07th week of 2013 patent applcation highlights part 58 |
Patent application number | Title | Published |
20130042236 | VIRTUALIZATION OF INTERRUPTS - A method for computing includes running a plurality of virtual machines on a computer having one or more cores and a memory. Respective interrupt addresses in the memory are assigned to the virtual machines. Upon occurrence on a device connected to the computer of an event pertaining to a given virtual machine during a period in which the given virtual machine is swapped out of operation, an interrupt message is written from the device to a respective interrupt address that is assigned to the given virtual machine in the memory. Upon activating the given virtual machine on a given core after writing of the interrupt message, a context of the given virtual machine is copied from the memory to the given core, and a hardware interrupt is automatically raised on the given core responsively to the interrupt message in the memory. | 2013-02-14 |
20130042237 | Dynamic Network Adapter Memory Resizing and Bounding for Virtual Function Translation Entry Storage - An approach is provided which a system selects a first virtual function from a plurality of virtual functions executing on a network adapter that includes a memory area. Next, the system allocates, in the memory area, a memory corresponding to the first virtual function. The system then stores one or more translation entries in the allocated memory partition, which are utilized to send data traversing through the first virtual function. As such, the system sends, utilizing one or more of the translation entries, the data packets from the network adapter to one or more destinations. In turn, the system dynamically resizes the memory partition based upon an amount of the memory partition that is utilized to store the one or more translation entries. | 2013-02-14 |
20130042238 | Optimized Virtual Function Translation Entry Memory Caching - An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location. | 2013-02-14 |
20130042239 | SYSTEM AND METHOD FOR USE OF A VIRTUAL ASSEMBLY BUILDER - A virtual assembly builder for use in virtualization environments, which can be used as a tool for virtualizing installed components in a reference environment, modifying those components if necessary, and then deploying them into another/target environment. Using the virtual assembly builder, a user (e.g., an administrator) can capture the configuration and product/component binaries of existing software components into software appliance artifacts. Appliances can be grouped, and their relationships defined, into software assembly artifacts. Logical connections between appliances within an assembly can be reconfigured by a process of assembly editing. When a desired assembly configuration has been achieved, the assembly can be prepared for, and deployed into, the target environment. | 2013-02-14 |
20130042240 | Optimized Virtual Function Translation Entry Memory Caching - An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location. | 2013-02-14 |
20130042241 | DYNAMIC VIRTUAL MACHINE DOMAIN CONFIGURATION AND VIRTUAL MACHINE RELOCATION MANAGEMENT - Dynamic relocation of virtual machines among hypervisors in a domain is provided. A domain management module is executed on a computer processor and is configured to receive a request to add a new hypervisor to a domain. Each hypervisor and each domain comprises an architecture description (ARD). A new canonical ARD is generated for all hypervisors in the domain. A virtual machine executing on a first system is relocated to any other hypervisor in the domain. Virtual machines may also be moved to out-of-domain hypervisors through the use of override masks. In addition, under certain conditions, new hypervisors additions, as well as hypervisor and system updates may be performed without disrupting the virtual machines that are controlled by the hypervisors. | 2013-02-14 |
20130042242 | Interrupt Handling in a Virtual Machine Environment - A method for computing includes running a plurality of virtual machines on a computer having one or more cores and a memory. Upon occurrence of an event pertaining to a given virtual machine during a period in which the given virtual machine is unable to receive an interrupt, an interrupt message is written to a pre-assigned interrupt address in the memory. When the given virtual machine is able to receive the interrupt, after writing of the interrupt message, a context of the given virtual machine is copied from the memory to a given core on which the given virtual machine is running, and a hardware interrupt is automatically raised on the given core responsively to the interrupt message in the memory. | 2013-02-14 |
20130042243 | INFORMATION PROCESSING APPARATUS - A procedure includes: receiving a request to monitor a target monitored item of the computer from a first information processing apparatus; inquiring the first information processing apparatus for a first monitoring condition; and determining a second information processing apparatus by referring to monitoring information. The monitoring information includes information indicating a specific monitored item and a monitoring condition for monitoring the specific monitored item in association with an identifier for identifying an information processing apparatus. The procedure further includes: instructing one of the first and second information processing apparatuses to monitor the target monitored item of the computer in accordance with the first monitoring condition for monitoring the target monitored item by the other one of the first and second information processing apparatuses; and instructing the other one of the first and second information processing apparatuses not to transmit a request to monitor the target monitored item. | 2013-02-14 |
20130042244 | METHOD AND SYSTEM FOR IMPLEMENTING INTERNET OF THINGS SERVICE - Disclosed in the present invention are a method and system for implementing an Internet of Things service. In the present invention: a service generation module generates a description script and a flow script according to a required service, sends the description script and the flow script to an application generation module and a control module, respectively; the application generation module generates an application according to the description script and sends the same to an access module; the access module receives an input of an Internet of Things terminal, processes the input of the Internet of Things terminal using the application, and sends the processed data to a control module; the control module runs the flow script and invokes an execution module to execute an operation according to the data sent by an access module; and the execution module executes an operation according to the invocation of the control module. | 2013-02-14 |
20130042245 | Performing A Global Barrier Operation In A Parallel Computer - Performing a global barrier operation in a parallel computer that includes compute nodes coupled for data communications, where each compute node executes tasks, with one task on each compute node designated as a master task, including: for each task on each compute node until all master tasks have joined a global barrier: determining whether the task is a master task; if the task is not a master task, joining a single local barrier; if the task is a master task, joining the global barrier and the single local barrier only after all other tasks on the compute node have joined the single local barrier. | 2013-02-14 |
20130042246 | SUSPENSION AND/OR THROTTLING OF PROCESSES FOR CONNECTED STANDBY - One or more techniques and/or systems are provided for assigning power management classifications to a process, transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes, and transitioning the computing environment from the connected standby state to an execution state. That is, power management classifications, such as exempt, throttle, and/or suspend, may be assigned to processes based upon various factors, such as whether a process provides desired functionality and/or whether the process provides functionality relied upon for basic operation of the computing environment. In this way, the computing environment may be transitioned into a low power connected standby state that may continue executing desired functionality, while reducing power consumption by suspending and/or throttling other functionality. Because some functionality may still execute, the computing environment may transition into the execution state in a responsive manner to quickly provide a user with up-to-date information. | 2013-02-14 |
20130042247 | Starvationless Kernel-Aware Distributed Scheduling of Software Licenses - Methods, systems, and apparatuses for implementing shared-license management are provided. Shared-license management may be performed by receiving from a remote client a license request to run a process of a shared-license application; adding the process to a queue maintained for processes waiting for license grants; and reserving at least one license instance for the received license request, the at least one license instance comprising a quantum of CPU time for running the process. | 2013-02-14 |
20130042248 | SYSTEM AND METHOD FOR SUPPORTING PARALLEL THREADS IN A MULTIPROCESSOR ENVIRONMENT - A method and system for supporting parallel processing of threads includes receiving a read request for a container from one or more read threads. Next, parallel read access to the container for each read thread may be controlled with a manager module that is coupled to the container. The manager module may receive a mutating request for the container from one or more mutating threads. While other read threads may be accessing the container, the manager module may provide single mutating access to the container in a series. The manager may monitor a reference count in the collection barrier for tracking a number of threads (whether read and/or mutating threads) which are accessing the collection barrier. The manager module may provide a mutex to a mutating thread for locking the container from any other mutating requests while permitting parallel read requests of the same container during the mutating operation. | 2013-02-14 |
20130042249 | Processing resource allocation within an integrated circuit supporting transaction requests of different priority levels - An integrated circuit | 2013-02-14 |
20130042250 | METHOD AND APPARATUS FOR IMPROVING APPLICATION PROCESSING SPEED IN DIGITAL DEVICE - A method and apparatus for improving application processing speed in a digital device which improve application processing speed for a digital device running in an embedded environment where processor performance may not be sufficiently powerful by detecting an execution request for an application, identifying a group to which the requested application belongs, among preset groups with different priorities and scheduling the requested application according to the priority assigned to the identified group, and executing the requested application based on the scheduling result. | 2013-02-14 |
20130042251 | Technique of Scheduling Tasks in a System - A technique for scheduling tasks in a system is provided. A method implementation of this technique comprises the steps of providing at least one association between a task and a range of priorities for the task and using the at least one association for the task scheduling. The task scheduling may be provided by a task scheduling unit having access to a memory unit. | 2013-02-14 |
20130042252 | Processing resource allocation within an integrated circuit - An integrated circuit | 2013-02-14 |
20130042253 | RESOURCE MANAGEMENT SYSTEM, RESOURCE MANAGEMENT METHOD, AND RESOURCE MANAGEMENT PROGRAM - A resource management system is provided which calculates a safety rate in such a manner that the amount of resources satisfying an SLA does not become excessive. Excess rate calculation means | 2013-02-14 |
20130042254 | Performing A Local Barrier Operation - Performing a local barrier operation with parallel tasks executing on a compute node including, for each task: retrieving a present value of a counter; calculating, in dependence upon the present value of the counter and a total number of tasks performing the local barrier operation, a base value of the counter, the base value representing the counter's value prior to any task joining the local barrier; calculating, in dependence upon the base value and the total number of tasks performing the local barrier operation, a target value of the counter, the target value representing the counter's value when all tasks have joined the local barrier; joining the local barrier, including atomically incrementing the value of the counter; and repetitively, until the present value of the counter is no less than the target value of the counter: retrieving the present value of the counter and determining whether the present value equals the target value. | 2013-02-14 |
20130042255 | Memory Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 2013-02-14 |
20130042256 | ADAPTIVE APPLICATION INTERFACE MANAGEMENT - A method and system for adaptive processing of alert messages exchanged between applications is disclosed. The system may include a diagnostic engine coupled to a plurality of applications. A plurality of application alert messages may be monitored to determine if the alerts exceed a predetermined threshold. If a threshold number of alert messages is exceeded, an interface status based on a diagnostic code for the interface may be determined. A query value for the interface may be adjusted. Based on the amount of the increase in the alert messages, different actions may be indicated. An administrator for the application interface or for equipment associated with the interface may be notified for servicing the equipment. | 2013-02-14 |
20130042257 | MODE-SWITCHED VARIABLE SIGNAL ATTRIBUTES IN BLOCK DIAGRAMS - A programming element is provided that defines model attributes in response to mode change events in a graphical modeling environment. Such definition may involve any signal attribute such as dimensions, data types, complexity and sample times. Events that trigger definition of model attributes may be explicit signaling events generated by other elements, elements within the block diagram programming environment, and elements external from the environment. Implicit events may also trigger definition of model attributes, such as a change of attribute in an input signal. | 2013-02-14 |
20130042258 | RUNTIME SYSTEM - Various embodiments provide an ability to describe, independent of a programming language, one or more interfaces associated with an operating system. Alternately or additionally, a compiler associated with a specific programming language can be configured to map the independent interface description(s) to the specific programming language. In some embodiments, an application can be configured to programmatically determine one or more interfaces of the operating system. | 2013-02-14 |
20130042259 | DRAG AND DROP OF OBJECTS BETWEEN APPLICATIONS - Methods, apparatuses and systems directed to capturing an object rendered on the first window of a display by a first program, extracting the object, permitting a user to drag the object across the display into a second window of the display containing a second program, and importing the object into the second program in substantially real-time. The drag and drop process occurs seamlessly to the user and permits a user to select one or more of a plurality of objects in one application, drag the object into a second application for modification, and drag the modified object back into the first application for real-time preview. | 2013-02-14 |
20130042260 | Distributed Pluggable Middleware Services - Plug-in configurable middleware for managing distributed applications includes at least one core runtime engine configured as a plurality of concurrent instantiations on one or more hosts within a distributed architecture. These hosts can represent separate nodes or a single node within the architecture. Each core runtime engine instance provides the minimum amount of functionality required to support plug-in architecture, that is to support the instantiation of one or more plug-ins within that core runtime engine instance. Each core runtime engine instance is in communication with other concurrent core runtime engine instances and can share the functionality of plug-in instances with the other core runtime engine instances, for example through the use of proxies. A plurality of personalities representing pre-defined functions is defined and one of more of these personalities is associated with each core runtime engine instance. A plurality of pre-defined plug-ins are defined and associated with the personalities. | 2013-02-14 |
20130042261 | ELECTRONIC VIDEO MEDIA E-WALLET APPLICATION - Systems and methods for an electronic video media e-wallet application have been provided. An apparatus for providing a viewer of a video with an electronic video wallet may be included within the scope of the invention. The apparatus may include a radio frequency identification device (“RFID”) tag. The RFID tag may be associated with an item in the video. The apparatus may also include a video camera comprising an antenna. The antenna may receive signals from the RFID tag. The signals may include purchasing information associated with the item. | 2013-02-14 |
20130042262 | PLATFORM-INDEPENDENT INTERACTIVITY WITH MEDIA BROADCASTS - A method is disclosed including: receiving a broadcast media sequence; comparing broadcast media sequence and a reference media sequence; generating broadcast information related to the broadcast media sequence based on the comparison of the broadcast media sequence and the reference media sequence; and providing interactivity related to the broadcast media sequence to at least one viewer based on the broadcast information. | 2013-02-14 |
20130042263 | METHOD AND APPARATUS FOR GIVING VIDEO ON DEMAND ASSETS TO SOCIAL NETWORK FRIENDS - A method and apparatus for providing a Video On Demand (VOD) asset as a gift from a plurality of users to a social network friend. A user can discover from a friend's user profile that other users have contributed amounts toward the purchase of a VOD asset as a gift for the friend, and make an additional contribution. A gift server totals the contributions and notifies the friend. If the purchase price is completely paid by the user contributions, the friend can watch the VOD asset free of charge. Alternatively, if the friend decides to watch the VOD asset before the purchase price is completely paid by the user contributions, the friend pays a discounted price equal to the remainder of the purchase price. A billing server proportionally charges the account of each user for their respective contribution. | 2013-02-14 |
20130042264 | METHOD AND SYSTEM FOR UTILIZING MULTIPLE CONTENT DELIVERY NETWORKS FOR DISTRIBUTING CONTENT - A system includes a content management system having a first set of business rules for a first content including a first target and a second set of business rules for a second content including a second target. The system also includes a workflow system that receives the first and second targets. The work flow system obtains first content with a first business rule identification and second content with a second business rule identification. The content management system associates the first content with the first set of business rules and associates the second content with the second set of business rules. A processing system processes the first content to form first processed content in response to the first business rules and processes the second content to form second processed content in response to the second business rules. A content repository stores the first and second processed content. | 2013-02-14 |
20130042265 | Addressable Advertising Switch by Decoupling Decoding from Service Acquisitions - A method and computing device for switching from a first transport stream to a second transport stream. The method detects a trigger in the first transport stream that determines a switch point for tuning to the second transport stream. The method receives a last frame of audio/video content in the first transport stream that immediately precedes the switch point, and initiates a switch to the second transport stream after receiving the last frame. The method processes the last frame through an audio/video decoder simultaneous with the initiating of the switch, and disables the output of the audio/video decoder after the processing of the last frame. The method receives a first frame of audio/video content in the second transport stream, and enables the output of the audio/video decoder after processing the first frame through the audio/video decoder. | 2013-02-14 |
20130042266 | EXPANDED MEDIA CONTENT ACCESS SYSTEMS AND METHODS - In one of many possible embodiments, an exemplary method includes an expansion media content processing device receiving media content in a format not supported by a set-top box to which the expansion media content processing device is communicatively connected by a local communication link, converting the media content from the format not supported by the set-top box to a format supported by the set-top box, and providing the media content in the format supported by the set-top box to the set-top box by way of the local communication link. In some examples, the method further includes the set-top box receiving and using the media content in the format supported by the set-top box to provide the media content to an output device for presentation. | 2013-02-14 |
20130042267 | USING IPTV AS HEALTH MONITOR - An IPTV can receive a user name and present a screen enabling a user by means of a remote control to select health information categories, inputting numeric parameters into the selected categories which can be uploaded to an Internet server for analysis and viewed by the user for subsequent monitoring/charting. | 2013-02-14 |
20130042268 | DIGITAL BROADCASTING SYSTEM AND METHOD THEREOF - A system and a method for providing a digital broadcasting service simultaneously with documented information related to a digital broadcast are provided. The system includes a broadcasting station for transmitting digital broadcast data on each broadcast channel; a data server for storing document information corresponding to the digital broadcast data on each broadcast channel, for searching for requested document information corresponding to prescribed digital broadcasting data, and for transmitting the requested document information; and a digital broadcast receiving apparatus for requesting the data server to transmit the document information corresponding to the digital broadcast data received from the broadcasting station, and for outputting the corresponding document information simultaneously with the digital broadcast data if the corresponding document information is received from the data server in reply to a request. | 2013-02-14 |
20130042269 | INTERACTIVE MASTHEAD - A method and system that provides a television service; receives a customer input to access a graphical user interface that includes a main menu pertaining to the television service; retrieves the graphical user interface; and displays the graphical user interface via the customer device, wherein the graphical user interface includes a main menu body and an interactive masthead having an interactive element that permits a customer to access content via the interactive element. | 2013-02-14 |
20130042270 | KIOSK SET-TOP-BOX - A device may include one or more processors. The one or more processors may be configured to receive user input via a user interface and provide an appearance of selecting a channel, via a content presentation device connected to the device, without actually selecting the channel when the user input requests a particular program channel. The one or more processors may also be configured to display interactive program guide data at the content presentation device when the user input requests an interactive program guide and when the device is disconnected from a network from which the device received the interactive program guide data. | 2013-02-14 |
20130042271 | MERCHANDISING STREAMING VIDEO CONTENT - Techniques are described for merchandising streaming media content to viewers in an engaging manner. A streaming media device may provide a content browsing interface configured to merchandise a set of streaming media titles to a viewer. Rather than rely solely on scrolling lists, titles, box shots, or other metadata associated with the titles available in the streaming media library, the content browsing interface merchandises the library by presenting short merchandising previews of the titles. Doing so creates an engaging content browsing experience where viewers are presented with the actual content of titles available from a streaming media service. | 2013-02-14 |
20130042272 | CONSUMER PURCHASES VIA MEDIA CONTENT RECEIVER - A method of facilitating purchases of products via a media content receiver is presented. In the method, the media content receiver receives media content representing a product. The receiver also receives a product code associated with the product. The media content representing the product is presented to a user. While presenting the media content, a request is received from a user. In response to receiving the request, the product code is transmitted. After transmitting the code, data descriptive of the product is received. The data is presented to the user. A product selection based on the data for the product is then received. In response to receiving the selection, an order for the product is transmitted. In another embodiment, no product codes are received at the receiver; instead, a channel identifier for a channel carrying the media content is transmitted instead of the product code. | 2013-02-14 |
20130042273 | TELEVISION BROADCAST RECEIVING DEVICE OF GENERATINGINFORMATION FOR OBTAINING WEBPAGE INFORMATION, METHOD OFGENERATING ACQUISITION OBJECTIVE INFORMATION, PROGRAM,APPARATUS OF GENERATING ACQUISITION OBJECTIVE INFORMATION, AND TELEVISION BROADCASTING SYSTEM - A television broadcast receiving device includes a program selecting unit that accepts the selection of one of programs in a program list; an extracting unit that extracts a keyword related to the accepted program from the program information; a site information obtaining unit that obtains names and address information of web sites and a rule for generating acquisition objective information for obtaining information of a webpage related to a keyword extracted from one of one or plural web sites; a site name display controller that displays the obtained names of one or plural web sites on a display device; a site name selecting unit that accepts the selection of a name of one web site among the displayed names of the one or plural web sites; and a generating unit that generates acquisition objective information in accordance with the rule. | 2013-02-14 |
20130042274 | BROADCAST METADATA COMPRESSION METHOD AND SYSTEM - Broadcast server and method for transmitting electronic program guide data to set top boxes via a broadcast network. The broadcast server is arranged to prepare a list of unique entries and associated identifications of the text items received, and to provide a compressed list to the plurality of set top boxes. The broadcast server repeats the following steps for each text item in the list:
| 2013-02-14 |
20130042275 | METHOD AND APPARATUS FOR CONTROLLING WIRELESS UPLINK SESSIONS - A video session scheduling capability is disclosed. The video session scheduling capability enables scheduling of video transmissions by mobile devices of a cellular sector. In response to a request by a mobile device to transmit a video via a wireless uplink of the cellular sector, a scheduler determines scheduling of the video session. The scheduler receives information indicative of an amount of wireless uplink resources available for supporting uplink video sessions within the cellular sector, receives information associated with the request by the mobile device to establish a video session for transmission of video content from the mobile device via a wireless uplink in the cellular sector, and determines, using the information indicative of an amount of wireless uplink resources available within the cellular sector and the information associated with the video session request, scheduling of the video session via the wireless uplink in the cellular sector. | 2013-02-14 |
20130042276 | METHOD AND APPARATUS FOR CONTROLLING WIRELESS UPLINK SESSIONS - A video session management capability is disclosed. The video session management capability enables management of potential and/or established video sessions of mobile devices of a cellular sector (e.g., for supporting dynamic changes to the transmission bit rates of established video sessions in a cellular sector). In response to an indication of a condition associated with the cellular sector, a manager determines, for each of a plurality video senders of a respective plurality of uplink video sessions of the cellular sector, a modified transmission bit rate for the video sender for the uplink video session and propagates, toward the video sender, a message for instructing the video sender to use the modified transmission bit rate for its uplink video session. | 2013-02-14 |
20130042277 | APPARATUS, AND ASSOCIATED METHOD, FOR PROVIDING MEDIA IN A RADIO COMMUNICATION SYSTEM - An apparatus, and an associated method, facilitates the sending and play out of popular media, such as viral videos, in a radio communication system. Portions of popular media are broadcast and stored at communication devices. When a user of a communication device elects to play out popular media, the broadcast portion, stored at a communication device, is retrieved and played out. If an additional portion of the media is to be played out, the additional portion is retrieved and downloaded to the communication device. | 2013-02-14 |
20130042278 | METHOD AND APPARATUS FOR PROVIDING VIDEO SERVICE - A method and an apparatus for providing video service according to example embodiments of the present invention are disclosed. The method for providing video service according to one example embodiment of the present invention comprises determining based on a predetermined reference whether it is necessary to set multiple bearers to provide the video service for a terminal, and when it is determined necessary to set the multiple bearers, setting an additional bearer, dividing a video source stream into a first stream and a second stream, assigning the first and second streams to a default bearer and the additional bearer, respectively, and transmitting the first and second streams to the terminal. | 2013-02-14 |
20130042279 | WIRELESS VIDEO TRANSMISSION DEVICE, WIRELESS VIDEO RECEPTION DEVICE AND WIRELESS VIDEO COMMUNICATION SYSTEM USING SAME - In a wireless video communication system, a wireless camera has an image capturing unit for generating video data, a video clipping unit for generating high priority video data and lower priority video data having mutually different image regions from the video data, a first and a second wireless communication unit for communicating with a first and a second access point and a communication control unit for controlling the wireless communication by the first and second wireless communication units. The communication control unit can cause the high priority video data and lower priority video data to be transmitted from the first and second wireless communication units as two individual video streams, and is configured to determine whether each wireless communication unit should transmit none, one or both of the video streams depending on the wireless communication quality and the condition of a handover. | 2013-02-14 |
20130042280 | Multi-Source Assisted Content Delivering System - While receiving content from a source via a first connection, a receiver determines the connection is interrupted, selects an alternative source, and continues to receive the content from the alternative source via a second connection. In some implementations, the alternative source may be a server. In implementations, the alternative source may be additional receivers configured in a peer-to-peer arrangement. In various implementations, after the receiver determines that the first connection is interrupted, the receiver may utilize the second connection until finished receiving the content, continue receiving the content utilizing the first connection once no longer interrupted, or determine that the second connection is interrupted and select an additional alterative source to continue receiving the content from via a third connection. In one or more implementations, various components of the broadcast system may assist the receiver in continuing to receive the content from the alternative source via the second connection. | 2013-02-14 |
20130042281 | Distribution of Over-the-Air Television Content to Remote Display Devices - A system for the distribution of over-the-air (OTA) television content for remote display includes an OTA antenna, a wireless antenna transceiver connected to the OTA antenna for receipt of OTA television signals via the OTA antenna, as set-top box receiver (STBR), and a television receiver connected to the set-top box receiver and adapted to receive video data therefrom. The wireless antenna transceiver includes a first wireless access point for transmission of television content signals, derived from the OTA television signals, via wireless link, and the STBR includes a second wireless access point for receipt of television content signals via wireless link. The STBR receives the television content signals directly from the wireless antenna transceiver or from an intermediate wireless router. The wireless router may also distribute the OTA content to other display devices. Power-line networking may alternatively be used instead of wireless links. | 2013-02-14 |
20130042282 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus including an execution unit, a generation unit, a first request unit, and a second request unit. The execution unit is capable of executing first information processing. The generation unit is configured to generate a display image including first information associated with first access information for accessing the execution unit and second information associated with second access information for accessing a server on a global network, the server being capable of executing second information processing. The first request unit is configured to request the execution unit to execute the first information processing based on the first access information associated with the first information. The second request unit is configured to request the server to execute the second information processing based on the second access information associated with the second information. | 2013-02-14 |
20130042283 | Method and Apparatus for Automatically Converting Source Video into Electronic Mail Messages - The invention relates to a method and system for automatically identifying video content within source video and transmitting the video content to an electronic mail client. The transmitted video content can be streaming video, video files, and/or other medium derived from the source video. An enhanced electronic mail client is also disclosed. | 2013-02-14 |
20130042284 | PAY-PER-VIEW PORTAL - A method and system that provides customers a pay-per-view portal, accessible via a television service, a mobile service, or an Internet service. The pay-per-view portal permits customers to search for pay-per-view programs and provide search results that include related content to pay-per-view programs including related videos, articles, biographical summaries, stats on players or fighters, and images. The pay-per-view portal provides personalized pay-per-view program recommendations, pay-per-view calendars, and sub-portals directed to categories or sub-categories of pay-per-view programs. The pay-per-view portal also provides the ordering and purchasing of pay-per-view programs days, weeks, or months in advance of the airing of the pay-per-view programs. | 2013-02-14 |
20130042285 | REQUEST FOR INFORMATION RELATED TO BROADCAST NETWORK CONTENT - A request for information (RFI) system is provided a viewer of a cable television network enters an RFI input ( | 2013-02-14 |
20130042286 | Apparatus and Method for Transmitting Media Content - A system that incorporates teachings of the present disclosure may include, for example, a computing device having a controller to transmit a client program having a GUI to a media device, where the client program presents an overlay that superimposes onto media content received by the media device and enables the media device to associate a user-generated comment with the media content received at the media device. The controller can receive user-generated comments and media content in a temporal vicinity of the user-generated comments via the client program, and can receive a request for the user-generated comments. Other embodiments are disclosed. | 2013-02-14 |
20130042287 | METHOD FOR TRANSMISSION/RECEPTION OF INTERNET-BASED CONTENT AND TRANSMITTER/RECEIVER USING SAME - The present invention relates to a method for transmitting/receiving contents through a network such as the Internet, and to a transmitter/receiver using same, the transmission method comprising: converting content stored in a file format into a delivery format; and including the content converted into the delivery format in a payload of an IP packet and transmitting same, wherein the delivery format includes composition information on at least one program that configures the content, wherein the program composition information further includes version information for expressing the version of the program composition information that is delivered through the IP packet. | 2013-02-14 |
20130042288 | METHOD AND ARRANGEMENT FOR PLAYING OUT A MEDIA OBJECT - A method and arrangement in a media equipment ( | 2013-02-14 |
20130042289 | BROADCAST SIGNAL RECEIVER, METHOD FOR PROVIDING BROADCAST SIGNAL RELATION INFORMATION, AND SERVER - A broadcast signal receiver capable of displaying relation information corresponding to a broadcast signal in real time. | 2013-02-14 |
20130042290 | METHOD AND APPARATUS FOR TRANSMITTING DATA - An implementation exits a power saving mode for fixed and periodic active periods of time to receive a separate burst transmission from a first stream during each of the corresponding active periods of time. The first stream is received at a first-stream burst data rate. The first stream includes data configured to be displayed at a first playback rate that is substantially less than the first-stream burst data rate. During the active periods of time, data is received from a second stream at a second-stream rate. The second stream includes data configured to be displayed at a second playback rate that is substantially the same as the second-stream rate. After receiving each of the burst transmissions from the first stream during the active periods of time, the power saving mode is entered for corresponding fixed and periodic power-saving periods of time while waiting for another burst from the first stream. | 2013-02-14 |
20130042291 | Streaming Audio Visual Content Simultaneously to Different Topologies on a Wireless Adapter - A source of video data may be coupled to a plurality of sinks using a wireless branch device with more than one connector. Numbers may be assigned to the connectors in a sequence depending on the wireless technology used by each connector. Examples of wireless technologies include DisplayPort, HDMI, and Wireless Gigabit Alliance. Sinks coupled to the branch device are interrogated to determine the number of connectors and each connector's wireless technology. | 2013-02-14 |
20130042292 | Distribution of Over-the-Air Television Content to Remote Display Devices - A system for the distribution of over-the-air (OTA) television content for remote display includes an OTA antenna, a wireless antenna transceiver connected to the OTA antenna for receipt of OTA television signals via the OTA antenna, as set-top box receiver (STBR), and a television receiver connected to the set-top box receiver and adapted to receive video data therefrom. The wireless antenna transceiver includes a first wireless access point for transmission of television content signals, derived from the OTA television signals, via wireless link, and the STBR includes a second wireless access point for receipt of television content signals via wireless link. The STBR receives the television content signals directly from the wireless antenna transceiver or from an intermediate wireless router. The wireless router may also distribute the OTA content to other display devices. Power-line networking may alternatively be used instead of wireless links. | 2013-02-14 |
20130042293 | METHOD FOR TRANSMITTING EXTRA INFORMATION IN DIGITAL BROADCAST CONTENTS AND APPARATUS USING THE SAME - A method for transmitting extra information in digital TV broadcast contents, comprising: retrieving video contents from an electronic apparatus; acquiring the extra information of the electronic apparatus; encoding the video contents into encoded video contents; encoding the extra information into a graphic subtitle or a text subtitle; providing a service information/program specific information table; multiplexing the encoded video and audio contents, the graphic subtitle or the text subtitle, and the service information/program specific information table to generate a transport stream; and transmitting the transport stream. | 2013-02-14 |
20130042294 | IDENTIFYING APPLICATION REPUTATION BASED ON RESOURCE ACCESSES - Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers. These techniques thereby achieve rapid detection and mitigation of newly identified malware through application telemetry in a predominantly automated manner. | 2013-02-14 |
20130042295 | METHOD AND APPARATUS FOR PROVIDING A SECURE VIRTUAL ENVIRONMENT ON A MOBILE DEVICE - Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and devices create a secure application environment in which secure data and documents may be segregated from unsecured data using document encryption, allowing the application of security policies to only the secure application environment. The creation of a secure application environment allows users to access and manipulate secure data on any mobile device, not just specifically designated secure devices, without having to secure all data on the mobile device, while providing the corporate entity with necessary document security. The methods and devices provide for securing data on a mobile device at the data level using encryption. | 2013-02-14 |
20130042296 | PHYSICAL INTERACTION WITH VIRTUAL OBJECTS FOR DRM - Technology is provided for transferring a right to a digital content item based on one or more physical actions detected in data captured by a see-through, augmented reality display device system. A digital content item may be represented by a three-dimensional ( | 2013-02-14 |
20130042297 | METHOD AND APPARATUS FOR PROVIDING SECURE SOFTWARE EXECUTION ENVIRONMENT BASED ON DOMAIN SEPARATION - An apparatus for providing a secure environment of software execution in a terminal device includes a normal service domain and a secure service domain into which a domain of the software is divided based on virtualization. The normal service domain executes a normal service on elements of the software, and the secure service domain executes a security service on elements of the software in response to a request for a security service of the software elements from the normal service domain. | 2013-02-14 |
20130042298 | SYSTEM AND METHOD FOR GENERATING TRUST AMONG DATA NETWORK USERS - A system and a method in which a user makes a service request with a service provider through a data network. The service provider receives from trust generating equipment, located in an access provider, an assessment of the security level of the user; said equipment in turn receiving a delivery of information about the trust level provided by said user; and in order for the aforementioned equipment to collect information about the user identity, the network traffic generated by the user, the security status of the user device and the geographical location of the user device, this information being analyzed and summarized in a trust label which is sent to the service provider. | 2013-02-14 |
20130042299 | WHITE LISTING DNS TOP-TALKERS - Systems and methods for creating a list of trustworthy resolvers in a domain name system. A computer receives a resolver profile for a resolver sending queries to a domain name server. The resolver profile is based on one or more of a top-talker status of the resolver, a normalcy of distribution of domain names queried, a continuity of distribution of query type, and an IP time-to-live variance of queries from the resolver. Resolver profiles can be compared to a trust policy to determine whether the resolver is trustworthy. Resolvers deemed trustworthy can be added to a list of trustworthy resolvers. Embodiments can detect the occurrence of a network-based attack. Embodiments can mitigate the effect of a network-based attack by responding only to queries from resolvers on the list of trustworthy resolvers. | 2013-02-14 |
20130042300 | METHOD FOR CONFIGURING AN APPLICATION FOR AN END DEVICE - A method for configuring an application for an end device having a predefined end-device configuration with a predefined security level. A query about the predefined end-device configuration is directed by means of the application to a central place in which a multiplicity of security levels of end-device configurations have respective application configurations associated therewith. In response to the query, the central place ascertains the predefined security level of the predefined end-device configuration from the multiplicity of security levels, and outputs it to the application together with the associated application configuration. In dependence on the output security level, one or several functions of the application are configured by means of the application on the basis of the output application configuration for the end device. | 2013-02-14 |
20130042301 | Authentication Control In Low-Power Lossy Networks - Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate devices in a lossy network receives an authentication start message from a particular device to be authenticated. The authenticator device determines a schedule for engaging in an authentication procedure for the particular device based on an indication of current network utilization. | 2013-02-14 |
20130042302 | COGNITIVE PATTERN RECOGNITION FOR COMPUTER-BASED SECURITY ACCESS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 2013-02-14 |
20130042303 | COGNITIVE PATTERN RECOGNITION FOR SECURITY ACCESS IN A FLOW OF TASKS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 2013-02-14 |
20130042304 | SYSTEM AND METHOD FOR HANDOVER BETWEEN INTERWORKING WLAN AND EUTRAN ACCESS SYSTEMS - This invention relates to the area of Mobility and Handover between heterogeneous wireless networks. The scope of the invention also covers the case when the UE is capable of accessing both the WLAN and EUTRAN access systems simultaneously and also the case where the UE is not capable of accessing both the WLAN and EUTRAN access systems simultaneously. This invention provides a system and method to perform Mobility between the access systems with optimized authentication procedure using security context transfer between the access systems and also minimize the data loss by buffering the data during the handover. More specifically, this invention provides a system and method to support handover between the I-WLAN and the EUTRAN access systems. | 2013-02-14 |
20130042305 | FACEMAIL - Systems and methods are disclosed for generating, sending, and delivering a message addressed using an image of an intended message recipient of the message. In one embodiment, a central server receives a message including an image of an intended message recipient from a first user device of a first user. The central server then identifies a second user as the intended message recipient based on the image of the intended message recipient. Then, before delivering the message, the central server obtains an image of a user at a second user device associated with the second user and sends the image to the first user device where the image is presented to the first user. Upon receiving authentication from the first user device that the user at the second user device is the intended message recipient, the central server delivers the message to the second user device of the second user. | 2013-02-14 |
20130042306 | DETERMINING MACHINE BEHAVIOR - When a user visits a webpage, the web browser obtains information of the user's operation behavior on the webpage and sends the obtained information of the operation behavior to the web server. The web server determines a weighted value of machine behavior based on obtained information of the user's operation behavior on the webpage. When the web server determines that the weighted value of machine behavior is not less than a defined threshold, it determines that user's operation behavior on the webpage is machine behavior. | 2013-02-14 |
20130042307 | COMMUNICATION METHOD AND INFORMATION PROCESSING SYSTEM - A communication method in an information processing system including a group of first information processing apparatuses that transmit data and a group of second information processing apparatuses that receive the data is disclosed. The communication method includes storing data subject to being transmitted to one of the second information processing apparatuses in a data storage by associating the data with identifier information of the second information processing apparatus, and performing transmission processing to transmit the stored data to the second information processing apparatus in response to reception of a first token generated by the second information processing apparatus serving as a generating source of the first token, the first tokens indicating a transmission right to transmit the data to the second information processing apparatus and being transferred between the group of the first information processing apparatuses and between the group of the second information processing apparatuses. | 2013-02-14 |
20130042308 | SUBSCRIPTION INTERFACE FOR PROVIDING ACCESS TO DIGITAL PUBLICATIONS - The present application provides a subscription interface positioned between client devices and third-party digital subscription providers. The subscription interface allows multiple different publication-related applications (e.g., Sports Illustrated, Time magazine, etc.) running on different client devices (e.g., tablets, desktop computers, laptop computers, smart phones, etc.) to obtain a list of digital issues available from an associated third-party digital subscription provider based on entitlements of the user of the client device. The subscription interface ensures that the application receives the list and associated metadata in a desired format for that particular application on a particular client device. | 2013-02-14 |
20130042309 | USER AUTHENTICATION MANAGEMENT - End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate for the third-party website, and receiving an agreement to terms of use of the multi-factor authentication service for the third-party website. Once received, the multi-factor authentication service can enable the third-party website to utilize the service (e.g., switch the service on, or send an authorization key to the third-party website). Further, registering a user to the multi-factor authentication service can comprise determining availability of service, and providing a location-specific access code. Additionally, registering the user can comprise registering the user's mobile device, for example, to provide multi-factor authentication. Also, an Internet-based user account management user interface can be provided that allows a user to view transactions on their account, and an ability to shut off a designated mobile device's ability to authenticate. | 2013-02-14 |
20130042310 | METHOD AND SYSTEM FOR AUTOMATIC AUTHENTICATION - A system and method for automatic authentication includes automatically calculating a security code on a computer running a security program. The security program resides on the same computer as a web browser. In response to a user signing into a web based account on a web site accessed by the web browser, automatically verifying that the security program is registered with the web based account. In response to a second factor security code entry request on the web based account, automatically entering the security code into the web based account. The security code is transmitted to the web site transparently to the user for login. | 2013-02-14 |
20130042311 | MULTI-STEP CAPTCHA WITH SERIAL TIME-CONSUMING DECRYPTION OF PUZZLES - A system and method for implementing a multi-step challenge and response test includes steps or acts of: using an input/output subsystem for presenting a series of challenges to a user that require said user to correctly solve each challenge before a next challenge is revealed to the user; receiving the user's response to each challenge; and submitting a last response in the series of challenges to a server for validation. The method further includes: using a processor device configured to perform for each challenge in the series of challenges: internally validating the response by comparing the user's response to a correct response; and using the user's response, decrypting the next challenge to reveal the next challenge; wherein the next challenge remains obfuscated until a previous challenge is correctly solved. | 2013-02-14 |
20130042312 | AUTHENTICATION IN A SMART THIN CLIENT SERVER - In a first embodiment of the present invention, a method for starting a session between a user and a smart thin client server is provided, wherein the smart thin client server permits users to create, manage, and deploy enterprise applications, the method comprising: receiving a request to initiate a session from a user, wherein the request does not include log-in credentials; selecting an anonymous account from a pool of anonymous accounts; obtaining credentials from the anonymous account; and establishing a session for the user using the credentials from the anonymous account. | 2013-02-14 |
20130042313 | KEY DERIVATIVE FUNCTION FOR NETWORK COMMUNICATIONS - Systems, methods, and other embodiments associated with deriving group keys used to securely communicate in a wireless mesh network are described. According to one embodiment, a controller, for calculating group keys used to secure communications to a plurality of remote devices in a network, includes a key logic configured to calculate a group key by using a group master key and unique information about a remote device of the plurality of remote devices. The plurality of remote devices are configured in a mesh topology. The group key is for securing communications with the remote device. The controller also includes a communication logic configured to secure a communication by using the group key. The communication is to be transmitted to the remote device. | 2013-02-14 |
20130042314 | System and Method for Authenticating a User - According to one embodiment, a system including a memory and a processor is provided. The memory may be operable to store a plurality of accounts. Each account may be associated with a user and with a mobile device. The processor may be coupled to the memory and operable to receive user credentials, sent by a requesting user and originating from a requesting device, in conjunction with a request for authentication. The user credentials may include an account identifier. The processor may be further operable to retrieve, from the plurality of accounts, the account associated with the account identifier that matches the account identifier included in the user credentials. The processor may compare information included within the user credentials with information associated the account. If the information included within the user credentials matches the information associated with the account, the processor may send an authentication-confirmation message to a second device. | 2013-02-14 |
20130042315 | Client-Client-Server Authentication - Described is a technology by which machines of a (typically small) network have associated public key-based certificates for use in authentication with a server and validation of other machines in the network. This provides an inexpensive and straightforward mechanism to control, manage and maintain client machines, as well as to allow valid client machines to securely communicate with one another and recognize machines that are not valid on the network. Certificates are maintained on the server and checked for validity as needed. | 2013-02-14 |
20130042316 | METHOD AND APPARATUS FOR REDIRECTING DATA TRAFFIC - A method and apparatus for redirecting data traffic are provided. The method includes receiving a service request from a first device, allocating resources for the service, associating the resources with a first unique identifier, confirming the service request with the first device, receiving a connection request from a second device including the first unique identifier and an authentication certificate, passing the authentication certificate to the first device, and receiving an authentication confirmation from the first device. The method further includes, in response to receiving the authentication confirmation, accepting the connection request from the second device, providing an indication regarding at least one lo-cal area network to the second device, and providing required credentials associated with the at least one local area network to the second device. | 2013-02-14 |
20130042317 | FRONTEND SYSTEM AND FRONTEND PROCESSING METHOD - In a frontend system in which a plurality of relay devices is mixed, the performance of end to end can be improved and a network can be flexibly established every policy. Specifically, the L7 (layer 7) processing is unified by providing a Front-End Processor (FEP), which have both a firewall (FW) and a load balancer (LB) recognizing a protocol of the L7 (layer 7) level, near a switch of a gateway to an external network. | 2013-02-14 |
20130042318 | Authentication System and Method Using Arrays - The present invention relates to a user authentication system and in particular to a method and system in which the user has to apply a transformation which can be an ArrayCard consists of transparent and/or opaque cells of Physical (static/electronic) or Virtual form or it can be a form of secret remembered which needs to be applied on an array of cells to arrive at a unique One-Time-SecretCode for each authentication request along with a sequence of cells/positions (pattern) in an array as a secret pattern. First, user undergoes registration phase to get authenticated to access the application. While registering user applies a transformation on the array of cells displayed on user terminal and registers a pattern by selecting the corresponding symbols from the resultant array. Once user gets registered, then he can access the application by authenticating himself to the system. At the authentication phase, user has to apply the transformation on the array of cells displayed and enter the symbols from the resultant array as One-Time-SecretCode by recollecting his own secret pattern. This user entered One-Time-SecretCode will be checked by the system and if found genuine, access will be granted or else access will be denied. | 2013-02-14 |
20130042319 | METHOD AND APPARATUS FOR DETECTING AND DEFENDING AGAINST CC ATTACK - A method for detecting and defending against a CC attack is disclosed, which comprises the following steps of: recording the number of times m of requests for a webpage and the number of times n of related requests for the webpage within a preset time interval if a user's request of accessing the webpage is a dynamic webpage request; and determining that the webpage is subjected to a CC attack if a value (m−n)/m is greater than or equal to a preset threshold. A corresponding apparatus is further disclosed. The method and the apparatus for detecting and defending against a CC attack of the present disclosure can accurately detect and defend against the CC attack. | 2013-02-14 |
20130042320 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING PORTIONS OF DATA - A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data. | 2013-02-14 |
20130042321 | SECURITY SYSTEMS AND METHODS - Security methods are provided. The method can include comparing a first device identifier ( | 2013-02-14 |
20130042322 | SYSTEM AND METHOD FOR DETERMINING APPLICATION LAYER-BASED SLOW DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK - A technology for defending a Distributed Denial-of-Service (DDoS) attack is provided. A system for determining an application layer-based slow DDoS attack may include a packet collecting unit to collect a packet in a network, a packet parsing unit to extract at least one header field from the collected packet, and a DDoS attack determining unit to determine whether a DDoS attack against the packet is detected, using a session table and a flow table. | 2013-02-14 |
20130042323 | HIGH AVAILABILITY FOR NETWORK SECURITY DEVICES - In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a primary IDP device, wherein the state update message indicates a network session being inspected by the primary IDP device and an identified application-layer protocol for the device, to receive an indication that the primary device has switched over or failed over to the backup device, and to receive a plurality of packets of the network session after receiving the indication, each of the plurality of packets comprising a respective payload including application-layer data, a protocol decoder to detect a beginning of a new transaction from the application-layer data of one of the plurality of packets, and a control unit to statefully process only the application-layer data of the network session that include and follow the beginning of the new transaction. | 2013-02-14 |
20130042324 | SERVER BASED MALWARE SCREENING - An Internet infrastructure is provided to transfer a packet of data between a client device and source device. The infrastructure consists of a support server that screens the packet for malware codes on behalf of a registered client. In order to scan for malware, the support server contains hardware and/or software modules to perform malware detection and quarantine functions. The modules identify malware bit sequence in the packet(s), malware bit sequences or entire contaminated code is quarantined or repaired as appropriate. After identification of malware code (if any), the support server sends warning messages to affected parties, providing information regarding the malware codes that were detected. | 2013-02-14 |
20130042325 | PROCEDURE FOR THE PREPARATION AND PERFORMING OF A POST ISSUANCE PROCESS ON A SECURE ELEMENT - The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE controlling party to perform remotely operations such as creation of new security domains for an external party, loading, and installation of applications of an external party and management functions including personalization and activation of applications loaded on the SE for an external party. The method includes the steps of:
| 2013-02-14 |
20130042326 | Mobile-Device User Authentication - In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second users respectively associated with one or more second mobile devices; accessing information known about one or more users and one or more mobile devices respectively associated with the one or more users; identifying at least one candidate for the first user based on the information known about the one or more users and the one or more mobile devices; and confirming one or more of the at least one candidate as the one or more second users. | 2013-02-14 |
20130042327 | GUIDED IMPLICIT AUTHENTICATION - Embodiments of the present disclosure provide a method and system for guided implicit authentication. The system first receives a request to access the controlled resource from a user. The system then determines whether the user request is inconsistent with regular user behavior by calculating a user behavior measure derived from historical contextual data of past user events. Next, the system allows the user to provide information associated with regular user behavior and/or current contextual data. The system further updates the user behavior measure based on current contextual data. | 2013-02-14 |
20130042328 | Enforcing single stream per sign-on from a content delivery network (CDN) media server - An apparatus for enforcing a media stream delivery restriction uses a stream control service (SCS). The SCS is implemented in a distributed network, such as a CDN, in which a given media stream is delivered to authorized end users from multiple delivery servers, but where an authorized end user is associated with a single log-in identifier that is not intended to be shared with other end users. According to the method, an enforcement server of the SCS identifies first and second copies of the given media stream associated with the single log-in identifier being delivered from multiple delivery servers. It then issues message to terminate delivery of the given media stream from at least one of the multiple delivery servers. | 2013-02-14 |
20130042329 | DISTRIBUTION CHANNEL LOSS PROTECTION FOR ELECTRONIC DEVICES - An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device. | 2013-02-14 |
20130042330 | HUMANIZED M-CSF MICE - Genetically modified mice comprising a nucleic acid sequence encoding a human M-CSF protein are provided. Also provided are genetically modified mice comprising a nucleic acid sequence encoding a human M-CSF protein that have been engrafted with human cells such as human hematopoietic cells, and methods for making such engrafted mice. These mice find use in a number of applications, such as in modeling human immune disease and pathogen infection; in in vivo screens for agents that modulate hematopoietic cell development and/or activity, e.g. in a healthy or a diseased state; in in vivo screens for agents that are toxic to hematopoietic cells; in in vivo screens for agents that prevent against, mitigate, or reverse the toxic effects of toxic agents on hematopoietic cells; in in vivo screens of human hematopoietic cells from an individual to predict the responsiveness of an individual to a disease therapy, etc. | 2013-02-14 |
20130042331 | ANIMAL MODELS AND THERAPEUTIC MOLECULES - The invention discloses methods for the generation of chimaeric human-non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2013-02-14 |
20130042332 | Device and method for inducing brain injury in animal test subjects - An apparatus and method for inflicting brain injury on a laboratory animal that employs a platform for supporting the laboratory animal. The platform defines an opening for positioning the head of the laboratory animal over the opening. A projectile is launched from a projectile launching device orientated below the opening of the platform. The projectile launching device has a means for propelling the projectile directly at and/or through the opening of said platform, thereby inflicting brain injury on the animal via either a pressure wave or concussive impact of the projectile. Without helmet, direct impact of the projectile results in severe traumatic brain injury. Use of helmet protects animals from skull fracture, subdural hematoma, intracerebral hemorrhage and contusion yet produces mild concussion-like pathology. | 2013-02-14 |
20130042333 | MARKERS FOR CANCER PROGNOSIS AND THERAPY AND METHODS OF USE - The invention relates generally to the field of cancer prognosis and treatment. More particularly, the present invention relates to methods and compositions that utilize a particular panel of gene products (“biomarkers”) and their differential expression patterns (“expression signatures”), wherein the expression patterns correlate with responsiveness, or lack thereof, to chemotherapy treatment. The invention is based on the identification of a specific set of biomarkers that are differentially expressed in chemotherapy-treated tumors and which are useful in predicting the likelihood of a therapeutic response, including residual disease persistence and subsequent tumor recurrence in cancer patients receiving chemotherapy. The gene panel is also useful in designing specific adjuvant modalities with improved therapeutic efficiency. Also disclosed are methods for characterizing tumors according to expression of the biomarkers described herein. | 2013-02-14 |
20130042334 | Capping-Prone RNA Polymerase Enzymes and Their Applications - The invention provides a chimeric enzyme comprising at least one catalytic domain of a RNA triphosphatase, at least one catalytic domain of a guanylyltransferase, at least one catalytic domain of a N | 2013-02-14 |
20130042335 | LETTUCE LINE RS16893282 - The invention provides seed and plants of the lettuce line designated RS16893282. The invention thus relates to the plants, seeds and tissue cultures of lettuce line RS16893282, and to methods for producing a lettuce plant produced by crossing a plant of lettuce line RS16893282 with itself or with another lettuce plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of lettuce line RS16893282, including the gametes of such plants. | 2013-02-14 |