials from the premises communication device via the PLC I/F, and accesses a WLAN via the WLAN I/F using the WLAN access credentials. The PLC device communicates with a client device via the PLC I/F, receives a WLAN service request from the client device via the PLC I/F, validates the client device for WLAN service, and transmits WLAN access credentials to the client device via the PLC I/F. The PLC device may also support backchannel operations such as financial transactions, key exchanges, encryption support, all via the PLC I/F. | 2013-01-03 |
20130007856 | RENEWAL OF USER IDENTIFICATION INFORMATION - A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server. | 2013-01-03 |
20130007857 | Anti-shoulder surfing authentication method - Disclosed is a client device that includes: a user interface to receive a username and a first password associated with a server site visited by a user; a random number generator to generate a random number; and a processor to generate a second password by implementing a function based upon the first password and the random number and to command storage of the random number, the username, and the associated server site. If the user attempts to log onto the server site by inputting their username and the second password, the processor extracts the random number associated with the username and the server site and implements the function based upon the second password and the random number to generate the first password which replaces the second password entered by the user and is submitted to the server site. | 2013-01-03 |
20130007858 | AUTHENTICATION AND SECURE CHANNEL SETUP FOR COMMUNICATION HANDOFF SCENARIOS - Persistent communication layer credentials generated on a persistent communication layer at one network may be leveraged to perform authentication on another. For example, the persistent communication layer credentials may include application-layer credentials derived on an application layer. The application-layer credentials may be used to establish authentication credentials for authenticating a mobile device for access to services at a network server. The authentication credentials may be derived from the application-layer credentials of another network to enable a seamless handoff from one network to another. The authentication credentials may be derived from the application-layer credentials using reverse bootstrapping or other key derivation functions. The mobile device and/or network entity to which the mobile device is being authenticated may enable communication of authentication information between the communication layers to enable authentication of a device using multiple communication layers. | 2013-01-03 |
20130007859 | WEBSITE AUTHENTICATION - Embodiments of website authentication including receiving a request from a user to view a website within a graphical user interface (GUI); generating a one time password (OTP); storing the generated OTP in a database; displaying the generated OTP on the GUI; verifying an identity of the user by receiving an identification datum from a communication device; receiving an entered OTP from the user; comparing the entered OTP with the generated OTP; and communicating whether the website is authenticated. | 2013-01-03 |
20130007860 | STREAMING VIDEO TO CELLULAR PHONES - A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a request for streaming video from a mobile device upon the resolving of the request by a DNS. The method can further include simultaneously sending both a request to a database for the video requested and a playlist for the video to the mobile device. The method can then include receiving the video from the database. The video received is sent as a sequence of blocks, where each block can further be comprised of a sequence of chunks. The method can even further include decompressing each block and storing each chunk on a web server. The method can further include an exchange of a security credential. | 2013-01-03 |
20130007861 | METHODS FOR AUTHENTICATING A USER WITHOUT PERSONAL INFORMATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string. | 2013-01-03 |
20130007862 | METHOD AND SYSTEM FOR NETWORK AVAILABILITY ALERT - In accordance with embodiments, there are provided mechanisms and methods for providing a network availability alert to a user in an on-demand service. These mechanisms and methods for providing a network availability alert to a user in an on-demand service may enable embodiments to provide a user with the knowledge that the connectivity problem is not the fault of the on-demand service. In this way the user may be provided with information that best allows the user to obtain connectivity. | 2013-01-03 |
20130007863 | STREAMING VIDEO TO CELLULAR PHONES - A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a request for streaming video from a mobile device upon the resolving of the request by a DNS. The method can further include simultaneously sending both a request to a database for the video requested and a playlist for the video to the mobile device. The method can then include receiving the video from the database. The video received is sent as a sequence of blocks, where each block can further be comprised of a sequence of chunks. The method can even further include decompressing each block and storing each chunk on a web server. The method can further include an exchange of a security credential. | 2013-01-03 |
20130007864 | SYSTEM AND METHOD FOR LOCATION-AWARE SOCIAL NETWORKING AUTHENTICATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing authentication via social networking data. A system configured to perform the example method first receives a request for a security token from a requestor. The system identifies, for the request, an executor and a trustee from social network contacts of the requestor. The system generates a challenge question based on location history information common to the requestor, the executor, and the trustee. The system presents the challenge question to the executor and to the trustee. The system receives an executor response from the executor and a trustee response from the trustee, and when the executor response and the trustee response match, transmits the security token to the requestor. | 2013-01-03 |
20130007865 | System and Method for Tracking Network Traffic of users in a Research Panel - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for tracking network traffic of users in a research panel are presented. A packet for a network device coupled to the network access device is received. An indicia corresponding to a presumptive user of the network device is obtained, where the presumptive user includes a member of a set of known users. One or more logging rules is applied to the network device, where the one or more applied logging rules correspond to the obtained indicia. Information relating to the packet is stored when the packet satisfies at least one of the logging rules applied to the network device. | 2013-01-03 |
20130007866 | MIGRATION ACROSS AUTHENTICATION SYSTEMS - A system, method, program product and a method for deploying a system for providing migration across authentication systems are disclosed. A system is provided that includes a login system that collects information from a user during a login process, a migration list check system that compares the information to a migration list to determine if the user is selected for migration, and a migration logic system that migrates the user from the existing authentication system to the new authentication system during the login process if the user is selected. | 2013-01-03 |
20130007867 | Network Identity for Software-as-a-Service Authentication - Techniques are provided for asserting an identity of a client device with a server. A request is received from a client device to access processes hosted by the server. Network identifier information associated with the client device is obtained from the request. Confirmation of authentication of the client device is requested from an identity authentication server using the network identifier information. Access is provided to the client device for the processes hosted by the server when authentication of the client device is confirmed by the identity authentication server. | 2013-01-03 |
20130007868 | ZERO SIGN-ON AUTHENTICATION - A method of facilitating zero sign-on access to media services depending on trust credentials. The trust credentials may be cookies, certificates, and other data sets operable to be stored on a device used to access the media services such that information included therein may be used to control the zero sign-on capabilities of the user device. | 2013-01-03 |
20130007869 | Method and system for automatic recovery from lost security token on embedded device - Automatic recovery from loss of a security token on an embedded device is achieved by having a service provider (SP) server send to a device server a backup copy of the security token in conjunction with sending to an embedded device a primary copy of the security token, and retrieving from the device server and sending to the embedded device the backup copy of the security token upon detecting that the primary copy of the security token has been lost. The method and system obviate the need for a user to have to re-input on the embedded device a credential that is represented by the security token in the event the primary copy of the security token is erased from the embedded device or otherwise becomes inaccessible to the embedded device. | 2013-01-03 |
20130007870 | SYSTEMS FOR BI-DIRECTIONAL NETWORK TRAFFIC MALWARE DETECTION AND REMOVAL - An exemplary bi-directional network traffic malware detection and removal system may comprise a scrubbing center running one or more server computer communicatively coupled to a network configured to receive a request for website content, remove any server-directed malware from the content request, transmit the scrubbed content request to the website's hosting server, receive the responsive website content, remove and client-directed malware from the content, and transmit the scrubbed content to the requesting client. | 2013-01-03 |
20130007871 | MIGRATING CONFIGURATION INFORMATION BASED ON USER IDENTITY INFORMATION - Techniques are provided for the configuration of a home-networking system. Home-networking configuration information may be stored on a host system in a manner accessible to the home-networking system and migrated to a home-networking gateway or router that has not yet been configured. Wireless configuration information may be stored on a home-networking gateway or router and used to configure one or more wireless access points through the use of a physical connection, such as a wired communications pathway. One or more wireless home-networking devices may be configured based on wireless configuration information stored in a central repository on a host system or a home-networking system. The wireless configuration information may be accessible only through the use of a security code. | 2013-01-03 |
20130007872 | SYSTEM AND METHOD FOR CONTEXUALLY INTERPRETING IMAGE SEQUENCES - A system and method for contextually interpreting image sequences are provided. The method comprises receiving video from one or more video sources, and generating one or more questions associated with one or more portions of the video based on at least one user-defined objective. The method further comprises sending the one or more portions of the video and the one or more questions to one or more assistants, receiving one or more answers to the one or more questions from the one or more assistants, and determining a contextual interpretation of the video based on the one or more answers and the video. | 2013-01-03 |
20130007873 | SYSTEMS AND METHODS FOR POWER-ON USER AUTHENTICATION - Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security controller of a computing device prior to supplying power to a primary processor of the computing device, comparing the authentication input to an authentication code using the security controller, and supplying power to the primary processor in response to the authentication input matching the authentication code. | 2013-01-03 |
20130007874 | SYSTEM AND METHOD FOR AUTHENTICATING A USER - According to an embodiment, a system is provided comprising a memory and a processor. The memory may be operable to store a master image associated with a user account. The master image may comprise an image of a physical, non-living object. The processor may be coupled to the memory and may be operable to receive a request to perform a transaction associated with the user account. The processor may be further operable to receive an image that is scanned in real-time in conjunction with the request to perform the transaction. The processor may be further operable to compare the scanned image with the master image associated with the user account and to perform the transaction if the scanned image is substantially similar to the master image. | 2013-01-03 |
20130007875 | Interactive CAPTCHA - The present disclosure involves a method. The method includes receiving a request from a user. The method includes constructing, by a computer processor, a media object that contains a plurality of media components. The method includes transmitting the media object to the user. The method includes prompting the user to perform a task involving at least a subset of the media components, the task including at least one of the following: selecting each of the media components in the subset according to a predefined sequence; and modifying at least one of the media components in the subset with respect to at least one of its following properties: location, size, appearance, and orientation. The method includes obtaining a description of an action performed by the user in response to the prompting. The method includes deciding whether or not to grant the request based on the obtaining. | 2013-01-03 |
20130007876 | SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device. | 2013-01-03 |
20130007877 | System and Method of Owner Control of Electronic Devices - A system and method of owner control of an electronic device are provided. Owner identification information, such as data integrity and source authentication information, is stored on the electronic device. Received owner control information is stored on the electronic device where the integrity of the received owner control information is verified and/or the source is authenticated using the owner identification information. In one embodiment, owner identification information comprises an owner signature private key. | 2013-01-03 |
20130007878 | CENTRALIZED LICENSING SERVICES - Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may operate under the control of a central licensing manager controlled by another entity, e.g., by a game provider. The license proxy may receive requests to enable features of an electronic gaming machine of the gaming establishment (e.g., game themes, player tracking features and/or peripheral device features) and determine, based on information provided by the central licensing manager, whether to grant such requests. The license proxy may also process requests to enable features of other devices in a gaming establishment, such as server-based features. | 2013-01-03 |
20130007879 | Method of and Apparatus for Monitoring for Security Threats in Computer Network Traffic - A method of and apparatus for monitoring for security threats in computer network traffic is disclosed. The method comprises operating computer processing means ( | 2013-01-03 |
20130007880 | DATA PLANE PACKET PROCESSING TOOL CHAIN - This present disclosure relates to systems and methods for providing a data plane processing tool chain for processing packets that can use OSI layers | 2013-01-03 |
20130007881 | System and Method for Dynamic, Variably-Timed Operation Paths as a Resistance to Side Channel and Repeated Invocation Attacks - A system and method for constructing variably-timed operation paths and applying those paths to any algorithm. In particular, the system and method may be applied to cryptography algorithms as a means to resist side-channel, repeated invocation, and any similar attacks based on the physical characteristics of a system for a given software implementation. The method has the benefit of being generally applicable to any algorithm and has the ability to constrain performance to known timing windows. | 2013-01-03 |
20130007882 | METHODS OF DETECTING AND REMOVING BIDIRECTIONAL NETWORK TRAFFIC MALWARE - An exemplary method for bi-directional detection and removal of network traffic malware may comprise receiving a request for website content, removing any server-directed malware from the content request, transmitting the scrubbed content request to the website's hosting server, receiving the responsive website content, removing and client-directed malware from the content, and transmitting the scrubbed content to the requesting client. | 2013-01-03 |
20130007883 | Portable Security Device and Methods for Detection and Treatment of Malware - Disclosed is a portable security device and method for detection and treatment of computer malware. The security device includes a communication interface for connecting to a computer, a memory for storing a set of data for use in malware detection experiments, and an antivirus engine configured to perform one or more malware detection experiments on the computer. A malware detection experiment includes simulating a connection to the computer of a data storage device containing a predefined set of data. The antivirus engine further configured to identify modifications in the set of data contained in the data storage device after termination of one or more malware detection experiments, analyze a modified set of data for presences of computer malware, determine a treatment mechanism for the detected malware, perform treatment of the detected malware on the computer, and generate user reports. | 2013-01-03 |
20130007884 | INTERDICTING MALICIOUS FILE PROPAGATION - An approach is provided for interdicting malicious file propagation. Packets of a message being transferred to a destination device are received. In response to packet(s) of the message being received, the packet(s) are scanned by determining whether the packet(s) match a corresponding portion of a malicious file. If any of the scanned packet(s) do not match the corresponding portion of the malicious file, a transfer of subsequent packet(s) of the message to the destination device is permitted without performing a scan of the subsequent packet(s). If the scanned packet(s) including a last one or more packets of the message match corresponding portions of the malicious file, a transfer of the scanned packet(s) to the destination device is permitted, except a transfer of the last one or more packets of the message to the destination device is not permitted. | 2013-01-03 |
20130007885 | BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION - Detecting security vulnerabilities in web applications by interacting with a web application at a computer server during its execution at the computer server, identifying client-side instructions provided by the web application responsive to an interaction with the web application, where the client-side instructions are configured to be implemented by a client computer that receives the client-side instructions from the computer server, evaluating the identified client-side instructions, and identifying a security vulnerability associated with the client-side instructions. | 2013-01-03 |
20130007886 | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS - Method to detect security vulnerabilities includes: interacting with a web application during its execution to identify a web page exposed by the web application; statically analyzing the web page to identify a parameter within the web page that is constrained by a client-side validation measure and that is to be sent to the web application; determining a server-side validation measure to be applied to the parameter in view of the constraint placed upon the parameter by the client-side validation measure; statically analyzing the web application to identify a location within the web application where the parameter is input into the web application; determining whether the parameter is constrained by the server-side validation measure prior to the parameter being used in a security-sensitive operation; and identifying the parameter as a security vulnerability. | 2013-01-03 |
20130007887 | BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION - Detecting security vulnerabilities in web applications by interacting with a web application at a computer server during its execution at the computer server, identifying client-side instructions provided by the web application responsive to an interaction with the web application, where the client-side instructions are configured to be implemented by a client computer that receives the client-side instructions from the computer server, evaluating the identified client-side instructions, and identifying a security vulnerability associated with the client-side instructions. | 2013-01-03 |
20130007888 | SYSTEM AND METHOD FOR PRIVATE INFORMATION COMMUNICATION FROM A BROWSER TO A DRIVER - Systems and methods for communicating private information from a browser to a driver are presented. The private information communication method can comprise: performing a private information communication process in which private information is communicated through a private information communication plug-in of a browser to a driver; and performing a driver process based upon the private communication information communicated in the private information communication process. The private information communication process can comprise determining private information content; communicating the private information to the private information communication plug-in coupled to a private communication channel; calling a graphics driver from the private information communication plug-in using the private communication channel; and forwarding the private information from the private information communication plug to the driver via the private communication channel. The driver process can comprise: determining if there is an association between normal information and the private information, and processing the normal information in accordance with associated private. The private information can be associated with stereoscopic | 2013-01-03 |
20130007889 | TRUSTED COMPUTING SOURCE CODE ESCROW AND OPTIMIZATION - A software installation package includes encrypted source code. An installer receives an encryption key for decrypting the encrypted source code. The installer further causes the establishment of a temporary virtual machine. The encrypted source code is decrypted, using the encryption key, on the temporary virtual machine. A compiler executing on the temporary virtual machine compiles the source code into an application. The application is transferred from the temporary virtual machine to an operating environment. The temporary virtual machine is then destroyed, thereby also destroying any decrypted copies of the source code. | 2013-01-03 |
20130007890 | METHOD AND SYSTEM FOR DETECTING VIOLATION OF INTELLECTUAL PROPERTY RIGHTS OF A DIGITAL FILE - A computer-based method and system for detecting violation of intellectual property rights of a digital file, comprising, in a distribution channel, digitally sending or streaming the file from a sending party to a receiving party, adding a watermark to the digital file at the sending party prior to sending or streaming the file, wherein the watermark comprises an identifier of the sending and receiving party(s), as well as a unique file ID. In one embodiment, the party is informed about user and/or customer behavior, and can take precautions. | 2013-01-03 |
20130007891 | SERVER SYSTEM, CONTROL METHOD, AND STORAGE MEDIUM FOR SECURELY EXECUTING ACCESS TO DATA OF A TENANT - In a multitenant service, security of the entire service is guaranteed by logically separating data for each tenant, and performing control to prevent access to data of another tenant. In an operation of the multitenant service, there are some special cases in which an access to data of another tenant becomes necessary. Further, processing executable across tenants needs to be subjected to restrictions on an executor of the processing and a processing target in addition to restrictions on a processing content. In data access control of the multitenant service, a control operation to determine whether processing is executable across tenants for each API and a control operation to determine whether processing is executable across tenants according to tenant categories of the executor and the processing target are performed. | 2013-01-03 |
20130007892 | ELECTRONIC CONTENT PROCESSING SYSTEM, ELECTRONIC CONTENT PROCESSING METHOD, PACKAGE OF ELECTRONIC CONTENT, AND USE PERMISSION APPARATUS - A game playing system includes a use permission tag provided for use in a game disk for a user of a game, a disk drive, and a reproduction device for reproducing the game. The disk drive reads out a disk ID from the game disk. When the game is to be played, the reproduction device conveys the disk ID and a player ID to the use permission tag. The use permission tag stores the terms of use of the game and determines whether a combination of the disk ID and the player ID conveyed from the reproduction device fulfills the terms of use or not. | 2013-01-03 |
20130007893 | PREVENTING ON-LINE VIOLATIONS OF LEGAL REGULATIONS ON USERS OF A COMMUNICATION SYSTEM - A system for preventing on-line violations of open meeting regulations and similar laws, in which one or more special classes of users are defined for an electronic communication system. The definition of each special class may include quorum requirements, including the number of group members that make up a quorum for that special class. Users identified as members of special classes may be reminded of the restrictions on communications using the communication system arising from that special class membership. When a user composes a message for posting or sending through the communication system, the user's identity is checked to determine whether they are a member of a restricted special class. If the user is a member of a special class, a determination is made as to whether posting or sending the message would violate any legal restrictions associated with that special class. | 2013-01-03 |
20130007894 | METHOD AND APPARATUS FOR DIGITAL RIGHTS MANAGEMENT - A method and apparatus for digital rights management (DRM) with steps and means for receiving a registration request from one of a plurality of DRM agent devices requesting to register one of a plurality of user accounts and the one DRM agent device to one of a plurality of rights issuers, completing a registration process in the one rights issuer, including establishment of a relationship among the one user account, the one DRM agent device and the one rights issuer; and returning a registration completion response to the one DRM agent device. The invention provides support to the many-to-many relationships among DRM entities, such as DRM agent device, user account and rights issuer, so that the DRM system can be applied to more business modes. | 2013-01-03 |
20130007895 | MANAGING ACCESS CONTROL FOR A SCREEN SHARING SESSION - A method, system or computer usable program product for filtering content in a screen sharing session based on user access rights including initiating the screen sharing session between a first and nth user, displaying the content on a first screen of the first user wherein the content is derived from a content source including a content representation and including a set of secure elements requiring access rights to view, determining a first subset of secure elements that the nth user has access rights to view, and transmitting the content representation and the first subset of secure elements to the nth user during the screen sharing session. | 2013-01-03 |
20130007896 | System and Method for Controlling Access to an Electronic Message Recipient - A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic communications media such as e-mail and instant messaging. | 2013-01-03 |
20130007897 | Method and System for Managing Secure Sharing of Private Information Across Security Domains - In a method of granting a user in a first organization access to private information stored within an authorization profile of a second organization, an access agreement between the two organizations is formed. Authorization is requested for the user, the authorization profile is retrieved, and authorization to private information is granted if authorized by the access agreement. | 2013-01-03 |
20130007898 | DIGITAL MEDIA ASSET IDENTIFICATION SYSTEM & METHOD - The present invention provides a system and method for identifying and transferring digital media assets within a system through the use of identification data. The identification data is applied to each transferred copy and includes data specific to the customer and digital media asset. To facilitate transfers and ease of use the digital media assets can be made DRM-free. | 2013-01-03 |
20130007899 | Persistent Public Machine Setting - Disclosed herein are methods for protecting user information on a client device that may have a plurality of users. A user interface with a public machine designation portion is presented to a user prior to the start of the authentication process. The public machine designation removes web service account descriptions and any user specific information stored on the client device. Also, the client device is prevented from storing any new user specific information that is provided to the client device. The public machine designation is a persistent feature that may only be disabled by an affirmative action from the user. | 2013-01-03 |
20130007900 | HIDING A CONTACT FIELD ON A WIRELESS HANDSET - A wireless handset configured to hide contact information fields associated with selected contacts is described. The wireless handset comprises a processor, a display, and a handset memory. The processor stores a list of contact entries on the handset memory. Each contact entry comprises a plurality of contact information fields. A user may select one or more of the contact entries to lock. The list is updated such that the contact information content of at least one contact information field is hidden when the locked contact entry is shown on the handset display. Additionally, a method for displaying contact entries on a wireless handset with one or more contact information fields hidden is described. | 2013-01-03 |
20130007901 | Concurrent web based multi-tasks support for computer system - The traditional web based computing system did no support user space multitasking, therefore, if a task is submitted by a user from a web browser window via a user interface (“UI”), the user has to wait the task to be completed before the user can submit another task. Thus the web browser window will experience being blocked or hanged and the user can not do anything but wait. A method is disclosed herein for controlling each user initiated task to be run in background of the web based computing system for solving such problem. | 2013-01-03 |
20130007902 | Apparatus for Selecting and Displaying a File Associated with a Current Geographic Location - An apparatus includes a storage device, a position comparison processor coupled to the at least one storage device, and a display coupled to the position comparison processor. A plurality of files is stored on the storage device, wherein each file contains at least one item of confidential information and wherein a geographic location of use is associated with the file. The position comparison processor compares a current geographic location with each of the geographic locations of use associated with the plurality of files and the display displays contents of a selected file, wherein the geographic location of use associated with the selected file matches the current geographic location. | 2013-01-03 |
20130007903 | EFFICIENT HAPLOID CELL SORTING FLOW CYTOMETER SYSTEMS - A flow cytometer system for sorting haploid cells, specifically sperm cells, may include an intermittingly punctuated radiation emitter, such as a pulsed laser. Embodiments include a beam manipulator and even split radiation beams directed to multiple nozzles. Differentiation of sperm characteristics with increased resolution may efficiently allow differentiated sperm cells to be separated at higher speeds and even into subpopulations having higher purity. | 2013-01-03 |
20130007904 | PRODUCTION OF CLONED OFFSPRING FROM COOLED CARCASSES - Genetic material is derived from animals post-mortem, and used in nuclear transfer processes to produce cloned embryos and live cloned animals having genetic make-ups identical to the post mortem animals. The method has particular applicability to the management and breeding of livestock, to the production of animals having desired genetic traits, and to the integration of those genetic traits into selective breeding operations. | 2013-01-03 |
20130007905 | TOMATO HYBRID HNX12860544 - The invention provides seed and plants of tomato hybrid HNX12860544 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid HNX12860544 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-01-03 |
20130007906 | Broccoli type having curds with detached florets - The present invention includes broccoli plants with curds having detached florets and methods for obtaining such broccoli plants. The present invention also provides reagents that can be used in methods for obtaining such broccoli plants. | 2013-01-03 |
20130007907 | MALE STERILE LEEK PLANTS - The present invention is directed to nuclear encoded dominant male sterile leek plants. A segregation for male sterility of about 50% is observed in the F1. Furthermore genetic markers linked to the nuclear encoded dominant male sterility are identified. The present invention is also directed to methods producing the nuclear encoded dominant male sterile leek plant, to methods producing hybrids from the nuclear encoded dominant male sterile leek plants, to hybrid leek plants, to seeds and parts of plants of the nuclear encoded dominant male sterile leek plants and the hybrids there from. In addition, method to use the genetic markers linked to the nuclear encoded dominant male sterile leek plants are provided. | 2013-01-03 |
20130007908 | METHODS AND COMPOSITIONS FOR SELECTIVE REGULATION OF PROTEIN EXPRESSION - The invention provides methods and compositions for selectively suppressing the expression of a recombinant protein in a male reproductive tissue of a transgenic plant. The invention also provides methods and compositions for inducing male sterility in a transgenic plant. Plants, plant cells, plant parts, seeds, and commodity products including such compositions are aspects of the invention. | 2013-01-03 |
20130007909 | EARLY FLOWERING CHIA AND USES THEREOF - The invention relates to early flowering Chia ( | 2013-01-03 |
20130007910 | STRUCTURE OF THE BRASSINOSTEROID RECEPTOR BRI1, AND MODULATION OF BRI1 SIGNALING - Provided herein is the crystal structure for the brassinosteroid receptor BRI1, as well as strategies for modulating its activity. | 2013-01-03 |