22nd week of 2012 patent applcation highlights part 57 |
Patent application number | Title | Published |
20120137330 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2012-05-31 |
20120137331 | VIRTUAL CHANNEL TABLE FOR A BROADCAST PROTOCOL AND METHOD OF BRAODCASTING AND RECEIVING BROADCAST SIGNALS USING THE SAME - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. | 2012-05-31 |
20120137332 | MOBILE TV DELIVERY SYSTEM - Systems and methods are disclosed that include a distribution unit for delivering content to a mobile device. This system includes an input for receiving an input signal comprising a multimedia content, an authentication module that is configured permit authentication of a mobile device to view the multimedia content, and a signal processing and conversion module for transcoding the multimedia content for a destination platform. This system also includes a delivery system for distributing the multimedia content. | 2012-05-31 |
20120137333 | TV INTERNET AND CELLULAR MOBILE COMMUNICATION - Methods, systems and devices for receiving in a television (TV) set wireless OFDM modulated, infrared (IR) and wire connected cable provided signals from a mobile devices and from a cellular phone. Transmitting from a TV set by a wireless and by a cable connected transmitter of the TV set a video signal or music signal received in the TV set from the internet or from a video broadcast transmitter, to a mobile device. Generating and providing a camera generated and a motion detector signal in a mobile device to a TV set for control of interactive communications between a TV set and a mobile device. | 2012-05-31 |
20120137334 | HOME MEDIA SERVER CONTROL - A home media server includes a processor, a storage medium; and machine-readable code, stored on the non-transitory storage medium, the non-transitory storage medium includes instructions which when executed, cause the home media server to receive downloadable instructions, an edited set of data and analysis data. The downloadable instructions, when executed by the processor cause the home media server to search for and obtain media content associated with an edited video program. The instructions also cause the home media server to receive the edited set of data corresponding to editing steps for assembly of the edited video program, and to emulate assembly of the edited video program utilizing the media content obtained by the home media server to created an emulated video program. | 2012-05-31 |
20120137335 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD THEREOF - An image processing method, includes: receiving streaming contents; extracting definition control information which includes content provider information and corresponds to the streaming contents; and controlling definition of the streaming contents by using the extracted definition control information. | 2012-05-31 |
20120137336 | Content Placement - A method includes receiving data identifying new media content items to be added to a media distribution system that provides media content on demand to a plurality of endpoints. The media distribution system includes a plurality of distribution nodes, and each of the distribution nodes is coupled to a subset of the endpoints. Historical demand is determined during a particular time period for existing media content items that include content available via at least one of the distribution nodes before the data was received. The method includes forecasting demand for media content items, including new media content items and existing media content items, based on the historical demand. Each media content item is assigned to, and stored at, at least one corresponding distribution node based at least partially on a cost function and the forecasted demand. | 2012-05-31 |
20120137337 | System and Method for Providing Video Content Associated with a Source Image to a Television in a Communication Network - A system and method are provided for processing video content, associated with a source image, for display on a television. The source image, such as a web page, and its associated (e.g., linked) video content are retrieved and separately encoded. The encoded source image and the encoded video content are composited together to form a sequence of encoded video frames, where a frame type of the video content is used to determine a type of a composited frame. For example, if all displayed frames of the video content are MPEG I-frames, then the composited frame also may be an I-frame. However, if any displayed frame of video content is an MPEG P-frame or B-frame, then the composited frame may be a P-frame. | 2012-05-31 |
20120137338 | DECODER VESA MOUNTING ASSEMBLY - A decoder VESA mounting assembly includes a housing that further includes an internal printed circuit board (PCB) mounted in an inverted orientation and where the PCB contains circuitry to receive the audio signal, the video signal, and the control command signals from the network source. The PCB processes and transmits the audio signal, the video signal, and the control command signal to the display device. The housing is compatible with the VESA 100×100 mounting standard. The assembly further includes network connections. The assembly includes power connections. The assembly includes a video out connection. The assembly additionally includes an audio out connection. The assembly includes a control command input connection and output connection. | 2012-05-31 |
20120137339 | APPARATUS AND METHOD FOR PROVIDING INTERACTIVE SERVICE TO DEVICE USING DIFFERENT DIGITAL BROADCAST MIDDLEWARE STANDARDS - An apparatus and method for providing an interactive service to devices using different digital broadcast middleware standards are provided. The apparatus includes an execution information providing module which provides execution information regarding an application that has been executed in a first device using a first middleware standard so that the application can be executed in a second device using a second middleware standard; and a request execution module which receives a request issued by the second device during the execution of the application in the second device, and performs an operation corresponding to the received request. | 2012-05-31 |
20120137340 | IMPLICIT AUTHENTICATION - Embodiments of the present disclosure provide a method and system for implicitly authenticating a user to access controlled resources. The system first receives a request to access the controlled resource from a user. Then, the system determines whether the user request is inconsistent with regular user behavior by calculating a user behavior measure derived from historical contextual data of past user events. Next, responsive to the determined inconsistency of the user request, the system collects current contextual data of the user from one or more user devices without prompting the user to perform an explicit action for authentication. The system further updates the user behavior measure based on the collected current contextual data, and provides the updated user behavior measure to an access controller of the controlled resource to make an authentication decision based at least on the updated user behavior measure. | 2012-05-31 |
20120137341 | SYSTEM AND METHOD FOR DETERMINING A SECURITY ENCODING TO BE APPLIED TO OUTGOING MESSAGES - A system and method for determining a security encoding to be applied to a message being sent by a user of a computing device. In one broad aspect, the device comprises a processor configured to: determine whether a general message encoding configuration setting indicates that when a security encoding is to be applied to a message then the security encoding is to be established by a policy engine; if the general message encoding configuration setting so indicates, query the policy engine for the security encoding to be applied to the message; otherwise, determine the security encoding to be applied to the message in accordance with a user-selected security encoding; and apply the determined security encoding to the message prior to transmission of the message to at least one recipient. | 2012-05-31 |
20120137342 | MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS - A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a time frame prior to the notification of the suspected malware infection. The malware analysis system may also create a time-bounded snapshot of the monitored activities that are conducted within a time frame subsequent to the notification of the suspected malware infection. The malware analysis system provides the created snapshot or snapshots for further analysis. | 2012-05-31 |
20120137343 | TERMINAL, COMMUNICATION SYSTEM, DATA MANAGEMENT METHOD, SERVER AND STORAGE MEDIUM - [Problem] To make it possible to prevent certainly user's personal information from flowing out without burdening the user, and to manage sensor information and result information which is acquired through processing a service by use the sensor information, on the basis of importance, classification, personal property, utilization form or the like. | 2012-05-31 |
20120137344 | SYSTEMS AND METHODS FOR RESETTING A NETWORK DEVICE - A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the second parameter affecting a security operation of the network device. A device reset function enables a user to selectively and independently refresh the first and second parameters. For example, a Session Initiation Protocol (SIP) device user can restore a default communications configuration of the SIP device while preserving the device decryption key. | 2012-05-31 |
20120137345 | SYSTEM AND METHOD FOR CYBER OBJECT PROTECTION USING VARIABLE CYBER COORDINATES (VCC) - A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; and the VCC controller unit configured to communicate the generated cyber coordinates to the protected routers with or without encryption and/or authentication. At a predetermined time interval or based on a command from the VCC controller unit, the routers and their respective control units (CU) are configured to change their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol. | 2012-05-31 |
20120137346 | SYSTEM AND METHOD FOR CONTROLLING ACCESS BETWEEN BLUETOOTH DEVICES - A method and system is provided for using an access list stored on a memory of a first computing device, the access list for controlling communication between the first computing device and a plurality of computing devices in a Bluetooth communication network. The method comprises: initiating a restricted mode of operation on the first computing device, the restricted mode of operation configured to secure the access list to prevent subsequent unauthorized modification thereon, the access list including at least one entry representing at least one selected computing device of the plurality of computing devices being permitted to access the first computing device, the at least one entry comprising at least one identifier to identify the at least one selected computing device; in response to a connection request between the first computing device and a particular computing device of the plurality of computing devices, determining whether the particular computing device is on the access list; and preventing connection between the first computing device to the particular computing device in response to determining that the particular computing device is not on the access list. | 2012-05-31 |
20120137347 | Method of and System for Implementing Privacy Control - A method and a system for implementing privacy control in a communication network are provided. The method comprises the steps of generating a first Request Verification Code (RVC) for each user request in a privacy server by means of parameter hashing or non-Parameter-hashing and forwarding the user request together with the first RVC to the SP; and verifying a second RVC and user privacy setting (s) in a privacy server, wherein the second RVC is received together with a further request from the SP. The system comprises an untrustworthy subsystem comprising at least one Service Provider (SP) for providing application service and a trustworthy subsystem comprising at least one mobile operator module for providing communication service, wherein the mobile operator module further comprises at least one mobile core network for providing user privacy control by means of Request Verification Code (RVC). According to the method and system of the invention, security and privacy control in a communications network has been greatly improved. | 2012-05-31 |
20120137348 | SYSTEM AND METHOD FOR ENCODING AND DECODING DATA AND REFERENCES TO DATA IN MACHINE-READABLE GRAPHICAL CODES - A system for decoding machine-readable graphical codes is provided. The system includes a graphical code reading device configured to read a graphical code and generate reference encoded source data. The reference encoded source data includes a first reference identifier and a second portion. The system also includes a computing device in electronic communication with the graphical code reading device. The computing device also includes a reference decoder configured to effect conversion of the reference encoded source data into source data. The source data includes first affiliated data in place of the first reference identifier. The first affiliated data may be longer in length than the first reference identifier. The source data also includes the second portion. The computing device also includes a software application configured to use the source data. | 2012-05-31 |
20120137349 | SAFE APPLICATION DISTRIBUTION AND EXECUTION IN A WIRELESS ENVIRONMENT - The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so. | 2012-05-31 |
20120137350 | SECURITY SYSTEM AND METHOD USING AUTOMATIC METER READING PROTOCOL - The present invention relates to a security system using an automatic meter reading protocol. The security system includes a Device Language Message Specification (DLMS) transmission unit for transmitting security DLMS data that includes security key update information and a first authentication value, and a DLMS reception unit for receiving the security DLMS data, searching the security key update information in the security DLMS data, and generating an updated security key using a second authentication value according to the security key update information. The security system can solve various problems occurring due to the operation of a separate security protocol, and can be easily implemented and managed. | 2012-05-31 |
20120137351 | SECURE LAUNCHING OF BROWSER FROM PRIVILEGED PROCESS - Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a restricted-capability web browser pointed toward a web server. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, the restricted-capability web is launched browser toward a web server. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation, but in a capacity without the limited functionality or the imposed browser restrictions. | 2012-05-31 |
20120137352 | METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION - A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security matrix based on a previously stored user keyword and user preference data, the security matrix being different for each authentication request. The security system sends the security matrix to the user and awaits a one-time code in response to the security matrix. The user forms the one-time code based on the user keyword, the user preferences, and the security matrix. The security system validates the one-time code against the security matrix, the keyword, and the user preferences, and responds by sending an authentication result to the user that either permits or denies access to the system. Additionally, the security system sends a success or fail message to the system to be accessed. | 2012-05-31 |
20120137353 | METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION - A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security matrix based on a previously stored user keyword and user preference data, the security matrix being different for each authentication request. The security system sends the security matrix to the user and awaits a one-time code in response to the security matrix. The user forms the one-time code based on the user keyword, the user preferences, and the security matrix. The security system validates the one-time code against the security matrix, the keyword, and the user preferences, and responds by sending an authentication result to the user that either permits or denies access to the system. Additionally, the security system sends a success or fail message to the system to be accessed. | 2012-05-31 |
20120137354 | APPARATUS, SYSTEM, AND METHOD OF MANAGING OBJECT TO BE ACCESSED, AND RECORDING MEDIUM STORING PROGRAM FOR MANAGING OBJECT TO BE ACCESSED - An access object management system manages an object in a transmission system, which is allowed for access by a terminal in the transmission system, based on whether access by the terminal is restricted. The access object management system allows the terminal to access a part of the transmission system even when access by the terminal is restricted. | 2012-05-31 |
20120137355 | Methods for Accessing Content Based on a Session Ticket - A method for accessing content stored on a memory device is provided. In this method, a request to access the content is transmitted and a session ticket is received. The session ticket includes a parameter used to decrypt the content and the session ticket is generated based on a variable that is configured to change at a session. The content may be accessed based on the session ticket. | 2012-05-31 |
20120137356 | INTELLIGENT ELECTRIC DEVICE AND NETWORK SYSTEM INCLUDING THE DEVICE - A protection relay installed at a power system and a network system including the protection relay are disclosed, the protection relay storing a security level of a plurality of systems or a plurality of source addresses, instructing whether to short-circuit a power by checking a security level of a data-transmitting system based on a security level stored in a security level setting device, or instructing whether to short-circuit a power by comparing the source addresses included in the data with the plurality of source addresses. | 2012-05-31 |
20120137357 | SYSTEM AND METHOD FOR TESTING NETWORK FIREWALL FOR DENIAL-OF-SERVICE (DOS) DETECTION AND PREVENTION IN SIGNALING CHANNEL - A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication; measure a second performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication; and measure a third performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication and return routability filtering. The device may also measure a first performance associated with legitimate traffic of a Session Initiation Protocol (SIP)-based protection device implementing rate-limiting filtering; measure a second performance associated with legitimate traffic and attack traffic of the SIP-based protection device implementing scheme filtering; and measure a third performance associated with legitimate traffic of the SIP-based protection device not implementing rate-limiting filtering without attack traffic. | 2012-05-31 |
20120137358 | POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS - A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier. | 2012-05-31 |
20120137359 | Method For Storing (Hiding) A Key In A Table And Corresponding Method For Retrieving The Key From The Table - A method is provided for storing/retrieving a key in a table, the method for storing a key comprising providing a table comprising a plurality of entries, each selected from a group consisting of random words and random strings; providing a question to a user; receiving from the user a corresponding secret answer; receiving the key to store in the table; determining a position in the table using the received corresponding secret answer and at least one table entry and storing the key at the determined position. | 2012-05-31 |
20120137360 | SYSTEM AND METHOD FOR ACCESS CONTROL AND IDENTITY MANAGEMENT - A mechanism for the flow of access by derivation is provided. An access point may be any object, such as files or functions, to which the access recipient is granted access rights by the access provider. Access is typically represented by a relationship object referencing the access provider function, the access recipient function, and the access point object, and a set of access rights. This membership access relationship object is typically represented as a subtype of the access relationship. When a membership access relationship is created, typically a new associated persona function is generated, representing the new identity created for the access recipient function while serving as a member of the access point function. When a persona function is invited to be a member in another function, that in turn generates a membership and a second persona that is derived from the first persona, resulting in identity derivation. | 2012-05-31 |
20120137361 | NETWORK SECURITY CONTROL SYSTEM AND METHOD, AND SECURITY EVENT PROCESSING APPARATUS AND VISUALIZATION PROCESSING APPARATUS FOR NETWORK SECURITY CONTROL - A network security control system includes: a network event generator for generating network events; a security event processing apparatus for collecting the network events from the network event generator via a network and processing the collected network events as a target data for visualization; and a visualization processing apparatus for visualizing the target data to display a security status as a third-dimensional (3D) visualization information on an organization basis. | 2012-05-31 |
20120137362 | COLLABORATIVE SECURITY SYSTEM FOR RESIDENTIAL USERS - The invention relates to a collaborative system for security information exchange between users, based on the fact that a determined function (whether storing or processing) is spread out at different points of a network to achieve more scalable processing and storing factors than if they were all done at one and the same point. | 2012-05-31 |
20120137363 | Method and Device for Preventing CSRF Attack - The disclosure provides a device and method for preventing CSRF attacks, in which the method comprises: intercepting request sent from a client browser to a server; generating a token; generating a response to the request; inserting the token into the response to the request; and sending the response to the request to the client browser with the token inserted into the response. With the method and device of the disclosure, it is assured that a token is inserted into all the requests made by a user through a client browser for accessing a resource. And it can be assured that the request is issued by the user himself by verifying whether the token in the request is valid, thereby preventing a CSRF attack. | 2012-05-31 |
20120137364 | REMOTE ATTESTATION OF A MOBILE DEVICE - Secure services and hardware on a mobile device are disabled if it is detected that software in the untrusted domain, such as the operating system, has been hacked or tampered with. Mobile devices often have rich, unprotected operating systems which are vulnerable to hacking, especially from execution of one or more apps. These apps are separated from secure services on the device, such as e-wallet services, NFC functionality, camera, enterprise access, and the like, and the present invention ensures that tampering with code in the untrusted domain or operating system does not affect these and other secure services. If tampering in the untrusted space is detected, the secure services and possible hardware on the device are shutdown or disabled. The extent of this disablement may depend on various factors, such as use of the device, type of device, context in which device is used (e.g., military, enterprise). | 2012-05-31 |
20120137365 | ANTI-MALWARE SCANNING SYSTEM AND METHOD THEREOF - Provided are an anti-malware scanning system and a method thereof. The system includes: a host; and a chip which is removably connected to the host, receives a file to be scanned from the host, and scans whether malware exists in the file, wherein the host adjusts a size of the file to be scanned to correspond to a storage capacity of a storage unit of the chip and transmits the adjusted file to the chip. Accordingly, scanning is performed effectively even in an environment in which resources of the anti-malware scanning system are limited. | 2012-05-31 |
20120137366 | TECHNIQUES FOR NETWORK PROTECTION BASED ON SUBSCRIBER-AWARE APPLICATION PROXIES - Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data. | 2012-05-31 |
20120137367 | CONTINUOUS ANOMALY DETECTION BASED ON BEHAVIOR MODELING AND HETEROGENEOUS INFORMATION ANALYSIS - The present disclosure describes a continuous anomaly detection method and system based on multi-dimensional behavior modeling and heterogeneous information analysis. A method includes collecting data, processing and categorizing a plurality of events, continuously clustering the plurality of events, continuously model building for behavior and information analysis, analyzing behavior and information based on a holistic model, detecting anomalies in the data, displaying an animated and interactive visualization of a behavioral model, and displaying an animated and interactive visualization of the detected anomalies. | 2012-05-31 |
20120137368 | APPARATUS, SYSTEM AND METHOD FOR PREVENTING DATA LOSS - A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface. | 2012-05-31 |
20120137369 | MOBILE TERMINAL WITH SECURITY FUNCTIONALITY AND METHOD OF IMPLEMENTING THE SAME - Disclosed herein is a mobile terminal with security functionality and a method of implementing the mobile terminal. The mobile terminal with security functionality includes a storage unit, a first module, a second module, and a third module. The storage unit stores a list of risky function combinations which may cause security risks. The first module monitors functions included in an application to be installed or running in the mobile terminal. The second module assesses security vulnerabilities based on whether a combination of the monitored functions corresponds to a risky function combination and/or security attributes of the mobile terminal. The third module takes countermeasures when a security vulnerability has been found based on the assessment. | 2012-05-31 |
20120137370 | PLATFORM FOR ANALYZING THE SECURITY OF COMMUNICATION PROTOCOLS AND CHANNELS - A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device's state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks. | 2012-05-31 |
20120137371 | AUTOMATICALLY CLASSIFYING AN INPUT FROM FIELD WITH RESPECT TO SENSITIVITY OF INFORMATION IT IS DESIGNED TO HOLD - A method and system for automatically classifying an input form field as designed to hold sensitive information. The method may include selecting an input characteristic associated with the input form field. The method may also include classifying the input form field as designed to hold sensitive information by considering classifying information of other input form fields having the same input characteristic. The method may further include statistically determining whether a similar input form field is indicated as designed to hold sensitive information by at least a predetermined threshold value of the other input fields. A computer program product is also disclosed. | 2012-05-31 |
20120137372 | APPARATUS AND METHOD FOR PROTECTING CONFIDENTIAL INFORMATION OF MOBILE TERMINAL - Disclosed herein is an apparatus for protecting the confidential information of a mobile terminal. The apparatus for protecting the confidential information of a mobile terminal includes a storage unit and a confidential information management unit. The storage unit stores at least one piece of confidential information which requires security. The confidential information management unit moves the confidential information from the preset unsecured initial storage area of the storage unit, to the preset secured storage area of the storage unit and stores the confidential data in the preset secured storage area, in order to protect the confidential data, and exclusively manages the secured storage area. The secured storage area is set by the confidential information management unit. | 2012-05-31 |
20120137373 | Role-based Access Control over Instructions in Software Code - In one embodiment, a method determines a role for a user for access to software code. A marker associated with an instruction in the software code is determined. An access level for the user based on the marker and the role is then determined. The access level is enforced based on the instruction associated with the marker for the software code. | 2012-05-31 |
20120137374 | SYSTEM AND METHOD FOR MANAGING HEALTH DATA - A system and method for managing health data based on a reader of a storage unit containing at least one health datum, said reader comprising an RFID tag reader containing a user code. The reader is configured to request, from a remote server by a local PC, validation of said user code and means for requesting entering of a password by said PC, and means for verifying said password, when said remote server is not accessible. When said user code or said password has been validated, the reader has access to said storage unit for reading/writing. | 2012-05-31 |
20120137375 | SECURITY SYSTEMS AND METHODS TO REDUCE DATA LEAKS IN ENTERPRISE NETWORKS - Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources. | 2012-05-31 |
20120137376 | RE-DOWNLOAD MANAGEMENT OF PREVIOUSLY ACQUIRED DIGITAL MEDIA ASSETS - Improved techniques that enable users to download digital media assets are disclosed. According to one aspect, digital media assets that a user has acquired from a remote media repository can be authorized for download multiple times. This, for example, allows a user to subsequently re-downloaded digital media assets that the user previously acquired. In one embodiment, digital media assets that a user previously downloaded to a user client device from a remote media repository can be made available to the user for subsequent re-download. Advantageously, a remote media repository can, in effect, provide users with a remote backup for previously acquired digital media assets. | 2012-05-31 |
20120137377 | METHOD AND SYSTEM FOR SAFEGUARDING DIGITAL OBJECTS CONSISTING OF DIGITAL ASSETS - Provided is a system and method for safeguarding digital objects consisting of digital assets. The system includes a unique identifier in each digital asset and a database with a record of each unique identifier, the database further structured and arranged to correlate at least two digital assets as distinctly related. A client is in communication with the database. The client is adapted to receive a subset of the digital assets and analyze each digital asset to determine the unique identifier embedded therein. The client is further adapted to query the database with the determined unique identifier to validate each digital asset, the validation further including confirmation of distinctly related digital asset received. An associated method is also provided. | 2012-05-31 |
20120137378 | EXTRANEOUS AGENTS TESTING - The present invention belongs to the field of pharmaceutical industry and specifies a method for testing extraneous agents in a composition comprising at least one active agent, comprising the steps of: a) contacting an antibody, which had been raised against an expression product of a polynucleotide construct comprising a sequence encoding at least a part of the active agent, with the composition comprising at least one active agent, wherein the antibody binds to the active agent, and b) determining the presence or absence of extraneous agents in the composition subsequent to step a). Furthermore, the invention specifies a process for producing a pharmaceutical composition by carrying out said method, to the use of a polynucleotide construct for testing the presence or absence of the active agent or of any extraneous or infectious agent in a composition to be tested. The present invention also relates to particular polynucleotides and polynucleotide constructs as useful substances in the field of influenza vaccines, as well as non-human organisms, transgenic animals or microorganisms containing the polynucleotides and/or polynucleotide constructs. The present invention is also directed to kit of parts. | 2012-05-31 |
20120137379 | NOVEL AAV'S AND USES THEREOF - The invention in some aspects relates to recombinant adeno-associated viruses having distinct tissue targeting capabilities. In some aspects, the invention relates to gene transfer methods using the recombinant adeno-associate viruses. In some aspects, the invention relates to isolated AAV capsid proteins and isolated nucleic acids encoding the same. | 2012-05-31 |
20120137380 | SQUASH HYBRID PX 13056719 - The invention provides seed and plants of squash hybrid PX 13056719 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of squash hybrid PX 13056719 and the parent lines thereof, and to methods for producing a squash plant produced by crossing such plants with themselves or with another squash plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-05-31 |
20120137381 | TOMATO HYBRID PS 01565172 - The invention provides seed and plants of tomato hybrid PS 01565172 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS 01565172 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-05-31 |
20120137382 | STRESS TOLERANCE IN PLANTS - Transcription factor polynucleotides and polypeptides incorporated into nucleic acid constructs, including expression vectors, have been introduced into plants and were ectopically expressed. Transgenic plants transformed with many of these constructs have been shown to be more resistant to disease (in some cases, to more than one pathogen), or more tolerant to an abiotic stress (in some cases, to more than one abiotic stress). The abiotic stress may include, for example, salt, hyperosmotic stress, water deficit, heat, cold, drought, or low nutrient conditions. | 2012-05-31 |
20120137383 | LETTUCE VARIETY INTRED - The present invention relates to plants of a lettuce variety NUN 6741 (referred to as “INTRED”) and seeds and progeny thereof. The invention further relates to methods for producing a lettuce plant by traditional breeding methods. Moreover, the invention relates to a method for producing a lettuce plant containing in its genetic material one or more transgenes. | 2012-05-31 |
20120137384 | TYPE OF LETTUCE AND METHODS OF PRODUCTION - The present invention relates to an iceberg lettuce having one or more romaine lettuce characteristics. The invention further relates to methods for producing iceberg lettuce varieties containing one or more romaine lettuce characteristics. | 2012-05-31 |
20120137385 | TRANSCRIPTION FACTORS - The invention provides polynucleotide sequences isolated from plants encoding transcription factors. Polypeptides encoded by the polynucleotides are also provided. Products and methods of use are disclosed. | 2012-05-31 |
20120137386 | Plants Having Modulated Carbon Partitioning and a Method for Making the Same - The present invention relates generally to the field of molecular biology and concerns a method for modulating carbon partitioning in plants. More specifically, the present invention concerns a method for modulating carbon partitioning in plants by modulating expression in a plant of a nucleic acid encoding a particular type of NAC transcription factor. The present invention also concerns plants having modulated expression of a nucleic acid encoding a NAC transcription factor, which plants have modulated carbon partitioning relative to control plants. The invention also provides constructs useful in the methods of the invention. | 2012-05-31 |
20120137387 | METHODS FOR GENETIC CONTROL OF INSECT INFESTATION IN PLANTS AND COMPOSITIONS THEREOF - The present invention relates to control of pest infestation by inhibiting one or more biological functions. The invention provides methods and compositions for such control, By feeding one or more recombinant double stranded RNA molecules provided by the invention to the pest, a reduction in pest infestation is obtained through suppression of gene expression. The invention is also directed to methods for making transgenic plants that express the double stranded RNA molecules, and to particular combinations of transgenic pesticidal agents for use in protecting plants from pest infestation. | 2012-05-31 |
20120137388 | Cucumber Vein Yellowing Virus (CVYV) Resistant Cucumber Plants (Cucumis Sativus L.) - Molecular markers genetically linked to, and capable of identifying, a genetic locus in the cucumber plant ( | 2012-05-31 |
20120137389 | PLANT-SPECIFIC GENETIC ELEMENTS AND TRANSFER CASSETTES FOR PLANT TRANSFORMATION - The present invention provides nucleic acid molecules and sequences, particularly those identified and obtained from plants, that are useful for transferring and integrating one polynucleotide into another via plant transformation techniques. | 2012-05-31 |
20120137390 | MATERIALS AND METHODS FOR REGENERATION AND TRANSFORMATION OF TREES - The present disclosure relates to a method for regenerating shoots from plant explants using a plant culture medium including meta-topolin. The invention also provides media and methods for regenerating plants, particularly forest trees. In particular, methods for regenerating stably transformed | 2012-05-31 |
20120137391 | SYSTEMS AND PROCESSES FOR COMBINING DIFFERENT TYPES OF SEEDS - A process and system are provided for preparing seed mixes having a target quantity and a target ratio of different types of seeds. The process generally includes portioning quantities of different types of seeds from bulk supplies of the seeds, and combining the portioned quantities of seeds to prepare the seed mixes. The system generally includes first and second dispensing assemblies for portioning the quantities of the different types of seeds from the bulk supplies, and a mixing assembly for receiving the portioned quantities of seeds as the seed mixes. The combined quantities of the different types of seeds in the seed mixes are substantially equal to the target quantity, and a ratio of the quantities of the different types of seeds is substantially equal to the target ratio. | 2012-05-31 |
20120137392 | CONSTRUCTS EXPRESSING CHIMERIC RECEPTORS AND USE THEREOF FOR THE CONTROLLED ACTIVATION OF DEFENCE RESPONSE TO PATHOGENS IN PLANTS - The present invention relates to a construct able to express in at least one plant tissue, a chimeric receptor, said chimeric receptor being essentially made of the extracellular region, comprising the external juxtamembrane portion, of a first kinase receptor R1; and the transmembrane region and the intracellular region, comprising the internal juxtamembrane portion, of a second kinase receptor R2, wherein R1 and R2 are different and uses thereof. | 2012-05-31 |
20120137393 | COMPOSITIONS AND METHODS FOR ALTERING ALPHA- AND BETA-TOCOTRIENOL CONTENT - Preparation and use of isolated nucleic acids useful in altering the oil phenotype in plants. Isolated nucleic acids and their encoded polypeptides that alter alpha- and beta-tocotrienol content in seeds and oil obtained from the seeds. Expression cassettes, host cells and transformed plants containing the foregoing nucleic acids. | 2012-05-31 |
20120137394 | Atomic Force Microscope Manipulation of Living Cells - Techniques for atomic force microscope manipulation of living cells include functionalizing a nanoscale tip of a microscale cantilever with a first ligand for a first receptor associated with a surface of a first type of cell. The method further comprises, controlling the cantilever to cause the first ligand on the nanoscale tip to contact the first receptor on a surface of a living cell of the first type in a particular temporal pattern to induce a target response by the living cell. Other techniques for controlling an atomic force microscope comprising a nanoscale tip include controlling the cantilever to cause the nanoscale tip to contact a living cardiomyocyte at a predetermined pressure. The cantilever is also controlled to turn off vertical deflection feedback after contacting the cardiomyocyte and collecting deflection data that indicates a time series of nanoscale vertical deflections of the microscale cantilever caused by the living cardiomyocyte. | 2012-05-31 |
20120137395 | SCANNED PROBE MICROSCOPE WITHOUT INTERFERENCE OR GEOMETRIC CONSTRAINT FOR SINGLE OR MULTIPLE PROBE OPERATION IN AIR OR LIQUID - A method and a device permit scanned probe microscopes with a non-optical feedback mechanism ( | 2012-05-31 |
20120137396 | Characterizing Dimensions of Structures Via Scanning Probe Microscopy - A method comprising characterizing the dimensions of structures on a semiconductor device having dimensions less than approximately 100 nanometers (nm) using one of scanning probe microscopy (SPM) or profilometry. | 2012-05-31 |
20120137397 | Odontocidium burgundian 'Too Sweet' - A new variety of orchid plant of the Oncidiinae Intergenerics, | 2012-05-31 |