08th week of 2013 patent applcation highlights part 49 |
Patent application number | Title | Published |
20130047185 | ALTERATION OF ELECTRONIC PROGRAM GUIDE DATA BASED ON RATINGS LOCK - A television receiver receives a programming signal including programming content and EPG data. The television receiver receives a request for an EPG display. The television receiver modifies the EPG data for one or more records in the EPG data which include content ratings that exceed a ratings lock setting of the television receiver. The television receiver may modify the EPG data for one or more records in a variety of different manners depending on a variety of different factors associated with the records. The television receiver then generates the EPG display from the modified EPG data and transmits the generated EPG display to a display device. The modification of the EPG data may prevent display of objectionable content in the EPG display and/or may indicate that the records correspond to blocked programs. | 2013-02-21 |
20130047186 | Method to Enable Proper Representation of Scaled 3D Video - A custom interface depth may be provided. A content stream, such as a three-dimensional television signal, comprising a plurality of video planes may be displayed. In response to receiving a request to adjust a depth of at least one of the video planes, the display depth of the requested video plane may be adjusted relative to at least one other video plane. The depth of a video plane containing a scaled version of the three-dimensional television signal may be adjusted relative to a video plane displaying an electronic program guide. | 2013-02-21 |
20130047187 | Methods and Systems for Facilitating User Access to Media Content Programs Included in a Programming Block - An exemplary method includes a media content presentation system detecting an access event initiated by a user and performed by a media content processing subsystem with respect to a media content program during a time period associated with a provider-scheduled presentation of the media content program, identifying a programming block of which the media content program is a part, determining that the user has failed to direct the media content processing subsystem to perform an additional access event with respect to one or more additional media content programs that are also a part of the programming block during a time period associated with a provider-scheduled presentation of the one or more additional media content programs, and facilitating, in response to the determining, access by the user to the one or more additional media content programs included in the programming block. Corresponding methods and systems are also disclosed. | 2013-02-21 |
20130047188 | Wireless Network With Presentation and Media Layers for Broadcast Satellite and Cable Services - A wireless network includes a satellite antenna assembly with a reflector dish and at least one low-noise block converter (LNB) positioned opposite the reflector dish. A wireless transceiver transmits video and data information to one or more users located in a surrounding area. An interface unit is coupled to provide communication signals to the wireless transceiver. The unit is also configured for connection to an interactive data network so that the one or more users are provided with connectivity to the interactive data network via the wireless transceiver. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 2013-02-21 |
20130047189 | LOW LATENCY WIRELESS DISPLAY FOR GRAPHICS - As part of a communication session, a wireless source device can transmit video component data and metadata to a wireless sink device. The wireless source device can intercept the video component data prior to the video component data being rendered by the wireless source device, and the wireless sink device can generate a frame of video data based on the video component data and the metadata. | 2013-02-21 |
20130047190 | NETWORK SYSTEM AND IMAGE PROJECTION APPARATUS - A network system includes an image projection apparatus that projects image data; a first terminal; and a second terminal where the first terminal includes an original image data storing unit that stores original image data and a corresponding information generating unit that generates corresponding information in which image identification data of the image data for projection, generated from the original image data, capable of identifying the original image data and terminal identification data for identifying the first terminal correspond with each other, and the image projection apparatus includes a request sending unit that sends, upon receiving a request for delivering the image data being projected from the second terminal, the request for delivering the original image data including the image identification data, which is included in the corresponding information stored in the storing unit, to the first terminal. | 2013-02-21 |
20130047191 | METHOD AND SYSTEM FOR DIGITAL CONTENT TRANSMISSION - Disclosed embodiments include a method and an apparatus for digital content transmission that comprise: (a) partitioning the digital content into a plurality of sequential segments; (b) selecting a plurality of transmission time instants for each of the sequential segments as a function of their order; (c) generating a plurality of linear combinations of the plurality of sequential segments during the plurality of transmission time instants resulting in a plurality of linearly combined coded segments; and (c) transmitting the plurality of linearly combined coded segments from a server to a plurality of clients. In particular embodiments, the method and apparatus further comprise performing error correction based on an implicit error correction (IEC) method that employs the redundancy present in the linearly combined coded segments to perform error correction at the client side without extra bandwidth cost. | 2013-02-21 |
20130047192 | Media Detection and Packet Distribution in a Multipoint Conference - A method includes receiving a plurality of audio signals. Each of the plurality of audio signals includes audio packets, wherein one or more audio packets from each of the plurality of audio signals is coded with an audiometric, the audiometric including an acoustic measurement from a conference site. The method further includes, for each of the plurality of audio signals, extracting an audiometric from one or more audio packets and selecting an active audio signal based on the extracted audiometrics. In addition, the method includes determining a change in the active audio signal and in response to determining a change in the active audio signal, updating a media forwarding table, the media forwarding table including a directory for routing one or more of the plurality of audio signals. The method further includes distributing audio packets to one or more conference sites in accordance with the media forwarding table. | 2013-02-21 |
20130047193 | Systems and Methods of Providing Broadband Services with Dynamic Resource Allocation - Systems and methods for providing broadband services having dynamic resource allocation are described herein. Example embodiments of the systems involve communication of information between one or more of content provider server(s), a backbone data communication network, a telecommunication service provider broadband distribution network, and one or more subscriber interface device(s) that allocate resources upon request in connection with the delivery of a broadband service. Each device along a data communication path between a service requesting subscriber interface device and content provider server may be enabled for and uses the Resource Reservation Protocol (RSVP). During operation, a subscriber interface device (including a set top box or cable modem) may communicate an RSVP reservation message to the content provider server via the path causing various devices along the path to dynamically reserve resources (including, without limitation, bandwidth) and set priority information based upon the requirements for and characteristics of a data flow(s) needed for delivery of the broadband service. | 2013-02-21 |
20130047194 | METHOD AND SYSTEM FOR A TRANSCODER - A system that incorporates teachings of the present disclosure may include, for example, a transcoder module having a controller to manage power distribution in the transcoder module from power supplied to an HDMI port of the transcoder module, transcode audio-visual information into a digital compatible format used on an external device. Other embodiments are disclosed. | 2013-02-21 |
20130047195 | METHOD AND APPARATUS FOR MAKING TOKEN-BASED ACCESS DECISIONS - According to one embodiment, an apparatus may store a plurality of token-based rules that facilitate access to a resource, and a plurality of tokens indicating a user is using a device to request access to a resource over a network. The apparatus may receive a risk token indicating the risk associated with granting at least one of the user and the device access to the resource. The risk token may be computed from a set of tokens in the plurality of tokens. The apparatus may determine at least one token-based rule based at least in part upon the plurality of tokens and the risk token. The apparatus may then make an access decision based upon the at least one token-based rule, and communicate a decision token representing the access decision. | 2013-02-21 |
20130047196 | TRANSITIVE CLOSURE SECURITY - In one implementation, a plurality of records included in a transitive closure of a driving record is identified, and a record from the plurality of records or the driving record is determined to satisfy a security rule. The security rule is then applied to the driving record and the plurality of records. | 2013-02-21 |
20130047197 | SEALING SECRET DATA WITH A POLICY THAT INCLUDES A SENSOR-BASED CONSTRAINT - Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a constraint that can only be satisfied by predefined readings that may be output by at least one sensor on a mobile computing device. If the sensor on the mobile computing device outputs a reading that satisfies the sensor-based constraint, secret data is provided to a requesting application. Otherwise, the requesting application is prevented from accessing the secret data. | 2013-02-21 |
20130047198 | Policy Based Application Suspension and Termination - In accordance with one or more aspects, an application that is to be suspended on a computing device is identified based on a policy. The policy indicates that applications that are not being used are to be suspended. The application is automatically suspended, and is allowed to remain in memory but not execute while suspended. Additionally, when memory is to be freed one or more suspended applications to terminate are automatically selected based on the policy, and these one or more selected applications are terminated. | 2013-02-21 |
20130047199 | Method and Apparatus for Subject Recognition Session Validation - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The plurality of tokens may include a session token associated with access to the resource by a user. The apparatus may receive a first token indicating at least one of the detection of a face other than the user's and the detection of a voice other than the user's. The apparatus may determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token and terminate the session token in response to the determination that access to the resource should be terminated. | 2013-02-21 |
20130047200 | Apparatus and Method for Performing Data Tokenization - According to one embodiment, an apparatus may receive a first data token indicating a request for data associated with the resource, a subject token indicating that at least one form of authentication has been completed, and a network token indicating that at least one form of encryption has been performed. The apparatus may determine at least one token-based rule based at least in part upon the first data token, the subject token, and the network token. The apparatus may determine, based at least in part upon the at least one token-based rule, that a second data token representing the data should be generated. The apparatus may generate a message indicating the determination that the second data token should be generated and then transmit the message. | 2013-02-21 |
20130047201 | Apparatus and Method for Expert Decisioning - According to one embodiment, an apparatus may store at least one subject token associated with a user and a device, at least one resource token associated with the resource, and at least one network token associated with a network. The apparatus may determine various access values associated with these stored tokens. The apparatus may then determine the value of a first access value based on the values of these various access values. The apparatus may determine that the value of the first access value is insufficient to grant access to the resource and determine that access by at least one of the user and the device to the resource over the network should be denied. | 2013-02-21 |
20130047202 | Apparatus and Method for Handling Transaction Tokens - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate the processing of transactions. The apparatus may receive a transaction token indicating that a transaction associated with an entity has been requested. The apparatus may determine at least one token-based rule based at least in part upon the transaction token. The at least one token-based rule may indicate that there is a risk that the transaction is fraudulent. The apparatus may determine that the transaction should be denied based at least in part upon the risk that the transaction is fraudulent. | 2013-02-21 |
20130047203 | Method and Apparatus for Third Party Session Validation - According to one embodiment, an apparatus may store a plurality of tokens. The apparatus may receive a first token indicating that access to a resource has been requested by a device. The apparatus may determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule may condition access to the resource upon a second token. The apparatus may determine the geographic location of the device based on a token in the plurality of tokens. The apparatus may determine, based on the geographic location of the device, that the second token should be requested from an entity and transmit a request to the entity for the second token. The apparatus may receive the second token from the entity and generate a session token based at least in part upon the first token and the second token. | 2013-02-21 |
20130047204 | Apparatus and Method for Determining Resource Trust Levels - According to one embodiment, an apparatus may receive a first resource token indicating that access to a resource has been requested. The apparatus may determine the value of an access value associated with at least one resource token in response to the determination that the plurality of resource tokens comprises the at least one resource token. The apparatus may determine that the value of the access value is insufficient to grant access to the resource. The apparatus may determine, in response to the determination that the value of the access value is insufficient to grant access to the resource, that access to the resource should be denied. | 2013-02-21 |
20130047205 | Apparatus and Method for Making Access Decision Using Exceptions - According to one embodiment, an apparatus may store a plurality of token-based exceptions The apparatus may receive a resource token indicating that access to the resource has been requested. The apparatus may determine, based at least in part upon the resource token, at least one token-based exception. The token-based exception further may condition the grant of access to the resource upon the apparatus determining that the plurality of tokens comprises the at least one token. The apparatus may determine that the plurality of tokens does not comprise the at least one token and determine, in response to the determination that the plurality of tokens does not comprise the at least one token, that access to the resource should be denied. | 2013-02-21 |
20130047206 | Method and Apparatus for Session Validation to Access from Uncontrolled Devices - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The apparatus may receive a first token indicating that an unsecured device has requested access to the resource and determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule indicates a timeout associated with the unsecured device. The apparatus may determine, based on the at least one token-based rule, that the timeout associated with the unsecured device has not been exceeded and generate a session token based at least in part upon the first token in response to the determination that the timeout has not been exceeded. | 2013-02-21 |
20130047207 | METHOD AND APPARATUS FOR SESSION VALIDATION TO ACCESS MAINFRAME RESOURCES - According to one embodiment, an apparatus may store a plurality of token-based rules. The apparatus may further store a plurality of tokens. The apparatus may receive a first token indicating that access to a mainframe resource has been requested. The apparatus may determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule may condition access to the resource upon a second token. The second token may be associated with a device. The second token may indicate a password. The second token may further indicate a geographic location associated with the device. The apparatus may determine that the plurality of tokens includes the second token generate a session token based at least in part upon the first token and the second. | 2013-02-21 |
20130047208 | SYSTEMS AND METHODS OF ASSESSING PERMISSIONS IN VIRTUAL WORLDS - Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds. | 2013-02-21 |
20130047209 | AUTHENTICATION PROCESSING METHOD AND APPARATUS - A physical unclonable function (PUF) device, and a PUF reader which extracts PUF parameters required to calculate a response output from a challenge input by analyzing an operation of the PUF device. Operation parameters characterizing an operation state are obtained by observing a power waveform, an electromagnetic waveform, or a processing time of the PUF device at that time. Authentication of the PUF device is based on the extracted parameters. The PUF reader executes authenticity determination as to whether or not the PUF device is a valid PUF device by monitoring an operation of the PUF device during response generation based on the operation parameters. | 2013-02-21 |
20130047210 | Systems and Methods for Providing Security When Accessing a User Account of a Browser-Based Communications Application - The embodiments described herein provide in one aspect, a method of providing security when accessing a user account of a browser-based communications application, the method comprising: providing a communications server, the communications server configured to access personal information management (PIM) data for the user account, the PIM data comprising a plurality of non-security data items; receiving, at the communications server, a connection request from a remote system, the connection request comprising at least one connection parameter of the remote system; determining if the at least one connection parameter of the remote system is acceptable based on at least one non-security data item of the plurality of non-security data items; allowing access to the user account based on said determining; and sending security awareness data for the user account from the communications server, the security awareness data comprising at least one second non-security data item of the plurality of non-security data items. | 2013-02-21 |
20130047211 | METHOD AND APPARATUS FOR NETWORK SESSION VALIDATION - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may further store a plurality of tokens. The apparatus may receive a first token indicating that access to the resource has been requested and determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule may condition access to the resource upon a second token. The second token may indicate that the resource is associated with a virtual private network of the link layer of the open systems interconnection model. The apparatus may determine that the plurality of tokens includes the second token associated with the at least one token-based rule and generate a session token based at least in part upon the first token and the second token. | 2013-02-21 |
20130047212 | Wireless Internet-Accessing Module, Host, Communication Method Thereof, and Data Card - A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with the wireless Internet access module of a secure digital interface. The method includes simulating each port on a wireless Internet access processing function unit in a wireless Internet access module into a secure digital card partition and reporting the secure digital card partition to a host side; receiving downlink interaction information from the host side encapsulated in a secure digital card interface format, decapsulating the downlink interaction information, and delivering the decapsulated downlink interaction information to a corresponding port; and receiving uplink interaction information reported to the host side from each port, encapsulating the received uplink interaction information in the secure digital card interface format, and sending the encapsulated uplink interaction information to the host side. | 2013-02-21 |
20130047213 | Method And Apparatus For Token-Based Token Termination - According to one embodiment, an apparatus may store a plurality of token-based rules that facilitate access to a risk-sensitive resource. The apparatus may further store a first token that may indicate that a user is accessing a non-risk-sensitive resource. The apparatus may receive a second token that may indicate that the user is attempting to access the risk-sensitive resource. In response to receiving the second token, the apparatus may apply the token-based rule to make an access decision whereby the user's access to the non-risk-sensitive resource will be terminated. The apparatus may then communicate at least one token representing the access decision. | 2013-02-21 |
20130047214 | METHOD AND APPARATUS FOR TOKEN-BASED COMBINING OF AUTHENTICATION METHODS - According to one embodiment, an apparatus may store a first and second subject token that indicate a first authentication method performed by the user and a second authentication method performed by the user respectively. The apparatus may detect at least one new subject token indicating at least one different authentication method performed by the user. The apparatus may then determine that a particular combination of subject tokens in the first subject token, second subject token, and the at least one new subject token indicates a privilege should be granted to the user, and facilitate the granting of the privilege to the user. | 2013-02-21 |
20130047215 | METHOD AND APPARATUS FOR TOKEN-BASED REASSIGNMENT OF PRIVILEGES - According to one embodiment, an apparatus may monitor a session that facilitates a user's access to a resource. The user may be granted a privilege associated with accessing the resource. The apparatus may detect a change associated with the privilege granted to the user in at least one token of a plurality of tokens. The apparatus may then communicate a token that represents the change, and receive a risk token associated with the token. The apparatus may then determine to revoke the privilege based on the risk token, and generate a second token that represents the determination to revoke the privilege. The apparatus may then communicate the second token to facilitate the revoking of the privilege. | 2013-02-21 |
20130047216 | INFORMATION PROCESSING APPARATUS, RESOURCE PROVIDING APPARATUS, AND INFORMATION PROCESSING SYSTEM - There is provided an information processing apparatus which the communication unit receives a usage request of a resource described in a first format from a program providing apparatus, the conversion unit identifies a resource providing apparatus having the resource as indicated and converts the usage request described in the first format into the usage request described in a second format that can be interpreted by the resource providing apparatus identified, the communication unit transmits the usage request described in the second format to the resource providing apparatus and receives a processing result of the usage request described in the second format from the resource providing apparatus, the conversion unit converts the processing result described in the second format into the processing result described in the first format, and the program execution unit performs an operation according to the processing result described in the first format. | 2013-02-21 |
20130047217 | SYSTEMS AND METHODS OF MANAGING VIRTUAL WORLD AVATARS - Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds. | 2013-02-21 |
20130047218 | WIRELESS DEVICE AUTHENTICATION BETWEEN DIFFERENT NETWORKS - A method and system for roaming between heterogeneous networks. The method involves authenticating a mobile communication device on a first network, and providing the device with a single-use token that can be used to sign on to a second network without requiring conventional re-authentication over the second network. | 2013-02-21 |
20130047219 | ENTERPRISE-WIDE SECURITY SYSTEM FOR COMPUTER DEVICES - A system and method for securing data in mobile devices ( | 2013-02-21 |
20130047220 | Method and system for multi-access authentication in next generation network - The disclosure provides a method for multi-access authentication in Next Generation Network (NGN), which includes: a network side authentication center generates an authentication vector after receiving user terminal information from a user terminal, wherein the user terminal information includes subscription information and multi-access information of the user terminal; the user terminal performs authentication on the network side after receiving an authentication request from the network side authentication center, and generates keying material and network side authentication information upon successful authentication, and sends the network side authentication information to the network side authentication center, wherein the authentication request includes authentication information; the network side authentication center performs authentication on the network side authentication information using the authentication vector, generates keying material according to the multi-access information of the user terminal upon successful authentication, and inform an access forwarding functional module of the keying material; the access forwarding functional module encrypts and decrypts access service information of the user terminal according to the keying material. The disclosure also provides a system of the method. The disclosure enhances the efficiency with which the user terminal accesses the network. | 2013-02-21 |
20130047221 | METHOD AND APPARATUS FOR IMPROVED INFORMATION TRANSACTIONS - A mechanism gives users meaningful access to information while protecting the interests of publishers and creators of information including text, graphics, photos, executable files, data tables, audio, video, and three dimensional data and allows a user to review a document while connected to a network but prevents the user from downloading, printing, or copying the document unless a fee is paid. The user is allowed to review documents at a first cost basis, but only provides other access to documents, such as copying, printing, or downloading on a second cost basis. The user is also allowed to purchase a selectable portion of a document at a price based on the amount of material selected where that amount of material can include a portion of a document, an entire document, or an anthology of components of multiple documents. | 2013-02-21 |
20130047222 | Implementing secured, event-based layered logout from a computer system - A secure, layered logout of a user session is implemented in a management tool. A logout strategy is provided to include a set of security levels of varying sensitivity, with each security level having a set of permissions that are enforced upon occurrence of an event. A succeeding security level in the set of security levels is reached upon occurrence of an event associated with that level, in which case the permissions associated with the level are then enforced against at least one object while the user session continues. As each next security level is reached, the set of permissions are then enforced, once again while the user session continues. The layered logout may enforce different permissions with respect to different objects. If the user takes no action, eventually a final security level will occur, at which point the user session is finally terminated. | 2013-02-21 |
20130047223 | Methods for the Secure Use of One-Time Passwords - Methods for authentication over unsecure networks using one-time passwords methods are provided. The methods establish a connection over a first channel between an authentication system and a user's computing system, then the authentication system determines information based on the connection over the first channel, such as the IP address and other information that can be readily found once the IP address is known. The information derived from the connection is then provided to the user over a second channel, and the user is given an opportunity to review the information before deciding whether to continue the login. If the information returned to the user over the second channel is suspicious, this can indicate to the user that the connection over the first channel has been compromised. | 2013-02-21 |
20130047224 | METHOD AND APPARATUS FOR TOKEN-BASED ATTRIBUTE ABSTRACTION - According to one embodiment, an apparatus may store a plurality of tokens associated with a session. The session may facilitate access to a resource by a user. The session may be identified by a session token. The apparatus may determine, based on a token-based rule, a second plurality of tokens required to facilitate determination of a risk token. The risk token may be used to facilitate determination of an access decision to the resource. The apparatus may determine that the plurality of tokens comprises the second plurality of tokens and generate a dataset token that represents the plurality of tokens. The apparatus may then communicate the dataset token to facilitate the generation of the risk token. The apparatus may receive the risk token and correlate it with the session token to facilitate determination of the access decision. | 2013-02-21 |
20130047225 | Method and Apparatus for Token-Based Tamper Detection - According to one embodiment, an apparatus may store: a hard token representing identification information of the device, a network token representing the status of a network, and a resource token representing information associated with a resource. The apparatus may further store secured copies of the hard token, network token, and resource token. The apparatus may receive a suspect token indicating a risk that at least one of the device, the network, and the resource has been tampered, and in response, determine to inspect at least one of the hard token, network token, and resource token. The apparatus may then compare the at least one of the hard token, network token, and resource token with its corresponding secured copy. If at least one of those tokens does not match its corresponding secured copy, the apparatus may communicate a revalidation token indicating at least one token has been tampered. | 2013-02-21 |
20130047226 | Method And Apparatus For Token-Based Re-Authentication - According to one embodiment, an apparatus may store a plurality of tokens that indicate a user is using a device to access a resource over a network. The apparatus may detect at least one token indicating a change associated with at least one of the device, the network, or the resource. The apparatus may then determine to re-authenticate the user in response to the change. The apparatus may then request a password generated using personal information of the user, and receive a re-authentication token comprising the password generated using personal information of the user. The apparatus may then request, from the user, a second password. The request for the second password may include instructions on how to form the second password. The apparatus may receive a response comprising the second password and determine that the second password matches the password. The apparatus may then re-authenticate the user. | 2013-02-21 |
20130047227 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION FOR A PRIORITY COMMUNICATION SESSION - An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session. | 2013-02-21 |
20130047228 | METHOD AND APPARATUS FOR TOKEN-BASED ATTRIBUTE AGGREGATION - According to one embodiment, an apparatus may store a plurality of tokens. The apparatus may receive a subject token indicating an attempt to authenticate a user. The apparatus may determine at least one token-based rule based at least in part upon a token in the plurality of tokens and the subject token. The at least one token-based rule may indicate a plurality of attributes required to access a resource. The apparatus may determine a second plurality of attributes represented by the plurality of tokens and the subject token. The apparatus may determine at least one missing attribute, which may be in the plurality of attributes but not in the second plurality of attributes. The apparatus may then request the at least one missing attribute, and in response, receive at least one token representing the at least one missing attribute. | 2013-02-21 |
20130047229 | PLAY TIME DISPENSER FOR ELECTRONIC APPLICATIONS - Systems, methods, devices, and computer program products are described for controlling access to electronic applications by a user. A request may be received (e.g., from a user) to access an electronic application. The availability of points, credits, or time for the particular user may be determined, and access to the electronic application granted or denied based on the determination. User identity may be verified through biometric data, with such verification repeated at periodic or random intervals. Access may be restricted based on a permission level of a particular authority that has responsibility for all or a portion of the user's activities during a particular time period. Access may also be restricted based on the location of the user at the time of the access request. | 2013-02-21 |
20130047230 | BUILDING DATA SECURITY IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared cloud infrastructure (e.g., as an extension to DB2®, Label-Based Access Control (LBAC), and/or an independent tool). Among other things, embodiments of the present invention provide cloud administrators with an easy to use customizable, configurable security constraint builder/tool with a built-in multi-tenant/customer enabled security model. Moreover, embodiments of the present invention enable cloud administrators to set up, configure, and manage tenants/customers and their private shards with their own security constraints. The output of this tool greatly eases the time to create an invisible (e.g., software) wall of separation for multiple tenants/customers in a shared cloud infrastructure. | 2013-02-21 |
20130047231 | METHOD AND APPARATUS USING A CAPTCHA HAVING VISUAL INFORMATION RELATED TO THE CAPTCHA'S SOURCE - Disclosed is a method for visual verification a Captcha's source. In the method, a Captcha is served to a user. The Captcha includes visual information related to a characteristic of a source of the Captcha and related to a puzzle question of the Captcha. The visual information is for visual verification by the user of the Captcha's source. A response is received from the user based on the served Captcha. A determination is made as to whether the received response is a solution of the puzzle question of the served Captcha. | 2013-02-21 |
20130047232 | MULTIPLE AUTHENTICATION MECHANISMS FOR ACCESSING SERVICE CENTER SUPPORTING A VARIETY OF PRODUCTS - A service center receives first media data from a mobile device over a network, the first media data including at least one of an image and a voice stream presenting an identity of a user associated with the mobile device. The first media data was captured via at least one of a camera and a voice recorder of the mobile device. The user is authenticated by matching the first media data against second media data stored in the service center. The second media data has been previously registered with the service center, where the service center provides support services for a plurality of products on behalf of a plurality of product providers. Upon having successfully authenticated the user, support services are provided to the user for a product that has been registered with the service center by the user on behalf of a vendor. | 2013-02-21 |
20130047233 | DATA MANAGEMENT WITH A NETWORKED MOBILE DEVICE - A tool for establishing a wireless connection from a mobile device to another device in proximity to the mobile device. The mobile device receives requests for data, such as a user profile, medical records, etc. from the device. The mobile device has the ability to register/preapprove the requesting device allowing the device to access the requested data. The mobile device also has the ability to give varying devices different authorization levels. The mobile device has the ability to store the data on another system, and in response to the request, validate the requesting device and the device's authorization level, request the data from the other system through a network, and return the data to the requesting device. | 2013-02-21 |
20130047234 | METHOD AND DEVICE FOR PROPAGATING SESSION MANAGEMENT EVENTS - A method for propagating session management events between a plurality of machines forming a machine cluster includes generating, with a session management user interface, a session management event on a first machine of the machine cluster; detecting, with an installment of the interface, the generated event; sending, from the installment to a first security service related to the first machine, a set of specific information that is related to the detected event; determining, with the first security service, a set of target machines; sending the specific information from the first security service to target security services that are related to the target machines; and processing the specific information at each target security service of the target machines so as to execute, on each target machine that has received the specific information, the session management event generated on the first machine. | 2013-02-21 |
20130047235 | Authenticating a rich client from within an existing browser session - A user authenticates to a Web- or cloud-based application from a browser-based client. The browser-based client has an associated rich client. After a session is initiated from the browser-based client (and a credential obtained), the user can discover that the rich client is available and cause it to obtain the credential (or a new one) for use in authenticating the user to the application (using the rich client) automatically, i.e., without additional user input. An application interface provides the user with a display by which the user can configure the rich client authentication operation, such as specifying whether the rich client should be authenticated automatically if it detected as running, whether and what extent access to the application by the rich client is to be restricted, if and when access to the application by the rich client is to be revoked, and the like. | 2013-02-21 |
20130047236 | AUTHENTICATION SYSTEM AND METHOD THEREOF - The invention relates to a system and method for authentication of subscribers of a system ( | 2013-02-21 |
20130047237 | PASSWORD SECURITY INPUT SYSTEM USING SHIFT VALUE OF PASSWORD KEY AND PASSWORD SECURITY INPUT METHOD THEREOF - The present invention relates to a password security input system which performs authentication through input of a security password key which is obtained by applying a shift value to an actual password key, and a password security input method thereof. According to the present invention, a password security input system is configured with a user terminal comprising: a password setting module for receiving and storing an actual password which is inputted during the initial setting by a user; an input window generating module for generating an input window in which key buttons are randomly disposed in every instance where a password is inputted; a password input module for receiving keys of a security password which are position-changed by applying the same shift distance to the key positions of the actual password in the input window displayed on a screen; and a password authentication module for comparing a key shift value of the pre-stored actual password with a key shift value of a security password inputted by a user on the basis of the input window, and determining that password authentication is in success when the two key shift values are the same. According to the present invention, even if a security password is exposed to a third person, the user can maintain the actual password with a sound mind. | 2013-02-21 |
20130047238 | METHOD FOR PROVIDING ACTIVE SECURITY AUTHENTICATION, AND TERMINAL AND SYSTEM SUPPORTING SAME - Disclosed herein are a method for providing active security authentication, and a terminal and system for supporting the same. The terminal includes a storage unit, a display unit, an input unit and a control unit. The control unit arranges a plurality of keys through an arrangement of random numbers when a security execution condition is satisfied, outputs, to the display unit, a security authentication screen based on a random-number matrix in which at least some keys in key regions adjacent to an item key among the plurality of keys arranged by the arrangement of the random numbers are set to exception keys that a user must not press, and decide that the terminal is used for an illegal use when the exception keys are included in an input information generated through the input unit. | 2013-02-21 |
20130047239 | METHOD AND SYSTEM FOR MAINTAINING LOGIN PREFERENCE INFORMATION OF USERS IN A NETWORK-BASED TRANSACTION FACILITY - The present invention relates to various aspects for maintaining and utilizing login preference information of users of a network-based transaction facility. In one embodiment, user interface information is communicated to a client via a communications network. The user interface information includes information concerning a plurality of features within the network-based transaction facility. The user interface information also specifies a login interface that facilitates user input of login preference information pertaining to each of the plurality of features. Further, the login preference information is received from the client via the communications network and utilized to control user access to any of the plurality of features within the network-based transaction facility via the communications network. | 2013-02-21 |
20130047240 | Method and Apparatus for Token-Based Container Chaining - According to one embodiment, an apparatus may intercept a request to access a resource represented by a resource token. The apparatus may receive a hard token representing identification information of a device. The apparatus may determine, based at least in part upon the hard token and the resource token, at least one token-based rule specifying compliance criteria required to consume the resource. The apparatus may receive at least one token representing compliance information of the device in response to a request for compliance information of the device. The apparatus may then compare the compliance information against the compliance criteria to determine that the device is capable of consuming the resource. The apparatus may then generate a compliance token representing the determination that the device is capable of consuming the resource, and communicate the compliance token to facilitate the provisioning of a container to the device. | 2013-02-21 |
20130047241 | Method and Apparatus for Token-Based Combining of Risk Ratings - According to one embodiment, an apparatus may store a plurality of tokens. The plurality of tokens may include a plurality of risk tokens. Each risk token may represent a risk rating. The risk rating may be a numerical value indicating a risk associated with granting a particular user access to a particular resource. The apparatus may identify a set of related risk tokens in the plurality of risk tokens, and generate a composite risk token that represents an arithmetic combination of the risk ratings represented by the set of related risk tokens. The apparatus may then use the composite risk token to facilitate the making of an access decision. | 2013-02-21 |
20130047242 | Apparatus and Method for Performing Real-Time Authentication Using Subject Token Combinations - According to one embodiment, an apparatus may receive a resource token associated with a resource indicating that access to the resource has been requested. The apparatus may determine at least one token-based rule based at least in part upon the resource token, wherein the at least one token-based rule may be associated with at least one subject token. The apparatus may then determine that the at least one subject token is not in the plurality of first subject tokens and the plurality of second subject tokens based at least in part upon the at least one token-based rule, and deny access to the resource. | 2013-02-21 |
20130047243 | Apparatus and Method for Performing Session Validation - According to one embodiment, an apparatus may receive a first token indicating that access to the resource has been requested. The apparatus may determine at least one token-based rule based at least in part upon the first token, and determine that a plurality of tokens includes a second token associated with the at least one token-based rule. The apparatus may then generate a session token based at least in part upon the first token and the second token in response to the determination that the plurality of tokens includes the second token. The apparatus may terminate the session token based on a received third token. | 2013-02-21 |
20130047244 | Method and Apparatus for Session Validation to Access Third Party Resources - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The apparatus may receive, from an entity, a first token indicating that access to the resource has been requested by a device through the entity and determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule may condition access to the resource upon a second token. The second token may be associated with a subscriber identity module of the device. The apparatus may determine that the plurality of tokens includes the second token associated with the at least one token-based rule and generate a session token based at least in part upon the first token and the second token. | 2013-02-21 |
20130047245 | Apparatus and Method for Performing Session Validation to Access Confidential Resources - According to one embodiment, an apparatus may receive a first token indicating that access to a resource has been requested by a device. The first token may further indicate that the resource is a confidential resource. The apparatus may determine that a plurality of tokens includes a second token and generate a session token based at least in part upon the first token and the second token in response to the determination that the plurality of tokens includes the second token. The apparatus may receive a third token indicating an event affecting the risk associated with granting access to the resource and determine, based at least in part upon the at least one token-based rule, that access to the resource should be terminated in response to receiving the third token. The apparatus may then terminate the session token in response to the determination that access to the resource should be terminated. | 2013-02-21 |
20130047246 | APPARATUS AND METHOD FOR DETERMINING ENVIRONMENT INTEGRITY LEVELS - According to one embodiment, an apparatus may receive a resource token indicating that access to the resource has been requested. The apparatus may determine the value of an access value associated with at least one network token. The apparatus may then determine that the value of the access value is insufficient to grant access to the resource and determine that access to the resource over the network should be denied. | 2013-02-21 |
20130047247 | ACCESS MANAGEMENT SYSTEM, ACCESS MANAGEMENT METHOD, ACCESS MANAGEMENT SERVER, COOPERATION SERVER, AND COMPUTER-READABLE MEDIUM - A system includes an access management server and a cooperation server, wherein the access management server comprises issuance unit that issues a token corresponding to the managed user account in response to a request of the cooperation server, and deletion unit that deletes a user account, of the managed user accounts, which satisfies a predefined deletion condition, and the cooperation server comprises acquisition unit that acquires, when acquisition of a token corresponding to the user account managed by the access management server is requested by another server, if the deletion unit has not deleted the user account, an issued token corresponding to the user account, and to cause, if the deletion unit has already deleted the user account, the access management server to re-register the user account to acquire a token issued for the re-registered user account. | 2013-02-21 |
20130047248 | Apparatus and Method for Determining Subject Assurance Level - According to one embodiment, an apparatus may store a plurality of token-based rules. The apparatus may further store a plurality of subject tokens associated with at least one of a user and a device. The apparatus may receive a resource token indicating that access to a resource has been requested. The apparatus may determine the value of an access value associated with the at least one subject token. The apparatus may then determine that the value of the access value is insufficient to grant access to the resource. The apparatus may then determine that access by at least one of the user and the device to the resource should be denied. | 2013-02-21 |
20130047249 | Method And Apparatus For Token-Based Packet Prioritization - According to one embodiment, an apparatus may receive a hard token that identifies a device and a subject token indicating that a user is a high priority user. The subject token may include a user identifier associated with the high priority user. The apparatus may apply a token-based rule that facilitates packet prioritization in response to receiving the subject token. In response to applying the token-based rule, the apparatus may communicate a notification token to at least one network component. The notification token may include the user identifier associated with the high priority user, the device identifier associated with the device, and instructions to prioritize any packet communications associated with the user identifier or the device identifier. The apparatus may then communicate at least one token to facilitate the provisioning of a container to the device associated with the high priority user. | 2013-02-21 |
20130047250 | Methods of On-Chip Memory Partitioning and Secure Access Violation Checking in a System-on-Chip - Systems and methods for partitioning memory into multiple secure and open regions are provided. The systems enable the security level of a given region to be determined without an increase in the time needed to determine the security level. Also, systems and methods for identifying secure access violations are disclosed. A secure trap module is provided for master devices in a system-on-chip. The secure trap module generates an interrupt when an access request for a transaction generates a security error. | 2013-02-21 |
20130047251 | Method and Apparatus for Token-Based Context Caching - According to one embodiment, an apparatus may receive a token that indicates a change that occurs during a session. The session may facilitate access to a resource. The token may indicate a risk token should be computed. The apparatus may determine, from the token, a first set of attributes. The first set of attributes may include attributes required to compute the risk token. The apparatus may determine that a cache contains a set of cached attributes. The apparatus may examine an attribute in the set of cached attributes, and determine the attribute in the set of cached attributes is not in the first set of attributes. The apparatus may then remove the attribute in the set of cached attributes from the cache. | 2013-02-21 |
20130047252 | Picture Gesture Authentication - In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen | 2013-02-21 |
20130047253 | METHOD AND APPARATUS FOR TOKEN-BASED REAL-TIME RISK UPDATING - According to one embodiment, an apparatus may store a plurality of tokens indicating a user is accessing a resource over a network. The plurality of tokens may include a risk token indicating a risk associated with access by the user to the resource. The apparatus may detect a token indicating a change associated with accessing the resource, and determine that the change triggers a risk update. The apparatus may then generate a dataset token that represents the risk token and the token indicating the change, and communicate the dataset token to a token provider to perform the risk update. The apparatus may then receive a recomputed risk token representing an updated risk. The updated risk may indicate the risk associated with continuing access to the resource with the change. | 2013-02-21 |
20130047254 | METHOD AND APPARATUS FOR TOKEN-BASED TRANSACTION TAGGING - According to one embodiment, an apparatus may monitor a session that facilitates the processing of a transaction. The transaction may represent an action taken against a resource during the session. The apparatus may determine that the transaction qualifies for additional monitoring, and in response, generate a tag. The tag may be unique to the transaction. The apparatus may then associate the tag with the transaction to facilitate tracing of the transaction. The apparatus may then trace the transaction during the processing of the transaction by following the tag, and communicate a message to transfer the transaction to an isolated processing unit. The isolated processing unit processes the transaction in isolation. | 2013-02-21 |
20130047255 | SYSTEM AND METHOD FOR INDIRECT INTERFACE MONITORING AND PLUMB-LINING - A method is provided in one example embodiment that includes monitoring a first interface, monitoring a second interface, and taking a policy action if the second interface is not executed before the first interface. In more particular embodiments, monitoring the second interface may include walking a call stack associated with the first interface. Moreover, a program context for calling code associated with the second interface may be identified and acted upon. | 2013-02-21 |
20130047256 | METHOD FOR PREVENTING A MOBILE COMMUNICATION DEVICE FROM LEAKING SECRET AND SYSTEM THEREOF - The invention provides a method for preventing a mobile communication device from leaking secret and a system thereof. In the method, by adopting a mobile communication device side and PC side structure, a controlling module installation package is transferred from a PC side to the mobile communication device; a controlling module runs automatically and obtains root privilege of the operating system of the mobile communication device; the controlling module forbids functions of silently dialing, silently answering, photo taking, video recording, voice recording, Bluetooth and infrared connection. The advantages of the present invention are that the present invention is suitable for on-site operation and possibility of leaking secret by any mobile communication device is eliminated by a PC terminal. | 2013-02-21 |
20130047257 | Systems and Methods for Computer Worm Defense - A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems. | 2013-02-21 |
20130047258 | Security Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 2013-02-21 |
20130047259 | METHOD AND APPARATUS FOR TOKEN-BASED VIRTUAL MACHINE RECYCLING - According to one embodiment, an apparatus may store a virtual machine token associated with a virtual machine running on a particular device and a secure image of the virtual machine. The virtual machine token may include a timestamp indicating when the virtual machine was established. The apparatus may receive a token indicating that the particular device is attempting to access a resource. In response, checking the validity of the virtual machine running on the particular device based at least in part upon the timestamp associated with the virtual machine token and a time threshold associated with the virtual machine. If the virtual machine is invalid, then the apparatus may communicate at least one token to initiate the recycling of the virtual machine by replacing the invalid virtual machine with the stored secure image of the virtual machine. | 2013-02-21 |
20130047260 | COLLABORATIVE CONTENT RATING FOR ACCESS CONTROL - Methods, systems, devices, and computer program products are described for controlling access to electronic content. Content ratings for electronic content are received from each of a number of reviewers, and the input value for each of the reviewers is weighted. Content analysis for the electronic content is also received on each of a number of factors, and each factor is weighted. These weightings may be based on community standards, be specific to a geographic region, or be personalized. The weighted content ratings and the weighted content analysis may be combined to generate an access metric. Access to the electronic content may be controlled based on the access metric. | 2013-02-21 |
20130047261 | Data Access Control - A set of data is provided to an application executed in an environment within which the application is restricted from making its output available outside the environment. An operation performed on the set of data by the application is inspected. A determination of whether an output of the application is satisfactory is reached based on the inspection. If the output is determined satisfactory, the output of the application is made available outside the environment. | 2013-02-21 |
20130047262 | Method and Apparatus for Object Security Session Validation - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The plurality of tokens may include a session token associated with access to the resource by a device. The apparatus may receive a first token indicating that an alarm associated with the device has been triggered. The apparatus may determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token and terminate the session token in response to the determination that access to the resource should be terminated. | 2013-02-21 |
20130047263 | Method and Apparatus for Emergency Session Validation - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may further store a plurality of tokens. The plurality of tokens may include a session token. The session token may be associated with access to the resource by a user. The apparatus may receive a first token indicating that an emergency has been declared. The emergency may be associated with the user. The apparatus may determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token and terminate the session token in response to the determination that access to the resource should be terminated. | 2013-02-21 |
20130047264 | Method and Device for Communicating Digital Content - A method for establishing a secured communication channel, between a first processing component and a second processing component; the method comprising executing a digital rights management agent on a processing unit, the digital rights management agent being configured to enforce permissions associated with digital content based on a digital rights management protection mechanism; receiving, by the digital rights management agent at least a security data item, the security data item including a session key data item; verifying authenticity of the received session key data item by the digital rights management agent using said digital rights management protection mechanism; providing the verified session key data item by the digital rights management agent to at least the second processing component; establishing a secured communication channel between the first and second processing components using at least the provided session key data item. | 2013-02-21 |
20130047265 | Method and Apparatus for Token-Based Conditioning - According to one embodiment, an apparatus may store a plurality of tokens indicating a user is requesting access to a resource over a network. The apparatus may determine a condition associated with accessing the resource based on the plurality of tokens. The condition may be determined in addition to a determination to grant or deny access to the resource. The condition may include an obligation to be fulfilled and a message providing instruction regarding how to fulfill the obligation. The apparatus may generate a decision token representing the condition, and communicate the decision token to a resource provider to facilitate enforcement of the condition. | 2013-02-21 |
20130047266 | METHOD AND APPARATUS FOR TOKEN-BASED ACCESS OF RELATED RESOURCES - According to one embodiment, an apparatus may store a plurality of tokens indicating that a user is attempting to access a resource. The apparatus may determine an authorization level for the user based at least in part upon the plurality of tokens. The authorization level may indicate whether the user is authorized to access the resource. The apparatus may then determine a related resource that shares a relationship with the resource, and determine that the authorization level indicates that the user is authorized to access the related resource. The apparatus may then communicate a decision token indicating that the user is authorized to access the resource and the related resource. | 2013-02-21 |
20130047267 | BENCHMARK MEASUREMENT FOR LEGITIMATE DUPLICATION VALIDATION - A system and method for detecting piracy of a software product that is distributed on a particular media type is described. Embodiments of the invention track a title load time of a software product that is distributed on a particular media type, and compare it against a benchmark load time for that media type. This comparison is used to detect if the title may have been illegally transferred or pirated to another, unauthorized media type. | 2013-02-21 |
20130047268 | Methods for Using Biometric Authentication Methods for Securing Files and for Providing Secure Access to Such Files by Originators and/or Authorized Others - Embodiments are directed to apparatus, methods and systems for locking data or program files and for allowing access to such files only by individuals given authorization and wherein the identity of locking or accessing individuals is provided by comparison of collected inertial information associated with providing a signature with information stored about the particular individuals. In a first embodiment two primary components work together to provide collection of inertial data (and potentially other data) and then comparing of the collected data to stored data to provide an authentication or identification assessment. The first of these components is a SigzaPen device for acquiring data while the second is a remote Signature Processing Center (“SPC”) wherein these two components are capable of communicating directly or indirectly with each other. | 2013-02-21 |
20130047269 | SYSTEMS AND METHODS FOR REAL-TIME VIEWING AND MANIPULATION OF INFORMATION HOSTED ON THIRD-PARTY SYSTEMS, INCLUDING METRICS, FALSE ACKNOWLEDGEMENTS, AND AUTO-COMPLETION FOR INPUTTING INFORMATION OVER A NETWORK - Systems and methods for real-time viewing and manipulation of information hosted on third-party systems are described. The system and methods enable property managers to create, edit and delete real estate vacancy postings on multiple sites from a single account, view metrics associated with the postings, and shift the administrative burdens associated with the unreliability of third-party systems to the system itself. | 2013-02-21 |
20130047270 | METHOD AND APPARATUS FOR DYNAMIC DATA FLOW CONTROL USING PRIORITIZATION OF DATA REQUESTS - A data center determines whether requested content is available at the data center. The content is available when the content is both present at the data center and current. When the requested content is available at the data center, the data center returns the requested content to the browser. When the requested content is locally unavailable at the data center, the requested content is retrieved from an origin server. When retrieval of the content is delayed, the request is prioritized and placed in a queue for handling by the origin server based on the priority of the request. A status page may be communicated to the browser to inform a user of the delay and provide alternate content and status information related to the request determined as a function of the request or the current state of the origin server. | 2013-02-21 |
20130047271 | Author Authorization of Electronic Works - Described is a system, device and method for granting rights or authorizing access to or delivery of a second, subsequent or other electronic copy of an author's work to consumers and others who have previously purchased a copy of the same or other author's work. The second copy of the work is for use on or through a consumer device such as a second consumer device that is also owned by the consumer who purchased or leased a first copy of the first work. An authentication credential or proof of purchase provides the system a means to determine if authorization may be granted for an electronic copy of an author's work. | 2013-02-21 |
20130047272 | INTEGRATED CIRCUIT FOR PREVENTING CHIP SWAPPING AND/OR DEVICE CLONING IN A HOST DEVICE - An integrated circuit is disclosed that can be included in a host electronic device that can be commonly manufactured, where the integrated circuit can be designated (“locked”) for a specific manufacturer, thereby substantially reducing the likelihood that a third party will be able to successfully clone a host electronic device manufactured by the specific manufacturer and/or swap the chip containing the integrated circuit for one having more enabled features. The integrated circuit includes an ID module that can be programmed after fabrication. Components within the integrated circuit designate manufacturer-specific configurations (e.g., address mapping, pin routing and/or vital function releasing) based on the programmed manufacturer ID. As a result, once the integrated circuit has been programmed with the manufacturer ID, the integrated circuit will function correctly only within a host device manufactured by the manufacturer associated with the programmed manufacturer ID. | 2013-02-21 |
20130047273 | Genetically altered animal specimen and related methods - A genetically altered animal specimen is provided by a process comprising: identifying a gene that is desired to be altered, disrupting the gene in a gene carrier to thereby create a new DNA fragment; inserting the new DNA fragment into an embryonic cell, injecting the embryonic cell which exhibits the desired genetic alteration into an embryo, inserting the embryo into a uterus of a carrier whereby the carrier's offspring shall exhibit the desired genetic alteration, and the offspring is the genetically altered animal specimen, in this case the neurocalcin δ gene knockout mouse model. | 2013-02-21 |
20130047274 | CD4 T-CELLS INVOLVED IN MAMMALIAN HOST RESPONSE TO EPITHELIAL CELL INFECTIONS AND USES THEREOF - MHC class II-restricted | 2013-02-21 |
20130047275 | Maize event HCEM485, compositions and methods for detecting and use thereof - Maize event HCEM485 is provided, in which plants comprising the event are tolerant to exposure to a glyphosate herbicide. Maize genomic polynucleotides flanking the insert DNA providing glyphosate tolerance are provided. The plant or part thereof having the event comprises a junction region of the insert DNA and maize plant genomic sequences. Methods and primers and probes to detect the presence of the event are provided, as well as kits which employ such primers and probes. | 2013-02-21 |
20130047276 | SOYBEAN VARIETY A1026305 - The invention relates to the soybean variety designated A1026305. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026305. Also provided by the invention are tissue cultures of the soybean variety A1026305 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026305 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047277 | SOYBEAN VARIETY A1026645 - The invention relates to the soybean variety designated A1026645. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026645. Also provided by the invention are tissue cultures of the soybean variety A1026645 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026645 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047278 | SOYBEAN VARIETY D2011903 - The invention relates to the soybean variety designated D2011903. Provided by the invention are the seeds, plants and derivatives of the soybean variety D2011903. Also provided by the invention are tissue cultures of the soybean variety D2011903 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D2011903 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047279 | SOYBEAN VARIETY A1026649 - The invention relates to the soybean variety designated A1026649. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026649. Also provided by the invention are tissue cultures of the soybean variety A1026649 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026649 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047280 | SOYBEAN VARIETY A1026657 - The invention relates to the soybean variety designated A1026657. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026657. Also provided by the invention are tissue cultures of the soybean variety A1026657 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026657 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047281 | SOYBEAN VARIETY A1026663 - The invention relates to the soybean variety designated A1026663. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026663. Also provided by the invention are tissue cultures of the soybean variety A1026663 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026663 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047282 | SOYBEAN VARIETY A1026754 - The invention relates to the soybean variety designated A1026754. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026754. Also provided by the invention are tissue cultures of the soybean variety A1026754 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026754 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047283 | SOYBEAN VARIETY A1026759 - The invention relates to the soybean variety designated A1026759. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026759. Also provided by the invention are tissue cultures of the soybean variety A1026759 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026759 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |
20130047284 | SOYBEAN VARIETY A1026766 - The invention relates to the soybean variety designated A1026766. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026766. Also provided by the invention are tissue cultures of the soybean variety A1026766 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026766 with itself or another soybean variety and plants produced by such methods. | 2013-02-21 |