05th week of 2011 patent applcation highlights part 65 |
Patent application number | Title | Published |
20110030021 | Audio/Video Monitoring Service Using Set-top Boxes and Application Servers - An audio/video monitoring system is disclosed, comprising a combination of one or more set-top boxes and application servers in a service provider's network. The set-top boxes and applications services are part of a multiple services operator's (MSO) network, such as that of a cable company. Cameras and/or microphones which are directly connected to a set-top box are the sources of media signals, which the set-top box transmits to an application server. The application server continually receives the media signals from one or more set-top boxes, and determines which subset of the received media signals to forward to a selected output device, such as a television connected to another set-top box or a cellular telephone. The application server then forwards media signals of interest to the output device, such as when motion or a loud noise is detected in a media signal received from the set-top box or boxes. | 2011-02-03 |
20110030022 | System and Method of Collecting Video Content Information - Aggregated information is accessed on a computing device. The aggregated information includes video content information associated with video content and related end destination information. The aggregated information is further processed to render at least a portion of the aggregated information on a publically-accessible information medium. Thus, published content is generated. | 2011-02-03 |
20110030023 | INTERNET SERVICE PROVIDER CALLBACK FOR SATELLITE SYSTEMS - A method, apparatus, article of manufacture, and a memory structure for delivering purchase information comprising storing purchase information for a purchase of a user in a set top box. The set top box (STB) is configured to receive and display the broadcast signals through a tuner onto a display device. The STB establishes a connection to the Internet through a user initiated action (e.g., when the user accesses the Internet using the STB). A new transmission control/Internet protocol (TCP/IP) connection is obtained using the established user-initiated Internet connection without the user requesting the connection. A secure electronic connection is established with a server through the new TCP/IP connection. The purchase information is then transmitted from the STB through the secure electronic connection to the server. | 2011-02-03 |
20110030024 | GRID RECORDING FOR VIDEO-ON-DEMAND - A set top box determines DVR requests that the set top box is not able to record based on a number of scheduled DVR requests. The set top box provides the DVR request to a DVR management server. The DVR management server selects another set top box to record the television content associated with the DVR request based on a number DVR requests the other set top box is scheduled to record. The DVR management server issues a command to the other set top box to record the television content associated with the DVR request. The other set top box provides the recorded television content, associated with the DVR request, to the set top box. | 2011-02-03 |
20110030025 | High speed wireless video transmission - An implementation of a system and method for wirelessly communicating a digital video signal is provided. The system automatically compensates to maintain the received signal integrity as a wireless path for the transmitted digital video signal deteriorates. This method adjusts both the video compression rate and the modulation index in tandem to maintain a constant symbol rate. | 2011-02-03 |
20110030026 | DIGITAL BROADCAST TRANSMITTER AND RECEIVER AND METHOD FOR TRANSMITTING AND RECEIVING BROADCAST THEREOF - A digital broadcast receiver is provided. The receiver includes a reception unit to select an aggregation channel providing access information regarding at least one broadcast channel and a control unit to control the reception unit to select a broadcast channel using access information provided by the aggregation channel. | 2011-02-03 |
20110030027 | TELEVISION TRANSMITTER, TELEVISION TRANSMITTING METHOD, TELEVISION RECEIVER AND TELEVISION RECEIVING METHOD - A TV transmitter, a TV transmitting method, a TV receiver and a TV receiving method allowing users to find and choose desired programs through the use of a program guide displayed by graphical user interface (GUI). The TV transmitter comprises a signal generation unit for generating text data signals associated with TV broadcast programs and hyper text data signals corresponding to the text data signals, a multiplexer for multiplexing the text data signals and the hyper text data signals onto video signals of the TV broadcast programs to provide a multiplexed TV broadcast signal, and an output unit for outputting the multiplexed TV broadcast signal provided by the multiplexer. The TV receiver comprises a display unit for receiving and displaying text data signals extracted from a multiplexed TV broadcast signal interleaving the text data signals associated with TV broadcast programs and hyper text data signals corresponding to the text data signals a designation unit for designating any one of the text data signals displayed by the display unit a detection unit for detecting the hyper text data signal corresponding to the text data signal designated by the designation unit and a processing unit for processing the TV broadcast program corresponding to the hyper text data signal detected by the detection unit. | 2011-02-03 |
20110030028 | Extensible Protocol Validation - A method comprises operations for receiving a binary data structure including a portion representing a protocol validation specification expressed in a respective protocol validation specification language and for receiving a security policy rule having an action part specifying that the binary data structure is to be used for verifying that application protocol payload of network packets complies with the protocol validation specification. After receiving the binary data structure and the security policy rule, an operation is performed for verifying that application protocol payload of received network packets complies with the protocol validation specification. Such verifying is initiated in response to determining that the security policy rule applies to the received network packets and such verifying includes validating the application protocol payload of the received network packets against the binary data structure. | 2011-02-03 |
20110030029 | REMOTE MANAGEMENT AND NETWORK ACCESS CONTROL OF PRINTING DEVICES WITHIN SECURE NETWORKS - Systems and methods are disclosed for enabling remote management of printing devices and for providing access control of printing devices within secure health policy based networks. A printing device transmits device status information to a status server and operational health information to a compliance server. The compliance server receives a health policy for the network from the status server. The compliance server evaluates the operational health information using the health policy and configures the printing device for operations within a secure portion of the network if the operational health information is in compliance with the health policy. | 2011-02-03 |
20110030030 | UNIVERSAL SERIAL BUS - HARDWARE FIREWALL (USB-HF) ADAPTOR - A system and method in accordance with the present invention provides a protected area for software to execute on a separate hardware firewall adaptor when a storage device is operating in an unprotected environment when connected to an uncontrolled or unmonitored host system. This software provides security through a plurality of security, access management and monitoring (SAMM) applications when a USB storage device is connected to a computer in an uncontrolled, unprotected environment. | 2011-02-03 |
20110030031 | Systems and Methods for Receiving, Processing and Organizing of Content Including Video - Methods and systems for receiving, processing and organizing video. Organizational tools are provided that allow users the capacity to solicit, mine, clip, aggregate, organize, and search submitted footage. These tools include: a set of electronic folders, a media clipper and a media submit portal. Studios, projects, folders and subfolders exist in a hierarchical relationship in order to arrange media. The hierarchy of folders created by producers may be made accessible by the public for the purpose of submitting media to a particular project. Various content creators may upload video to the system, may create electronic video clips from the uploaded video by selecting subportions of that video, and may submit the electronic video clips to a specific folder which is associated with a project. Producers may view various folders to select submitted video clips for use in a project. | 2011-02-03 |
20110030032 | SECURE DHCP PROCESSING FOR LAYER TWO ACCESS NETWORKS - In general, this disclosure describes network security techniques that may accommodate legitimate movement of a subscriber device while preventing MAC collisions that may result from configuration errors or MAC spoofing attempts. MAC spoofing may result in packets directed to one subscriber device being sent instead to another subscriber device. By modifying an access node or a Dynamic Host Configuration Protocol (DHCP) server to allow only authorized subscriber devices on the access network, layer two collisions (“MAC collisions”) may be prevented. | 2011-02-03 |
20110030033 | MANAGING SECURE USE OF A TERMINAL - A terminal exhibits at least one functionality made secure on the basis of a security item. A security entity stores said security item as well as first authentication parameters. The terminal stores second authentication parameters. At the level of the terminal, an authentication of the security entity is performed on the basis of the first and second authentication parameters. Next, a secure contactless link is established with the security entity. Finally, the security item stored on said security entity is received in the course of said secure link. | 2011-02-03 |
20110030034 | URGENT ACCESS MEDICATION DISPENSING STATION - A medical supply station is disclosed. The medical supply station includes a securable compartment configured to hold medical supplies, and a controller. The controller is responsive to access information and is configured to selectively permit access to the securable compartment when the access information indicates the securable compartment is authorized for access, and restrict access to the securable compartment when the access information indicates the securable compartment is not authorized for access. The medical supply station also includes a critical access module configured to, upon actuation, bypass the access information required by the controller and permit substantially immediate access to the securable compartment. The medical supply station further includes an image capturing device, coupled to the critical access module, configured to capture at least one image of an area proximal to the medical supply station in response to actuation of the critical access module. | 2011-02-03 |
20110030035 | METHOD OF MANAGING AUTHORIZATION OF PRIVATE NODE B IN A WIRELESS COMMUNICATION SYSTEM AND RELATED DEVICE - A method of managing authorization of a private node-B for a packet core network terminal of a wireless communication system includes determining authorization validity of the private node-B according to network information and licensed band coverage of the private node-B, and then rejecting the authorization of the private node-B when the network information of the private node-B is out of the licensed band coverage of the private node-B. | 2011-02-03 |
20110030036 | RUNNING A SOFTWARE MODULE AT A HIGHER PRIVILEGE LEVEL IN RESPONSE TO A REQUESTOR ASSOCIATED WITH A LOWER PRIVILEGE LEVEL - A request is received from a requester to run a first software module at a first privilege level, where the requester is associated with a second privilege level, and wherein the first privilege level is higher than the second privilege level. It is determined whether the first software module is valid to run at the first privilege level by checking for predefined content associated with the first software module. The first software module is run at the first privilege level on the computer in response to detecting the predefined content. | 2011-02-03 |
20110030037 | ZONE MIGRATION IN NETWORK ACCESS - The present disclosure is directed to providing a network user the ability to travel between different zones or locations within a network environment, such as, for example, a hospitality location, without requiring a user to re-login to the new location, while requiring a user to re-login to other locations within the network environment. | 2011-02-03 |
20110030038 | Auditing Authorization Decisions - The auditing of authorization decisions is facilitated by integrating or coupling an audit policy to access control decisions. In an example implementation, an audit policy of an auditing scheme is coupled to a semantic framework of an access control scheme such that the audit policy is specified using at least a portion of the semantic framework. In another example implementation, audit policy rules include audit content rules that specify what audit information from any of the inputs, the outputs, or the internal data of authorization decisions is to be included in an audit record. In yet another example implementation, a semantic of an audit trigger rule comports with a semantic framework of an access request and of a logical evaluation for an authorization decision. | 2011-02-03 |
20110030039 | DEVICE, METHOD AND APPARATUS FOR AUTHENTICATION ON UNTRUSTED NETWORKS VIA TRUSTED NETWORKS - The described apparatus and methods may include a security agent configured to transmit a first service request message via a trusted network, and acquire credential information via the trusted network. The security agent is further configured to transmit a second service request message via an untrusted network, wherein the second service request message comprising the credential information. The security agent is further configured to receive service via the untrusted network based on the credential information in the second service request message. | 2011-02-03 |
20110030040 | APPLICATION AUTHENTICATION SYSTEM AND METHOD - A system and method are provided for validating executable program code operating on at least one computing device. Program instructions that include a request for access to sensitive information are executed on a first computing device. An authentication request for access to the electronic information is sent from the first computing device to a second computing device. In response to the authorization request, a challenge is sent from the second computing device to the first computing device. The first computing device executes the challenge and generates an authentication response that includes at least one memory object associated with the program instructions. The response is sent to the second computing device from the first computing device, and the second computing device generates and sends a verification to the first computing device confirming that at least some of the first program instructions have not been altered or tampered with, and further grants the first computing device access to at least some of the electronic information. | 2011-02-03 |
20110030041 | Session Ticket Authentication Scheme - A method of propagating a user's authentication/session information between different requests to Web services in a network includes a web server receiving a request for access to a first web service. The request is intercepted with an agent and authentication credentials are collected. A determination is made whether the web service customer is authenticated and authorized. If the web service customer is authenticated and authorized, a session and session ticket are created. An ID and the session ticket are returned to the web server. The session ticket ID and a public key are encrypted into an assertion. The assertion is sent to the first web service. The assertion is then returned to the web service customer for use with future requests. The assertion can be in the form of a SAML assertion. | 2011-02-03 |
20110030042 | LDAPI COMMUNICATION ACROSS OS INSTANCES - Methods and apparatus for connecting a client on a first operating system to a server on a second operating system using LDAPI communication includes establishing privacy between the first and second operating systems, identifying the client to the server, identifying the server to the client to establish a trust by the client of the server, and sending LDAPI messages between the client and the server. | 2011-02-03 |
20110030043 | DEVOLVED AUTHENTICATION - A method of authenticating a user to a service provider by means of an authentication provision unit, the method comprising: in a first stage of the method: receiving credentials from a user; determining whether the credentials received from the user represent a valid logon; and if that determination is positive: generating at least one network address comprising a domain address and at least one instance parameter, the instance parameter uniquely identifying the user and the instance of generation of the network address; and providing the network address to the user; and in a second stage of the method: receiving a parameter from a service provider; determining whether the received parameter indicates a valid attempt to log on to the service provider by checking that the received parameter matches an instance parameter that has previously been issued to a user and that has not previously been received from a service provider; and if that determination is positive: signalling to the service provider over a secure channel a message indicating that the received parameter represents a valid logon attempt, the message including credentials of the user to whom the instance parameter that matches the received parameter had been issued. | 2011-02-03 |
20110030044 | TECHNIQUES FOR ENVIRONMENT SINGLE SIGN ON - Techniques for environment single sign on are provided. Multiple identifiers for devices are associated as a single environment. A principal can be authenticated via any of the devices once to access protected resources and once authenticated the principal can access the protected resources from the other devices without re-authenticating. | 2011-02-03 |
20110030045 | Methods and Systems for Controlling Access to Resources and Privileges Per Process - To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process. | 2011-02-03 |
20110030046 | GUARDIAN MANAGEMENT SYSTEM - A computer-implemented method for allowing a guardian for a dependent to manage electronic services provided by a third party service provider to the dependent comprises the steps of: establishing an account for the dependent with the service provider by providing at least one item of dependent information; communicating the dependent information to a guardian management system; generating a token that is associated with the dependent information; storing the at dependent information and the token at the guardian management system; communicating the token to the service provider; storing the dependent information and the token at the service provider; communicating the token to the guardian; receiving at least one constraint on access to the service provider from the guardian; associating the at least one constraint with the token; and using the token to retrieve the at least one constraint when the dependent accesses the electronic services provided by the service provider. | 2011-02-03 |
20110030047 | METHOD, APPARATUS AND SYSTEM FOR PROTECTING USER INFORMATION - A method and apparatus for protecting user information. The method includes receiving a request for accessing the user information from an application. When the request does not include an authorized token, the user is requested to temporally confirm the request for access. In response to the confirmation, a token is generated and the user on a mobile service platform is associated with the request for access by the token. The application is then allowed to access the user information based on the token associating the user with the request for accessing the user information from the application. | 2011-02-03 |
20110030048 | SYSTEM, METHOD AND PROGRAM FOR MANAGING FIREWALLS - Computer system, method and program for managing a firewall. First program instructions identify a first rule of the firewall. The first rule specifies a permitted message flow through the firewall to or from an IP address of a computer. The computer resides on a network. Second program instructions identify a second rule of the firewall. The second rule specifies a permitted message flow through the firewall to or from an IP address corresponding to the network. Message flows through the firewall to all computers on the network are permitted pursuant to the second rule. Third program instructions delete the first rule from the firewall based on the identification of the second rule and the computer residing on the network. Other program instructions identify and delete stale rules which are not needed. Other program instructions automatically identify rules for a new server added to a cluster. | 2011-02-03 |
20110030049 | System and Method for Reducing Data Stream Interruption During Failure of a Firewall Device - A system includes first and second firewalls and a controller. The first firewall is configured to perform a firewall function on a first redundant input data packet and output the first input packet as a first redundant output data packet according to the firewall function. The second firewall is configured to perform the firewall function on a second redundant input data packet and output the second input packet as a second redundant output data packet according to the firewall function. The output packets are at least substantially similar when the firewall devices function properly. The controller is configured to receive the output packets from the firewalls, transmit at a given time one of the output packets, transmit the first output packet while the second firewall is failed, and transmit the second output packet while the first firewall is failed. | 2011-02-03 |
20110030050 | IMAGE FORMING APPARATUS - An image forming apparatus having a plurality of functions and executing a function designated from the plurality of functions includes a display device for displaying a function selection image allowing a user to designate any of the plurality of functions. The display device displays a first group of functions of which frequency of use is higher than a prescribed threshold value, and a second group of functions of which frequency of use is not higher than the threshold value, on mutually different function selection images, with a display item indicating that functions are displayed distinguished from each other. The image forming apparatus further includes: a designating device receiving a user input designating any of the plurality of functions displayed by the display device; and an image forming unit executing the function designated by the input received by the designating device. | 2011-02-03 |
20110030051 | AUTONOMIC MANUFACTURING OPERATOR AUTHORIZATION ADJUSTMENT - Operator authorizations are autonomically adjusted in many ways to automatically account for many different variables. Operator authorization may be adjusted according to an operator's past activity record so previous experience is not lost when the operator is rehired. Operator authorization may be adjusted according to the operator's quality and performance. Operator authorization may also be adjusted by recognizing similar operations to those the operator is authorized to perform, and authorizing the operator to perform one or more similar operations. Operator authorization may also be adjusted to a lesser level or may be revoked for an operation based on the passage of time. A manufacturing system may efficiently track operators taking into account different activity periods, the passage of time, the operator's performance, and similar operations to autonomically adjust the authorization of the operators as needed. | 2011-02-03 |
20110030052 | COMPUTER PROGRAM FOR SECURELY VIEWING A FILE - A method for distributing a password protected content file without revealing the password to a recipient. An unlocking program that has access to at least one password corresponding to the password protecting the password protected content file is distributed to the recipient's computer. The password protected content file is distributed to the recipient's computer wherein upon activation of the unlocking program, the unlocking program automatically supplies the at least one password upon loading of the password protected content file. | 2011-02-03 |
20110030053 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions - A token device that generates and displays one-time passwords and couples to a computer for inputting or receiving data for generating and outputting one-time passwords and performing other functions is provided. The token includes an interface for coupling to a computer. The token may also be coupled to any network that the computer may be connected to, when coupled to the computer. Data and information may be transmitted between the computer and token, and between the network and token, via the computer and interface. The data and information may include one-time password seeding, file transfer, authentication, configuration and programming of the token. The token must be seeded to generate and display one-time passwords. An original, or seed, value is loaded into the token. One-time passwords are subsequently generated or calculated, or both, from the seed value. Seeding of the token involving a counter, time, or time-related functions, may allow synchronization of the token with such functions. The token may support different authentication methods. | 2011-02-03 |
20110030054 | Progressive wiretap - Disclosed is a method and system for identifying a controller of a first computer transmitting a network attack to an attacked computer. To identify an attacker implementing the attack on the attacked computer, the present invention traces the attack back to the controller one hop at a time. The invention examines traces of the attacked computer to identify the first computer. Traffic transmitted to the first computer is redirected through a monitoring complex before being transmitted to the first computer. The controller is then detected from traffic monitoring by the monitoring complex. | 2011-02-03 |
20110030055 | Detecting Spoofing in Wireless Digital Networks - Detecting spoofing in a digital network. Packets of information in a digital network using a shared medium contain a unique identifier for the device originating the packet. An individual device may be transmitting, or receiving, but not both. If a device receives a packet containing its unique identifier as the origin address, that packet must have been transmitted by another device, and a spoofing alert is raised. | 2011-02-03 |
20110030056 | INFORMATION PROCESSING APPARATUS - Provided is an information processing apparatus capable of protecting against an unauthorized access from outside without increasing load of packet analysis and also capable of performing protection from a device inside a network. The information processing apparatus has a first network interface (illustrated using an NIC as an example) and is communicable with other information processing apparatus via the NIC. The information processing apparatus further has a second network interface (illustrated using an energy saving NIC as an example) for performing communication with other information processing apparatus in place of the NIC. The information processing apparatus executes switching processing for switching a network interface to be operated from the NIC to the energy saving NIC when an unauthorized access from outside is detected. At the time of the switching processing, internal information of the information processing apparatus is saved in the energy saving NIC. | 2011-02-03 |
20110030057 | MATCHING WITH A LARGE VULNERABILITY SIGNATURE RULESET FOR HIGH PERFORMANCE NETWORK DEFENSE - Systems, methods, and apparatus are provided for vulnerability signature based Network Intrusion Detection and/or Prevention which achieves high throughput comparable to that of the state-of-the-art regex-based systems while offering improved accuracy. A candidate selection algorithm efficiently matches thousands of vulnerability signatures simultaneously using a small amount of memory. A parsing transition state machine achieves fast protocol parsing. Certain examples provide a computer-implemented method for network intrusion detection. The method includes capturing a data message and invoking a protocol parser to parse the data message. The method also includes matching the parsed data message against a plurality of vulnerability signatures in parallel using a candidate selection algorithm and detecting an unwanted network intrusion based on an outcome of the matching. | 2011-02-03 |
20110030058 | SYSTEM AND METHOD FOR SCANNING AND MARKING WEB CONTENT - Instructions to access content at a destination node is intercepted. Content at the destination node is analyzed for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content. | 2011-02-03 |
20110030059 | Method for testing the security posture of a system - A method is provided for assessing the susceptibility of a NIDS to evasion. In an embodiment, the method involves intercepting packets that pass through a NIDS or other defensive device, reading, from the intercepted packets, message sequences that pertain to at least one protocol or network application, and constructing at least one stochastic sequential model of usage of the protocol from the protocol sequences. | 2011-02-03 |
20110030060 | METHOD FOR DETECTING MALICIOUS JAVASCRIPT - A method provides Dynamic Analysis to identify URL provisioning malicious javascripts comprising tracing frequently used javascript feature used to either inject malicious javascript in html response or redirecting user to the website that is serving malicious contents. An apparatus embodiment operates in the cloud in the middle where it identifies javascript in the response traffic and then requests the other corresponding javascript and can make a determination before delivering the original content to the user. | 2011-02-03 |
20110030061 | DETECTING AND LOCALIZING SECURITY VULNERABILITIES IN CLIENT-SERVER APPLICATION - The present invention provides a system, computer program product, and a computer implemented method for analyzing a set of two or more communicating applications. The method includes executing a first application, such as a client application, and executing a second application, such as a server application. The applications are communicating with each other. A correlation is recorded between the applications and an execution characteristic exhibited on execution. An oracle is used to determine an analysis of the first application that has been executed. The execution of the first application causes a change of state in the second application and/or a change control flow in the second application. Code fragment in the first application and/or the second application are prioritized based on an evaluation produced by the oracle, and based on the correlation between the code fragments that have been executed and the execution characteristic exhibited by the code fragments. | 2011-02-03 |
20110030062 | VERSION-BASED SOFTWARE PRODUCT ACTIVATION - A software license for a particular version of a software product on a computing device includes both a branding identifier that identifies the particular version of the software product and component dependency information that identifies one or more aspects of the particular version of the software product. To activate a software product on the computing device, the branding identifier is compared to a portion of the software product on the computing device. If the branding identifier matches the portion of the software product, then the component dependency information is compared to one or more aspects of the software product on the computing device. If the component dependency information matches the one or more aspects of the software product then the software product is activated. Otherwise, the a license state of the software product is kept unchanged. | 2011-02-03 |
20110030063 | APPARATUS FOR SETTING AN EMAIL SECURITY AND METHOD THEREOF - An apparatus for setting an email security and method thereof are displayed. The present invention includes receiving an email from a email server, deleting partial information of the email according to a security level of the email, and displaying the partial information deleted email. | 2011-02-03 |
20110030064 | DATA MASK SYSTEM AND DATA MASK METHOD - A data mask system includes a processor providing control signals including a command signal, an address signal, and a data signal, a data mask processor receiving the control signals and providing either write data or masked data in response to the control signals, and generating data mask information and a data mask selection signal from at least one of the control signals, and a data mask register unit receiving the data mask selection signal, storing the data mask information, selecting a subset of the stored data mask information in response to the data mask selection signal, and returning selected data mask information to the data mask processor. The data mask processor receives the selected data mask information from the data mask register unit and provides the masked data as a result of performing a data mask operation on the data signal according to the selected data mask information. | 2011-02-03 |
20110030065 | SYSTEMS AND METHODS FOR DETECTING CLONE PLAYBACK DEVICES - Systems and methods are described for aggregating information obtained from messages between playback devices and content protection systems, including but not limited to conditional access systems, downloadable conditional access systems, and digital rights management systems, that include a unique identifier and applying user modifiable rules to the aggregated information to identify abnormal behavior associated with the unique identifier including but not limited to one or more clone playback devices utilizing the unique identifier or a rogue playback device utilizing a unique identifier. One embodiment includes a plurality of playback devices connected to a headend via a network, where the headend includes at least one content protection system, and a clone monitor configured to register playback devices based upon a unique identification supplied by each playback device, when communicating with the at least one content protection system. In addition, the clone monitor is configured to aggregate information associated with each playback device over time, where the information is obtained from messages that are transmitted between the playback device and the headend and that include a unique identifier, and the clone monitor is configured to apply rules to the aggregated information to identify at least one pattern of abnormal behavior in the aggregated information associated with a specific unique identifier. | 2011-02-03 |
20110030066 | METHOD OF MANAGING SOFTWARE LICENSE CONTRACTS, SYSTEM AND INFORMATION PROCESSING APPARATUS THEREFOR, AND TARGET SOFTWARE FOR LICENSE CONTRACTS - A URL, to launch a license contract registration process, in software which requires license registration is informed to a license contract information input server which executes a process of inputting information necessary for license registration. After input of the necessary information, the license contract information input server transfers a request for license registration to the informed URL. The information necessary for license registration is inputted in accordance with a format arbitrarily created by the license contract information input server. A Web browser used by a user to operate a license contract registration process and license management target software can run on different hosts. After distribution of the target software for a license contract, information to be input by the user at the time of license contract can be changed. | 2011-02-03 |
20110030067 | APPARATUS AND METHOD FOR CONTROLLED SHARING OF PERSONAL INFORMATION - An apparatus and method for controlled sharing of personal information are provided which allow confident and accurate indications of, and alterations to, the level of personal information being shared by all personal information sharing capable (i.e. source) applications of a portable electronic device. Controlled personal information sharing is achieved through the application of sharing modes which are enabled through the cooperation of a plurality of applications which share personal information, a detecting module which detects requests to control the continued sharing of personal information and a controlling module controls the continued sharing of personal information by the plurality of applications. A universal sharing toggle is provided which allows a user of a portable electronic device to control the sharing of all personal information by the device. A personal information sharing icon is provided which gives a user of a portable electronic device a quick indication of the present state of the device's sharing mode. In cooperation, the universal sharing toggle and personal information sharing icon provide a user of a portable electronic device with a highly useable and efficient mechanism to control the amount of privacy provided by the device by restricting or allowing personal information to be shared. | 2011-02-03 |
20110030068 | IMAGE PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - There is provided an image processing apparatus which suppresses reduction in security due to increase in output products without any restriction without losing the convenience of a re-output function using a history. A method for controlling an image processing apparatus includes displaying a list of jobs executed based on a job history information stored in the storing means on display means, determining whether the job selected by a user from the displayed list of jobs is the one which output an output product whose copy is restricted, and restricting to output an output product in accordance with the job selected by the user if it is determined that the job is the one which output an output product whose copy is restricted. | 2011-02-03 |
20110030069 | SYSTEM AND METHOD FOR PREVENTING UNAUTHORISED USE OF DIGITAL MEDIA - A method for protecting digital media content from unauthorised use on a client, is described. The method comprising the steps of receiving from a server on the client a list of processes, instructions, activity descriptions or data types that must not be active simultaneously with playback of the digital media content (“the blacklist”). The method further comprising checking, on the client, for the presence of any items on the list; and continuing interaction with the server, key management and playback of protected content only if no items on the list are detected on the client. A system is also described. | 2011-02-03 |
20110030070 | DIAGNOSIS AND TREATMENT OF AUTISM USING CD38 - The invention relates to a method for screening a pharmaceutical for treating or preventing a neurodevelopmental disorder or a psychiatric disorder accompanied by an abnormality of oxytocin system by using an increase in expression or enzymatic activity of CD38 as an index, and a diagnosis of a predisposition to a neurodevelopmental disorder or a psychiatric disorder accompanied by an abnormality of oxytocin system by using a mutation present in a CD38 gene region as an index. | 2011-02-03 |
20110030071 | Transgenic Animal Model of Cancer and Methods of Use - The invention features a transgenic mouse model of cancer, exemplified by basal cell carcinoma, which finds use in identification of anti-cancer drugs. The transgenic mouse is characterized by a heterozygous defect in a Patch gene (Ptch | 2011-02-03 |
20110030072 | GENOME EDITING OF IMMUNODEFICIENCY GENES IN ANIMALS - The present invention provides genetically modified animals and cells comprising edited chromosomal sequences encoding immunodeficiency proteins. In particular, the animals or cells are generated using a zinc finger nuclease-mediated editing process. Also provided are methods of assessing the effects of agents in genetically modified animals and cells comprising edited chromosomal sequences encoding immunodeficiency proteins. | 2011-02-03 |
20110030073 | THERAPEUTIC TARGETS AND MEDICAMENTS INVOLVING P230/GOLGIN-245 - The present invention relates generally to the field of cell biology and in particular the cellular processes surrounding inflammation. Even more particularly, the present invention provides targets for medicaments useful in reducing levels of TNF-alpha, an extracellular pro-inflammatory mediator. The medicaments are therefore useful in modulating inflammatory responses. Model inflammatory disease systems also form part of the present invention. | 2011-02-03 |
20110030074 | COMPOSITIONS AND METHODS FOR CANCER GENE DISCOVERY - The present invention features transgenic non-human mammalian animals being genetically modified to develop cancer. The invention also relates to methods for identifying genes or genetic elements that are potentially related to human cancers using an chromosomally unstable animal model. Information on such genetic alterations can be used to predict cancer therapeutic outcomes and to stratify patient populations to maximize therapeutic efficacy. | 2011-02-03 |
20110030075 | Methods and Compositions Capable of Causing Post-Transcriptional Silencing of Gene Expression in a Synergic Manner - The invention relates to compositions for the post-transcriptional inhibition of gene expression by means of the combined use of a modified U1 snRNA targeted at a pre-selected region in a target pre-mRNA and of a gene expression-silencing agent of the siRNA, shRNA and/or miRNA type, as well as the use of said combinations for the treatment of diseases caused by the unwanted over-expression of a protein. | 2011-02-03 |
20110030076 | Methods and compositions for targeted cleavage and recombination - Disclosed herein are methods and compositions for targeted cleavage of a genomic sequence, targeted alteration of a genomic sequence, and targeted recombination between a genomic region and an exogenous polynucleotide homologous to the genomic region. The compositions include fusion proteins comprising a cleavage domain (or cleavage half-domain) and an engineered zinc finger domain and polynucleotides encoding same. Methods for targeted cleavage include introduction of such fusion proteins, or polynucleotides encoding same, into a cell. Methods for targeted recombination additionally include introduction of an exogenous polynucleotide homologous to a genomic region into cells comprising the disclosed fusion proteins. | 2011-02-03 |
20110030077 | METHODS OF MODULATING THE ORGANIC SOLUTE AND STEROID TRANSPORTER (OSTalpha-OSTbeta) ACTIVITY AND TREATING ASSOCIATED CONDITIONS - The present invention is directed to methods of modulating bile acid and lipid transport via the organic solute and steroid transporter Ostα-Ostβ. The present invention is further directed to methods of treating a patient having dyslipidemia or a condition associated with altered bile acid homeostasis. Therapeutic agents and pharmaceutical compositions that modulate Ostα-Ostβ heteromeric complex formation and/or transport activity are also disclosed. | 2011-02-03 |
20110030078 | TRYPANOSOME RESISTANT NON-HUMAN TRANSGENIC ANIMAL - The present invention is directed to a Trypanosome-resistant, non-human transgenic animal whose somatic and germ cells comprise a nucleic acid which encodes an apolipoprotein L-I polypeptide (apoL-I). The apoL-I protein has the amino acid sequence selected from the group consisting of SEQ ID NO: 1, SEQ ID NO: 3, SEQ ID NO: 4, and SEQ ID NO: 5. The first nucleic acid transgene is operatively associated with at least one expression regulatory sequence. Methods of producing and raising such transgenic animals as well as transgenic eggs and sperm are also disclosed. | 2011-02-03 |
20110030079 | NON-DEHISCENT SESAME VARIETY SESACO 27 - Improved non-dehiscent sesame ( | 2011-02-03 |
20110030080 | TOMATO LINE PSQ23-2258 - The invention provides seed and plants of tomato hybrid PS02326502 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS02326502 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2011-02-03 |
20110030081 | Novel Rucola plants with cyptoplasmic male sterility (CMS) - The present invention discloses rucola plants, including an | 2011-02-03 |
20110030082 | PEPPER HYBRID PX11435810 - The invention provides seed and plants of pepper hybrid PX11435810 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PX11435810 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2011-02-03 |
20110030083 | TOMATO VARIETY PICUS - The invention provides seed and plants of the tomato variety designated Picus. The invention thus relates to the plants, seeds and tissue cultures of tomato variety Picus and to methods for producing a tomato plant produced by crossing a plant of tomato variety Picus with itself or with another tomato plant, such as a plant of another variety. The invention further relates to seeds and plants produced by such crossing, and also relates to parts of a plant of tomato variety Picus including the fruit and gametes of such plants. The invention also relates to tomato variety FDS 14-2081, and to seeds and plants produced by crossing a plant of tomato variety FDS 14-2081 with itself or another tomato plant. The present invention is also directed to tomato variety FDS 14-2090, and to seeds and plants produced by crossing a plant of tomato variety FDS 14-2090 with itself or another tomato plant. | 2011-02-03 |
20110030084 | Dominant Gene Suppression Transgenes and Methods of Using Same - Pairs of plants are provided in which complementing constructs result in suppression of a parental phenotype in the progeny. Methods to generate and maintain such plants, and methods of use of said plants, are provided, including use of parental plants to produce sterile plants for hybrid seed production. Also provided are regulatory elements for pollen-preferred expression of linked polynucleotides. Also provided are methods for identifying gene function, methods for testing allelic variants, and methods for repressing transmission of transgenes. | 2011-02-03 |
20110030085 | BRASSICA OLERACEA PLANTS WITH A RESISTANCE TO ALBUGO CANDIDA - At least one embodiment of the present invention relates to | 2011-02-03 |
20110030086 | CORN EVENT DAS-59122-7 AND METHODS FOR DETECTION THEREOF - The invention provides DNA compositions that relate to transgenic insect resistant maize plants. Also provided are assays for detecting the presence of the maize DAS-59122-7 event based on the DNA sequence of the recombinant construct inserted into the maize genome and the DNA sequences flanking the insertion site. Kits and conditions useful in conducting the assays are provided. | 2011-02-03 |
20110030087 | TOMATO LINE FIR10-8086 - The invention provides seed and plants of tomato hybrid PS01059664 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS01059664 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2011-02-03 |
20110030088 | METHOD FOR TRANSFORMATION OF GRASSES - The invention provides methods for transforming grass plants with | 2011-02-03 |
20110030089 | Transgenic plants with enhanced growth characteristics - The invention relates to transgenic plants exhibiting dramatically enhanced growth rates, greater seed and fruit/pod yields, earlier and more productive flowering, more efficient nitrogen utilization, increased tolerance to high salt conditions, and increased biomass yields. In one embodiment, transgenic plants engineered to over-express both glutamine phenylpyruvate transaminase (GPT) and glutamine synthetase (GS) are provided. The GPT+GS double-transgenic plants of the invention consistently exhibit enhanced growth characteristics, with T0 generation lines showing an increase in biomass over wild type counterparts of between 50% and 300%. Generations that result from sexual crosses and/or selfing typically perform even better, with some of the double-transgenic plants achieving an astounding four-fold biomass increase over wild type plants. | 2011-02-03 |
20110030090 | Disease resistance genes - The invention provides isolated peptide-methionine sulfoxide reductase nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering peptide-methionine sulfoxide reductase levels in plants. The invention further provides recombinant expression cassettes, host cells, transgenic plants, and antibody compositions. | 2011-02-03 |
20110030091 | GRG23 EPSP SYNTHASES: COMPOSITIONS AND METHODS OF USE - Compositions and methods for conferring herbicide resistance or tolerance to bacteria, plants, plant cells, tissues and seeds are provided. Compositions include polynucleotides encoding herbicide resistance or tolerance polypeptides, vectors comprising those polynucleotides, and host cells comprising the vectors. The nucleotide sequences of the invention can be used in DNA constructs or expression cassettes for transformation and expression in organisms, including microorganisms and plants. Compositions also include transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated polynucleotides encoding glyphosate resistance or tolerance polypeptides are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated polynucleotides containing nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29, 31, 33, or 35, or the nucleotide sequence set forth in SEQ ID NO:6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 26, 28, 30, 32, or 34. | 2011-02-03 |
20110030092 | PROMOTER, PROMOTER CONTROL ELEMENTS, AND COMBINATIONS, AND USES THEREOF - The present document is directed to promoter sequences and promoter control elements, polynucleotide constructs comprising the promoters and control elements, and methods of identifying the promoters, control elements, or fragments thereof. The document further relates to the use of such promoters or promoter control elements to modulate transcript levels in plants, and plants containing such promoters or promoter control elements. | 2011-02-03 |
20110030093 | BRITTLE STALK 2 GENE FAMILY AND RELATED METHODS AND USES - This invention relates to isolated polynucleotides encoding BRITTLE STALK 2-like (Bk2L) family polypeptides. The invention also relates to the construction of a chimeric gene encoding all or a portion of a Bk2L polypeptide, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the Bk2L polypeptide in a transformed host cell. | 2011-02-03 |
20110030094 | Nucleic Acid Sequences Encoding Proteins Associated with Abiotic Stress Response and Plant Cells with Increased Tolerance to Environmental Stress - This invention relates generally to nucleic acid sequences encoding proteins that are associated with abiotic stress responses and abiotic stress tolerance in plants. This invention further relates to transformed plant cells with altered metabolic activity compared to a corresponding non transformed wild type plant cell, wherein the metabolic activity is altered by transformation with a Stress-Related Protein (SRP) coding nucleic acid and results in increased tolerance and/or resistance to an environmental stress as compared to a corresponding non-transformed wild type plant cell. | 2011-02-03 |
20110030095 | METHOD FOR INCREASING THE RESISTANCE OF A PLANT TO ENDOPARASITIC NEMATODES - The invention relates to a method for increasing the resistance of a plant to an endoparasitic nematode by inhibiting in said plant a microtubule associated protein of the MAP65 protein family. | 2011-02-03 |
20110030096 | AXMI-192 Family of Pesticidal Genes and Methods for Their Use - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a toxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated toxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:28-62, or the nucleotide sequence set forth in SEQ ID NO:1-27, as well as variants and fragments thereof. | 2011-02-03 |
20110030097 | COMPOSITIONS AND METHODS FOR ENHANCING OIL CONTENT IN PLANTS - The present invention provides transgenic plants with altered oil content. The invention further provides nucleic acid sequences and methods for generating such plants. | 2011-02-03 |
20110030098 | Glycosyltransferases, Polynucleotides Encoding These And Methods Of Use - The invention provides method for producing a plant cell or plant with increased phlorizin or phloretin glycosyltransferase activity, the method comprising transformation of a plant cell or plant with a polynucleotide encoding a polypeptide with phloretin glycosyltransferase activity. The invention also provides host cells, plant cells and plants, genetically modified to contain and or express the polynucleotides. | 2011-02-03 |
20110030099 | PLANTS AND MODULATORS FOR IMPROVED DROUGHT TOLERANCE - Methods of conferring increased drought tolerance to a plant by reducing or inhibiting ammonia accumulation, and plants produced thereby. | 2011-02-03 |
20110030100 | Method for promoting efficiency of gene introduction into plant cells - A method for gene introduction by which higher efficiency for gene introduction than that by the conventional | 2011-02-03 |
20110030101 | AGROBACTERIUM-MEDIATED METHOD FOR PRODUCING TRANSFORMED PLANT - The present invention aims to provide a novel | 2011-02-03 |
20110030102 | GENERATION OF ACYL AMINO ACIDS - Engineered polypeptides useful in synthesizing acyl amino acids are provided. Also provided are methods of making acyl amino acids using engineered polypeptides. In certain embodiments, an acyl amino acid produced using compositions and/or methods of the present invention comprises cocoyl glutamate. | 2011-02-03 |
20110030103 | LIPOPEPTIDES AND LIPOPEPTIDE SYNTHETASES - Novel lipopeptides, and engineered polypeptides useful in synthesizing lipopeptides are provided. Also provided are methods of making lipopeptides using engineered polypeptides, and methods of using lipopeptides, e.g., as insecticidal and/or antimicrobial agents. | 2011-02-03 |
20110030104 | Nucleic acids encoding plant glutamine phenylpyruvate transaminase (GPT) and uses thereof - Glutamine phenylpyruvate transaminase (GPT) proteins, nucleic acid molecules encoding GPT proteins, and uses thereof are disclosed. Provided herein are various GPT proteins and GPT gene coding sequences isolated from a number of plant species. As disclosed herein, GPT proteins share remarkable structural similarity within plant species, and are active in catalyzing the synthesis of 2-hydroxy-5-oxoproline (2-oxoglutaramate), a powerful signal metabolite which regulates the function of a large number of genes involved in the photosynthesis apparatus, carbon fixation and nitrogen metabolism. | 2011-02-03 |
20110030105 | RAMULARIA LEAF SPOT RESISTANT SAFFLOWER - The invention is directed to varieties of safflower plants and seeds that are resistant to fungal disease, such as those fungi that cause foliage diseases in | 2011-02-03 |
20110030106 | BRASSICA PLANT COMPRISING A MUTANT INDEHISCENT ALLELE - This invention relates to crop plants of which the fruit dehiscence properties are modulated. More specifically the invention relates to improved methods and means for reducing seed shattering, or delaying seed shattering until after harvest, in plants, while maintaining at the same time an agronomically relevant threshability of the pods. | 2011-02-03 |
20110030107 | COMPOSITIONS AND METHODS FOR GENETIC MODIFICATION OF PLANTS - Methods for the targeted integration of nucleotide sequences into a plant are provided. Transfer cassettes comprising nucleotide sequences of interest flanked by non-identical recombination sites are used to transform a plant comprising a target site. The target site contains at least a set of non-identical recombination sites corresponding to those on the transfer cassette. Exchange of the nucleotide sequences flanked by the recombination sites is effected by a recombinase. | 2011-02-03 |
20110030108 | MAMMALIAN-TYPE GLYCOSYLATION IN PLANTS - The invention relates to the field of glycoprotein processing in transgenic plants used as cost efficient and contamination safe factories for the production of recombinant biopharmaceutical proteins or pharmaceutical compositions comprising these. The invention provides a plant comprising a functional mammalian enzyme providing N-glycan biosynthesis that is normally not present in plants, said plant additionally comprising at least a second mammalian protein or functional fragment thereof that is normally not present in plants. | 2011-02-03 |
20110030109 | SURFACE STATE MEASURING DEVICE, AND SURFACE STATE MEASURING METHOD USING THE DEVICE - Provided are a surface state measuring device which can measure an alternating force of an arbitrary frequency and which is excellent in spatial resolution, and a surface state measuring method using the device. This surface state measuring device measures the surface state of a sample by detecting the modulation of the oscillation of a probe arranged above the sample. The measuring device comprises: a cantilever having a probe near a free end; an excitation mechanism for exciting the cantilever; a scanning mechanism for making the probe scan the sample by moving the probe and the sample relative to each other; and alternating force generator for generating an alternating force of an arbitrary frequency in a space; and a modulation measuring mechanism for measuring the degree of frequency modulation or amplitude modulation of the oscillations of the probe, which are generated by the alternating force. | 2011-02-03 |
20110030110 | Apricot tree named 'DANIEL' - A new and distinct apricot variety of | 2011-02-03 |
20110030111 | POMEGRANATE TREE NAMED 'KAMEL' - A new and distinct pomegranate variety of | 2011-02-03 |
20110030112 | POMEGRANATE TREE NAMED 'EMEK' - A new and distinct pomegranate variety of | 2011-02-03 |