Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2013 patent applcation highlights part 62
Patent application numberTitlePublished
20130145397SERVER AND METHOD FOR PROVIDING SYNCHRONIZATION INFORMATION, CLIENT APPARATUS AND METHOD FOR SYNCHRONIZING ADDITIONAL INFORMATION WITH BROADCAST PROGRAM - A synchronization information providing server to synchronize a broadcast program with additional information related to the broadcast program, a synchronization information providing method of synchronizing a broadcast program with additional information related to the broadcast program, a client apparatus to process synchronization information received from the synchronization information processing server and a method of processing synchronization information received from the synchronization information processing server are provided. The synchronization information providing server manages metadata of a broadcast frame constituting a broadcast program and additional information related to the metadata. The metadata includes time information and image feature information of the broadcast frame. Upon receiving synchronization request information, which includes time information and image feature information about at least one broadcast frame of a predetermined broadcast program, synchronization information to synchronize the predetermined broadcast program with additional information related to the predetermined broadcast program is provided to the client apparatus.2013-06-06
20130145398SYSTEMS AND METHODS FOR CREATING CUSTOM VIDEO MOSAIC PAGES WITH LOCAL CONTENT - Systems and methods for providing custom video mosaic pages are provided. The custom pages may be locally-generated, remotely-generated, or partially locally-generated and partially remotely-generated. The custom pages may include local content, such as content recorded to a digital video recorder (DVR), overlaid on a multi-video composite feed. A local compositing system may render the mosaic pages and dynamically customize the pages based on user profile data, user preferences, and active user monitoring.2013-06-06
20130145399PERSONAL TELEVISION CHANNEL - A “personal television channel” is created for a user by a television head-end server. The personal channel has its own playlist that can include, in addition to service offerings from a television-delivery service, content stored locally by the user, media sent to the user from third parties (e.g., an electronic magazine publisher), and messages from other users. The user selects the personal channel just as he would select any other television channel. He then sees a playlist for the personal channel (which may be integrated into a general electronic program guide (“EPG”) supplied by the television provider). The user selects and plays content from the playlist just as he would interact with a traditional EPG. The user can specify local content to be included in his personal channel. He can also send content to another user to be included in the playlist of the recipient's personal channel.2013-06-06
20130145400Systems and Methods to Facilitate a Voice Search of Available Media Content - A particular method includes determining estimated popularity scores for programs identified in an electronic program guide for a time interval. The programs identified in the electronic program guide for the time interval include programs being aired. One or more estimated popularity scores are based on viewing trends of the programs being aired. The method also includes determining a voice search vocabulary based on the estimated popularity scores. The voice search vocabulary includes one or more keywords usable for a keyword search of the electronic program guide during the time interval based on a received voice search request.2013-06-06
20130145401MUSIC STREAMING - Methods and systems for a complete vehicle ecosystem are provided. Specifically, systems that when taken alone, or together, provide an individual or group of individuals with an intuitive and comfortable vehicular environment. The present disclosure includes a system to generate a vehicle communication system. The vehicle communication system can determine which devices are within the vehicle. From this determination, the vehicle communication system may create a universal bus and hotspot where applications, data, multimedia information, and resources can be shared both with the vehicle and with the other devices in the vehicle.2013-06-06
20130145402VIDEO ON DEMAND BROADCAST SERVICES - A system may include one or more devices. The one or more devices may obtain indications of quantities of wireless resources that are available at a group of wireless transmission devices, and determine, based on the obtained indications, an amount of wireless resources to allocate to a broadcast service that provides video on demand content. The one or more devices may further cause the determined amount of wireless resources to be allocated, from a unicast service, to the broadcast service at one or more wireless transmission devices, of the group of wireless transmission devices.2013-06-06
20130145403APPARATUS AND METHOD FOR PROVIDING MEDIA PROGRAMMING - A system that incorporates teachings of the present disclosure may include, for example, detecting at a mobile communication device a presence of a set-top box communicatively coupled to a display device, negotiating a transfer of operational control of the display device from the detected set top box to the mobile communication device, receiving a media stream at the mobile communication device by way of wireless communication with a media source, and transmitting a selected media program from the mobile communication device to the display device by way of a wireless communication link between the mobile communication device and the detected set-top box for presentation at the display device without decoding of the selected media program being performed by the set top box. Other embodiments are disclosed.2013-06-06
20130145404REMOTE TRANSMISSION SYSTEM - A transmission apparatus includes a plurality of modems, which are configured to communicate via respective wireless communication channels and includes at least first and second modems configured to communicate respectively over separate first and second wireless communication networks. The transmission apparatus also includes a stream processor, which is configured to receive and process an incoming media stream so as to provide multiple upload streams for transmission by different ones of the modems, including first and second upload streams for transmission by the first and second modems, respectively.2013-06-06
20130145405USING DIFFERENT PHYSICAL INTERFACE TO REQUEST RETRANSMISSION OF PACKET LOST ON UNIDIRECTIONAL INTERFACE - Packets detected to be lost from a unidirectional interface such as an ATSC tuner are requested from the source or a peer using a different physical interface. The packets may be retransmitted for reception over either interface.2013-06-06
20130145406VIDEO ON DEMAND PROCESSING - A device may include a communication interface configured to receive a request from a client device, where the request identifies a first video on demand (VOD). The device may also include logic configured to identify capabilities associated with the client device, the capabilities including at least one of a decoding capability of the client device, a content protection scheme supported by the client device, or a transport protocol via which the client device can communicate, and forward the request for the VOD to a service provider associated with providing the first VOD. The logic may also be configured to receive a media stream from the service provider, the media stream corresponding to the first VOD, process the media stream in accordance with the identified capabilities, and forward the processed media stream to the client device.2013-06-06
20130145407Method of outputting video content from a computing device to a playback device and related media sharing system - A method of outputting video content from a computing device to a playback device includes executing a video viewing application on the computing device and browsing a video website on the computing device through the video viewing application, selecting video content to watch on the video website by navigating to a corresponding video webpage address through the video viewing application, and the video viewing application converting the video webpage address into a corresponding video file address. The method further includes selecting a playback device through the video viewing application, the selected playback device being in communication with the computing device, the video viewing application obtaining video data and obtaining audio data from the video file address and outputting the obtained video and audio data from the computing device to the selected playback device, and playing the obtained video data and the obtained audio data on the selected playback device.2013-06-06
20130145408FILE SYSTEM INDEX TABLE FOR A REMOTE STORAGE DIGITAL VIDEO RECORDER THAT HANDLES MULTIPLE BITRATE CONTENT - A remote storage digital video recorder (RS-DVR) system is disclosed. The RS-DVR system includes a network interface to communicate data between the RS-DVR system and a subscriber system via a network, a file system module coupled to the network interface, an ingest agent coupled to the file system module to receive encoded media segments that represent media content files encoded at a plurality of different bitrates; and a storage architecture coupled to the file system to store the encoded media segments, resulting in stored media segments. The RS-DVR carries out a number of functions and operations to service multiple subscribers and associated subscriber systems, such as various storage device management operations, file structure techniques, assignment of recorded media to subscribers, file system indexing, and supporting shared and per-subscriber content rights.2013-06-06
20130145409SYSTEM AND METHOD FOR MEDIA CONTENT DELIVER - A system and method for media content delivery is described. One implementation of the system and method allows for interactive services to be ordered and delivered to a limited-capability set-top box. A gateway unit receives interactive service commands from the remote control of the set-top box through one communication path (such as a wireless path) and relays those commands to a media content network. The media content network then delivers media content in response to the interactive service commands through another communication path (such as a wired path).2013-06-06
20130145410REMOTE STORAGE DIGITAL VIDEO RECORDER FOR MULTIPLE BITRATE DIGITAL MEDIA CONTENT - A remote storage digital video recorder (RS-DVR) system is disclosed. The RS-DVR system includes a network interface to communicate data between the RS-DVR system and a subscriber system via a network, a file system module coupled to the network interface, an ingest agent coupled to the file system module to receive encoded media segments that represent media content files encoded at a plurality of different bitrates, and a storage architecture coupled to the file system to store the encoded media segments, resulting in stored media segments. The RS-DVR carries out a number of functions and operations to service multiple subscribers and associated subscriber systems, such as various storage device management operations, file structure techniques, assignment of recorded media to subscribers, file system indexing, and supporting shared and per-subscriber content rights.2013-06-06
20130145411FILE STRUCTURE TECHNIQUES FOR STORING MULTIPLE BITRATE CONTENT - A remote storage digital video recorder (RS-DVR) system is disclosed. The RS-DVR system includes a network interface to communicate data between the RS-DVR system and a subscriber system via a network, a file system module coupled to the network interface, an ingest agent coupled to the file system module to receive encoded media segments that represent media content files encoded at a plurality of different bitrates; and a storage architecture coupled to the file system to store the encoded media segments, resulting in stored media segments. The RS-DVR carries out a number of functions and operations to service multiple subscribers and associated subscriber systems, such as various storage device management operations, file structure techniques, assignment of recorded media to subscribers, file system indexing, and supporting shared and per-subscriber content rights.2013-06-06
20130145412System for Acceleration of Web Page Delivery - A method comprising running a web browser on one or more servers of a service center, and hosting files for a web page on a storage unit associated with the one or more servers. Upon receiving user input from a client device to the web browser at the service center, streaming interactive video web page is transmitted to the client device with substantially no detectable latency.2013-06-06
20130145413Transforming Uncompressed Video Traffic to Network-Aware Ethernet Traffic with A/V Bridging Capabilities and A/V Bridging Extensions - Aspects of a system for transforming uncompressed video traffic to network-aware Ethernet traffic with A/V bridging capabilities and A/V bridging extensions may include a graphics processing unit (GPU) that may enable encapsulation of uncompressed video data and/or auxiliary channel data within a Display Port protocol data unit (PDU). A LAN subsystem may enable encapsulation of the Display Port PDU within an encapsulating PDU. The LAN subsystem may enable determination of a traffic class designation associated with the encapsulating PDU. The LAN subsystem may enable transmission of the encapsulating PDU via a network based on the traffic class designation.2013-06-06
20130145414TERMINAL APPARATUS, SERVER APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND LINKING APPLICATION SUPPLY SYSTEM2013-06-06
20130145415LATE ASSIGNMENT OF RECORDED DIGITAL MEDIA CONTENT AT TIME OF PLAYBACK - A remote storage digital video recorder (RS-DVR) system is disclosed. The RS-DVR system includes a network interface to communicate data between the RS-DVR system and a subscriber system via a network, a file system module coupled to the network interface, an ingest agent coupled to the file system module to receive encoded media segments that represent media content files encoded at a plurality of different bitrates; and a storage architecture coupled to the file system to store the encoded media segments, resulting in stored media segments. The RS-DVR carries out a number of functions and operations to service multiple subscribers and associated subscriber systems, such as various storage device management operations, file structure techniques, assignment of recorded media to subscribers, file system indexing, and supporting shared and per-subscriber content rights.2013-06-06
20130145416DIRECT CURRENT VOLTAGE OUTPUT CIRCUIT AND SET TOP BOX - When the conduction state of at least one MOS transistor of a PMOS transistor (P2013-06-06
20130145417SERVICE EXECUTING APPARATUS - A broadcast receiving terminal, which implements a service executing method, includes a receiver operable to receive a service that uses a plurality of resources, a recording medium, and a service executer operable to execute a service that uses the plurality of resources in a service execution environment intended for the service. The terminal also includes an associater operable to associate the service execution environment with resource set information indicating the plurality of resources used by the service, when an application requests the service executer to execute the service, and a storager operable to store a plurality of service execution environments together with the associated resource set information. The terminal further includes a resource manager operable to provide, to a selected service, the plurality of resources indicated in the resource set information in the associated service execution environment.2013-06-06
20130145418UPDATING SYSTEM BEHAVIOR DYNAMICALLY USING FEATURE EXPRESSIONS AND FEATURE LOOPS - Behavior of an online system is modified dynamically using feature expressions and feature loops. A feature expression can be expressed as a combination of other features or feature expressions, thereby allowing specification of complex features. The sets of feature expressions and policies of an online system can be modified while the online system is running. Feature loops aggregate values of a feature expression across a plurality of actions, for example, number of occurrences of an event over a time interval. The online system evaluates a set of feature expressions in response to actions performed by users. Feature expressions are used to specify policies that determine how the online system reacts to certain types of user actions. The ability to dynamically modify the feature expressions and policies of the online system allows the online system to adapt to attacks by malicious users in a timely manner.2013-06-06
20130145419Systems and Methods for Generating Trust Federation Data from BPMN Choreography - In practice, collaborative processes using web services present complex information security requirements, as a domain security model needs to conditionally control access to data and services by both internal and external collaboration participants. One embodiment presents an automated process for defining required trust relationships between collaboration participants that can be used for materializing domain IT policies. A BPMN choreography process model of a business process is parsed to extract participant and task lists. An initiating participant is identified for each task in the task list. A trust graph (can be represented in a matrix format) is generated to represent trust relationships implicit in the business process model by indicating in the trust graph that all other participants in a given task are to trust the initiating participant of that task. A registry can be used to gather data used to materialize security policies based on the trust relationships.2013-06-06
20130145420SECURE AUTHENTICATION USING MOBILE DEVICE - Representative embodiments of secure authentication include receiving, by a server, information from a mobile device identifying (i) the mobile device and (ii) an identifying tag read by the mobile device; accessing, by the server, a database to identify (i) a user associated with the mobile device, (ii) a secure device associated with the identifying tag, and (iii) a security policy associated with the secure device; and if the policy permits access by the identified user to the identified secure device, causing access to the secure device to be accorded to the user.2013-06-06
20130145421POLICY EVALUATION IN CONTROLLED ENVIRONMENT - A module may include interface logic to receive information identifying a state related to a client device via logic related to a controlled environment, and to send a valid policy result to a host device, where the valid policy result is related to the state. The module may include processing logic to process policy content according to a resource policy, where the processing is based on the information, and to produce the valid policy result based on the processing using the resource policy, where the valid policy result is adapted for use by the host device when implementing the network policy with respect to a destination device when the client device attempts to communicate with the destination device.2013-06-06
20130145422Security Techniques For Device Assisted Services - Methods and systems for receiving a report from an end-user device, the report comprising information about a device service state; determining, based on the report, that a particular service policy setting of the end-user device needs to be modified, the particular service policy setting associated with a service profile that provides for access to a network data service over a wireless access network and configured to assist in controlling one or more communications between the end-user device and the wireless access network, the particular service policy setting stored in a protected partition configured to deter or prevent unauthorized modifications to the particular service policy setting; and, in response to determining that the particular service policy setting needs to be modified, sending configuration information to the end-user device, the configuration information configured to assist in modifying or allowing modifications to the particular service policy setting.2013-06-06
20130145423METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR TAGGING CONTENT ON UNCONTROLLED WEB APPLICATION - Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including messages and application content, originating from outside of the network may be dynamically converted to structured data that can be tagged. Interactions and activities can be monitored and processed differently according to internal policies and/or business rules. For example, at least a portion of the structured data can be modified prior to forwarding to the device, access by the device to at least a portion of the structured data can be blocked or limited, access by the device to one or more features associated with the structured data can be blocked or limited, etc.2013-06-06
20130145424SECURE PROVISION OF A DIGITAL CONTENT PROTECTION SCHEME - Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust relationship between a media application within an application execution environment of a device and a security controller of the device. The application execution environment may include an operating system, and the operating system may control resources within the application execution environment. Additionally, the security controller may be outside the application execution environment, enabling components of the security controller to be secured from components of the operating system. Further, the method may include the security controller in enabling a digital content protection scheme for the media application to provide digital content to a digital content protection enabled transmitter within the application execution environment for provision to a digital content protection enabled receiver. Other embodiments may be disclosed or claimed.2013-06-06
20130145425VERIFICATION SERVICE - Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions.2013-06-06
20130145426Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access - A computer-based service provides methods and apparatus for a user to manage a collection of information that the user wishes to share with, or distribute to, one or more designated recipients, typically at a future time, where the user controls the contents of the collection, and the times and rules under which the collection, or portions of the collection, may be accessed by, or delivered to, the one or more designated recipients; and where the resources for storing, retrieving, processing and communicating the collection of information is logically centralized and remote from the user.2013-06-06
20130145427AUTHORIZING APPLICATION ACCESS TO SECURE RESOURCES - An application submits a permission request to a resource server. In response to receiving the request, the resource server generates a user interface that asks the user to grant or deny the requested permissions. If the permissions are granted, data is stored indicating that the application has the requested permissions. When a runtime request for a resource is received, the resource server determines whether the request has been made by a user, by an application, or by an application on behalf of a user. If the request is made by an application only, the request is granted only if the application has permission to access the resource by way of a direct call not on behalf of a user. If the request is made by an application on behalf of a user, the request is granted only if both the user and the application have sufficient permission.2013-06-06
20130145428DENIAL OF SERVICE ATTACK RESISTANT INPUT PORT - An input port for a computer system may retain potentially authenticable requests for processing while removing other connection requests from an incoming queue or request pool. The input port may continue to receive new requests even during a denial of service attack, allowing potentially legitimate requests to be processed. In a typical embodiment, a first in, first out buffer may be used to receive and process connection requests. When the buffer is full, any request that comes from a device having a previous connection with the computer system may be retained for authentication, while removing requests that come from unknown devices. Some embodiments may retain a list of known devices associated with administrators or other known users, and the list may be updated as those users are authenticated.2013-06-06
20130145429System Utilizing a Secure Element - An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.2013-06-06
20130145430ASSET STREAMING - A device streams assets to network-based storage in cooperation with servers administering the network-based storage. The servers manage and secure access to the stream of assets, on both an account level and an asset level, in accordance with asset metadata registered for the assets during streaming, and in accordance with account data associated with the assets being streamed and the device with which the assets are streamed. The servers operate to notify other authorized devices associated with the device that the assets are available to download, including initiating the download of assets automatically or in response to user input.2013-06-06
20130145431INTEGRATED CIRCUITS AS A SERVICE - Technologies are generally described for provisioning and managing access to FPGAs as a service. In some examples, a system for allowing provisioning management for shared FPGA use and access control to enable a user's processes to access their custom programmed FPGA may accept user packages for compilation to an FPGA in communication with datacenter servers. The user packages may be imaged to the FPGA with an added management payload, and a driver and user key may be employed to allow selective access to the FPGA as a service for datacenter virtual machines. Together these elements allow a datacenter to provision rentable integrated circuits as a service (ICaaS). Additional services such as billing tracking, provision management, and access control may be provided to users allowing them to realize lower cost while the datacenter realizes greater return.2013-06-06
20130145432TRUST CONFERENCING APPARATUS AND METHODS IN DIGITAL COMMUNICATION - A conferencing application executing on a computerized appliance from a machine-readable medium, the computerized appliance coupled to one or more networks is provided, the application including functionality for responding to requests to join a conference, and for enabling requesters as participants, functionality for receiving and rendering text, voice or video data from each registered participant as text, voice or video data to be transmitted to individual ones of other participants, functionality for controlling which received text, voice or video data is transmitted to which participants, and functionality for receiving and executing instructions from a trust authority.2013-06-06
20130145433USING A LOCAL AUTHORIZATION EXTENSION TO PROVIDE ACCESS AUTHORIZATION FOR A MODULE TO ACCESS A COMPUTING SYSTEM - Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a computing system. A memory stores information on a first validity range comprising position coordinates for a module seeking to access the computing system and a second validity range comprising position coordinates for a location authorization extension for a computing system. A determination is made of a first position signal from a first receiver of the module and of a second position signal from a second receiver of the location authorization module. Determinations are made as to whether the first position signal is within the first validity range and whether the second position signal is within the second validity range. The module is granted access to the computing system in response to determining that the first position signal is within the first validity range and the second position signal is within the second validity range.2013-06-06
20130145434Unattended Authentication in a Secondary Authentication Service for Wireless Carriers - A wireless device initiates a connection by sending an Unsolicited HTTP(s) POST that includes a user identity and credentials, not in response to a form that is provided to the wireless device from a secondary authentication service (2AS), so the 2AS does not have a session with the wireless device. An HTTP(s) session is handled by a home agent or enterprise home agent. The 2AS uses the user identity and credentials from the Unsolicited POST to complete interaction with a downstream identity management server, and takes appropriate action by either indicating to the home agent that authentication was successful and the device is authorized to use the private enterprise network resources protected by the 2AS process; or if the authentication was unsuccessful that the session(s) should be disconnected. In addition, the 2AS may communicate with the agent on the wireless device to send intermediate and final status of the attempt.2013-06-06
20130145435METHOD AND APPARATUS FOR PROVIDING ENHANCED SERVICE AUTHORIZATION - An approach is provided for authorizing one or more services from service providers in a communications network. The approach includes receiving a request from a first service provider, the request having an associated primary token and a secondary token identifier, the secondary token identifier relating to resources of a second service provider. Based, at least in part, on the secondary token identifier, a secondary token is identified; and then the secondary token is sent to the first service provider, wherein the first service provider and the second service provider belong to different trust domains and the first service provider can use the secondary token to access resources of the second service provider.2013-06-06
20130145436SYSTEM AND METHOD FOR RESTRICTING ACCESS TO NETWORK PERFORMANCE INFORMATION - A system and method for restricting access to network performance information associated with communications over a packet network. A request may be received from a user to access network performance information associated with communications of data packets over a packet network. A determination as to whether the user has permission to access the network performance information may be made. In response to determining that the user has permission to access the network performance information, the user may be enabled to access the network performance information; otherwise, the user may be prevented from accessing the network performance information. The network performance information may include information associated with communications of data packets including real-time content and non-real-time content.2013-06-06
20130145437PROTECTION AGAINST MALWARE ON WEB RESOURCES UTILIZING SCRIPTS FOR CONTENT SCANNING - A method and system for identification of malware threats on web resources. The system employs a scheduled antivirus (AV) scanning of web resources. The scheduled scanning of web resources allows to create malware check lists and to configure access to web resources. Frequency and depth of inspection (i.e., scan) are determined for each web resource. The user identifiers are used for scheduled AV scanning of web resources. The system allows for scanning a web resource based on selected configurations without using additional client applications.2013-06-06
20130145438MOBILE EQUIPMENT AND SECURITY SETTING METHOD THEREOF - The present invention relates to mobile equipment and a security setting method thereof for improving security of an object accessible by a user and for providing an easy security setting for the user by controlling user rights for the object according to a security setting pattern of the user. To this end, mobile equipment according to an embodiment of the present invention comprises: a mode management unit which determines a security setting mode; a setting management unit which checks a preset security setting in the case that the security setting mode is a first mode, and checks a security setting corresponding to time or location in a security setting pattern in the case that the security setting mode is a second mode; and a right control unit which controls user rights for an object according to the checked security setting, wherein the security setting pattern is changed on the basis of information on the time or location.2013-06-06
20130145439APPARATUS AND METHOD FOR SECURE STORAGE OF INFORMATION ON A MOBILE TERMINAL - A mobile terminal and method for securely storing private information are provided. The mobile terminal includes a cellular band transceiver for transmitting and receiving radio signals in a cellular band, a controller for controlling operations of the mobile terminal, and a memory for storing programs used by controller for the controlling of the operations of the mobile terminal and data including the private information, the memory including a secure storage area for storing the private information, and a non-secure storage area for storing the non-private information.2013-06-06
20130145440REGULATING ACCESS USING INFORMATION REGARDING A HOST MACHINE OF A PORTABLE STORAGE DRIVE - Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a portable storage drive that stores an operating system that is booted by the host machine. The information regarding the host machine of a portable storage drive may be used as a second factor in a two-factor authentication. Such information regarding the host machine may include, in some embodiments, information retrieved from a secure storage of the host machine, such as from a cryptoprocessor of the host machine. The information may include an identifier for the host machine or may be a user credential pre-provisioned to the host machine to be used in two-factor authentication.2013-06-06
20130145441CAPTCHA AUTHENTICATION PROCESSES AND SYSTEMS USING VISUAL OBJECT IDENTIFICATION - Systems and processes for performing user verification using an imaged-based CAPTCHA are disclosed. The verification process can include receiving a request from a user to access restricted content. In response to the request, a plurality of images may be presented to the user. A challenge question or command that identifies one or more of the displayed plurality of images may also be presented to a user. A selection of one or more of the plurality images may then be received from the user. The user's selection may be reviewed to determine the accuracy of the selection with respect to the challenge question or command. If the user correctly identifies a threshold number of images, then the user may be authenticated and allowed to access the restricted content. However, if the user does not correctly identify the threshold number of images, then the user may be denied access the restricted content.2013-06-06
20130145442SYSTEM AND METHOD FOR PRIVILEGE DELEGATION AND CONTROL - This invention provides a privilege delegation mechanism, which allows a privilege and associated control attributes to be delegated from a security token to another security token or an intelligent device such as a computer system. The privilege may be in the form of an attribute certificate, a key component of a cryptographic key, a complete cryptographic key, digital certificate, digital right, license or loyalty credits. The purpose of the delegation is to allow another security token or computer system to act as a surrogate for the security token or to access a resource which requires components from both units before access is permitted. Attributes associated with the delegated privilege control the scope and use of the privilege. The delegation may allow the surrogate to perform authentications, access data or resources included on another security token or computer system. Authentications are performed prior to transferring of the delegable privileges.2013-06-06
20130145443APPLICATION SECURITY SYSTEM AND METHOD - According to an aspect, a computing device includes a processor; a computer readable memory; a display screen; a touch sensitive panel overlying the display screen; and computing device application instructions coded in the computer readable memory and executed by the processor to: display a user-selectable photograph on the display screen, the user-selectable photograph including a group of fiducials, generate captured pattern data, the captured pattern data representing coordinate values on the touch sensitive panel where touched by a user, and provide for authentication of the user based on a comparison of the captured pattern data and respective locations of the group of fiducials included in the user-selectable photograph.2013-06-06
20130145444ELECTRONIC RECEIPT SYSTEM, TERMINAL DEVICE AND METHOD OF PROVIDING ELECTRONIC RECEIPT - An electronic receipt system includes a terminal device, a first memory unit which a first user has, and a second memory unit which a second user who is a trading partner of the first user has. The terminal device includes biometric authentication obtaining means to obtain biometric authentication information of the first user and biometric authentication information of the second user; electronic tally generating means to generate electronic tallies based on the biometric authentication information of the both users; electronic receipt generating means to generate electronic receipts including transaction information of the first user and the second user, the electronic receipts including a first electronic receipt having one of the electronic tallies and a second electronic receipt having another of the relevant electronic tallies; means to store the first electronic receipt in the first memory unit; and means to make the second electronic receipt to be stored in the second memory unit.2013-06-06
20130145445MECHANISM FOR FACILITATING DYNAMIC AND CONTINUOUS TESTING OF SECURITY ASSERTION MARKUP LANGUAGE CREDENTIALS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic and continuous testing of security assertion markup language (SAML) credentials in an on-demand services environment. In one embodiment and by way of example, a method includes identifying, at a computing device, an organization using a SAML process in an on-demand service environment, obtaining SAML credentials relating to the identified organization, and testing the SAML credentials relating to the identified organization. The testing includes asserting a set of test credentials against the SAML credentials relating to the identified organization. The method may further include generating one or more new codes based on testing results obtained from testing.2013-06-06
20130145446SYSTEMS AND METHODS FOR FAST AUTHENTICATION WITH A MOBILE DEVICE - A system for authenticating a user to a service includes a service, an authentication server and a device. The service includes first signal interface, first processing hardware and first user interface. The authentication server includes second signal interface and second processing hardware. First signal interface transmits a request to the authentication server to authenticate a user. Second processing hardware creates a session identifier and encodes it into a pictogram. Second signal interface transmits the pictogram to the service. The device includes third processing hardware that scans the pictogram and extracts the session identifier, and a third signal interface that transmits the credentials and the session identifier to the authentication server. Second processing hardware verifies the credentials, and second signal interface securely transmits the result of the authentication to the service.2013-06-06
20130145447CLOUD-BASED DATA BACKUP AND SYNC WITH SECURE LOCAL STORAGE OF ACCESS KEYS - Methods and systems are provided for secure online data access. In one embodiment, three levels of security are provided where user master passwords are not required at a server. A user device may register with a storage service and receive a user device key that is stored on the device and at the service. The user device key may be used to authenticate the user device with the storage service. As data in the storage service is encrypted with a master password, the data may be protected from disclosure. As a user master key or derivative thereof is not used in authentication, the data may be protected from a disclosure or breach of the authentication credentials. Encryption and decryption may thus be performed on the user device with a user master key that may not be disclosed externally from the user device.2013-06-06
20130145448LOCK SCREENS TO ACCESS WORK ENVIRONMENTS ON A PERSONAL MOBILE DEVICE - One or more embodiments of the invention provide access to a work environment in a mobile device from a lock screen presented by a personal environment of the mobile device, wherein the work environment is running in a virtual machine supported by a hypervisor running within the personal environment and wherein the personal environment is a host operating system (OS) of the mobile device. The host OS receives an authentication credential from a user in response to a presentation of the lock screen on a user interface (UI) of the mobile device and then determines whether the authentication credential is valid for the personal environment or the work environment. If the authentication credential is valid for the personal environment, access is enabled only to the personal environment. If the authentication credential is valid for the work environment, access is enabled to both the personal environment and the work environment.2013-06-06
20130145449Method and Apparatus for Providing a One-Time Password - In a method for providing a one-time password for a user device belonging to a user, which password is intended to register the user device with a server, the server generates the one-time password using a cryptographic operation on the basis of a unique use identifier and transmits the password to the user device. The method provides a service provider with the possibility of tying additional conditions for registration to the one-time password and thus increases the flexibility of the service provider when configuring the services offered by the latter and increases security against manipulation.2013-06-06
20130145450AUDITABLE MULTICLAIM SECURITY TOKEN - The current invention provides a paradigm for securely transmitting messages using an auditable message token and associated protocol for recording information pertaining to events occurring with respect to transmission(s) of a message.2013-06-06
20130145451APPARATUS AND METHOD OF BINDING A REMOVABLE MODULE TO AN ACCESS TERMINAL - The described apparatus and methods may include a processor, a memory in communication with the processor, a removable module in communication with the processor and operable to store data, an initialization component executable by the processor and configured to initialize the removable module, and an authentication component executable by the processor and configured to: receive a command from the removable module to perform an authentication operation, wherein the command is a standard message having a command qualifier value or code that represents an authentication challenge; obtain a random value from the removable module in response to the command; calculate a response based on the random value and a terminal key stored in the memory; and transmit the response to the removable module.2013-06-06
20130145452SYSTEMS AND METHODS FOR MANAGING ADVANCED METERING INFRASTRUCTURE - A system for maintaining and hosting an AMI command and control application is disclosed. The system includes an AMI command and control application module in a network compartment for measuring energy usage from customer meters, managing an AMI network, and executing connect/disconnect orders; and a plurality of firewalls to provide a security perimeter to the AMI command and control application module when the module is accessed by a vendor network or a utility network. The AMI command and control application module includes a VPN concentrator and a 6 in 4 router to provide a security perimeter between the AMI command and control application module and the AMI network.2013-06-06
20130145453Multi Mode Operation Using User Interface Lock - A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a mobile computing device through a launcher. The configuration includes mapping one or more applications with a guest access code. The configuration receives, through a display screen of a mobile computing device, an access code, and determines whether the received access code corresponds with the guest access code. The configuration identifies the mapped applications corresponding to the guest access code and provides for display, on a screen of the mobile computing device, the identified applications.2013-06-06
20130145454PORTABLE INFORMATION TERMINAL, ITS CONTROL METHOD AND PROGRAM - Disclosed are a portable information terminal for materializing limitation of its use more effectively and method and program for controlling the terminal The portable information terminal comprises a mail address storing unit for storing mail addresses, a mail reception unit for receiving mails, a certification information generation unit for generating certification information and a terminal lock controlling unit for limiting a predetermined function or operation, wherein when a mail address of an originator of transmission of a mail received by the mail reception unit coincides with an address stored in the mail address storing unit, the predetermined function or operation is limited by certification information the certification information generating unit generates.2013-06-06
20130145455METHOD FOR ACCESSING A SECURE STORAGE, SECURE STORAGE AND SYSTEM COMPRISING THE SECURE STORAGE - It is described a method for accessing a secure storage of a mobile device, the method comprising: providing a generic interface for accessing the secure storage; accessing the secure storage using the generic interface by a first application of the mobile device; accessing the secure storage using the generic interface by a second application of the mobile device. Further, a corresponding secure electronic storage and a system is described.2013-06-06
20130145456SYSTEM AND METHOD FOR AUTHENTICATING CODE EXECUTING ON COMPUTER SYSTEM - A code authentication architecture is used to sign code by adding one or more digital signatures to it. The digital signatures identify what authority signed the code, what the code contains, what type of program the code is, or other identifying information. When the signed code is later executed on a computer system, its identity is obtained by accessing encrypted information of the code stored on disk. The architecture then determines whether the identity satisfies at least one requirement imposed on the code for some purpose. If the code has been altered from when it was signed or it fails to satisfy a requirement imposed, the code will not have a valid identity. In addition to verifying the identity of the code, the architecture also validates executing code immediately responsible for managing the code and additional executing code in a chain of hosts responsible for managing one another.2013-06-06
20130145457Protecting Personal Information Upon Sharing a Personal Computing Device - In particular embodiments, a temporary user is able to use another's personal computing device in shared mode for a short period of time while experiencing a personalized user interface. An indication is detected that a personal computing device associated with a primary user is to be shared with a temporary user. Access to local personal information associated with the primary user is disabled if it is stored on the personal computing device. Access to remote personal information of the primary user that is accessible from the personal computing device is disabled. A personalized user interface incorporating personal information associated with the temporary user is presented on the personal computing device for the temporary user. Personal information of the primary user is not accessible by the temporary user, and vice versa. When shared mode is to be terminated, all personal information of the temporary user is deleted.2013-06-06
20130145458ELECTRONIC DEVICE AND METHOD FOR UNLOCKING LOCKED OPERATING SYSTEM - A method for unlocking a locked operating system of an electronic device is provided. The electronic device includes a storage unit and a locking unit, the storage unit is configured for storing a preset password and preset unlocking request information. The method includes steps: receiving a message from a second electronic device; verifying the received message according to the preset unlocking request information; and sending the preset password to the second electronic device if the verification is successful.2013-06-06
20130145459Information Processing Device, Control Method and Program - An information processing device, control method and program that suppresses security risks to a minimum. When power is activated, a control component starts by reading a first program from a first memory component and, in observance of the first memory program, it reads the identification information of an authentication device that is mounted to a mounting component, references a table T, and performs authentication processing for the authentication device, with the condition that the count value correspondingly listed for the identification information of the authentication device be larger than a prescribed value and, when authentication processing has succeeded, starts by reading the second program from a second memory component, and in the event that the authentication device continues to be mounted to the mounting component during executing the second program, decreases the table count value corresponding to the unique identification information of the authentication device.2013-06-06
20130145460Progammable Customized User Interface for Transport Refrigeration Units - A control device having a graphical user interface for controlling the operation of a transport refrigeration unit is disclosed. The graphical user interface may include a menu structure having multiple levels of menu options, executable functions and data items that may be navigated and viewed by a user. Access to the various menus may be user-specific and controlled so that a subset of the information in the menu structure is available to normal users, and larger subsets of the information are available to advanced users having higher levels of authorization to the menus and information contained in the graphical user interface device. The graphical user interface may also include programmable soft keys that may take users directly to frequently viewed menu options, functions and data items without the necessity of navigating through the levels of the menu structure.2013-06-06
20130145461Security Method for Mobile Ad Hoc Networks with Efficient Flooding Mechanism Using Layer Independent Passive Clustering (LIPC) - A security method and system for Layer Independent Passive Clustering (LIPC) is presented. The inventive method and system maintains the states in the LIPC cluster formation protocol while adding a ‘Trusworthy’ event to each state and provides a methodology that depends on the state of the transmitting node to quantify Trustworthy and derive a Trust Confidence Value (TCV) to represent the level of confidence in quantifying ‘Trustworthy’. The invention dynamically computes a degree of trustworthiness for each participating network node and eliminates nodes from participating in the PC cluster formation protocol and packet forwarding if they do not meet established trust metrics. The security solution can also apply to PC-based Mobile Ad hoc Networks (MANETs). The novel system and method applies a multidimensional set of security algorithms to protect the LIPC cluster formation protocol from malicious attacks that compromise cluster formation and secure routing.2013-06-06
20130145462Phishing Processing Method and System and Computer Readable Storage Medium Applying the Method - A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.2013-06-06
20130145463METHODS AND APPARATUS FOR CONTROL AND DETECTION OF MALICIOUS CONTENT USING A SANDBOX ENVIRONMENT - A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.2013-06-06
20130145464Network Overload Detection and Mitigation System and Method - Systems and methods are provided for detecting and mitigating overload conditions affecting one or more computers attached to a network, such as overloads resulting from distributed denial of service (DDoS) attacks, for example. According to some described embodiments, an attempted overload condition is detected, e.g., by a system, through following a method, or both, within a data cleaning center. Detection may be achieved, e.g., by analyzing data packets traveling over the network to identify packets that bear characteristics that may be associated with DDoS attacks, and this analysis may include examination of the packets' data payloads. Mitigation, in turn, may include discarding some data packets, redirecting network traffic, or some combination thereof.2013-06-06
20130145465MULTILAYERED DECEPTION FOR INTRUSION DETECTION AND PREVENTION - Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.2013-06-06
20130145466System And Method For Detecting Malware In Documents - In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.2013-06-06
20130145467SYSTEMS AND METHODS FOR DETECTING A SECURITY BREACH IN A COMPUTER SYSTEM - The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach, a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected.2013-06-06
20130145468SECURITY SYSTEM BASED ON INPUT SHORTCUTS FOR A COMPUTER DEVICE - A method of activating security functions on a computer device, for example a mobile communications device. The computer device includes a device state that may be realized by way of a first user input or a second user input. The method includes designating the first user input to realize the device state as a security rule having an associated security function, detecting realization of the device state, and activating the associated security function if the device state was realized by way of the second user input rather than the first user input. For example, the first user input may be a shortcut input, and the second user input may be a conventional or normal input.2013-06-06
20130145469PREVENTING AND DETECTING PRINT-PROVIDER STARTUP MALWARE - A method for preventing malware attacks includes detecting an attempt on an electronic device to modify a print service registry, determining an entity associated with the attempt to modify the print service registry, determining a malware status of the entity, and, based on the malware status of the entity, allowing or denying the modification to the print service registry. The print service registry is configured to store configuration information about mechanisms to be used when printing from the electronic device.2013-06-06
20130145470DETECTING MALWARE USING PATTERNS - In certain embodiments, a method includes receiving a first file. The method also includes accessing at least one storage module comprising a first malware pattern, a second malware pattern, and a third malware pattern. The second malware pattern is a first permutation of the first malware pattern. The third malware pattern is a second permutation of the second malware pattern and is different than the second malware pattern. The method includes comparing, by at least one processor, the first file to the third malware pattern. In addition, the method includes determining, by the at least one processor, that the first file comprises malware in response to comparing the file to the third malware pattern.2013-06-06
20130145471Detecting Malware Using Stored Patterns - In one embodiment, a method includes identifying a plurality of portions of a file and comparing the plurality of portions of the file to a plurality of stored patterns. The plurality of stored patterns include portions of known malware. The method also includes determining, from the plurality of portions of the file and based on the comparing of the plurality of portions of the file to the plurality of stored patterns, a set of matching portions. The set of matching portions include one or more of the plurality of portions of the file. In addition, the method includes determining a score for each portion in the set of matching portions and providing information regarding the set of matching portions. The information includes the scores determined for each portion of the set of matching portions.2013-06-06
20130145472Preventing Execution of Task Scheduled Malware - A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity associated with the attempt to access the task scheduler, determining a malware status of the entity, and, based on the malware status of the entity, allowing or denying the attempted access to the task scheduler. The task scheduler is configured to launch one or more applications at a specified time or interval.2013-06-06
20130145473METHODS AND APPARATUS TO ANONYMIZE A DATASET OF SPATIAL DATA - Methods and apparatus are disclosed to anonymize a dataset of spatial data. An example method includes generating a spatial indexing structure with spatial data, establishing a height value associated with the spatial indexing structure to generate a plurality of tree nodes, each of the plurality of tree nodes associated with spatial data counts, calculating a localized noise budget value for respective ones of the tree nodes based on the height value and an overall noise budget, and anonymizing the plurality of tree nodes with a anonymization process, the anonymization process using the localized noise budget value for respective ones of the tree nodes.2013-06-06
20130145474CONCEALING AND REVEALING MESSAGE DATA - Systems, methods, computer program products, and networks for messaging. In some examples the identity of a sending user of a message and/or other data is initially concealed when the (manipulated) message or an associated created message is sent to an intended receiving user. In these examples, revealing data which enables determination of at least some data which the sent message concealed is only provided upon request, and in some of these examples, only after a user has been authenticated as being an intended receiving user.2013-06-06
20130145475METHOD AND APPARATUS FOR SECURING TOUCH INPUT - A method and apparatus for securing touch input are provided. The method includes rendering a first screen in a secure world; rendering a second screen in a non-secure world; and outputting a secured input screen by displaying the first screen as an overlay above the second screen.2013-06-06
20130145476Managing A Software Item On A Managed Computer System - A method and system is provided of managing a current software item on a managed computer system connectable to a management computer system via a computer network. The method includes identifying, using an agent application, the current software item on the managed computer system, identifying if the current software item is an unauthorized software item; and selectively disabling the unauthorized software item.2013-06-06
20130145477CONTENT REPRODUCTION SYSTEM, INFORMATION PROCESSING TERMINAL, MEDIA SERVER, SECURE DEVICE, AND SERVER SECURE DEVICE - A content reproduction system includes an information processing terminal and a secure device. The information processing terminal receives a copyright protection application program from an application distribution server. The copyright protection application program includes a first program having a first execution format executable in the information processing terminal and a second program having a second execution format different from the first execution format and executable in the secure device. The second program is encrypted with a program key held in the secure device. By extracting and executing the first program, the information processing terminal extracts the second program and transmits the second program to the secure device. The secure device receives the second program from the information processing terminal, decrypts the second program using a program key stored in a key storing unit, and executes the second program.2013-06-06
20130145478SYSTEMS AND METHODS FOR ELECTRONICALLY PUBLISHING CONTENT - Systems and methods for electronically publishing content are disclosed. An example method includes receiving a content selection and receiving a selection of rights assigned to the content. The method also includes receiving a selection of one or more tags and associating the content with the rights assigned and the tag to enable a security trimmed rank adjusted search return of the content.2013-06-06
20130145479Systems and Methods for Clinical Study Management - Electronic systems and methods for managing and auditing Clinical Trial data includes using storage and classification of all data. New data is added to the data storage system and designated as a current version, rather than deleting previous data and storing only a single version. Further identifying information about the data, including the user name who modified it and the date of modification, may also stored. Computer users are authenticated by the systems and methods and may then add and alter data according to user permissions. Further systems and methods include electronic billing for clinical trials based on statuses of clinical trial procedures. Prices for procedures may be assigned by appropriate users and billing mechanisms may proceed based on statuses of the procedures and not necessarily on the status of the entire clinical trial.2013-06-06
20130145480E-MAIL WITH SECURE MESSAGE PARTS - A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request.2013-06-06
20130145481RECORDING MEDIUM APPARATUS AND CONTROLLER - A storage unit 2013-06-06
20130145482VEHICLE MIDDLEWARE - The present disclosure describes a vehicle implementing one or more processing modules. These modules are configured to connect and interface with the various buses in the vehicle, where the various buses are connected with the various components of the vehicle to facilitate information transfer among the vehicle components. Each processing module is further modularized with the ability to add and replace other functional modules now or in the future. These functional modules can themselves act as distinct vehicle components. Each processing modules may hand-off processing to other modules depending on its health, processing load, or by third-party control. Thus, the plurality of processing modules helps to implement a middleware point of control to the vehicle with redundancy in processing and safety and security awareness in their applications.2013-06-06
20130145483System And Method For Processing Protected Electronic Communications - Systems and methods for processing protected electronic communications are disclosed. According to one embodiment, a method for processing inbound messages may include (1) receiving a message containing protected content at an electronic device comprising at least one computer processor; (2) using the at least one computer processor, determining a manner in which unprotected content corresponding to the protected content is accessed by a user; and (3) using the at least one computer processor, automatically sending the unprotected content to a first storage location.2013-06-06
20130145484ANTIBODY PRODUCING NON-HUMAN MAMMALS - Described are transgenic, non-human animals comprising a nucleic acid encoding an immunoglobulin light chain, whereby the immunoglobulin light chain is human, human-like, or humanized. The nucleic acid is provided with a means that renders it resistant to DNA rearrangements and/or somatic hypermutations. In one embodiment, the nucleic acid comprises an expression cassette for the expression of a desired molecule in cells during a certain stage of development in cells developing into mature B cells. Further provided is methods for producing an immunoglobulin from the transgenic, non-human animal.2013-06-06
20130145485METHODS AND COMPOSITIONS FOR ALTERATION OF A CYSTIC FIBROSIS TRANSMEMBRANE CONDUCTANCE REGULATOR (CFTR) GENE - Nucleases and methods of using these nucleases for alteration of a CFTR gene and generation of cells and animal models.2013-06-06
20130145486METHOD FOR PRODUCING TUMOR CELL - The object of the invention is to provide a method for producing tumor cells by carrying out gene transfer into cells derived from normal cells. The invention provides a method for producing tumor cells by transferring cancer-associated genes into immortalized small airway epithelial cells.2013-06-06
20130145487MEGANUCLEASE VARIANTS CLEAVING A DNA TARGET SEQUENCE FROM THE DYSTROPHIN GENE AND USES THEREOF - The invention relates to meganuclease variants which cleave a DNA target sequence from the human dystrophin gene (DMD), to vectors encoding such variants, to a cell, an animal or a plant modified by such vectors and to the use of these meganuclease variants and products derived therefrom for genome therapy, ex vivo (gene cell therapy) and genome engineering including therapeutic applications and cell line engineering. The invention also relates to the use of meganuclease variants for inserting therapeutic transgenes other than DMD at the dystrophin gene locus, using this locus as a safe harbor locus. The invention also relates to the use of meganuclease variants for using the dystrophin gene locus as a landing pad to insert and express genes of interest.2013-06-06
20130145488MESOPOROUS SILICA NANOPARTICLES SUITABLE FOR CO-DELIVERY - The invention provides gold-plated mesoporous silicate bodies comprising pores and at least one agent and methods of using those bodies.2013-06-06
20130145489SEEDLESS PEPPER PLANTS - The present invention provides methods and composition for preparing seeds that when cultivated produce pepper plants with seedless fruits. These plants may further be male sterile and contain a stable non-Peterson Cytoplasmic Male Sterility (“CMS”). The invention also provides essentially pure populations of seed that, when grown, produce pepper plants with seedless fruit. Methods are provided comprising crossing a stable non-Peterson CMS plant as a female parent with pepper lines displaying a parthenocarpy trait. The invention also includes the seeds produced by such a method. Methods for breeding and using seedless pepper plants for enhancing the production of fruit under suboptimal temperature conditions are also provided.2013-06-06
20130145490METHODS AND MEANS TO MODIFY A PLANT GENOME AT A NUCLEOTIDE SEQUENCE COMMONLY USED IN PLANT GENOME ENGINEERING - Methods and means are provided to modify in a targeted manner the plant genome of transgenic plants comprising chimeric genes wherein the chimeric genes have a DNA element commonly used in plant molecular biology. Re-designed meganucleases to cleave such an element commonly used in plant molecular biology are provided.2013-06-06
20130145491Cotton Variety FM 2011GT - The cotton variety FM 2011GT is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 2011GT with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 2011GT and to plants of FM 2011GT reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 2011GT.2013-06-06
20130145492MSCA1 NUCLEOTIDE SEQUENCES IMPACTING PLANT MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences of a Msca1 gene, critical to male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in impacting male fertility in plants.2013-06-06
20130145493Transgenic Plants with Enhanced Agronomic Traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits2013-06-06
20130145494Disease Resistant Plants - The present invention relates to a plant, which is resistant to a pathogen of viral, bacterial, fungal or oomycete origin, wherein the plant has an increased homoserine level as compared to a plant that is not resistant to the said pathogen, in particular organisms of the phylum Oomycota. The invention further relates to a method for obtaining a plant, which is resistant to a pathogen of viral, bacterial, fungal or oomycete origin, comprising increasing the endogenous homoserine level in the plant.2013-06-06
20130145495ENHANCED CARBON FIXATION IN PHOTOSYNTHETIC HOSTS - This invention provides genetically modified photosynthetic organisms and methods and constructs for enhancing inorganic carbon fixation. A photosynthetic organism of the present invention comprises a RUBISCO fusion protein operatively coupled to a protein-protein interaction domain to enable the functional association of RUBISCO and carbonic anhydrase.2013-06-06
20130145496FLAVIN ENZYME HAVING FLAVONOL 8-HYDROXYLASE ACTIVITY AND USE THEREOF - The purpose of the present invention is to provide a novel flavonol 8-hydroxylase. The present invention relates to a flavin enzyme protein having a flavonol 8-hydroxylase activity, and a polynucleotide etc. encoding the same, and so on. The present invention provides: a polynucleotide comprising the nucleotide sequence of SEQ ID NO: 1 or 3; a polynucleotide encoding a protein consisting of the amino acid sequence of SEQ ID No. 2; an expression vector and transformant comprising the polynucleotide; a method for screening a plant which blooms one or more yellow coloured flowers by using the polynucleotide; a method for producing a plant which blooms one or more yellow coloured flowers by introducing the polynucleotide into host cells; and a method for producing a flavin enzyme protein having a flavonol 8-hydroxylase activity, using the transformant.2013-06-06
Website © 2025 Advameg, Inc.