21st week of 2013 patent applcation highlights part 78 |
Patent application number | Title | Published |
20130132993 | TRACKING LOCAL TELEPHONE NUMBERS - The present disclosure includes a system and method for tracking local telephone numbers. In some implementations, a method of tracking local TV ads includes receiving tracking information for a TV advertisement from a plurality of geographic regions. The TV advertisement are presented in each geographic region with a local telephone number. Metrics associated with the TV advertisement are determined for each geographic region using the tracking information. One or more Web pages are populated with at least one or more metrics for presenting to an advertiser. | 2013-05-23 |
20130132994 | MEDIA CONTENT AGGREGATOR AND CONTENT RATING SYSTEM - Methods and systems include providing a plurality of rebroadcasting devices at a plurality of different geographic locations and controlling the plurality of rebroadcasting devices to receive local television broadcasts via their respective digital television tuners and upload the received local television broadcasts to a network server. The uploaded local television broadcasts can be received at the network server from the respective rebroadcasting devices. One or more of the uploaded local television broadcasts can be delivered to one or more computer devices via the Internet. | 2013-05-23 |
20130132995 | SERVICE ACCESS METHOD, DEVICE, AND SYSTEM - The present invention provides a service access method, device, and system, and relates to the field of television services, to guarantee multicast security of a network device. The method includes: obtaining an authorized multicast address list according to program channel list information provided by a server; receiving an Internet Group Management Protocol IGMP packet request sent by a user terminal device, where the IGMP packet request carries a multicast address; verifying the multicast address in the IGMP packet request according to the multicast address list; and sending a media data stream corresponding to the verified multicast address to the user terminal device. The solutions of the present invention are suitable for realizing the security of multicast of network device. | 2013-05-23 |
20130132996 | SYSTEM AND METHOD FOR DISPLAYING PRODUCT INFORMATION ABOUT ADVERTISEMENT ON DIGITAL TELEVISION, AND RECORDING MEDIUM THEREOF - A system and a method for displaying product information about advertisement on digital television, and a record medium thereof are provided, applicable to a server and a digital media playback device that are connected through a network. The server stores at least one piece of channel advertisement information and at least one piece of product description data corresponding to a plurality of media. The digital media playback device is used for sending an instruction of advertisement information. The instruction of advertisement information includes specific information. While acquiring the instruction of advertisement information, the server compares the specific information with the channel advertisement information to find target product description data from the product description data corresponding to the channel advertisement information and return to the digital media playback device. The digital media playback device plays the playback media and the target product description data. | 2013-05-23 |
20130132997 | CONTENT INJECTION SYSTEM AND METHODOLOGY - A method, and an associated system, for sending to a first group of recipients only the content portions of a continuity source data-flow which takes the form of ordered, successive, alternating content and non-content segments. From a methodologic point of view, the invention involves, in a manner which utilizes content-segment material buffering, delivering fully, and in correct order, to the first recipient group the material in each content segment, via steps including (a) bridging each gap between next-adjacent content segments at least partially with transmitted injection material that differs from the non-content segment material in the gap, which injection material ends in time no sooner than the end of the gap, and (b) employing, as needed, and as a part of such full delivering of content-segment material, time-progressive, time-length-variable buffering, and subsequent, progressive buffer-delivering, of any content-segment material which overlaps in time with the transmission of injection material. | 2013-05-23 |
20130132998 | SENDING A MESSAGE WITHIN A TELEVISION-CONTENT DELIVER ENVIRONMENT - Subscribers to a television-delivery service can send and receive messages within a television-viewing environment. A subscriber can create a message, attach content from the television environment, and send the message to a friend, all without leaving the television environment. A television producer controls its rights to the content by allowing subscribers to select and send some content while preventing other content from being incorporated in a message. Rights can be checked at the sender site, at the recipient site, and in between by a message-transport service. In some situations, the recipient may not have sufficient rights to view the entire message. Specifically, the recipient's subscription level may not allow access to some of the message content that was pulled from the sender's television-delivery service. In this case, the recipient may take corrective action or may view the message with the restricted content replaced with alternative content. | 2013-05-23 |
20130132999 | PROGRAMMING BASED INTERACTIVE CONTENT - A method may include receiving an identification of a device; receiving at least one of device information, which includes a location of the device or a viewing history for the device, or preference information, which includes preferences by a user or a third party, associated with the identification of the device from the device; identifying interactive content based on the at least one of the device information or the preference information; and receiving trigger information, which includes a time and a place for a trigger, the trigger information to identify an event relating to a provisioning of video content. The method may further include mapping the identification of the device and the identified interactive content with the trigger information; detecting that the event has occurred; and sending the identified interactive content based on the mapping and the trigger information. | 2013-05-23 |
20130133000 | Video Interaction System - Apparatus and methods are described that allow content associated with specified passages of a video program to be retrieved from a network and presented to the viewer of the video program in synchronization with the identified passages. A video waymark host that may be located in a television monitor or attached equipment such as a set-top box is disclosed. The waymark host identifies the occurrence of various points as the video is viewed and communicates this information to connected viewing devices such computers or mobile phones, allowing for the synchronized presentation of content on these devices. | 2013-05-23 |
20130133001 | Television Receiver, Method of Controlling the Receiver, and Network Construction Device - According to one embodiment, the present invention is designed to automatically determine the language of the content distributed when connecting to the Web server so as to agree with the language configured at the initial setup. The present invention has following elements. An initial setup module maintains initial setup information that indicates at least a menu language. A setup information association process module which determines a language request signal to request a language the same as the menu language indicated in the initial setup information. And a network control module which accesses the World Wide Web while transmitting the language request signal to determine a browser language. | 2013-05-23 |
20130133002 | METHOD FOR PERFORMING INTELLIGENT RECOMMENDATION/SELECTION OF MULTICHANNEL BROADCASTING PROGRAMS, AND ASSOCIATED APPARATUS - A method for performing intelligent recommendation/selection of multichannel broadcasting programs includes: calculating a difference between a start time of each of at least one portion of the multichannel broadcasting programs and a specific time; and setting priority of each of the at least one portion of the multichannel broadcasting programs according to the difference, for use of performing intelligent recommendation/selection. An associated apparatus for performing intelligent recommendation/selection of multichannel broadcasting programs is also provided. For example, the apparatus is utilized for viewing one or more of the multichannel broadcasting programs. The apparatus includes a processing circuit arranged to perform intelligent recommendation/selection, where the processing circuit includes a calculation module and a priority control module, for performing operations of the method. In particular, various modes such as a normal recommending (NR) mode, an automatic recommending (AR) mode, and an intelligent program-viewing plan (IPP) mode may be involved with the method. | 2013-05-23 |
20130133003 | METHOD AND APPARATUS FOR SELECTING A VERSION OF AN ENTERTAINMENT PROGRAM BASED ON USER PREFERENCES - A method and apparatus for selecting a version of an entertainment program based on user preference includes receiving entertainment programming input, identifying multiple available versions of an entertainment program, identifying, for each of the multiple versions, a set of descriptive information regarding the respective version, accessing user preferences, and selecting one of the multiple versions for display based on a comparison of the descriptive information to the user preferences. | 2013-05-23 |
20130133004 | METHOD FOR PERFORMING BROADCASTING PROGRAM SCHEDULE CONTROL THROUGH ELECTRONIC DEVICE, AND ASSOCIATED APPARATUSES - A method for performing broadcasting program schedule control through an electronic device includes: obtaining EPG data from outside the electronic device, for use of broadcasting program schedule control, wherein the EPG data includes broadcasting schedule information of a plurality of multichannel broadcasting programs; and parsing the EPG data, and further providing a user with at least one hint through the electronic device, allowing the user to designate at least one multichannel broadcasting program to be viewed within the plurality of multichannel broadcasting programs. Associated apparatuses for performing broadcasting program schedule control are also provided. For example, an apparatus can be at least one portion of an electronic device, and more particularly, includes a data retrieving module and a schedule control module. In another example, another apparatus can be at least one portion of a multimedia player, and more particularly, includes a BPCP serving module and a service control module. | 2013-05-23 |
20130133005 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION SHARING SYSTEM - There is provided an information processing apparatus communicable with a plurality of content viewing devices via a network, including a viewing information receiving unit for receiving viewing information of a user in the past, present, and future from each of the content viewing devices, a user viewing content management unit for managing a user viewing content DB based on the viewing information received from each of the content viewing devices and a program guide, the user viewing content DB associating, in a form of program guide, past, present, and future contents represented in the program guide and identification information of users who have viewed the past content, those who are viewing the present content, and those who will view the future content, and a viewing information transmitting unit for transmitting the extracted viewing information of another user to the requesting content viewing device. | 2013-05-23 |
20130133006 | ANIMATED STATION IDENTIFIER IN PROGRAM GUIDES - A television program guide is displayed having a station identifier portion in a first location. A determination is made as to when a user navigates in the television program guide between past programs and future programs. In response to the user navigating in the television program guide between the past programs and the future programs, the station identifier portion is changed to a second location. | 2013-05-23 |
20130133007 | System and Method of Recording Television Content - A method of recording television content is disclosed and includes receiving one or more television program search criteria from a set-top box device at a recurrent searching system. The method also includes storing the one or more search criteria at the recurrent searching system. Further, the method includes performing a first search of electronic program guide (EPG) data accessible to the recurrent searching system based on the television program search criteria and performing at least one additional search of EPG data accessible to the recurrent searching system based on the television program search criteria after the first search. | 2013-05-23 |
20130133008 | APPARATUS AND METHOD FOR VIRTUAL BROADCASTING - An apparatus and method provide virtual broadcasting. A method of server operation for virtual broadcasting includes receiving a request for creation of a virtual broadcasting channel meeting a specific required condition from a first client, identifying a virtual group meeting the specific required condition, analyzing log data of second clients within the virtual group and, based on the analyzed result, providing broadcasting information meeting the specific condition, to the first client. | 2013-05-23 |
20130133009 | OPTIMIZING VIDEO RECORDER POWER USAGE FOR DVR NETWORK - A method, program product and system are provided for optimizing recording requests to minimize electricity usage for a network of DVRs. The disclosed methodology analyzes upcoming recording requests against a schedule guide including both local and networked DVRs. Overlaps in requested recordings and broadcasts during same or close proximity time slots are identified. Requested recordings are then rescheduled to optimally overlap recording times based upon the number of tuners in each DVR system. Changes in recording schedules are then communicated to other interconnected DVRs in a network. | 2013-05-23 |
20130133010 | OBJECT MODEL DELIVERING LIVE TV PROGRAMMING STREAMS TO DIFFERENT CLIENT DEVICE - In embodiments of an object model for domain-based content mobility, a client object model architecture ( | 2013-05-23 |
20130133011 | FULL-REFERENCE COMPUTATION OF MOBILE CONTENT QUALITY OF EXPERIENCE IN REAL-TIME - Technologies are generally described for Quality of Experience (QoE) computation in a wireless content transmission environment. Portions of audio and/or video content transmitted to user devices may be selected by a service provider/content provider/user device and transmitted back from the user device for real-time QoE computation. Transmission quality may be adjusted based on the real-time QoE computations. Alternatively, selected portions of the content may be stored for subsequent computation and improvement. Selected portions of the data may be frames marked as such and reference frames may be selected based on the marked frames. | 2013-05-23 |
20130133012 | METHOD AND SYSTEM FOR PROVIDING A HOME CABLE NETWORK - Methods and systems for providing a home cable network may comprise, for example, in a premises-based wired network (network), receiving by a root node network controller (NC), signals that conform to first protocols, where the signals may be received from sources external to the premises. The received signals may be bridged to conform to a second communications protocol and communicated to one or more networked devices comprising a television set top box downstream from the root node device where, for example, only signals conforming to the second communications protocol may be communicated. The first protocol signals may comprise data over cable service interface specification (DOCSIS), cable television, satellite television, fiber-to-the-home, and/or digital subscriber (DSL) signals. The second communications protocol may, for example, comprise a multimedia over cable alliance (MoCA) standard. The bridged signals may be communicated to networked devices at a frequency that is independent of the first communications protocols. | 2013-05-23 |
20130133013 | DISPLAY DEVICE AND METHOD FOR PROVIDING CONTENT USING THE SAME - A display device and a method for providing content using the display device are disclosed. A controller receives a search term and searches for at least one content including a video frame associated with the received search term. A display displays a list of the searched content. | 2013-05-23 |
20130133014 | METHOD FOR TRANSMITTING AND RECEIVING A BROADCAST SIGNAL AND A BROADCAST RECEIVER USING THE METHOD - The present invention relates to a method and apparatus for transmitting and receiving a broadcast signal. The method for receiving a broadcast signal comprises: generating a broadcast stream including at least one program; generating first program table information that represents the broadcast stream; receiving non-real time (NRT) service schedule information; generating second program table information that represents the NRT service, in accordance with the received NRT service schedule information; configuring a stream including the broadcast stream, the 1st program table information and the second program table information; and transmitting the stream. | 2013-05-23 |
20130133015 | DATA RETRIEVAL IN A TWO-WAY NETWORK - A system receives a first request for data associated with a data stream received over a first network from a remote source and then determines when the requested data will be available based on analyzing the data stream. The system communicates a second request for the requested data over a second network to the remote source when the requested data will not be available from the data stream within a threshold time and receives the requested data from the remote source over at least one from the list including the first network and the second network. | 2013-05-23 |
20130133016 | PROVIDING A REGIONAL CHANNEL IN A DIGITAL BROADCAST ENVIRONMENT - A method and system of broadcasting a regional television channel to a user. A digital subscriber line access multiplex (DSLAM) receives a broadcast of multicast channels intended for delivery to the user. The multicast channels include national channels and a regional channel. The DSLAM broadcasts the multicast channels to the user and receives a regional channel control signal specifying a broadcast during a specified period of time of the regional channel instead of a national channel previously scheduled to be broadcast to the user during the specified period of time. The DSLAM switches the multicast channels broadcasted to the user during the specified period of time from the national channel to the regional channel such that the regional channel is in a specific channel slot of the national channel during the specified period of time during broadcasting the multicast channels to the user. | 2013-05-23 |
20130133017 | CONTENT DOWNLOADING METHOD AND APPARATUS USED BY MOBILE DEVICE - A content downloading method and apparatus of a mobile device employing an Internet protocol television (IPTV) are provided. The content downloading method and apparatus allow an IPTV to provide a mobile device with content information received from a service provider, allow a user to input content desired to be downloaded to the mobile device, and allow a user to download the content to the mobile device from the service provider via the IPTV, thereby quickly and easily downloading desired content to the mobile device without a complicated process of browsing and copying the content. | 2013-05-23 |
20130133018 | SYSTEM AND METHOD FOR DATA TRANSMISSION IN DLNA NETWORK ENVIRONMENT - A system and method for data transmission in a DLNA network environment are disclosed. The data transmission system includes a content creation unit creating at least one content, a content correlation check unit checking a created content to classify the created content by category and a conversion content creation unit extracting header information and body information of the classified content and converting the extracted information into preset type information. | 2013-05-23 |
20130133019 | BROADBAND REFLECTIVE PHASE CANCELLING NETWORK INTERFACE DEVICE - A network interface device including a signal splitter which conducts CATV signals through an active branch circuit, the active branch circuit including an active signal conditioner which modifies characteristics of active branch signals conducted through the active branch circuit, a sensor connected to sense normal, inoperative and abnormally operative conditions, the sensor removing a control signal indicative of inoperative and abnormal operating conditions, a selectable switch connected to the active branch circuit, the selectable switch communicating the CATV signals between the CATV network and the subscriber devices when in an activated position, and the selectable switch passing the signals to a signal reduction path when in a deactivated position, the selectable switch assuming the deactivated position in response to the de-assertion of the control signal, and a phase cancellation circuit connected to the signal reduction path. | 2013-05-23 |
20130133020 | Protocol for Control of Network or Bus Attached Cable TV Set-Top Box Front-End Functionality - A processor for a cable television set-top box has an interface for coupling the processor to a second processor. The processor also has a port that is coupleable to control a tuner, a demodulator and a DOCSIS module with or without DSG support. The tuner has an output coupled to the demodulator input, and the demodulator has an output to the DOCSIS module input. The demodulator's output is also coupled to a conditional access module controlled by the second processor. The processor issues commands via the port to control at least one of the tuner and the demodulator based on instructions received via the interface from the second processor. | 2013-05-23 |
20130133021 | Audiovisual (AV) Device and Control Method Thereof - According to one embodiment, video image and audio signals are transmitted to a plurality of electronic devices each having at least one of a video image display function and an audio reproducing function. Information indicating the fact that at least one of a video image and audio has been set in a mute state is acquired from each of the electronic devices. Based on the information, a processing operation is applied to the video image and audio signals supplied to each of the electronic devices. | 2013-05-23 |
20130133022 | APPARATUS AND METHOD FOR PROVIDING PREFERRED MEDIA PROGRAMMING - A system that incorporates teachings of the present disclosure may include, for example, identifying a first user initiating control of a media processor device, determining a startup media program according to one or more startup media preferences associated with the identified first user and one or more characteristics corresponding to the first user initiating control, and transmitting to a display device the startup media program derived from a media stream. Other embodiments are disclosed. | 2013-05-23 |
20130133023 | DYNAMICALLY MAPPING NETWORK TRUST RELATIONSHIPS - In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network; transmitting the access request to an authentication server; after sending a response that the access request was granted, updating a trust topology map by including in the trust topology map information that has been obtained from the response and that indicates a secure link between the authenticator device and the supplicant device, and causing displaying the updated trust topology map as a logical map depicting one or more network devices and roles assigned to the one or more network devices; wherein the method is performed by one or more computing device. | 2013-05-23 |
20130133024 | Auto-Approval of Recovery Actions Based on an Extensible Set of Conditions and Policies - Recovery action approval may be provided. A request to perform an action may be received from a user. If the user is not always authorized to request the action, then the action may be performed if a policy rule permits the user to request the action. | 2013-05-23 |
20130133025 | Security Deployment System - To address security that can arise in information systems, the present invention uses novel methods and/or systems to enhance security in information systems, using a new way to deploy selected security policies. Instead of trying to modify a whole binary file all at once to add in code to implement additional security policies, the current invention modifies the code in memory in a piecemeal, as-needed fashion. | 2013-05-23 |
20130133026 | SYSTEM, METHOD, AND APPARATUS FOR DATA, DATA STRUCTURE, OR ENCRYPTION COGNITION INCORPORATING AUTONOMOUS SECURITY PROTECTION - Aspects of the inventive subject matter relate in general to systems, methods, and apparatus for data cognition that incorporates autonomous security protection and embedded intelligence. More particularly, the inventive subject matter relates to systems, methods, and apparatus utilizing cognitive data, cognitive encryption key(s), and cognitive data structures or protocols that can perform analyses and assessments, self-manage and/or self-organize, secure its environment, evaluate behavior, detect security problems, adapt, work in conjunction with network communication and protocols, alert the data creator of an urgent situation (Situation Awareness), and provide traceability, electronic forensics, and possess self-knowledge so it can be discovered, searched, and support data management, dynamic endpoint security, and be influenced by user behavior. | 2013-05-23 |
20130133027 | COMBINING NETWORK ENDPOINT POLICY RESULTS - An endpoint integrity system controls access to resources of a protected network for endpoint devices attempting to access the protected network. The system may include a number of evaluation modules that communicate with an endpoint device. The evaluation modules generate policy results for the endpoint device, in which each of the policy results assume one of three or more states, called a multi-state policy result. The multi-state policy results are combined to produce a combined Boolean policy result. | 2013-05-23 |
20130133028 | AUTOMATED DEVICE PROVISIONING AND ACTIVATION - A non-transitory computer-readable storage medium storing program code for causing one or more processors of a wireless device to execute a method comprising: assisting in obtaining a user input through a user interface of the wireless device; determining at least an aspect of a control policy based on the user input, the control policy associated with a first application on the wireless device, the at least an aspect of the control policy for at least assisting in controlling a first access to the first wireless network by the first application on the wireless device and enabling a first control of the first access to the first wireless network by the first application on the wireless device that differs from a second control of a second access to the first wireless network by a second application; and applying the control policy. | 2013-05-23 |
20130133029 | WIRELESS LAN COMMUNICATION TERMINAL AND COMMUNICATION CONTROL METHOD THEREOF IN WIRELESS LAN SYSTEM FOR THE SAME - A wireless LAN communication terminal and its communication control method are provided that make it possible to configure desired security between the terminal and an other-end terminal, without increasing power consumption of the terminals. The wireless LAN communication terminal ( | 2013-05-23 |
20130133030 | PLATFORM AUTHENTICATION STRATEGY MANAGEMENT METHOD AND DEVICE FOR TRUSTED CONNECTION ARCHITECTURE - Provided are a platform authentication strategy management method for trusted connection architecture (TCA), and the trusted network connection (TNC) client, TNC access point and evaluation strategy service provider for implementing the method in the TCA. In the embodiments of the present invention, the platform authentication strategy for the access requester can be configured in the TNC access point or the evaluation strategy service provider, and the platform authentication strategy for the access requester configured in the evaluation strategy service provider can be delivered to the TNC access point. Moreover, a component-type-level convergence platform evaluation strategy can be executed in the TNC access point or the evaluation strategy service provider, to ensure that the realization of the TCA platform authentication has good application extensibility. | 2013-05-23 |
20130133031 | Retention Based Intrinsic Fingerprint Identification Featuring A Fuzzy Algorithm and a Dynamic Key - A random intrinsic chip ID generation employs a retention fail signature. A 1 | 2013-05-23 |
20130133032 | System and Method for Capturing Network Traffic - In certain embodiments, a method includes receiving, by a capture device, traffic flows transmitted by a plurality of client devices, each of the traffic flows being associated with one of the plurality of client devices and comprising encrypted data. The method further includes receiving, by the capture device, flow information communicated from a proxy server communicatively coupled to the capture device, the flow information comprising an identification of a particular traffic flow and a session key associated with the particular traffic flow. The method further includes storing, by the capture device, encrypted data of the particular traffic flow identified by the flow information supplied by the proxy server; storing, by the capture device, the session key associated with the particular traffic flow; and discarding, by the capture device, any of the plurality of received traffic flows not identified in the flow information received from the proxy server. | 2013-05-23 |
20130133033 | Behavioral fingerprint controlled automatic task determination - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the behavioral fingerprint providing a current status of the network-accessible user; and controlling one or more devices automatically as a function of the determined behavioral fingerprint and a direction received from the network-accessible user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2013-05-23 |
20130133034 | SYSTEMS AND METHODS FOR CREATING A TRUST INDEX WITH RESPECT TO ONLINE IDENTITIES - A user verification engine that will verify trust worthiness (trust-level) of individuals and through that trust-level of content they produce online is disclosed herein. | 2013-05-23 |
20130133035 | SYSTEM AND METHOD FOR MUTUAL AUTHENTICATION - A control unit for controlling a card reader. The control unit includes an authentication management unit for transmitting/receiving information to/from a host and each of a first encryption magnetic head device and a second encryption magnetic head device to mutually authenticate each other. The authentication management unit includes (1) a commanding means for commanding one of the first encryption magnetic head device and the second encryption magnetic head device to create lower-level information for authentication, according to a request on authentication from the host, (2) a sharing means for transmitting the lower-level information for authentication received from the above-mentioned one device to the other device for the purpose of sharing it and (3) a transmission means for transmitting the lower-level information for authentication, having been shared in all of the first encryption magnetic head device and the second encryption magnetic head device, to the host. | 2013-05-23 |
20130133036 | REMOTE CONTROL OF DIALYSIS MACHINES - This disclosure relates to remote control of dialysis machines. In certain aspects, a method includes receiving a request for a network connection from a dialysis machine and establishing the network connection with the dialysis machine. The method also includes receiving, from a client device, a request to access the dialysis machine, authorizing the client device to access the dialysis machine, receiving, from the dialysis machine, information pertaining to an operation of the dialysis machine, and providing, to the client device, the received information. | 2013-05-23 |
20130133037 | INSERTING MEDIA CONTENT FROM MULTIPLE REPOSITORIES - Methods and systems for inserting media content from multiple media content repositories are disclosed herein. The method includes displaying indicia corresponding to a number of repositories within a user interface that is authorized to access all of the repositories, wherein the repositories may include a local repository and an online repository, or any combination thereof. The method also includes obtaining media content from any of the repositories via the user interface and inserting the media content into a location via the user interface. | 2013-05-23 |
20130133038 | AUTHENTICATION FOR SOCIAL NETWORKING MESSAGES - A tool for verifying that a message received by a social networking service was sent by a bona fide owner of a social networking account who purportedly sent the message. The tool receives a message and it locates in the message a string that was entered into a message text field of the message. The string is compared with a registered authentication string for the bona fide owner of the account. If the string in the message matches the registered authentication string, the string is removed from the message and the message is forwarded to the social networking service. If the string in the message does not match the registered authentication string, the message is blocked from being forwarded to the social networking service. | 2013-05-23 |
20130133039 | Method for statistical object identification - The present invention provides a mechanism to communicate an original object ( | 2013-05-23 |
20130133040 | SYSTEM AND METHOD FOR MANAGING AUTHORIZATION OF FUNCTIONS OF ELECTRONIC DEVICE - A system includes a base station, a number of electronic devices, and a server. The base station radiates wireless signal including a base station identifier for identifying the base station and an authorization code for setting authorization level for a function of the electronic device. The electronic device detects the wireless signal, determines the existence of a predetermined base station according to the base station identifier, analyzes the authorization code to determine the function and authorization represented by the authorization code, disables the determined function, receives user information in response to an authorization input, transmits the received user information to the server to retrieve the pre-set authorization level of the user of the electronic device, and enables the function in response to the authorization represented by the authorization code being equal or lower than the retrieved pre-set authorization level. | 2013-05-23 |
20130133041 | Data Traffic Control in a Communication Network - A method and apparatus for controlling data traffic in a communications network. The server determines that network conditions are suitable for sending delay tolerant data traffic, and as a result of the determination, it transmits a grant message to at least one client device, the grant message informing the client device that it is permitted to send or receive delay tolerant data traffic. | 2013-05-23 |
20130133042 | BIOMETRIC AUTHENTICATION - An apparatus, method and program product locally stores biometric data in response to a user accessing a network ( | 2013-05-23 |
20130133043 | AUTHENTICATION IN VIRTUAL PRIVATE NETWORKS - Systems and methods are provided for controlling access to a network. An access request is received from a client application running on a computing device for accessing a remote network. The access request is received over a secure virtual private network connection (VPN) connection established by a user-mode VPN client running in non-privileged user space of the computing device. The access request includes contextual information for use in authenticating a user to access a remote network, wherein the contextual information includes contextual information about the client application requesting access to the remote network. An authentication process is performed using the contextual information to authenticate the user, and a secure VPN connection is established between the client application and the remote network, if the user is authenticated. | 2013-05-23 |
20130133044 | SELF-PROPELLED HARVESTING VEHICLE INCLUDING A THERMOCHEMICAL REACTOR FOR CARBONIZING HARVESTED CROP MATERIAL - A system and method are provided for employing a hand-held wireless device to assess a vulnerability of a wirelessly-accessible target network to intrusion and/or cyber-attack. The system and method are directed at providing discrete, covert and fully-automated wireless access to the target network via one or more wireless access points and to assessing characteristic of the one or more wireless access points and the target network in support of a vulnerability assessment. The hand-held wireless device is configured to collect appropriate data regarding the wirelessly-accessible network, including network and portal scans, and higher-level programmed data collection. The hand-held wireless device is further configured to analyze the collected data and to produce at least a first level vulnerability assessment of the target network without interaction by the user. | 2013-05-23 |
20130133045 | Method for directing requests to trusted resources - The present invention enables an enterprise to move from an implicitly trusted resource pool to an explicitly authenticated resource pool. Trust information is generally conveyed whenever a new resource is added to the pool and trust information is revoked when a resource is removed from the pool or is unable to provide its advertised resources. The dynamic, event driven conveyance of trust information is particularly important in highly virtualized environments where virtual resources are dynamically scaled up and down in response to resource demand. | 2013-05-23 |
20130133046 | SEARCH SERVICE ADMINISTRATION WEB SERVICE PROTOCOL - The embodiments described herein generally relate to a method and system for enabling a client to configure and control the crawling function available through a crawl configuration Web service. A client is able to configure and control the crawling function by defining the URL space of the crawl. Such space may be defined by configuring the starting point(s) and other properties of the crawl. The client further configures the crawling function by creating and configuring a content source and/or a crawl rule. Further, a client defines authentication information applicable to the crawl to enable the discovery and retrieval of electronic documents requiring authentication and/or authorization information for access thereof. A protocol governs the format, structure and syntax (using a Web Services Description Language schema) of messages for communicating to and from the Web crawler through an application programming interface on a server hosting the crawler application. | 2013-05-23 |
20130133047 | INTERWORKJNG BETWEEN FIRSTAND SECOND AUTHENTICATION DOMAINS - To interwork between a first authentication domain and a second authentication domain, a bridge module performs a first authentication procedure in the first authentication domain for a mobile station, wherein the first authentication domain is part of a wireless access network. Based on information collected in the first authentication procedure, the bridge module performs a second authentication procedure is performed, on behalf of the mobile station, in the second authentication domain. | 2013-05-23 |
20130133048 | IDENTITY ASSESSMENT METHOD AND SYSTEM - A method, system and software for assessing an entity ( | 2013-05-23 |
20130133049 | METHODS AND SYSTEMS FOR DETERMINING BIOMETRIC DATA FOR USE IN AUTHENTICATION TRANSACTIONS - A method for determining biometric data for use in conducting authentication transactions is provided that includes capturing biometric data from a user during an authentication transaction and capturing conditions of the authentication transaction with a device. The captured biometric data corresponds to desired biometric data. The method also includes transmitting the captured biometric data and conditions to an authentication system that stores biometric data and conditions therein. Moreover, the method includes determining that stored biometric data corresponding to the desired biometric data, associated with conditions that best match the captured conditions, is to be used for authenticating the user. | 2013-05-23 |
20130133050 | DEVICE FOR SHARING ANONYMIZED INFORMATION, AND METHOD FOR SHARING ANONYMIZED INFORMATION | 2013-05-23 |
20130133051 | AUTHENTICATED HOME DIRECTORY - Methods and systems for home directory management are described. In one embodiment, a computing system receives a user login request, and in response, bind mounts a temporary directory on a local file system of the computing system. The temporary directory does not require authentication. The computing system prompts the user for user credentials and authenticate the user using the user credentials. In response to a successful authentication, the computing system mounts a non-native directory in the temporary directory. | 2013-05-23 |
20130133052 | Behavioral fingerprint device identification - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network-accessible user; and identifying a current device of the one or more devices as being currently used by the network-accessible user as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2013-05-23 |
20130133053 | METHODS FOR ENHANCING PASSWORD AUTHENTICATION AND DEVICES THEREOF - This technology includes identifying verification password characters and a location of each of the verification password characters in one of a plurality of rows and one of a plurality of columns of a password matrix in response to received login identifier characters and received password characters from a client computing device. A determination is made whether each of the received password characters and the location of each of the received password characters in the password matrix matches each of the identified verification password characters and the location of each of the identified verification password characters in the password matrix. Access to the client computing device is granted when each of the received password characters and the location of each of the received password characters in the password matrix is determined to match each of the identified verification password characters and the location of each of the identified verification password characters. | 2013-05-23 |
20130133054 | Relationship Based Trust Verification Schema - A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 2013-05-23 |
20130133055 | METHOD AND APPARATUS TO PROVIDE CONTINUOUS AUTHENTICATION BASED ON DYNAMIC PERSONAL INFORMATION - An authentication method, system and device are provided to continuously collect dynamic personal identification data (DPID) samples through a user device by using one or more sensors to continuously collect biometric and location data samples associated with the user and then securely transfer the DPID samples to a central authentication server where attributes of the DPID samples may be captured and incorporated as part of a challenge-response pair which requests an arbitrarily generated N-tuple of the DPID samples from a predetermined time interval from the user device that is unique to the user and dynamic based on the sensed data and the time-interval of collection. | 2013-05-23 |
20130133056 | Single login Identifier Used Across Multiple Shopping Sites - Various methods and systems for facilitating online shopping at multiple retailer websites using a single login identifier are provided. The techniques disclosed herein allow prospective consumers to access various retailer websites on the Internet without the need to remember multiple logins and passwords or log into such retailer websites each time the consumers uses a new electronic device. The prospective consumers may log into a common website, such as a social networking website using a single user identifier and password. An example method for facilitating online shopping at multiple retailer websites using a single login identifier comprises receipt of the login information that corresponds to one or more login websites from a user device. The method may further include retrieving an internal user login identifier based on the received login information. | 2013-05-23 |
20130133057 | SYSTEM FOR MANAGING VIRTUAL PRIVATE NETWORK AND METHOD THEREOF - Disclosed are a system for managing virtual private networks (VPNs) includes: terminals configured to transmit user data; a manager configured to transmit information for concealing networks and managing the VPNs; border gateways configured to decrypt the user data and perform a network address translation (NAT) procedure and a filtering procedure on the decrypted user data based on the information; and servers configured to receive the user data subjected to the NAT procedure and the filtering procedure, wherein the filtering procedure is a procedure discarding the user data to be transferred to the servers that are not allowed so as to allow the terminals to access only the allowed servers, the NAT procedure is a procedure changing an Internet protocol (IP) address used in a first network to an IP address used in a second network, and the first network and the second network are different networks. | 2013-05-23 |
20130133058 | SECURITY BRIDGING - A network media gateway is used to bridge trust between a Service Provider network and subscriber devices. The gateway is authenticated by the Service Provider by using knowledge of network topology. Subscriber devices are authenticated in response to subscriber input to the gateway via an interface. Trusted subscriber devices can be tightly coupled with the Service Provider network, thereby facilitating delivery of QoE. Mobile and remote subscriber devices may also be authenticated. The gateway may also facilitate establishment of VPNs for peer-to-peer communications, and dynamically adjustable traffic, policy and queue weightings based on usage patterns. | 2013-05-23 |
20130133059 | REVERSE PROXY DATABASE SYSTEM AND METHOD - A system and method for providing a comprehensive security solution for databases through a reverse proxy, optionally featuring translating database queries across a plurality of different database platforms. | 2013-05-23 |
20130133060 | COMMUNICATION SYSTEM, CONTROL DEVICE AND CONTROL PROGRAM - In a communication system in which a terminal | 2013-05-23 |
20130133061 | METHOD AND SYSTEM FOR VPN ISOLATION USING NETWORK NAMESPACES - One embodiment of the present invention provide a system for providing exclusive access to a virtual private network (VPN) connection to an authorized application. During operation, the system creates a unique network namespace that is different from a default network namespace of a host system. The system then places a pseudo network interface associated with the VPN connection into the unique network namespace. Furthermore, the system places at least one socket for an authorized application into the unique network namespace. The system also precludes unauthorized applications on the host from accessing the unique network namespace, thereby facilitating exclusive access to the VPN connection by the authorized application. | 2013-05-23 |
20130133062 | System and Method to Capture and Manage Input Values for Automatic Form Fill - A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File containing sets of records associated with the user, his or her accounts or web sites, and registered values associated with form tags (e.g. username, password, address, email, telephone, etc.). When the user encounters another form, the MCF is automatically searched for matching values and form tags, primarily from the same account or web site, or alternatively from other accounts or sites. A flowing pop-up menu is displayed nearby the form fields from which the user can select values to automatically complete the form. Automatic account information updating, value expiration management, mapping of favorite values, and sharing of values are optional, enhanced functions of the invention. | 2013-05-23 |
20130133063 | TUNNELING-BASED METHOD OF BYPASSING INTERNET ACCESS DENIAL - The tunneling-based method of bypassing Internet access denial allows for the re-routing of communication between a local system and a destination system when the local system's Internet Protocol (IP) address has been blocked by a malicious higher-tier Internet service provider (ISP). If it is determined that the local system is blocked from communicating with the destination system, then it is determined if a malicious higher-tier ISP is responsible for the blockage of service. If the local system is blocked by the ISP, then the ISP is identified and communication is established between the local system and a neighboring system that is not blocked by the ISP. Finally, communications are then transmitted from the local system to the destination system, through the established tunnel, by first transmitting from the local system to the neighboring system, and then transmitting from the neighboring system through the ISP to the destination system. | 2013-05-23 |
20130133064 | REVERSE NFA GENERATION AND PROCESSING - In a processor of a security appliance, an input of a sequence of characters is walked through a finite automata graph generated for at least one given pattern. At a marked node of the finite automata graph, if a specific type of the at least one given pattern is matched at the marked node, the input sequence of characters is processed through a reverse non-deterministic finite automata (rNFA) graph generated for the specific type of the at least one given pattern by walking the input sequence of characters backwards through the rNFA beginning from an offset of the input sequence of characters associated with the marked node. Generating the rNFA for a given pattern includes inserting processing nodes for processing an input sequence of patterns to determine a match for the given pattern. In addition, the rNFA is generated from the given type of pattern. | 2013-05-23 |
20130133065 | SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTION - A method and system are provided for secure messaging on mobile computing devices. The method and system provide for an indication of a security trust level associated with a security method used with an electronic message. | 2013-05-23 |
20130133066 | TRANSACTION-BASED INTRUSION DETECTION - Systems and methods are provided for intrusion detection. The systems and methods may include receiving transaction information related to one or more current transactions between a client entity and a resource server, accessing a database storing a plurality of transaction groups, analyzing the received transaction information with respect to information related to at least one of the plurality of transaction groups, and based on said analyzing, determining a possibility of an occurrence of an intrusion act at the resource server. The transaction groups may be formed based on a plurality of past transactions between a plurality of client entities and the resource server. Identity information of a user associated with the one or more current transactions may also be received along with the transaction information. The user may be associated with at least one of the plurality of transaction groups. | 2013-05-23 |
20130133067 | PATTERN MATCHING ENGINE, TERMINAL APPARATUS USING THE SAME, AND METHOD THEREOF - Provided is a pattern matching engine. The pattern matching engine calculates an error detection sign of target data and compares the calculated error detection sign with an error detection sign of a malware pattern DB. When the error detection sign of the target data and the error detection sign of the malware pattern DB are identical to each other, the pattern matching engine compares the target data with the malware pattern. | 2013-05-23 |
20130133068 | METHOD, APPARATUS AND SYSTEM FOR PREVENTING DDOS ATTACKS IN CLOUD SYSTEM - A method, an apparatus and a system for preventing DDoS (Distributed Denial of Service) attacks in a cloud system. The method for preventing DDoS attacks in a cloud system includes: monitoring, by a protection node in a cloud system, data traffic input into virtual machines, where the cloud system includes the protection node and multiple virtual machines, and data streams communicated between the virtual machines pass through the protection node; extracting data streams to be input into virtual machines if it is detected that the data traffic input into the virtual machines is abnormal; sending the extracted data streams to a traffic cleaning apparatus for cleaning; receiving the data streams cleaned by the traffic cleaning apparatus; and inputting the cleaned data streams into the virtual machines. The technical solutions provided in the embodiments of the present disclosure can effectively prevent DDoS attacks between virtual machines in the cloud system. | 2013-05-23 |
20130133069 | SILENT-MODE SIGNATURE TESTING IN ANTI-MALWARE PROCESSING - Method and computer program product for signature testing used in anti-malware processing. Silent signatures, after being tested, are not updated into a white list and are sent directly to users instead. If the silent signature coincides with malware signature, a user is not informed. A checksum (e.g., hash value) of a suspected file is sent to a server, where statistics are kept and analyzed. Based on collected false positive statistics of the silent-signature, the silent-signature is either valid or invalid. Use of the silent signatures provides for effective signature testing and reduces response time to new malware-related threats. The silent signature method is used for turning off a signature upon first false positive occurrence. Use of silent signatures allows improving heuristic algorithms for detection of unknown malware. | 2013-05-23 |
20130133070 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device. | 2013-05-23 |
20130133071 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device. | 2013-05-23 |
20130133072 | NETWORK PROTECTION SYSTEM AND METHOD - Systems and methods for protecting at least one client from becoming part of at least one botnet. The system may comprise virtual machines deliberately infected with malicious content and operable to record botnet communications to and from criminal servers. The virtual machines are in communication with a processing unit configured to index data collected. Data related to the prevalence of cyber threats may be presented to users in response to queries. | 2013-05-23 |
20130133073 | SYSTEM AND METHOD FOR EVALUATING MARKETER RE-IDENTIFICATION RISK - Disclosures of databases for secondary purposes is increasing rapidly and any identification of personal data may from a dataset of database can be detrimental. A re-identification risk metric is determined for the scenario where an intruder wishes to re-identify as many records as possible in a disclosed database, known as a marketer risk. The dataset can be analyzed to determine equivalence classes for variables in the dataset and one or more equivalence class sizes. The re-identification risk metric associated with the dataset can be determined using a modified log-linear model by measuring a goodness of fit measure generalized for each of the one or more equivalence class sizes. | 2013-05-23 |
20130133074 | System And Method For Monitoring Network Traffic - Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined. After the classification, a predetermined response is executed based on the classification of the traffic. | 2013-05-23 |
20130133075 | FIXING SECURITY VULNERABILITY IN A SOURCE CODE - A computer implemented method for automatically fixing a security vulnerability in a source code is disclosed. The method includes obtaining identification of code that sends tainted data to corresponding sink code in the source code; and automatically fixing the vulnerability by automatically performing code modification which is selected from the group of code modifications consisting of: code motion and code duplication. Also disclosed are computer program product and data processing system. | 2013-05-23 |
20130133076 | WEB VULNERABILITY REPAIR APPARATUS, WEB SERVER, WEB VULNERABILITY REPAIR METHOD, AND PROGRAM - A Web vulnerability repair apparatus ( | 2013-05-23 |
20130133077 | SYSTEM AND METHOD FOR PREVENTING ILLEGAL COPY - Disclosed herein is an illegal copy prevention system and method. In short, an anti-copy prevention system of the present invention includes, a chipless RFID disk having a print layer distributed with metal fibers; an Optical Disk Drive (ODD) reading, recorded information when mounted with the chipless RFID disk; and a reader installed in the disk drive to sense whether metal fibers distributed at the printed layer exists and a unique ID contained in the metal fiber. | 2013-05-23 |
20130133078 | SYSTEM AND METHOD FOR PERMITTING USE OF CONTENT - Apparatus, method, and computer-readable media for permitting use of content. An exemplary method comprises transmitting, while in a requester mode of operation, a transfer request message to at least one external computing devices, wherein the transfer request message indicates content to be transferred; receiving the content in accordance with a transfer right that indicates that the content is permitted to be transferred from at least one of the external computing devices, wherein the transfer right is updated based at least in part on the transfer of the content, and wherein the content is associated with a usage right, the usage right corresponding to a utilization of the content; and processing, while in a server mode of operation, a utilization request message for utilizing the content in accordance with the usage right associated with the content. | 2013-05-23 |
20130133079 | Systems and Methods for Data Protection - A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the token is not verifiable for the copied software, thereby restricting execution of the copied software element. | 2013-05-23 |
20130133080 | LICENSE MANAGEMENT SYSTEM AND METHOD - When hardware connected to an image forming apparatus is detected, a check is performed as to whether the hardware was used with another image forming apparatus, and, if used, a license of an application that is operated by the hardware is automatically transferred so that the application can be used in the image forming apparatus to which the hardware is connected. | 2013-05-23 |
20130133081 | SYSTEM AND METHOD FOR AN ELECTRONIC READER THAT ALLOWS ACCESS TO ADDITIONAL CONTENT AND TOOLS - A method, system and non-transitory computer-readable medium are provided for controlling display of content on an electronic device with a touch screen display, which content may, in response to detection of a squeeze gesture, be reduced on the display screen to reveal additional content, tools and features associated with the one or more pages of the content. | 2013-05-23 |
20130133082 | DIGITAL RIGHTS MANAGEMENT LICENSE ARCHIVING - An arrangement is provided where a media server temporarily stores a DRM license that is associated with downloaded media content prior to copying the DRM license to a physical archival medium such as an optical disc. When the media server confirms that the DRM license is successfully copied to the physical archival medium, it destroys the temporarily stored DRM license. | 2013-05-23 |
20130133083 | MEDIATION PROCESSING METHOD, MEDIATION APPARATUS AND SYSTEM - A disclosed mediation apparatus collects data of transactions between a provider holding data of a user and a terminal of the user, for authorizing utilization of the data of the user by a consumer, and stores matching data to determine whether response data received from the provider at next time and subsequent times is substantially the same as the response data previously received and reply data used when sending answer data to the provider into an automatic response data storage unit. Thus, the mediation apparatus automatically respond on behalf of the terminal of the user at the next time and subsequent times. Therefore, it is possible to simplify user operations. | 2013-05-23 |
20130133084 | DIGITAL RIGHTS MANAGEMENT OF CONTENT WHEN CONTENT IS A FUTURE LIVE EVENT - A system for managing use of digital content within a trusted community. An access list defines the trusted community. License requests for use of content made from outside the trusted community are handled in accordance with a license request policy process. | 2013-05-23 |
20130133085 | INFORMATION PROCESSING DEVICE AND MULTIFUNCTION PERIPHERAL - A control API controls secret data to be stored in a secret data storage area which is accessible only to the control API. Moreover, the control API controls the file information storing part in the secret data storage area to store (i) storing location information of the stored secret data and (ii) administrative storage location information notified by the web application so that the storing location information and the administrative storage location information are associated with each other. This makes it possible to (i) prevent a leakage of confidential information and (ii) allow an authorized web application to easily use the confidential information. | 2013-05-23 |
20130133086 | METHOD FOR AUTHENTICATING A USER REQUESTING A TRANSACTION WITH A SERVICE PROVIDER - The present invention relates to a method for authenticating a user (Ui) requesting a transaction with a service provider (SP), which comprises: using authentication data (d | 2013-05-23 |
20130133087 | ENFORCING POLICIES IN WIRELESS COMMUNICATION USING EXCHANGED IDENTITIES - Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second device in proximity, ideally using existing radio capabilities such as Bluetooth (IEEE802.15.1-2002) or Wi-Fi (IEEE802.11). The detected identifier, being associated with the device, is also associated with an entity. Rather than directly exchanging application data flow between the two devices using the short range wireless capability, a second wireless capability allows for one or more of the devices to communicate with a central server via the internet, and perform the exchange of application data flow. By using a central server to draw on stored information and content associated with the entities the server can broker the exchange of information between the entities and the devices. | 2013-05-23 |
20130133088 | CONNECTION DEVICE AUTHENTICATION - A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data interconnect apparatus installed with a security chip. The interconnect apparatus may be authenticated prior to enabling a stacking feature. Authentication of a interconnect apparatus may be used to ensure the quality and performance of the interconnect apparatus and the data modules. | 2013-05-23 |
20130133089 | HIGH AFFINITY LEPTINS AND LEPTIN ANTAGONISTS - Leptin muteins, in particular leptin antagonists, with increased binding affinity to leptin receptor are provided. These compounds as well as pharmaceutical composition comprising them are useful for the treatment of any disorder in which a non-desirable or deleterious activity of endogenous leptin or an altered innate immune response is implicated. | 2013-05-23 |
20130133090 | TRANSGENIC MAMMALLS MODIFIED IN BRI PROTEIN EXPRESSION - Provided are non-human mammals comprising a knock-in nucleic acid sequence capable of causing an alteration of expression of wild-type Bri2 in the mammal or a knockout of wild-type Bri2. Also provided are the non-human mammals as a model for Alzheimer's disease. | 2013-05-23 |
20130133091 | Human Monoclonal Antibodies To Programmed Death 1 (PD-1) And Methods For Treating Cancer Using Anti-PD-1 Antibodies Alone Or In Combination With Other Immunotherapeutics - The present invention provides isolated monoclonal antibodies, particularly human monoclonal antibodies, that specifically bind to PD-1 with high affinity. Nucleic acid molecules encoding the antibodies of the invention, expression vectors, host cells and methods for expressing the antibodies of the invention are also provided. Immunoconjugates, bispecific molecules and pharmaceutical compositions comprising the antibodies of the invention are also provided. The invention also provides methods for detecting PD-1, as well as methods for treating various diseases, including cancer and infectious diseases, using anti-PD-1 antibodies. The present invention further provides methods for using a combination immunotherapy, such as the combination of anti-CTLA-4 and anti-PD-1 antibodies, to treat hyperproliferative disease, such as cancer. The invention also provides methods for altering adverse events related to treatment with such antibodies individually. | 2013-05-23 |
20130133092 | SEQUENCE-SPECIFIC DNA RECOMBINATION IN EUKARYOTIC CELLS - The present invention relates to a method of sequence specific recombination of DNA in eukaryotic cells utilizing att sequences from the bacteriophage lambda. A particular embodiment of the invention relates to a method further comprising performing the sequence specific recombination of DNA with an Int and a Xis factor. The present invention further relates to vectors containing each of these sequences and their use as medicaments. | 2013-05-23 |