21st week of 2011 patent applcation highlights part 65 |
Patent application number | Title | Published |
20110126210 | RESPONSIVE USER INTERFACE WITH BACKGROUND APPLICATION LOGIC - A user interface can be maintained in a responsive state on a user interface thread while synchronous application logic is running on a background thread. The application logic can access an object on the background thread, and the user interface can access the same object on the user interface thread. Additionally, a request for work to be done on an object can be received. If the request is to be dispatched to a background thread, then the work can be dispatched to the background thread without blocking the user interface thread. However, if the request is to be dispatched to the user interface thread, then the work can be dispatched to the user interface thread, and the background thread can be blocked. | 2011-05-26 |
20110126211 | AUTOMATIC PROCESSING OF AGRICULTURAL DATA - Methods for agricultural data management include automatically monitoring for events associated with receipt of agricultural data through use of a service executing on a computing device, notifying at least one component of a software system executing on the computing device of the receipt of the agricultural data, processing the agricultural data by the at least one component and storing the agricultural data in a data repository, and automatically distributing the agricultural data from the data repository in a predetermined format. | 2011-05-26 |
20110126212 | IMPLEMENTING A MIDDLEWARE COMPONENT USING FACTORY PATTERNS - In one aspect, a method to use a middleware component includes receiving a request from an application to interact with a platform using a service and using an abstract factory pattern corresponding to the service. The abstract factory pattern is associated with a first factory pattern stored in the middleware component. The method also includes determining if the first factory pattern is associated with the platform and invoking the service with the platform using the first factory pattern if the first factory pattern is associated with the platform. | 2011-05-26 |
20110126213 | ARCHITECTURE, SYSTEM AND METHOD FOR PROVIDING REAL TIME WIDGETS IN A WEB APPLICATION FRAMEWORK - A method and apparatus for providing real-time widgets in a web application framework is described. In one embodiment, the method includes storing a topic in a framework widget. The method may also include receiving a data message, at a user computer system, from a message broker of a real-time web applications framework corresponding to the topic. In one embodiment, the method may also include executing one or more callback functions, specified by the framework widget, to process the data message in response to receiving the data message. | 2011-05-26 |
20110126214 | Data Management for Mobile Data System - A data architecture provides mobile clients with the ability to gain access to business enterprise data sources through configurable Views that interface with the data sources through Data Objects that are defined by Commands, which in turn communicate with the data sources through Connectors (also referred to as Adapters). Each type of View will interface to the data sources with a different functionality so that communications links and other system resources can be used more efficiently. The View types can include Direct Views, Derived Views, Delegated Views, and Definition Views. | 2011-05-26 |
20110126215 | EVENT-DRIVEN CPU ARCHITECTURE - Various exemplary embodiments relate to an event-driven microprocessor and a related method. A microprocessor may halt processing instructions when it executes a halting command. Thereafter, an EPU clock may stop its processing cycle and therefore halt microprocessor execution until it receives a start signal by a pattern detector. The pattern detector may use a plurality of bit slices to monitor a plurality of external inputs for the occurrence of events specified by the user. Some embodiments may also allow the user to check functioning by skipping upcoming instructions if a monitored event did not occur. By halting the EPU clock and the execution flow of the microprocessor, the event-driven microprocessor minimizes waste associated with executing a main control loop while waiting for a monitored event to occur. This may save processing capacity, memory, and power associated with continually running the main control loop. | 2011-05-26 |
20110126216 | SYSTEM AND METHOD FOR SWITCHING BETWEEN ENVIRONMENTS IN A MULTI-ENVIRONMENT OPERATING SYSTEM - Various embodiments of the present invention provide a mobile computing device that operates multiple, co-existing and independent operating system environments on a common kernel. A booting process for initiating a multiple operating system environment is also provided. Additionally, various embodiments of the present invention include processes for managing a switch between one operating system environment to a second operating system environment. | 2011-05-26 |
20110126217 | SYSTEM, A METHOD, AND A DATA-STRUCTURE FOR PROCESSING SYSTEM CALLS IN A COMPUTERIZED SYSTEM THAT IMPLEMENTS A KERNEL - A computer implementing a kernel, the computer including: a processor that is configured to run processes in kernel mode and to run other processes not in kernel mode, wherein the processor is configured to run in the kernel mode the following processes: (a) determining selection parameters that relates to a system call requesting an operation by a hardware device, by processing information of the system call; (b) deterministically selecting a single data-structure element (DSE) of a data-structure in response to a type of the system call, to at least one other determined selection parameter, and to a status of an activity flag included in the DSE that indicates an availability of the DSE for selection; wherein the selecting includes selecting a DSE that includes an activity flag that indicates that the DSE is available for selection; wherein at least one DSE of the data-structure is an inactive DSE that includes an activity flag indicating that the inactive DSE is not available for selection; (c) modifying an activity flag of at least one DSE of the data-structure, in response to activeness instructions stored in the DSE selected; (d) assigning a priority to the system call in response to a content of the DSE selected; and (e) selectively enabling fulfillment of the operation by the hardware device, in response to the priority assigned to the system call. | 2011-05-26 |
20110126218 | CONTROL APPARATUS, CONTROL METHOD AND COMPUTER PROGRAM - Functions of platform layer based on platform program are separated into a resource manager layer that performs logical controls for hardware resources and a resource controller layer that performs physical controls for the hardware resources. The resource manager layer requires identifying a desired data based on an application program, but does not require knowing the actual address of the desired data in a storing unit. The resource controller layer knows the actual address, and physically reads out and replies the data instructed by the resource controller layer. | 2011-05-26 |
20110126219 | Middleware for Extracting Aggregation Statistics to Enable Light-Weight Management Planners - Management of a planner through use of a middleware layer. A computer system is configured with the middleware layer in communication with both a planner and a data repository. One or more modules are provided in the middleware layer to support the functionality of the planner. Application program interface calls are employed to call the modules, thereby mitigating duplication of the functionality in separate planners. | 2011-05-26 |
20110126220 | Method and Apparatus for Integrating Distributed Shared Services System - Method and apparatus for integrating distributed shared services system which integrates web based applications with each other and with other centralized application to provide a single sign-on approach for authentication and authorization services for distributed web sites requiring no access time back to the authentication/authorization server is provided. | 2011-05-26 |
20110126221 | Flexible Printed Circuit and Electric Apparatus and Optical Disc Drive Having Flexible Printed Circuit - A electronic device including a mechanism for changing the relative positions of two circuit boards such as in an optical disc drive, in which a flexible printed circuit electrically connecting between the two circuit board changes shape to suppress fluctuations in the transmission characteristics occurring due to contact with metal such as a case, and provides stable signal transmission. A flexible printed circuit is comprised of at least one or more differential lines, a fixed unit affixed to a case at least at one location, a movable unit that changes shape according to the relative positions of two case. The lines adjacent to the differential line are a grounded surface, and the flexible printed circuit is formed to narrow the distance between the movable unit lines more than the distance between the fixed unit lines. | 2011-05-26 |
20110126222 | PORTABLE MULTI-PURPOSE AUDIENCE MEASUREMENT SYSTEMS, APPARATUS AND METHODS - Portable multi-purpose audience measurement systems, apparatus and methods are disclosed. An example method disclosed herein comprises collecting demographic data of a user, including a phone number for a mobile device, via a website associated with an information gathering entity, sending a message to the mobile device, the sent message, when responded to, resulting in downloading of a metering software module to the mobile device, receiving, from the mobile device and at a system associated with the information gathering entity, information indicative of events associated with use of the mobile device, and associating the received information with the demographic data. | 2011-05-26 |
20110126223 | Method and Apparatus for Distributed Display Monitoring - A method for monitoring a monitored display monitors data to be output from a monitored display. The monitored data is analyzed to generate one or more content identifiers. The content identifiers are compared to a set of rules to determine if the monitored data should be blocked from being output or if an alert should be transmitted to a supervisor device. One or more supervisor devices may be used to respond to alerts and may also be used to control the output of the monitored display. | 2011-05-26 |
20110126224 | DEDICATED BUTTON OF REMOTE CONTROL FOR ADVERTISEMENT DELIVERY USING INTERACTIVE TELEVISION - Method and system is disclosed for delivering targeted advertisements to a user by employing an interactive television system. A dedicated button of a remote control is used to control the operation of rendering the advertisement to the user with the great simplicity. An icon for advertisement is displayed on the screen when a channel programming is being broadcasted. The advertisement is displayed in full screen after the first actuation of the button is received. The advertisement is removed from the screen after the second actuation of the button is received. The user can be identified by using of the dedicated button in combination of the channel selection buttons, which are switched into numeric buttons after a specific actuation of the dedicated button is received. A displayed window on the screen invites the user to key in the user's password represented by a series of numbers. | 2011-05-26 |
20110126225 | TV, TEXT/WEB FEED AND ADVERTISMENT AGGREGATION SYSTEM - A system for aggregating TV content, with text or web feed content and advertisements, including processors that receive EPG (electronic program guide) information from an EPG server, a DGM (digital rights management) server in communication with the processors for communicating encryption keys and entitlement information, and a video server that provides VOD or NVOD (video on demand or near video on demand) information to the processors, the processors, the EPG server, the DGM server and the video server together forming a media aggregation server and playout schedule engine, which outputs an aggregated format for viewing on a screen. | 2011-05-26 |
20110126226 | System and method for distributing media content from multiple sources - A subscriber unit is provided and configured to receive an input media content feed of a media content program selection from a first source upon a determination that predetermined conditions exist. The subscriber unit may further be configured to receive an input media content feed of a media content program selection from a second source upon determining that certain predetermined conditions do not exist. | 2011-05-26 |
20110126227 | METHODS AND SYSTEMS FOR FORCED ADVERTISING - Methods and systems for forced advertising are provided. These methods and systems determine when a forced advertisement is to be presented, determine what forced advertisement is to be presented, and control how the forced advertisement is to be presented. A forced advertisement may be received prior to the time at which the forced advertisement is to be presented or when needed. The forced advertisement may be presented when certain broadcast advertisements are being broadcast, at certain times of the day, or at certain times within a program. The forced advertisements may be selected based upon content of a replaced broadcast advertisement, content of a nearby program, or independently of any broadcast-related factors. Finally, forced advertisements may be presented so that a television viewer cannot escape viewing the advertisement by changing channels or turning off the television. | 2011-05-26 |
20110126228 | MEDIA DISPLAYING SYSTEM AND METHOD - A media displaying system includes a displaying unit, a time-of-flight (TOF) camera, and a processing unit. The TOF camera captures an image of an audience, and obtains distance data between a number of points of the audience and the TOF camera. The processing unit builds a three dimension (3D) model of the audience according to the image of the audience and the distance data between the points of the audience and the TOF camera, and obtains demographic information of the audience according to the 3D model of the audience. The processing unit further selects media content according to the demographic information about the audience. The displaying unit displays the selected media content by a displaying unit. | 2011-05-26 |
20110126229 | Managing Under-Filled Spot Blocks - Changes to spot blocks to be broadcast via terrestrial stations can cause paid spots to be removed from corresponding spot blocks on a streaming station. If the streaming station has other spot blocks that are under-filled, the bumped spots can be automatically placed in under-filled spot blocks, allowing the bumped to be placed in an under-filled spot block faster than if human intervention was required. A media traffic system can keep track of the bumped spots, and in response to a request by a media automation system, provide a list of potential spots available for inclusion in the under-filled spot blocks. The automation system selects desired spots for placement in under-filled spot blocks, and notifies the traffic system about which potential spots have been placed. The traffic system removes the spots from its list of available spots to prevent selected spots from being included in future responses. | 2011-05-26 |
20110126230 | CONTENT INGESTION FOR A CONTENT SYSTEM - A computer-implemented system and method for enabling content information ingestion and processing in a content browsing and recommendation system are disclosed. The system and method in an example embodiment includes: gathering available content information related to particular items of content from a plurality of content sources via a data network; normalizing the gathered content information by using an ingestion engine; processing the content information, using a data processor, to associate particular items of content information with content catalogs; and storing the processed content information into a database with information identifying associated content catalogs. | 2011-05-26 |
20110126231 | MOBILE DEVICE, AV DEVICE AND METHOD OF CONTROLLING THE SAME - Disclosed is a mobile device. The mobile device includes: a display; a user input receiving unit which receives input by a user; a storage unit; a communication unit which communicates with an external AV device via a network; and a controller which receives UI information of the AV device from the AV device through the communication unit to display the UI information on the display, controls the storage unit to store a user setup value of the AV device according to the input of the user, and controls the communication unit to transmit the user setup value to the AV device when the communication unit starts communicating with the AV device. | 2011-05-26 |
20110126232 | METHOD OF PROCESSING EPG METADATA IN NETWORK DEVICE AND NETWORK DEVICE FOR CONTROLLING THE SAME - A method of processing EPG metadata in a network device includes performing a services discovery procedure utilizing multiple service discovery metadata components supplied by a service provider, and requesting specific SGDDs (service guide delivery descriptors) or specific fragments. | 2011-05-26 |
20110126233 | METHOD AND APPARATUS FOR PRESENTING MEDIA CONTENT - A method that incorporates teachings of the present disclosure may include, for example, receiving a selection from a media device corresponding to a first media content, generating a play list at a server where the play list includes second media content that is associated with the first media content by at least one of genre, artist and being published in temporal proximity, and providing play list content comprising at least a portion of the first and second media content to the media device, where at least one of the generation of the play list and the providing of the play list content is based on metadata pointers associated with the first and second media content. Other embodiments are disclosed. | 2011-05-26 |
20110126234 | Media content distribution system and method - A system is provided that includes a graphical user interface (GUI). The GUI includes a storefront that is associated with predetermined media content. The storefront is also linked to a predetermined source for the media content. | 2011-05-26 |
20110126235 | Program guide optimization system - A method and system of optimizing strings comprised in program guide data for transmission is described. The method includes sharing, in the program guide data, a plurality of strings, each string among the plurality of strings including a shared sorting key, implementing an order access of a sorted sharing index, wherein the program guide data and the shared sorting key are comprised in the same data storage structure. Related methods and apparatus are also described. | 2011-05-26 |
20110126236 | METHOD AND APPARATUS FOR PRESENTING MEDIA SEGMENTS - An approach is provided for presenting media segments. A media segment manager receives an input, from a device, for specifying a plurality of segments. Each of the plurality of segments corresponds to one or more media streams and is associated with a respective duration of time. The media segment manager then causes, at least in part, presentation of the plurality of segments in a predetermined order based on the input and the respective durations of time. | 2011-05-26 |
20110126237 | EDITING MENU FOR A NETWORK TELEVISION - A network TV includes a network interface, a user interface, and a controller. The network interface establishes a connection with at least one content provider server through a network. The user interface receives an input signal selecting an icon for display. The controller controls output of the selected icon for display along with an image corresponding to the selected icon. The selected icon corresponds to the content provider and is displayed with one or more other icons that correspond to additional content providers, and the image is based on information received through the network interface from the content provider. Further, a main menu on the display includes a background image and/or icons that display various types of information. The displayed background image and/or icons may be changed or customized. | 2011-05-26 |
20110126238 | Program information distribution apparatus, program information distribution method, program and program information distribution system - There is provided a program information distribution system including a character information receiving unit receiving desired character information as a predetermined transmitting destination from a program receiving apparatus having a character information transmitting unit transmitting the desired character information regarding a program desired to be received, a program information receiving unit receiving scheduled program information as a predetermined transmitting destination from a program distributing apparatus having a program information transmitting unit transmitting the scheduled program information regarding a program scheduled to be distributed in a certain time slot, a matching processing unit determining whether the scheduled program information includes the desired character information by comparison between the desired character information and the scheduled program information, and a program information transferring unit transferring the scheduled program information including the desired character information to the program receiving apparatus if determined that the scheduled program information includes the desired character information. | 2011-05-26 |
20110126239 | Method of processing EPG metadata in network device and network device for controlling the same - A method of processing EPG (Electronic Program Guide) metadata in a network device includes performing a service discovery procedure utilizing multiple service discovery metadata components supplied by a service provider, receiving EPG metadata corresponding to a super group information element comprising both of a member element giving a group ID of another super group information element that has a higher level than a level of the super group information element and a level attribute giving a level of super group represented by the super group information element, wherein the member element is used to reference the other super group information element at a higher level, and processing the EPG metadata. | 2011-05-26 |
20110126240 | APPLICATIONS REGISTRY FOR A TELEVISION ENVIRONMENT - An applications registry provides a repository of television-based applications. The registry stores information about television-based applications registered, and allows users to view information regarding the registered television-based applications through one or more portals. The information includes a general description of the television-based applications, a description of an entitlement model for the television-based applications, and downloading information to permit a user to download the application to the home media system. The user accesses the registry, to view information about the television-based application, through a home media system. The home media system, which includes a television, accesses the portal over a network, such as the Internet. | 2011-05-26 |
20110126241 | System and Method for Layered Delivery of Media Content Quality - A method in a server for providing various Internet Protocol television signal qualities involves an IPTV signal having a first signal quality that is transmitted over a first network connection to a first device. A request to receive the IPTV signal over a second network connection at a second device with the IPTV signal having a second signal quality is received. A determination is made that the second network connection has sufficient bandwidth to transmit the IPTV signal at the second signal quality, and that the second device is capable of receiving IPTV signal. The transmission of the IPTV signal over the first network connection to the first device is ended. An endpoint for the transmission of the IPTV signal to the first device is determined. The IPTV signal is transmitted over the second network connection to the second device at the second signal quality beginning at the determined endpoint. | 2011-05-26 |
20110126242 | Inflight entertainment system with screen configurable video display unit roles - An inflight entertainment (IFE) system provides screen configurable video display unit (VDU) roles. Screen configurable VDU roles allow a role for each VDU in the system to be specified in the field through user inputs on the VDU and advertised to the head end system to create awareness of the specified role. Screen configurable VDU roles can reduce the number of discrete VDU line replaceable unit (LRU) types deployed on a single aircraft and across a fleet of aircraft, reducing hardware and software upgrade and sparing costs, while adding substantial flexibility to the system by removing cabin positioning restrictions on certain VDU types and facilitating system reconfiguration. | 2011-05-26 |
20110126243 | Device, method and system for transmitting data network based data over a wireless video link - Disclosed is a method, circuit and system for transmitting data network based data (e.g. TCP/IP, UDP/IP) over a wireless video link. There is provided circuitry adapted to receive network data traffic and to insert the received data traffic into a transmission signal (e.g. downlink video and/or control signals, and/or uplink control signals) generated by a wireless video signal transceiver. | 2011-05-26 |
20110126244 | POLICY MANAGEMENT ARBITRATION BY SERVICE GROUP - A request is received from one of a plurality of terminals in a service group of a video content network. The request is to establish a session with a head end of the network. The video content network provides at least first and second different categories of sessions to the service group. The request is evaluated against a policy. The policy specifies a maximum utilization threshold for sessions of the first category and a maximum utilization threshold for sessions of the second category. The request is granted if it is in conformance with the policy. The method may be carried out, for example, with a session resource manager apparatus. | 2011-05-26 |
20110126245 | Analyzing Internet Protocol Television Data to Support Peer-Assisted Video-on-Demand Content Delivery - A video-on-demand (VOD) server in an Internet protocol television (IPTV) network with a network of set-top boxes includes IPTV operational data and an analysis module that selects a content item. The VOD server divides the content item into sequential chunks, divides the chunks into stripes, pre-populates set-top boxes in a peering network with at least one stripe from each chunk, receives a request for the content item, and directs each set-top box to sequentially stream its stripes. A method includes selecting a content item based upon IPTV operational data, dividing the content item into sequential chunks, dividing the chunks into stripes, pre-populating set-top boxes in a peering network with at least one stripe from each chunk, receiving a request for the content item, and directing each set-top box to sequentially stream its stripes. | 2011-05-26 |
20110126246 | Systems and Methods for Communicating and Enforcing Viewing and Recording Limits for Media-On-Demand - Systems and methods for communicating and enforcing viewing and recording limits for media-on-demand are provided. The system may provide a guidance application that allows users to select on-demand media offerings. The delivery of the on-demand media offerings may be managed based on the length of program, the bandwidth required, the available bandwidth, the time of delivery, pricing and other factors. The system may manage the delivery of on-demand offerings by assigning a number of different types of viewing rights to a user when an on-demand offering is selected. The system may warn a user of insufficient rights and enforce selected viewing rights. | 2011-05-26 |
20110126247 | MIDDLEWARE BANDWIDTH SHIFTING - Embodiments of the disclosed invention include an apparatus, method, and computer program product for distributing media content to a plurality of display devices. For instance, in one embodiment, a computer implemented method for distributing media content to a display device is disclosed. The method comprises configuring a middleware device to provide media content to the display device and to a set of display devices. In response to the middleware device receiving a request for media content from the display device, the method determines whether the there is sufficient bandwidth to provide a requested media content to the display device. In one embodiment, if the method determines that there is insufficient bandwidth to provide the requested media content to the display device, the method provides the requested media content to the display device based on a set of preconfigured user preferences. | 2011-05-26 |
20110126248 | MANAGED MULTIPLEXING OF VIDEO IN AN ADAPTIVE BIT RATE ENVIRONMENT - Methods and apparatus for delivering video programs are provided. A plurality of video programs are provided in a fragmented, adaptive bit rate format. A request for a respective video program from the plurality of video programs is received from each of a plurality of clients. The requested video programs are multiplexed for delivery to the clients in a multiplex over a shared, fixed-bit-rate transmission channel. The requests may be for the same or different video programs. The requests for the video programs may occur at the same or at different times. In the fragmented, adaptive bit rate format, the fragment delivered to the client may not be the same as the requested fragment and is dependent on multiple criteria, including the bitrate and quality of the requested and delivered fragments, the total available delivery bandwidth, and other fragment requests made on the channel. The resulting multiplex may be either a constant bit rate multiplex or a variable bit rate multiplex. | 2011-05-26 |
20110126249 | System and method for time shifting delivery of media content - A subscriber unit is provided to receive a streaming feed of the media selection from first source upon determining that a broadcast time of the program selection falls within a current broadcasting time slot. The subscriber unit is configured to receive a streaming feed of a media selection from a second source where it is determined that the media selection falls within a time slot that has already elapsed. | 2011-05-26 |
20110126250 | SYSTEM AND METHOD FOR ACCOUNT-BASED STORAGE AND PLAYBACK OF REMOTELY RECORDED VIDEO DATA - A user interacts with a data storage service which enables one or more feeds from video and or web cameras to be streamed to the data storage service. The data storage service then provides storage and/or playback services to the subscriber (e.g., for a monthly fee or a usage fee). Once the video streams have been established between at least one camera and the data storage facility, the user may access the recorded data from any one of several sources, such as a world wide web browser or a cellular phone). The interface may provide a matrix of displays such that the user can see multiple areas or multiple parts of the same area simultaneously. | 2011-05-26 |
20110126251 | SYSTEM AND METHOD FOR THE EXCHANGE AND STORAGE OF SET-TOP BOX DATA - A system and method for updating viewing status between a set-top box and one or more social networks. User preferences are set for communicating a viewing status between the set-top box and one or more social networks. A determination of media content viewed by a user is made by a user utilizing the set-top box. The viewing status of the user is posted in response to the user preferences and the determined media content. | 2011-05-26 |
20110126252 | METHOD AND APPARATUS FOR PRESENTING MEDIA PROGRAMS - A system that incorporates teachings of the present disclosure may include, for example, a computing device, including a controller to: transmit a client program having a graphical user interface (GUI) to a media device operating in an interactive television (iTV) network, wherein the client program presents a symbolic overlay that superimposes onto media content received by the media device and enables the media device to associate commentary with the media content received at the media device; and conduct searches for one of consumer products or consumer services associated with the media content based on the commentary regarding the media content. Other embodiments are disclosed. | 2011-05-26 |
20110126253 | APPARATUS AND METHOD FOR MANAGING A SOCIAL NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to collect one or more user-generated comments from each of a plurality of computing devices, detect a correlation in the one or more user-generated comments collected from the plurality of computing devices, and establish a social network between the plurality of computing devices according to the detected correlation. The one or more user-generated comments can be temporally associated with media content presented at the plurality of computing devices. Other embodiments are disclosed. | 2011-05-26 |
20110126254 | METHOD AND SYSTEM FOR VIDEO DISTRIBUTION AND MANAGEMENT - The disclosure provides a video management and distribution system. The system includes management center, end points, and client accounts. A management center having a backend server provides a video management and distribution interface for clients. The management center backend server stores end point and client data. Clients may upload videos, view videos, create campaigns for distribution on remote points, and view statistics. Further, clients may create campaigns based at least on location, duration of campaign, dates of campaign, number of video spots in campaign, product, cost, etc. Statistics generated by management center enables clients to quickly determine video distribution decisions. End points include a display, a network connection device, and a computer-readable medium encoded with management center end point software (MCES). End points may further include a camera enabling clients to view the end point location. In one embodiment, the present disclosure enables enhanced local, regional, or continental advertising. | 2011-05-26 |
20110126255 | System and method for remote-hosted video effects - A method for remote-hosted video effects includes rendering an application frame buffer in a hosting service that is streaming interactive video. Only a portion of the application frame buffer is subsequently displayed on a local device. | 2011-05-26 |
20110126256 | METHOD FOR LIVE BROADCASTING IN A DISTRIBUTED NETWORK AND APPARATUS FOR THE SAME - The present invention has provided a method for live broadcasting in distributed network and means for the same. Wherein the method mainly comprises steps of: tracker servers receive the status report information from the program source connected to the tracker server; generates the status information of the program source based on said status report information; sends status information of the program source to the information synchronization means. | 2011-05-26 |
20110126257 | SYSTEM AND METHOD FOR TUNING A SET-TOP BOX REMOTELY VIA A SOCIAL NETWORK - A system and method for controlling a set-top box through a social network. Access is granted to control the set-top box to one or more contacts of a user. The one or more contacts being associated with one or more social networks. Access to control the set-top box is granted to one or more contacts of one or more social networks. A request to change media content is received from one of the one or more contacts. The one or more contacts are authenticated to ensure they are authorized to tune the set-top box to the media content. The media content is tuned in for communication to a display in response to authenticating the request from the one of the one or more contacts. | 2011-05-26 |
20110126258 | SYSTEM AND METHOD FOR SOCIAL NETWORK CHAT VIA A SET-TOP BOX - A system and method for chatting between a set-top box and one or more social networks. One or more social networks is associated with a set-top box. User preferences are set for communications with one or more contacts included in the one or more social networks. A chat interface is displayed to a user on a display associated with the set-top box in response to the user preferences and activity trigger determined in response to activity detected by the set-top box. Communications occurs with the one or more contacts using the chat interface. | 2011-05-26 |
20110126259 | Gated Network Service - A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint. The method also includes providing a risk assessment associated with the privacy constraint violation. The risk assessment is at least partially based on terms and conditions associated with a particular device of the plurality of devices. | 2011-05-26 |
20110126260 | ACCESS AUTHORIZATION HAVING EMBEDDED POLICIES - A facility for receiving an embedded policy is provided. The facility checks an application program image for the presence of an embedded policy. If an embedded policy is detected, the facility extracts the policy from within the application program image. The facility may then apply the extracted policy to the application program image before the application program image is loaded and/or executed. Moreover, the facility may check the application program image's integrity prior to extracting the embedded policy. | 2011-05-26 |
20110126261 | METHODS AND SYSTEMS FOR IMPLEMENTING SERVICE LEVEL CONSOLIDATED USER INFORMATION MANAGEMENT - Embodiments of the invention provide methods and systems for implementing service level consolidated user information management. According to one embodiment, a method comprises intercepting, at a policy enforcer, a manipulation request of data. The method may further include analyzing the request to determine which data the manipulation request is associated with and, based on that analysis, selecting a policy from a plurality of policies. Furthermore, the method may execute the selected policy. The policy may be configured to direct the policy enforcer to allow the manipulation request to pass through to the associated destination data system to process the request, delegate processing of the manipulation request to at least one of a plurality of data systems, or process the manipulation request by the policy enforcer. | 2011-05-26 |
20110126262 | SPECIFYING A SET OF FORBIDDEN PASSWORDS - Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password and then comparing the at least one symbolically equivalent password with at least one specified forbidden password. The user password is disapproved if one of the symbolically equivalent passwords corresponds to the at least one forbidden password. | 2011-05-26 |
20110126263 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, PROGRAM FOR IMPLEMENTING THE METHOD, AND STORAGE MEDIUM STORING THE PROGRAM - An image processing apparatus which can be readily used by an authenticated user without laborsome setting even if the user uses the image processing apparatus for the first time through an authentication server. A user is authenticated with an authentication server connected to an image processing apparatus via a network. User unique setting information for the authenticated user is set, and the user unique setting information for each user is stored in user information storing areas. Initial setting information of initial setting of the image processing apparatus is stored in an initial setting information storing area. When the authenticated user uses the image processing apparatus for the first time, duplicate copy of the initial setting information stored in the initial setting information storing area is stored as the user unique setting information in the user information storing areas. | 2011-05-26 |
20110126264 | SYSTEM AND METHOD FOR PROVIDING A SECURE NETWORK ON ANOTHER SECURE NETWORK - The present invention provides a system and method for providing a closed or secure network” on another closed or secure network. The system enables linking at least one acquirer network operating a closed network to at least one operator by a central server. The acquirer network includes one or more terminals and optionally an acquirer server. The central server is linked to the acquirer network and to the operator. The central server is configurable to communicate with at least a subset of the one or more terminals, and also with the operator, and to establish one or more serve; communication links between the operator and the one or more terminals. The central server acts as a trusted intermediary between the acquirer network and the operator for enabling the operator to communicate with the one or more terminals via the closed acquirer network. | 2011-05-26 |
20110126265 | SECURITY FOR CODES RUNNING IN NON-TRUSTED DOMAINS IN A PROCESSOR CORE - A method and apparatus configure a trusted domain and a plurality of isolated domains in a processor core. Each isolated domain is assigned a unique domain identifier. One or more resources are associated with each isolated domain. The associations are stored as permissions to access physical addresses of resources. Code to be executed by a hardware device is assigned to one of the isolated domains. The domain identifier for the assigned isolated domain is written to the hardware device. When the hardware device executes the code, each instruction is logically tagged with the domain identifier written to the hardware device. An instruction includes request to access a physical address. The hardware device compares the domain identifier of the instruction with the permissions. If the permissions allow the domain identifier to access the physical address, then access to the resource at the physical address is allowed. Access is otherwise blocked. | 2011-05-26 |
20110126266 | Method and system for authenticating subaccount users - There is provided a method and system for authenticating users to an application. The method comprises receiving a master account identifier corresponding to a master account associated with the application. The method further comprises determining if at least one subaccount is assigned to the master account. The method comprises requesting a master password if at least one subaccount is not assigned to the master account. Finally, the method includes requesting a subaccount identifier and a subaccount password if at least one subaccount is assigned to the master account. | 2011-05-26 |
20110126267 | METHOD AND APPARATUS FOR PROVIDING A CONTEXT RESOURCE DESCRIPTION LANGUAGE AND FRAMEWORK FOR SUPPORTING THE SAME - An apparatus for providing a framework for supporting a context resource description language may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to perform at least receiving an indication of content loaded at a browser, parsing the content for context resource description language providing an identification of properties requested in association with a service from which the content was loaded, and providing property management with respect to the identified properties for provision to the service. A corresponding method and computer program product are also provided. | 2011-05-26 |
20110126268 | SYSTEM AND METHOD FOR AUTHORIZATION AND MANAGEMENT OF CONNECTIONS AND ATTACHMENT OF RESOURCES - Embodiments of the present invention are directed to a method and system for authorization management and resource attachment. The method includes receiving, within an electronic system, a notification of an emulated device operable to be provisioned and updating an authorization record of an authorization record datastore. The updating of the authorization record comprises updating routing information related to communication of the emulated device and a virtual device. The method further includes receiving a request for initial instantiation or reconnection of the emulated device with the virtual device and determining whether the emulated device and the virtual device are allowed to communicate based on the authorization record datastore. A response to the request for instantiation or reconnection can then be sent. | 2011-05-26 |
20110126269 | SYSTEM AND METHOD FOR VIRTUAL DEVICE COMMUNICATION FILTERING - Embodiments of the present invention are directed to a method and system for virtual device communication filtering. The method includes receiving, within an electronic system, an instantiation request for a first virtual device and determining whether the first virtual device and a second virtual device are allowed to communicate based on an authorization record datastore. The method further includes modifying an authorization record of the authorization record datastore. The modifying comprises setting an indicator of a data filtering module to filter communication between the first virtual device and the second virtual device. A response can then be sent to the instantiation request. | 2011-05-26 |
20110126270 | Image Forming System, Image Forming Apparatus, and Method For Creating, Maintaining, and Applying Authorization Information - A user-manager server device includes: registration information on a local group including a domain user separately from a domain group managed by a directory server device, and authorization information on the domain group, the domain user, and/or the local group. When a logged-in user belongs to the local group, an authorization processing unit transmits the authorization information on the local group to a multifunction periphery (MFP) as the authorization information corresponding to the logged-in user. When the logged-in user does not belong to the local group, the authorization processing unit transmits the authorization information on one of the domain group and the domain user to the MFP as the authorization information corresponding to the logged-in user. | 2011-05-26 |
20110126271 | METHOD AND APPARATUS FOR REGISTERING A DEVICE IN ACCESS POINT - Provided is a method of registering an unregistered device in an access point (AP) by using a registered device registered in the AP, the method including: transmitting a control signal for controlling the registered device to the registered device so as to transmit a mode change request, which requests the AP to change a mode to an authentication approval mode approving an authentication operation with the unregistered device, to the AP; transmitting a mode confirm request, which confirms whether an operation mode of the AP is the authentication approval mode, to the AP; receiving a mode confirm response as a response to the mode confirm request from the AP that receives the mode change request; and selectively performing an authentication operation with the AP, based on the received mode confirm response. | 2011-05-26 |
20110126272 | APPARATUS AND METHOD OF IDENTITY AND VIRTUAL OBJECT MANAGEMENT AND SHARING AMONG VIRTUAL WORLDS - A system for centrally managing credential information of a user and a virtual object of a user across a plurality of virtual world (or corresponding virtual world servers) is disclosed. The system includes an identity service module for managing an authentication request (e.g., verifying credential information of a user) from a user and an inventory service module for managing virtual properties of a user. Furthermore, a method for logging in a virtual world by using the system is disclosed. A method for teleporting a virtual property from a virtual world to another virtual world by using the system is disclosed. A method for logging out from a virtual world by using the system is also disclosed. | 2011-05-26 |
20110126273 | SYSTEM AND METHOD FOR ENHANCED DATA SECURITY - A method for protecting data stored in a data repository. The method includes verifying authenticity of a user at each of a plurality of levels. Furthermore, the method includes directing the user to one of a first path or a second path based on the verification of the authenticity of the user at each of the plurality of levels. Systems and computer-readable medium that afford functionality of the type defined by this method are also contemplated. | 2011-05-26 |
20110126274 | SYSTEMS AND PROCESSES FOR SECURING SENSITIVE INFORMATION - Securing sensitive information [ | 2011-05-26 |
20110126275 | SYSTEM AND METHOD FOR DISCOVERY ENRICHMENT IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method described herein for discovery enrichment in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the management threads may converge information for managing identities and access credentials, which may provide information that can enrich discovery of physical and virtual infrastructure resources. For example, a discovery engine may reference federated identity information stored in an identity vault and enrich a discovered infrastructure model with the federated identity information. Thus, the model may generally include information describing physical and virtualized resources in the infrastructure, applications and services running in the infrastructure, and information derived from the federated identity information that describes dependencies between the physical resources, the virtualized resources, the applications, and the services. | 2011-05-26 |
20110126276 | CROSS PLATFORM GATEWAY SYSTEM AND SERVICE - A method, system, and apparatus for delivering content to a user of a registered platform are provided. Assets retrieved from a number of content sources may be stored on a database at a service provider. Information related to a number of content items retrieved from the assets may be presented to the user of the registered platform. In response to a request from the user, a content item associated with a content source may be delivered to the user without a need for user authentication. | 2011-05-26 |
20110126277 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING DIAMETER SIGNALING ROUTER WITH FIREWALL FUNCTIONALITY - According to one aspect, the subject matter described herein includes a system for Diameter routing and firewall filtering. The system includes a Diameter signaling router comprising a network interface for receiving, from a first Diameter node, a first Diameter message having Diameter information. The Diameter signaling router also includes a firewall module for determining whether the first Diameter message satisfies a firewall policy. The firewall policy is based on at least a portion of the Diameter information in the first Diameter message. The Diameter signaling router further includes a routing module for forwarding at least a portion of the first Diameter message towards a second Diameter node in response to the first Diameter message satisfying the firewall policy. | 2011-05-26 |
20110126278 | METHOD AND APPARATUS FOR LOCAL AREA NETWORKS - A mechanism for segregating traffic amongst STAs that are associated with a bridge, referred to herein as the personal virtual bridged local area network (personal VLAN), is based upon the use of a VLAN to segregate traffic. The IEEE 802.1Q-1998 (virtual bridged LANs) protocol provides a mechanism that is extended by the invention to partition a LAN segment logically into multiple VLANs. In the preferred embodiment, a VLAN bridge forwards unicast and group frames only to those ports that serve the VLAN to which the frames belong. One embodiment of the invention extends the standard VLAN bridge model to provide a mechanism that is suitable for use within an AP. In a preferred embodiment, the Personal VLAN bridge extends the standard VLAN bridge in at least any of the following ways: VLAN discovery in which a personal VLAN bridge provides a protocol for VLAN discovery; VLAN extension in which a Personal VLAN allows a station to create a new port that serves a new VLAN, or to join an existing VLAN via an authentication protocol; Logical ports in which a Personal VLAN bridge can maintain more than one logical port per physical port, and bridges between ports of any kind; and cryptographic VLAN separation. | 2011-05-26 |
20110126279 | INFORMATION PROCESSING APPARATUS, SOFTWARE INSTALLING METHOD, AND RECORDING MEDIUM - An information processing apparatus includes a communication unit that transmits and receives information to and from an IC chip of a recording medium, an authentication processing unit that executes mutual authentication processing with the IC chip, a list-display-screen outputting unit that reads identification information and usage control information and causes a display to display a list display screen, a selection input unit that receives a selection input from a user, a software reading unit that reads data of software selected according to selection input from the data area, an installation processing unit that causes the authentication processing unit to execute the authentication processing, reads key information necessary for installing the software, and executes installation processing for the software, and a usage-control-information updating unit that accesses the IC chip and updates the usage control information corresponding to the software. | 2011-05-26 |
20110126280 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus according to the present invention includes a biometric authentication unit that authenticates one piece of biometric information based on registered biometric information, wherein the one piece of biometric information is image information unique to a living body, and a plurality of pieces of user information are associated with the one piece of biometric information, and the registered biometric information is biometric information registered in advance, and a login processing unit that selects, based on user specification information for specifying user information used for login processing, one of the plurality of pieces of user information associated with the biometric information successfully authenticated by the biometric authentication unit so that the login processing unit uses the selected one of the plurality of pieces of user information to perform the login processing. | 2011-05-26 |
20110126281 | Controlling Resource Access Based on Resource Properties - Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classification properties, such that a change to the file may change its resource label, thereby changing which users have access to the file. The resource label-based access evaluation may be logically combined with a conventional ACL-based access evaluation to determine whether to grant or deny access to the resource. | 2011-05-26 |
20110126282 | System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies - Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions. | 2011-05-26 |
20110126283 | System for Tracking Digital Information Over a Communications Network - A method for tracking digital files transmitted over the Internet by placing certain identifying indicia within a file, and monitoring selected sites through which Internet traffic is transmitted, to determine the source and destination of a transmission containing a file with particular identifying indicia. Identifying indicia (“ID”) is placed in the header of each digital file whose transmission over the Internet is to be monitored. A data communications monitoring device is installed at an Internet service provider's (ISP's) facility. The monitoring device intercepts packets received by the ISP. These intercepted packets are then examined to determine whether they contain an ID of interest. If a sought ID is found within the packet, the source and destination fields in the Internet Protocol (IP) header are logged, along with the ID and other information, in a database. The pertinent contents of the database are then periodically sent to the proprietors whose IDs were discovered in packets in transit across the Internet. A proprietor may then take appropriate steps to secure compensation for the unauthorized copies, or to prevent further dissemination thereof. | 2011-05-26 |
20110126284 | CONTENT REPRODUCTION DEVICE, CONTENT REPRODUCTION DEVICE CONTROL METHOD, CONTENT REPRODUCTION PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A content playback device of the present invention includes a playback unit | 2011-05-26 |
20110126285 | INTERNET SITE SECURITY SYSTEM AND METHOD THERETO - The present invention discloses an internet site security system and method thereof. That is, the present invention comprises a browser execution module which executes the browser for providing a work-performing environment on the internet site according to the selection of a user; a memory protection module which, according to the execution of the browser, prevents an external module from accessing a memory area allocated to the browser and detects whether the memory area is tampered or not and whether the executing code is tampered or not; and a browser protection module which prevents another process or module from debugging the browser execution module according to the execution of the browser, and distinguishing several modules loaded to the memory area into acceptable modules and unacceptable modules, and thereby is able to provide a secure electronic transaction based environment against a malicious attack. | 2011-05-26 |
20110126286 | SILENT-MODE SIGNATURE TESTING IN ANTI-MALWARE PROCESSING - Method and computer program product for signature testing used in anti-malware processing. Silent signatures, after being tested, are not updated into a white list and are sent directly to users instead. If the silent signature coincides with malware signature, a user is not informed. A checksum (e.g., hash value) of a suspected file is sent to a server, where statistics are kept and analyzed. Based on collected false positive statistics of the silent-signature, the silent-signature is either valid or invalid. Use of the silent signatures provides for effective signature testing and reduces response time to new malware-related threats. The silent signature method is used for turning off a signature upon first false positive occurrence. Use of silent signatures allows improving heuristic algorithms for detection of unknown malware. | 2011-05-26 |
20110126287 | ANTI-VIRUS PROTECTION SYSTEM AND METHOD THEREOF - An anti-virus protection system and method including receiving an address of a data server from a user, writing and transmitting a request message including the address received from the user, receiving the data from the data server, and determining whether the data contains malignant virus. Thus, a malignant web site is scanned/filtered by minimally using a restrictive memory and central process unit (CPU) resource of a mobile device, and a user uses a mobile device whose security is ensured even through a user moves to another country. | 2011-05-26 |
20110126288 | METHOD FOR SOFTWARE VULNERABILITY FLOW ANALYSIS, GENERATION OF VULNERABILITY-COVERING CODE, AND MULTI-GENERATION OF FUNCTIONALLY-EQUIVALENT CODE - A method for detecting, analyzing, and mitigating vulnerabilities in software is provided. The method includes determining whether one or more vulnerabilities are present in one or more target software components, determining whether any detected vulnerabilities are fixable, and fixing the detected vulnerabilities that are fixable in code or in associated models used to generate code. A vulnerability-covering code is generated when one or more of the detected vulnerabilities are not fixable. A determination is then made whether there are any remaining vulnerabilities in the vulnerability-covering code. A vulnerability-aware diverse code is generated when there are one or more remaining vulnerabilities to obfuscate the remaining vulnerabilities. | 2011-05-26 |
20110126289 | CLIENT SIDE USERNAME/PASSWORD CREDENTIAL PROTECTION - A method of protecting username/password (U/P) credentials operates on a client computer that cooperates with an anti-phishing scheme that generates a client warning at the client computer when a suspected phishing website issues a U/P request. At the client computer, a set of S fake U/P credentials is generated when the client warning is heeded, or a set of (S−1) fake U/P credentials are derived from a client-supplied U/P credential provided after the client warning is ignored. The client computer then transmits to the suspected phishing website one of (i) the set of S fake U/P credentials, and (ii) the client-supplied U/P credential along with the set of (S−1) fake U/P credentials. | 2011-05-26 |
20110126290 | Tailored Protection of Personally Identifiable Information - The disclosed technology provides a negotiation-based mechanism for a user to share personally identifiable information with a requesting website, for example, a third party website such as an aggregator website that might be gathering information about the user. The user, rather than being limited to a pre-set collection of privacy options, is free to agree to share more or less of their privacy with any website or subset of websites based on the user's trust of the requesting website. | 2011-05-26 |
20110126291 | SECRET INFORMATION DISTRIBUTION SYSTEM, METHOD, PROGRAM, AND TRANSMISSION SYSTEM - A secret reconstruction method comprises: receiving (k+α) pairs out of n pairs (r | 2011-05-26 |
20110126292 | Method and System for Providing Security Seals on Web Pages - A method of providing web site verification information to a user includes receiving a DNS query including a host name and a seal verification site name, parsing the DNS query, and extracting the host name from the DNS query. The method also includes accessing a DNS zone file including a list of Trust Services customers and determining if the host name is associated with a Trust Services customer in the list of Trust Services customers. The method further includes transmitting a positive identifier to the requester if the host name is associated with a Trust Services customer and transmitting a negative identifier to the requester if the host name is not associated with a Trust Services customer. In a specific embodiment, the Trust Services include issuance of digital certificates. | 2011-05-26 |
20110126293 | SYSTEM AND METHOD FOR CONTEXTUAL AND BEHAVIORAL BASED DATA ACCESS CONTROL - A system and method of controlling access to information. An encrypted version of the information is stored. An attempt to access encrypted information may be intercepted and an access authorization rank may be computed. If computed access authorization rank is above a predefined level then a decrypted version of the information may be provided. Other embodiments are described and claimed. | 2011-05-26 |
20110126294 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING DISTRIBUTION OF DIGITAL CONTENT IN A FILE SHARING SYSTEM USING LICENSE-BASED VERIFICATION, ENCODED TAGGING, AND TIME-LIMITED FRAGMENT VALIDITY - A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide tagged fragments for distribution. The tags may be generated using a pseudo-random number (PRN) bit sequence. A digital rights license is generated for the digital content file based on the tags and/or fragments. The digital rights license is configured to allow reassembly of the tagged fragments to provide the digital content file. Later, the fragments may be re-tagged with corresponding second tags to provide second tagged fragments for distribution that are different from the first tagged fragments. Related systems and computer program products are also discussed. | 2011-05-26 |
20110126295 | DISPERSED STORAGE NETWORK DATA SLICE INTEGRITY VERIFICATION - A method begins with a processing module issuing a retrieval request, receiving secret shares of a set of secret shares to produce received secret shares, and receiving encoded data slices of a set of encoded data slices. The method continues with the processing module decoding the received secret shares to recapture a message authentication key when a threshold number of the secret shares is received. The method continues with the processing module identifying a received encoded data slice of the received encoded data slices having an authentication code associated therewith when a threshold number of the encoded data slices is received. The method continues with the processing module verifying the authentication code based on the message authentication key and the received encoded data slice. The method continues with the processing module decoding the received encoded data slices to recapture a data segment when the authentication code is verified. | 2011-05-26 |
20110126296 | Method For Scalable Access Control Decisions - Content access may be provided and processed by assigning responsibility for obtaining entitlement data to the client's browser. Thus, in one example, the client may be configured to synchronize and coordinate data lookups associated with a content request, rather than relying on the server to do so. The network architecture may use a mediator design pattern, in which the client's browser acts as the mediator (i.e., middleman) between a content server and an entitlement data server. Accordingly, synchronous calls between server-side services might not be required. Instead, data necessary for the content server to process a client request for access to protected content may be received in the incoming request from the client's browser. | 2011-05-26 |
20110126297 | TRANSGENIC ANIMAL WITH MONOCYTE CHEMOTACTIC PROTEIN 1 PROMOTER - The present invention relates to a transgenic animal, which comprises in its genome a recombinant polynucleotide encoding one or more reporter proteins and a monocyte chemotactic protein-1 (MCP-1) promoter, wherein the one or more reporter proteins are expressed under the control of the MCP-1 promoter. A method for monitoring endogenous expression of MCP-1 in vivo is also provided, which is useful for identifying a regulator of the expression of MCP-1 or an anti-inflammatory agent. | 2011-05-26 |
20110126298 | Transgenic Mice Over-Expressing Receptor For Advanced Glycation Endproduct (RAGE) In Brain And Uses Thereof - The present invention provides for a transgenic non-human animal whose cells contain a DNA sequence comprising: (a) a nerve tissue specific promoter; and (b) a DNA sequence which encodes a receptor for advanced glycation endproducts (RAGE), wherein the promoter and the DNA sequence which encodes the receptor for advanced glycation endproducts (RAGE) are operatively linked to each other and integrated in the genome of the non-human animal, and wherein said non-human animal exhibits a reduced amount of cerebral tissue infarcted following a transient middle cerebral artery occlusion compared to an identical non-human animal lacking said DNA sequence. | 2011-05-26 |
20110126299 | TRIPLE TRANSGENIC MOUSE MODEL OF AUTOIMMUNE DISEASE AND NF-KAPPA B IN VIVO IMAGING - The present invention provides for monitoring of NF-κB-associated inflammation in mice undergoing Id-driven autoimmune disease. The mice are triple transgenic mice expressing both Id | 2011-05-26 |
20110126300 | High Through-Put Method of Screening Compounds for Pharmacological Activity - Provided is a method for high through-put screening for physiologic alterations in an altered teleost displaying a phenotype that is characteristic of the alteration and different from a wild-type, unaltered, matched teleost, comprising the steps of contacting the teleost displaying a genetically-inherited or chemically-induced phenotype with at least one test compound for a sufficient time and under suitable conditions to induce a response in the teleost indicative of pharmacological activity of the compound, and detecting and comparing the response with that of a matched, untreated, control, wherein a change in the teleost signal that is different from that of the control, indicates an altered phenotype and pharmacological activity of the at least one test compound. Further provided are the compounds identified by this method, the zebrafish having an altered phenotype resulting from treatment in accordance with these methods, and kits for facilitating the high through-put screening methods. | 2011-05-26 |
20110126301 | Dendritic Cell Marker and Uses Thereof - The present invention relates to the identification of proteins located on the cell surface of dendritic cells or precursors thereof, particularly antigen presenting dendritic cells. In particular, the present invention relates to compounds such as antibodies that bind these proteins. These compounds can be used to detect and/or enrich a subset of dendritic cells or precursors thereof. These compounds can also be used to target antigens to dendritic cells or precursors thereof to modulate a humoral and/or T cell mediated immune response to an antigen, or used to target cytotoxic agents to dendritic cells or precursors thereof involved in diseased states. | 2011-05-26 |
20110126302 | DIAGNOSTIC AND THERAPEUTIC METHODS FOR EFMR (EPILEPSY AND MENTAL RETARDATION LIMITED TO FEMALES) - Methods and kits for the diagnosis of illnesses related to protocadherin 19 (PCDH 19) protein deficiency or altered PCDH 19 protein function, in particular EFMR (Epilepsy and Mental Retardation limited to Females) are provided, as well as methods and kits for the identification of a predisposition to such illnesses and methods of screening subjects to identify carriers of such illnesses and methods and kits for the therapeutic or prophylactic treatment of PCDH 19 deficiency or altered PCDH 19 protein function. Further, nucleotide and amino acid sequences corresponding to a complete PCDH19 open reading frame (ORF), mutant sequences encoding non-functional PCDH19 mRNA or altered PCDH19 mRN A are described along with transformed cells and non-human transgenic animals comprising wild-type or mutant PCDH19 ORF nucleotide sequences. | 2011-05-26 |
20110126303 | Modified Blood Clotting Factors And Methods Of Use - The invention provides compositions including modified blood clotting factors that have a non-native proteolytic cleavage site engineered into them allowing intracellular cleavage and secretion of an active form. The compositions are useful in the methods for treating a bleeding or clotting disorder. | 2011-05-26 |
20110126304 | METHOD FOR DISTINGUISHING SECRETORY GRANULES OF DIFFERENT AGES - The present invention relates to an in vitro method of detecting secretory granules (SGs) of different ages in a cell by differentially labelling said SGs according to their age comprising (a) contacting a cell capable of forming SGs and expressing 1. a (poly)peptide specific for SGs, wherein said (poly)peptide has a binding site common for at least three different substances A, B and C covalently binding thereto or 2. a fusion protein comprising (i) a (poly)peptide specific for SGs and (ii) a (poly)peptide having a binding site common for at least three different substances A, B and C covalently binding thereto, wherein said substances are capable of penetrating the cell membrane and wherein at least substances A and C are detectable by different means with a substance A targeting said binding site (b) saturating said binding sites by contacting the cell with a substance B which blocks the binding sites which were not bound by substance A, (c) allowing that unbound substance B is removed from the cell or removing unbound substance B from the cell, (d) contacting the cell with a substance C targeting said binding site on the (poly)peptide or the fusion protein becoming available for binding after step (b) and (e) detecting for the presence of both detectable substances A and C, wherein the simultaneous detection of both substances A and C is indicative of the presence of two populations of SGs having a different age. Further, the present invention relates to an in vitro method of investigating in a cell the effect of a stimulus on secretory granules (SGs) differentially labelled according to their age. | 2011-05-26 |
20110126305 | Mutant blue fluorescent protein and method of using the same for fluorescence resonance energy transfer and blue fluorescent fish - The present invention discloses a mutant blue fluorescent protein (BFP) exhibiting, at an aerobic or anaerobic system, larger fluorescent intensity than a BFPvv D7 of SEQ ID NO:2 derived from a wild type BFP, BfgV of SEQ ID NO:1, obtained from | 2011-05-26 |
20110126306 | Circular Nucleic Acid Vectors, and Methods for Making and Using the Same - Circular nucleic acid vectors that provide for persistently high levels of protein expression are provided. The circular vectors of the subject invention are to characterized by being devoid of expression-silencing bacterial sequences, where in many embodiments the subject vectors include a unidirectional site-specific recombination product hybrid sequence in addition to an expression cassette. Also provided are methods of using the subject vectors for introduction of a nucleic acid, e.g., an expression cassette, into a target cell, as well as preparations for use in practicing such methods. The subject methods and compositions find use in a variety of different applications, including both research and therapeutic applications. Also provided is a highly efficient and readily scalable method for producing the vectors employed in the subject methods, as well as reagents and kits/systems for practicing the same. | 2011-05-26 |
20110126307 | CHLOROPLAST TRANSIT PEPTIDES FOR EFFICIENT TARGETING OF DMO AND USES THEREOF - The invention provides for identification and use of certain chloroplast transit peptides for efficient processing and localization of dicamba monooxygenase (DMO) enzyme in transgenic plants. Methods for producing dicamba tolerant plants, methods for controlling weed growth, and methods for producing food, feed, and other products are also provided, as well as seed that confers tolerance to dicamba when it is applied pre- or post-emergence. | 2011-05-26 |
20110126308 | LETTUCE THAT IS RESISTANT TO THE LETTUCE APHID NASONOVIA RIBISNIGRI BIOTYPE 1 - The present invention relates to lettuce plants and heads that are resistant to | 2011-05-26 |
20110126309 | METHODS AND COMPOSITIONS FOR IDENTIFYING DOWNY MILDEW RESISTANT CUCUMBER PLANTS - The present invention relates to methods for identifying cucumber lines having increased resistance to Downy Mildew, and identification of genetic markers linked to gene(s) conditioning such increased disease resistance. The present invention also relates to methods of breeding cucumber plants from lines having increased Downy Mildew resistance by marker-assisted selection, compositions including nucleic acid probes or primers which are useful for such marker assisted selection, and plants and plant parts produced by such methods. | 2011-05-26 |