Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2012 patent applcation highlights part 71
Patent application numberTitlePublished
20120144411METHOD AND SYSTEM FOR AUTOMATED MONITORING OF VIDEO ASSETS - A method and system for monitoring video assets provided by a multimedia content distribution network (MCDN) includes an expert test monitoring platform (ETMP) configured to emulate MCDN client systems at a facility of an MCDN service provider. The ETMP may allow users to provide input to an ETMP studio application for generating remote control commands to send to a desired multimedia handling device (MHD) representing an emulated MCDN client. The user input may be captured to generate an ETMP script, which may be stored in a globally addressable format that is reusable with other MHDs in the ETMP. Additional functionality for editing and combining portions of ETMP scripts to generate further ETMP scripts may also be provided.2012-06-07
20120144412MEDIA ASSET VOTING - In embodiments of media asset voting, a voting application is executed at a controllable device to interface the controllable device with portable devices via a wireless network. The voting application may be initiated at the controllable device by one of the portable devices. A request can be communicated from the controllable device to the portable devices to initiate each of the portable devices sending a user-selected vote for media asset selection at the controllable device. The controllable device receives the user-selected votes from one or more of the portable devices, and the voting application can aggregate each received vote to determine voting results. A media asset can then be selected at the controllable device based on the voting results. Alternatively or in addition, the voting results can be displayed for viewing on a display device that corresponds to the controllable device.2012-06-07
20120144413RANKING CONTENT USING USER FEEDBACK - A technology is described for ranking content using user feedback. A method can include presenting a content entry to a plurality of users to enable viewing of the content entry. Positive and negative ratings can be captured about the content entry from the plurality of users. A relative deviation value can be calculated using the positive ratings and negative ratings for the content entry to form a raw rating score using a processor. Another operation can be scaling the raw rating score via a power function to form a controversial rating score using a processor. The content entry may then be displayed in a ranked order with other content entries based on the controversial rating score.2012-06-07
20120144414Enhanced Television Services - A method and system to permit TV viewers to interact with program content broadcast over a subscriber network, such as cable, satellite, internet, or cellular telephone. The details of the ability for the viewer to interact is embedded as data in the program signal. The subscription provider broadcasts a visual indicator as a small icon during programming that informs the viewer that interaction is permitted. The viewer then uses a remote control to purchase products, vote on events, respond to polls, download files, request information, and request callback actions. The TV viewer uses the remote control to send information to a set-top box front-end application, and to iteratively create transactions that are batched and then sent to a back-end core application and database which then handles fulfillment.2012-06-07
20120144415MEDIA QUALITY MONITORING - A content processing device is configured to receive a media stream via a network. The media stream may be analyzed to detect whether an anomaly is present in the media stream indicative of a potential quality defect in playback of the media stream. Data relating to a detected anomaly may be provided to a destination via the network.2012-06-07
20120144416METHODS, APPARATUS, AND SYSTEMS FOR PRESENTING TELEVISION PROGRAMMING AND RELATED INFORMATION - Methods and apparatus for providing advertising information on a second user viewing device relating to a media program viewed on a first user viewing device. Upon determining that the media program is being presented via the first user viewing device, an ad programming signal is transmitted to the second user viewing device so as to present on the second user viewing device at least one first advertisement relating to content of the media program.2012-06-07
20120144417METHOD AND SYSTEM FOR CONTROLLING CONTENT IN A MULTIMEDIA DISPLAY - A computer system is used to create and distribute a multimedia presentation. At a source, audio-video content and an interactive application are broadcast. At a distributor, the audio-video content and the interactive application are received, and at least one resource of the application is replaced with a replacement resource. The audio-video content and the modified interactive application with the replacement resource are distributed. At a receiver, the audio-video content and the modified interactive application are received, the audio-video content is displayed, and in response to an external signal the interactive application is executed utilizing the replacement resource.2012-06-07
20120144418SYSTEM FOR PRESENTING COLLATERAL INFORMATION TO MOBILE DEVICES - A system that incorporates teachings of the present disclosure may include, for example, a tangible computer-readable storage medium having computer instructions to receive from a media processor a time-sensitive code embedded in a video stream received and presented by the media processor at a presentation device, retrieve collateral information associated with a scene of the video stream according to the time-sensitive code, and transmit the collateral information to a mobile communication device. Other embodiments are disclosed.2012-06-07
20120144419INTERACTIVE TELEVISION - One or more techniques and/or systems are disclosed for interactive television. A desired contextual probability factor is identified for respective potential interactive content, such as stored in a database, based on information relating to a consumer context. Interactive contextual content is selectively activated to run concurrently with television programming running on a consumer display, where the activated contextual content is selected based on a desired consumer interest probability factor. When the consumer interacts with the contextual content a response is provided, comprising corresponding response information, which can be sent to a consumer device associated with interactive content.2012-06-07
20120144420TARGETED ADVERTISEMENT DISTRIBUTION IN AN SDV ENVIRONMENT - A system and method for distributing targeted advertisements in a switched digital video system. The method monitors a content stream associated with a channel selected by a subscriber, where the content stream includes an advertisement segment having a start time and an end time, and an advertisement replacement opportunity inserted in the content stream. The method detects the advertisement replacement opportunity at a detection time that is prior to the start time of the advertisement segment, and sends a request to select an advertisement replacement for the advertisement segment, thereby broadcasting a service associated with the advertisement replacement prior to the start time for the advertisement segment. The method receives tune data to identify an advertisement replacement stream associated with the advertisement replacement, and tunes to the advertisement replacement at the start time for the advertisement segment.2012-06-07
20120144421IN-TRAIN INFORMATION DISTRIBUTION AND DISPLAY SYSTEM AND IN-TRAIN INFORMATION DISTRIBUTION AND DISPLAY METHOD - An in-train information distribution and display system and enables dynamic selection and display of contents having higher advertising effectiveness according to train information. A first program listing having time slots set therein and a plurality of advertising content data associated with each of the time slots of the first program listing, as candidates for program material, are prepared in a ground content-distribution server. An on-board central-distribution server determines the program material by selecting one of the plural advertising content data associated with each of the time slots of the first program listing, based on train information and passenger information obtained from a train-information central unit. A program listing having determined program materials constitutes a second program listing. Video terminals render advertising content data allocated to the respective time slots according to the second program listing and display the advertising content data as advertising information on displays.2012-06-07
20120144422DISPLAY APPARATUS AND CONTENTS SEARCHING METHOD THEREOF - A display apparatus includes a display unit; a plurality of application units which provides contents; and an integrated searching unit which controls the plurality of application units to search contents with respect to an input search word, and displays on the display unit the contents searched by the application units.2012-06-07
20120144423METHOD FOR SHARING MESSAGES IN IMAGE DISPLAY AND IMAGE DISPLAY DEVICE FOR THE SAME - A method for controlling display of information includes displaying content on a first display device, receiving a signal to share information, generating a message including information corresponding to the displayed content, and transmitting the message for display on at least a second display device. The message is transmitted to a provider of a network-related service, and the first and second display devices have access to the network-related service which may be but is not limited to a social network service.2012-06-07
20120144424ON-DEMAND USER-INTERFACE - Embodiments described herein provide a method and system for creating and displaying a media presentation. Data is received corresponding to a video program from a content delivery network. The video program is displayed on a display device. A plurality of display features are generated and displayed on the display device concurrently with the video program. The display features are selectable, and in response to a user selecting a display feature, content from a specific site associated with the selected display feature is retrieved. The retrieved content is concurrently displayed with the video program.2012-06-07
20120144425DISPLAY PROCESSING APPARATUS, DISPLAY PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an display processing apparatus includes a display module, an operation receiver, a relation calculator, a display information generator, and a display controller. The display module displays a content list indicating contents of an identical type. The operation receiver receives operation to select a key content from the content list. The relation calculator calculates relation between the key content and second contents of a plurality of types including the identical type. The display information generator generates first display information of the key content and second display information of the second contents. The display controller displays list information including the first display information and pieces of the second display information around the first display information. The pieces of the second display information are arranged such that second display information of second content with higher relation is closer to the first display information.2012-06-07
20120144426DISPLAY APPARATUS AND CONTENTS SEARCHING METHOD - A display apparatus includes a display unit which displays contents; and a integrated searching unit which displays a recommended search word related to current contents displayed on the display unit if a user inputs a search signal for executing a searching function, and displays contents related to a selected recommended search word if a user selects one of the recommended search words.2012-06-07
20120144427APPARATUS FOR CONTROLLING INTERNET PROTOCOL TELEVISION SERVICE AND CONTENT SEARCHING METHOD USING THE SAME - An apparatus for controlling an internet protocol television service and a content searching method, enabling a user to easily use EPG and to share contents with other users, are provided. An EPG server of the IPTV service controlling apparatus includes a program creating module configured to create an electronic program guide by use of information about contents and an interface module which is connected to an internet protocol television (IPTV) terminal through a predetermined session, provides the IPTV terminal with the created EPG through the session, receives a keyword from the IPTV terminal through the predetermined session and searches for a content including the key word through web browsing.2012-06-07
20120144428CONTENT SEARCHING - An apparatus, such as a personal video recorder PVR, comprises an input module for receiving information defining a selected programme. The programme may be selected for viewing or recording. The apparatus also comprises a processing module which searches information relating to programmes available from a broadcast stream and another source, such as the Internet or a local storage unit, to find programmes corresponding to the selected programme. The selected programme is associated with an identifier, and corresponding programmes are those which are associated with the same identifier as the selected programme. One of the corresponding programmes may then be chosen as an alternative to the selected programme.2012-06-07
20120144429DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT.2012-06-07
20120144430RECORDING MULTI-STREAM INTERACTIVE TELEVISION - Detailed herein is a technology which, among other things, allows recording and playback of multi-stream interactive television. In one approach to this technology, the service configuration for an interactive television feature is determined. Data describing this service configuration is then obtained, and a recording device is then configured to record a portion of the interactive television feature. A number of data streams associated with that portion of the interactive television feature are recorded. The recorded portion of the interactive television feature can then be displayed.2012-06-07
20120144431VIRTUAL CHANNEL TABLE FOR A BROADCAST PROTOCOL AND METHOD OF BROADCASTING AND RECEIVING BROADCAST SIGNALS USING THE SAME - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.2012-06-07
20120144432VIRTUAL CHANNEL TABLE FOR A BROADCAST PROTOCOL AND METHOD OF BRAODCASTING AND RECEIVING BROADCAST SIGNALS USING THE SAME - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.2012-06-07
20120144433APPARATUS AND METHOD FOR TRANSMITTING MULTIMEDIA DATA IN WIRELESS NETWORK - Provided are an apparatus and method for transmitting multimedia data in a wireless network. The apparatus and method receive multimedia data classified into at least one layer, and set different radio bearer channels for the respective at least one multimedia layer. Here, a service quality parameter is differentially applied to the respective set radio bearer channels, so that end-to-end quality of service (QoS) improvement is maximized.2012-06-07
20120144434Hospitality Set-Top to Television Interface - A set top box interface 2012-06-07
20120144435Method and system for synchronization of digital media playback - A system and method for synchronizing digital media playback at multiple digital media playback devices interconnected on a network is provided. A digital media playback device comprising a processor, a synchronization component, a timekeeper component and a digital media source performs synchronization processes to arrange for other players to begin playback at a predetermined position and time in the digital media signal. Synchronization is accomplished by processes which approximate the arrival time of a packet containing audio and/or video digital content across the network and instruct the playback devices as to when playback is to begin, and at what point in the streaming media content signal to begin playback. One method uses a time-stamp packet on the network to synchronize all players. Other methods utilize reiterative processes to narrow approximations of packet arrival time at each playback device.2012-06-07
20120144436SYSTEM AND METHOD FOR BROADCASTING VIDEO PROGRAMS AND RESPONDING TO A SUBSCRIBER RESTART COMMAND - A system is disclosed for providing broadcast programming to subscriber locations including an intermediate video supplier, subscriber location equipment and one or more video sources. The intermediate video supplier includes a video buffer and a video server that processes received subscriber requests and retrieves, according to the subscriber requests, either of currently broadcast programming or broadcast programming previously buffered in the video buffer by the video server. The subscriber location equipment includes a remote control and a local control unit that transmits the subscriber requests to the video server via one or more data links and receives, from the video server, the broadcast programming for display on a local video display via the data link. A subscriber may initiate a restart command with a single action via the remote control to restart a currently viewed program from the beginning even if the currently viewed program was joined in progress.2012-06-07
20120144437PROVIDING REMOTE ACCESS TO SEGMENTS OF A TRANSMITTED PROGRAM - A method for providing remote access to segments of a transmitted program is presented. The program is recorded, and then stored at a communication server. Information specifying a segment of the stored program is transferred from a communication device to the communication server. Also, a request for access to the specified segment of the stored program is transferred from another communication device to the communication server. In response to the request, the specified segment of the program is transferred from the communication server to the requesting communication device.2012-06-07
20120144438METHOD AND APPARATUS FOR DISTRIBUTING CONTENT VIA A NETWORK TO USER TERMINALS - A method and apparatus for distributing content via a network to user terminals includes storing content in a store, the content having a probability value indicating the probability that the content will be required by the user terminals. The content is separated into segments, each segment being associated with a respective segment probability value derived at least from the probability value of the content. The segments are ranked using at least the respective segment probability values. During a time period when the network capacity is greater than at another time, the top J ranked segments, where J is related to the broadcasting bit rate and duration of the broadcast, are predictively broadcast to user terminals.2012-06-07
20120144439METHOD AND SYSTEM FOR PLAYING ORDER PROGRAM AND SERVER ENDPOINT FOR SENDING ORDER PROGRAM - For playing an order program in the present invention, an order program request signal is sent from a digital television receiving terminal. Then linkage program request information is generated and parsed according to the order program request signal. Search the preset recording list according to user identification information to locate a program breakpoint time, wherein the recording list is used for storing and correlating user identification information to program breakpoint time. The located program breakpoint time is set as a playback start time specified in the parsed linkage program request information, and then the linkage program request information is reformed. The digital television receiving terminal is controlled to play the order program from the playback start time specified in the reformed linkage program request information, thereby accomplishing breakpoint resuming of the order program so as to allow a user to watch the order program as desired.2012-06-07
20120144440Method and System for Reducing Channel Switching Delay Of An IPTV - The disclosure provides a method and system for reducing channel switching delay of an IPTV. The method comprises that: an IPTV system plans a multicast association mode; the IPTV system determines, after receiving a message of requesting to access a multicast group from a terminal, other multicast groups associated with the multicast group which the terminal requests to access according to the multicast association mode and makes the terminal synchronously join in the multicast group which the terminal requests to access and other multicast groups associated with the multicast group which the terminal requests to access; provides normal multicast streams of the multicast group which the terminal requests to access, and provides no multicast streams or Low-Definition Television (LDTV) multicast streams of the other multicast groups associated with the multicast group which the terminal requests to access, and when the terminal switches channels, the IPTV system provides the terminal with normal multicast streams of the multicast group of a channel to which the terminal requests to switch when determining that the terminal has joined in the multicast group of the channel to which the terminal requests to switch. The method can reduce the channel switching delay of the IPTV and further improve the QoS of the IPTV service.2012-06-07
20120144441METHOD FOR DIAGNOSING 3D STATE INFORMATION, AND BROADCAST RECEIVER - The present invention relates to a method for diagnosing 3D state information, and a broadcast receiver. One embodiment of a cable broadcast receiver according to the invention comprises: a cable set-top box that receives a request for 3D state information diagnosis from a communication device and requests 3D state information collection from a digital broadcast receiver according to the request; and the digital broadcast receiver that collects 3D state information and transfers the collected 3D state information to the cable set-top box according to the request from the cable set-top box, wherein the cable set-top box transfers the 3D state information collected and transferred by the digital broadcast receiver to a cable headend through the communication device and receives a 3D broadcast service based on the 3D state information transmitted from the cable headend.2012-06-07
20120144442RESIDENTIAL GATEWAY AND METHOD FOR REDUCING CHANNEL ZAPPING TIME - A method for reducing channel zapping time is executed by a residential gateway. The method comprises predicting the next channel the client device will request and storing the most recent I-frames of each channel adjacent to the current channel in the same frequency band into a buffer. While a current channel is tuned by one tuner, using the other tuner for locking onto the frequency of the predicted channel if the predicted channel and the current channel are not in the same frequency band. If the prediction is correct, the total channel zapping time is reduced by saving tuner locking time. If the predicted channel and the current channel are in the same frequency band and the prediction is correct, the total channel zapping time is reduced by presenting the stored I-frame immediately.2012-06-07
20120144443SYSTEM AND METHOD FOR EXECUTING SOURCE BUFFERING FOR MULTIPLE INDEPENDENT GROUP TRANSMISSION OF REAL-TIME ENCODED SCALABE VIDEO CONTENTS - A system and method for performing source buffering to transmit a real-time encoded scalable video to multiple transmission groups are provided. A streaming system for providing a scalable video bitstream for each multicast group may include an encoder source buffer to receive a scalable video bitstream and to store the received scalable video bitstream, and a plurality of subgroup transmitters, each to receive data of different layers in the stored scalable video bitstream from the encoder source buffer, to packetize the received data, and to transmit the packetized data to a terminal.2012-06-07
20120144444Variable Bit Video Streams for Adaptive Streaming - One embodiment of the present invention sets forth a technique for adapting playback bit rate in a content delivery system based on scene complexity of the video content as well as network conditions and other performance factors. A scene complexity map of the video content indicates the complexity levels of different scenes within the video content. Using the scene complexity map, a content player may download scenes of lower scene complexity levels from video streams encoded to lower bit rates to manage the bandwidth consumed to download the video content and allow for the downloading of scenes of higher complexity levels from video streams encoded to higher bit rates.2012-06-07
20120144445METHOD AND APPARATUS FOR DISTRIBUTING VIDEO - A method and apparatus for distributing live video to multiple client devices is provided herein. In particular, a router is provided that acts on behalf of all client devices in its network. The router serves multiple groups of client devices with each group being formed by client devices having similar bandwidth requirements. The router then requests and receives video chunks from a network. The router then redistributes the video chunks to the multiple client devices using a multicast transmission. In particular, to minimize the demands on the core network, the router sets up a separate multicast to each group. Live video, of the appropriate quality is then multicast to each group.2012-06-07
20120144446DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs.2012-06-07
20120144447DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs.2012-06-07
20120144448Data Store Including a File Location Attribute - A data store including a file location attribute is described. In an embodiment, the location attribute for a data element, such as a file or database record, is stored with the bytes of data and records the geographic location of the data element. Writing to this attribute is limited to a single trusted entity, such as an operating system, to ensure that the location data can be trusted and when a data element is moved or replicated, the attribute is updated to reflect the new location of the data element. This location data is made available to users and applications by a metadata service which tracks the locations of data elements and responds to requests from users. Access control policies can been defined in terms of location and stored at the metadata service and the metadata service can then enforce these policies when responding to requests.2012-06-07
20120144449METHOD AND SYSTEM FOR PROTECTING CONFIDENTIAL INFORMATION - A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.2012-06-07
20120144450Authentication Method in Electronic Commerce - An authentication method in electronic commerce is disclosed. The authentication method includes steps of a first side utilizing a first device to access an interactive interface, and the first side transferring a first device characteristics of the first device and a verification information to a second side for authentication.2012-06-07
20120144451GEOLOCATING NETWORK NODES IN ATTENUATED ENVIRONMENTS FOR CYBER AND NETWORK SECURITY APPLICATIONS - A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet to the destination network node through at least one router network node. The data packet contains a security signature portion, a routing data portion, and a payload data portion. The security signature portion comprises a listing of at least one network node that the data packet travelled through from the origination network node to the destination network node. In addition, the security signature portion comprises geolocation information, identifier information, and timing information for at least one network node in the listing.2012-06-07
20120144452MANAGED DISSEMINATION OF LOCATION DATA - A location provider manages dissemination of location data of a user to one or more third-party services, so that the user can take advantage of services offered by the third parties, without the associated burden of continuously granting or denying requests by the third party services to obtain location data of the user. A third-party service can obtain location information of a user from the location provider. Users may control circumstances in which the location provider is to share location data of the user with the one or more third-party services.2012-06-07
20120144453Identity based auditing in a multi-product environment - An identity of a user performing an operation with respect to an application is propagated, from a point at which the user authenticates, to one or more other applications in a multi-product environment. The application may be a management console associated with an information cluster. In an embodiment, an administrator logs on to a management console (using an identity) and invokes a management operation. The management console then performs a programmatic remote access login (e.g., using SSH/RXA) to one or more nodes using a system account, invokes an application, and passes in the identity. As the application performs one or more management operations, audit events are logged, and these events each contain the identity that has been passed in by the management console during the SSH/RXA login. The technique thus provides a method for identity-based auditing in an environment having a plurality of applications, where each application typically has a respective authentication process or mechanism and distinct identity registries.2012-06-07
20120144454APPARATUS FOR MANAGING AUTHORIZATION IN SOFTWARE-AS-A-SERVICE PLATFORM AND METHOD FOR THE SAME - An authorization management apparatus and method in a software-as-a-service (SaaS) platform is disclosed. The present invention provides an automated authorization management apparatus and method which can efficiently reduce errors by applying a basic authority of a virtual tenant, which is predefined for an application to be provided to a tenant, as it is to the tenant requesting the use of the application. Moreover, the present invention provides an authorization management apparatus and method which can provide services customized to various tenants by defining a role appropriate for the condition of each tenant and allocating an application resource for each role. The authorization management apparatus includes a user application access control device, an access control device for a user's resource, a virtual tenant authority definition device, and a tenant authority definition device.2012-06-07
20120144455AUDIO BASED HUMAN-INTERACTION PROOF - A method and system for allowing access to computer functions such as websites that utilizes a user's ability to recognize sounds is described. The method presents a user a series of sounds. Some of the sounds presented in the series are labeled as validation sounds. The user is asked to provide an input every time he or she hears the validation sound. The user must identify the sound within a specified length of time. The system disclosed comprises a user interface, a sound database module, a generation module, and a sound database module. The generation module creates the validation test file and expected answer. The answer confirmation module checks the input from the requesting computer and provides access to the computer function if the computer input from the requesting computer meets the required parameters.2012-06-07
20120144456METHOD OF RECEIVING, STORING, AND PROVIDING DEVICE MANAGEMENT PARAMETERS AND FIRMWARE UPDATES TO APPLICATION PROGRAMS WITHIN A MOBILE DEVICE - The present invention is a method for the efficient persistent storage of Device Management (DM) information on a mobile device. More specifically, the present design provides methods for applications to access and update this information consistent with the Open Mobile Alliance (OMA) DM standard.2012-06-07
20120144457METHOD AND SYSTEM FOR PROVIDING REGISTRATION OF AN APPLICATION INSTANCE - An approach for registration an application instance is provided. A registration request including credential information related to a user, a device and an instance of an application resident on the device is generated. The registration request is transmitted over a network to a registration platform. A unique identifier that is encrypted, in response to registration of the application instance is received from the registration platform. This unique identifier is used to securely authenticate communication with the application instance.2012-06-07
20120144458SYSTEM AND METHOD FOR IDENTITY VERIFICATION ON A COMPUTER - A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user identity is to be verified. The user captures the image on a mobile communication device using, by way of example, a built-in camera. The captured image is transmitted via a public mobile network back to the server where the captured image is compared with the stored image. If the images match, the user identity is verified. In another embodiment, multiple images may be displayed and user-selectable options are selected by capturing one of the multiple images.2012-06-07
20120144459REVOKING DELEGATABLE ANONYMOUS CREDENTIALS - The claimed subject matter provides a method for revoking delegatable anonymous credentials. The method includes receiving a request to revoke an anonymous credential. The anonymous credential may be representative of an ability to prove non-membership in an accumulator for a first entity. The method also includes revoking the anonymous credential from the first entity in response to the request to revoke the anonymous credential. Additionally, the method includes revoking the anonymous credential from a second entity in response to the request to revoke the anonymous credential. The first entity delegates the anonymous credential to the second entity.2012-06-07
20120144460METHODS AND DEVICES FOR ACCESS AUTHENICATION ON A COMPUTER - The invention discloses methods for preventing unauthorized and potentially illegal access to password-protected accounts. Specifically, the invention allows for inclusion of time-related data to distinguish between a human and computer as the source of a password, either in its creation or in its delivery to a server to gain access to a web-based account.2012-06-07
20120144461MOBILE PIN PAD - A system is configured to: receive an authentication request for a transaction from a web server; identify a phone number of the mobile device based on identifying information of the user in the authentication request and the user information, transmit a message to the mobile device based on the phone number, receive a message response from the mobile device, determine whether the mobile device provided a mobile pin pad authentication for the user based on the message response, and transmit a success authentication response to the web server when the mobile device provided the mobile pin pad authentication for the user.2012-06-07
20120144462SYSTEM, APPARATUS AND METHODS FOR HIGHLY SCALABLE CONTINUOUS ROAMING WITHIN A WIRELESS NETWORK - In one embodiment, an apparatus includes a first access point within a wireless network. The first access point is configured to identify a communication device within a radio frequency (RF) range of the first access point. The first access point is also configured to request a session key associated with the communication device from a first network controller associated with the first access point in response to the communication device being identified. The first access point is further configured to receive the session key associated with the communication device from a second network controller associated with a second access point having an RF range partially overlapping the RF range of the first access point.2012-06-07
20120144463SYSTEM AND METHOD FOR EXTENDING SECURE AUTHENTICATION USING UNIQUE SESSION KEYS DERIVED FROM ENTROPY - In some aspects of the present disclosure a device is disclosed that includes a processor; a storage unit; a user interface; a transceiver; a device identifying unit arranged to store device identifying data; a memory unit arranged to store machine-executable instructions that when executed by the processor causes a password to be generated, based on the device identifying data, that is arranged to allow the device to access a public wireless local area network (PWLAN).2012-06-07
20120144464METHOD AND SYSTEM FOR IMPROVED SECURITY - An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a bridge server performing authentication tasks that allow a user to access a server or a group of servers with multiple security levels. The method eliminates the need for the user to remember multiple usernames/passwords for each target server. The method also allows one bridge server and one set of security devices to be used to authenticate the user for multiple servers, thereby reducing security costs and increasing user convenience. A location-based password-ID generating device is also described for secure location-based access.2012-06-07
20120144465DISTRIBUTED SINGLE SIGN ON TECHNOLOGIES INCLUDING PRIVACY PROTECTION AND PROACTIVE UPDATING - Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sign-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret, keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs.2012-06-07
20120144466MANAGING PASSWORDS USED WHEN DETECTING INFORMATION ON CONFIGURATION ITEMS DISPOSED ON A NETWORK - Disclosed embodiments include a method for receiving, at a configuration information server, an encrypted password associated with a configuration item, where the encrypted password is encrypted using an encryption key. The method further includes encrypting a decrypted password to generate a reencrypted password, where the decrypted password is derived from the encrypted password. The method further includes transmitting the reenrypted password to the configuration item and removing the decrypted password from the configuration information collection server.2012-06-07
20120144467Network Selection from a Menu - Methods and systems for connecting to a network, such as a wired or wireless network, are provided. A method may include displaying a menu with one or more menu options in response to a user indication. Each menu option may indicate an available network and the status of the available network. Upon receiving a user menu selection indicating a selected available network, an authentication input field may be provided with the corresponding menu option in the displayed menu. The user may enter authentication information in the authentication input field in order to be connected to the selected available network. The corresponding menu option may display further status information upon successful connection to the selected available network.2012-06-07
20120144468Systems, Methods, and Computer Program Products for User Authentication - Responsive to receiving an authentication request from a device, an authentication server determines a confidence level for the authentication request, generates a confidence-weighted challenge to the authentication request. The confidence-weighted challenge being weighted based upon a confidence level. The authentication server, responsive to receiving a challenge response to the confidence-weighted challenge from the device, determines whether to authenticate the user based upon the challenge response. If the authentication server determines that the challenge response satisfies an expected response known to the authentication server, the authentication server permits authentication of the user to access the device. If the authentication server determines the challenge response does not satisfy the expected response known to the authentication server, the authentication server denies authentication of the user to access the device.2012-06-07
20120144469Network Selection From A Menu - Methods and systems for connecting to a network, such as a wired or wireless network, are provided. A method may include displaying a menu with one or more menu options in response to a user indication. Each menu option may indicate an available network and the status of the available network. Upon receiving a user menu selection indicating a selected available network, an authentication input field may be provided with the corresponding menu option in the displayed menu. The user may enter authentication information in the authentication input field in order to be connected to the selected available network. The corresponding menu option may display further status information upon successful connection to the selected available network.2012-06-07
20120144470USER AUTHENTICATION METHOD USING LOCATION INFORMATION - A user authentication method includes transmitting a number of the mobile communication terminal, a user identifier (ID), and a unique number (PW); at the web server, storing the number of the mobile communication terminal, the user identifier (ID), and the unique number (PW); at a mobile communication terminal registered in the web server, transmitting location information of the mobile communication terminal; at the web server, storing a table in which the location information is mapped together with the number of the mobile communication terminal, the user identifier (ID), and the unique number (PW); and when the web server receives an access request from the mobile communication terminal registered in the web server, at the web server, confirming location information of the mobile communication terminal and comparing the location information of the mobile communication terminal with the table.2012-06-07
20120144471UPDATING STORED PASSWORDS - A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client in accordance with an authentication protocol, and authenticate the client based on a comparison of the first form to a value derived from a second form of the password stored in a password database. The comparison fails when the first form is not comparable to a value derived from the second form. The server may establish a secure connection to the client, receive a plain-text password from the client over the secure connection, authenticate the client by comparing a value derived from the plain-text password with a value derived from the second form, and update the password database with a third form of the password that permits the authentication server to successfully authenticate the client when the authentication server receives the first form.2012-06-07
20120144472Fraud Detection - In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is related to a failed authentication attempt; determining whether the authentication credential is related to a valid account; and performing a security measure related to the valid account, if it is determined that the authentication credential is related to the valid account.2012-06-07
20120144473PAIRING OF WIRELESS DEVICES USING A WIRED MEDIUM - Techniques that facilitate pairing of wireless devices with other wireless devices are disclosed. According to one aspect, a pair of wireless devices can be paired for wireless data exchange using an available wired link. Advantageously, the wired link can be used to transport a pin code from one of the wireless devices to the other. Consequently, pairing of the wireless devices can be completed without necessitating user entry of a pin code so long as the wired link is available.2012-06-07
20120144474METHOD OF PROTECTING ACCESS TO DATA ON A NETWORK - The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an index list. The method comprises the step of inserting a request to a control message in the index list. The control message applies to a data reachable through one URI belonging to the index list.2012-06-07
20120144475SCALABLE NAT TRAVERSAL - A system and method for traversing a firewall for a voice-over-IP session or other communication session uses four main components: a relay agent, and NAT 2012-06-07
20120144476SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.2012-06-07
20120144477PROCESSOR AND SEMICONDUCTOR DEVICE - According to embodiments, a CPU includes an address decoder configured to control input of data from a JTAG I/F and output of data to the JTAG I/F, an authentication unit configured to perform predetermined authentication processing using an entered password and a predetermined key and, if the authentication is successful, output a predetermined authentication signal, and a selector configured to control output of data to be outputted to JTAG I/F according to presence or absence of the predetermined authentication signal.2012-06-07
20120144478IMAGE PROCESSING APPARATUS, PROCESSING FLOW CONTROL METHOD, IMAGE FORMING SYSTEM, AND STORAGE MEDIUM - An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired processing flow. The image processing apparatus including an authentication unit adapted to execute user authentication, and an execution unit adapted to execute processing on image data with a plurality of processes as a sequential processing flow while cooperating a plurality of different functions with one another. Setting data personalized for a user authenticated by the authentication unit is obtained, and the plurality of processes is registered as a sequential processing flow. The processing flow is executed with a part of the processing flow replaced by processing personalized for the user set in the setting data, upon executing the registered processing flow.2012-06-07
20120144479METHOD FOR AUTHENTICATING A TERMINAL - The invention provides a system, a secure device and a method for authenticating dynamically a host device with a secure device without modifying hardware or basic functional software of the host device. An authentication engine implemented in the secure device allows detecting non-authorized host devices or illegal secure devices environment. The secure device is locally connected to the host device comprising at least one processor configured for handling a plurality of hardware or software parameters defining the functioning behavior of the host device. A memory associated to the processor stores a plurality of reference hardware and software parameters. The secure device monitors the behavior of the host device both in terms of hardware and software. After comparison with the reference parameters, the host device is considered as authentic or authorized only when the values of counters associated to the hardware and software parameters are within an acceptable.2012-06-07
20120144480Using Virtual Table Protections to Prevent the Exploitation of Object Corruption Vulnerabilities - The subject disclosure is directed towards preventing the exploitation by malicious code of object state corruption vulnerabilities, such as use-after-free vulnerabilities. An object class is configured with a secret cookie in a virtual function table of the object, e.g., inserted at compile time. An instrumentation check inserted in the program code evaluates the secret cookie to determine whether the object state has been corrupted before object access (e.g., a call to one of the object's methods) is allowed. If corrupted, access to the object is prevented by the instrumentation check. Another instrumentation check may be used to determine whether the object's virtual table pointer points to a location outside of the module that contains the legitimate virtual function table; if so, object access is prevented.2012-06-07
20120144481HOST IP REPUTATION - Various embodiments described above are directed to identifying abuse-hosting services at their source, rather than using such intermediaries as URLs and associated domains. In one or more embodiments, threats can be blocked by using the Internet protocol (IP) address of an identified attacker that is hosting content associated with abuse.2012-06-07
20120144482Method and System for Whitelisting Software Components - A method and system for whitelisting software components is disclosed. In a first operating environment, runtime information may be collected about a first loaded and executing software component. The collected information may be communicated to a second software component operating in a second operating environment that is isolated from the first operating environment. The collect runtime information may be compared with a validated set of information about the first software component. Other embodiments are described and claimed.2012-06-07
20120144483METHOD AND APPARATUS FOR PREVENTING NETWORK ATTACK - The present disclosure relates to the communication field, and discloses a method for preventing a network attack. The method includes: receiving a packet; when the received packet is a first packet, determining whether a source IP address and a source MAC address information that are carried in the first packet exist in a first record table; if so, obtaining a second packet, the source addresses of which are the same as the source as addresses of the first packet, and sending the second packet to a CPU for processing. Through this method, a network attack can be prevented effectively, and a packet can be sent to the CPU for processing in the case that the validity of the packet is determined. Therefore, some application that requires sending packets to the CPU for processing is supported. The present disclosure further discloses an apparatus for preventing a network attack.2012-06-07
20120144484METHODS, MEDIA, AND SYSTEMS FOR DETECTING AN ANOMALOUS SEQUENCE OF FUNCTION CALLS - Methods, media, and systems for detecting an anomalous sequence of function calls are provided. The methods can include compressing a sequence of function calls made by the execution of a program using a compression model; and determining the presence of an anomalous sequence of function calls in the sequence of function calls based on the extent to which the sequence of function calls is compressed. The methods can further include executing at least one known program; observing at least one sequence of function calls made by the execution of the at least one known program; assigning each type of function call in the at least one sequence of function calls made by the at least one known program a unique identifier; and creating at least part of the compression model by recording at least one sequence of unique identifiers.2012-06-07
20120144485COMPUTER SECURITY METHOD AND SYSTEM WITH INPUT PARAMETER VALIDATION - A security system, including a receiver for receiving a downloadable, a scanner, coupled with the receiver, for scanning the downloadable to identify suspicious computer operations therein, a code modifier, coupled with the scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by the scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by the scanner, and a processor, coupled with the code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for the processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. A method is also described and claimed.2012-06-07
20120144486METHOD AND SYSTEM FOR PROTECTING AGAINST UNKNOWN MALICIOUS ACTIVITIES BY DETECTING A HEAP SPRAY ATTACK ON AN ELECTRONIC DEVICE - A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being written to the memory if the amount of the data is greater than or equal to a threshold.2012-06-07
20120144487ROUTING APPARATUS AND METHOD FOR DETECTING SERVER ATTACK AND NETWORK USING THE SAME - Routing apparatus and method for detecting a server attack are disclosed. The routing apparatus includes: a reception unit configured to receive a packet transmitted in a network; a transmission unit configured to transmit the packet along a transmission path; a memory unit configured to store data and/or information required for an operation; and a controller configured to set the transmission path of the packet in the network and perform packet switching along the set transmission path, wherein the reception unit receives server state information from servers at every certain time, the memory unit stores the received server state information, and the controller calculates a change in the state of the servers based on the received server state information, and determines that a server is attacked when a change in the state of the server is greater than a certain threshold value.2012-06-07
20120144488COMPUTER VIRUS DETECTION SYSTEMS AND METHODS - Systems and methods for computer virus detection are presented. In one embodiment; an computer virus detection method includes: receiving an indication of a change to a file; performing a virus analysis process, including executing the changes to the file in a virtual machine and examining results of the executing the changes; and handling the file based upon the virus analysis. The virus analysis can be performed in a system in which the change to the file occurs. Handling the file can include treating the file as potentially infected with a virus based upon the virus analysis. In one exemplary implementation, examining the results includes comparing the results of executing the changes to the file to other results from executing changes to another file, wherein the file is identified as potentially infected with a virus if the examining results indicates the results of executing the changes to the file are similar to results from executing changes to another file. Examining results includes examining behavior resulting from executing the file (e.g., examining system calls, etc.). Outcome of the examining results can be forwarded for utilization in developing virus data sets.2012-06-07
20120144489Antimalware Protection of Virtual Machines - The subject disclosure is directed towards protecting virtual machines on guest partitions from malware in a resource-efficient manner. Antimalware software is divided into lightweight agents that run on each malware-protected guest partition, a shared scanning and signature update mechanism, and a management component. Each agent provides the scanning mechanism with files to scan for malware, such as by running a script, and receives results from the scanning mechanism including possible remediation actions to perform. The management component provides the scanning mechanism with access to virtual machine services, such as to pause, resume, snapshot and rollback guest partitions as requested by the scanning mechanism.2012-06-07
20120144490MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS - A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a time frame prior to the notification of the suspected malware infection. The malware analysis system may also create a time-bounded snapshot of the monitored activities that are conducted within a time frame subsequent to the notification of the suspected malware infection. The malware analysis system provides the created snapshot or snapshots for further analysis.2012-06-07
20120144491Answering Security Queries Statically Based On Dynamically-Determined Information - A method includes analyzing execution of a software program, the software program having sources returning values, sinks that perform security-sensitive operations on those returned values or modified versions of the returned values, and flows of the returned values to the sinks, the analyzing determining a first set of methods having access to a value returned from a selected one of the sources. A static analysis is performed on the software program, the static analysis using the first set of methods to determine a second set of methods having calling relationships with the selected source, the static analysis determining whether the returned value from the selected source can flow through a flow to a sink that performs a security-sensitive operation without the flow to the sink being endorsed, and in response, indicating a security violation. Apparatus and computer program products are also disclosed.2012-06-07
20120144492Predictive Malware Threat Mitigation - The subject disclosure is directed towards protecting against malware, by classifying a user's risk level, which corresponds to a likelihood of malware being activated. To make the classification, data is collected that represents a probability of encountering malware, a probability of a user activating that malware, and the impact to the machine is activated. The classification maps to a protection level, which may be dynamically adjustable, e.g., based upon current risk conditions. The protection level determines a way to mitigate possible damage, such as by running a program as a virtualized program, running a virtualized operating system, or sandboxing a process.2012-06-07
20120144493SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.2012-06-07
20120144494SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target parts, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.2012-06-07
20120144495SECURING MIXED-MODE APPLICATIONS - Embodiments are directed to securing mixed-mode applications in a semi-trusted environment. In an embodiment, a computer system securely loads native data files associated with a mixed-mode application. The secure loading ensures that the native components upon which the managed component depends are authentic. The computer system implements a securely stored handle associated with the loaded native data files to provide secure communications between the managed component and the loaded native data files. The handle provides a trusted function pointer to an associated mixed-mode application function. The computer system also initiates a security permission request for each resource that is passed to the native components during execution of the mixed-mode application, so that each resource is verified before execution.2012-06-07
20120144496ELECTRONIC DEVICE WITH DATA PROTECTION FUNCTION AND METHOD THEREOF - The present disclosure provides an electronic device with a data protection function. The device includes a display, an input unit, and a processor. The display displays content of a document and a cursor. The input unit generates mode switching signals in response to a user input. The mode switching signals is for switching operational modes of the electronic device between a normal mode and a data protection mode. The processor switches the device to the data protection mode upon receiving the mode switching signals when in the normal mode, and displays a color layer on the display to cause content selected through the cursor to be visible and unselected content to be invisible when in the data protection mode. A related method is also provided.2012-06-07
20120144497ELECTRONIC COPYRIGHT LICENSE REPOSITORY - A content distribution system for transporting audio or video licenses between content players that use digital rights management (DRM) is disclosed. The content distribution system includes at least a second license repository and an authentication engine. The second license repository receives second information describing a second plurality of content licenses. A first license repository stores a first plurality of content licenses. The first plurality of content licenses enable use of a plurality of content objects with a first content player within confines of DRM. The second license repository is geographically distant from the first license repository. The authentication engine authorizes the second plurality of content licenses of the second license repository. The second plurality of content licenses enable use of the plurality of content objects with the second content player within the confines of DRM.2012-06-07
20120144498System And Method For Mobile Identity Protection of a User of Multiple Computer Applications, Networks or Devices - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed.2012-06-07
20120144499SYSTEM TO INFORM ABOUT TRADEMARKS SIMILAR TO PROVIDED INPUT - Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input. Some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used.2012-06-07
20120144500METHOD AND APPARATUS FOR PROTECTING DATA USING A VIRTUAL ENVIRONMENT - The present invention relates to a method and apparatus for protecting data using a virtual environment, which creates a safe virtual environment that supports the execution of application programs being operated on a computer and which enables important data to be inputted or outputted only within the virtual environment, such that access to the important data is prevented in a general local environment. According to the present invention, data leakage is initially prevented to protect data, and convenience is provided in that a user may use the computer in a general manner while performing desired work.2012-06-07
20120144501REGULATING ACCESS TO PROTECTED DATA RESOURCES USING UPGRADED ACCESS TOKENS - Various techniques and procedures related to client authorization and the management of protected data resources are presented here. One approach employs a computer-implemented method of regulating access to protected data resources. In accordance with this approach, a client sends a first access token to a server, the first access token having first data access attributes associated therewith. In response to receiving the first access token, the server sends a second access token to the client module, the second access token having second data access attributes associated therewith. The second data access attributes represent expanded or additional data access capabilities granted to the client. The client may then access protected data resources using the second data access token.2012-06-07
20120144502DIRECTORY SERVICE DISTRIBUTED PRODUCT ACTIVATION - In some embodiments, an activation object used to activate a software product is stored in a directory service. The activation object may, for example, comprise a proof of purchase token and/or information about the directory service, and may be communicated from the directory service to a client computer after the directory service authenticates a request from a client computer for access to the activation object. In some embodiments, a directory service is interrogated for an activation object used to activate software on a client computer. A client computer may, for example, receive an activation object from the interrogated directory service, and use the received activation to object to activate a software product on the client computer. In some embodiments, a non-transitory computer-readable medium has instructions stored thereon that, when executed by a computer, cause the computer to interrogate a directory service for an activation object used to activate software on the computer. The computer may, for example, receive the activation object from the directory service, and use the received activation object to activate a software product.2012-06-07
20120144503METHOD AND DEVICE FOR IDENTIFYING OBJECTS OR DOCUMENTS - The document identification method comprises: a step of marking the document with an anti-copy mark that is identical for a plurality of documents; a step of reading an anti-copy mark; a step of generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and; a step of marking said document to form said identification mark on said document. In embodiments the method comprises, in addition, a step of printing a uniform area and the step of marking the document to form the identification mark comprises a step of emitting light with a laser in the uniform area. In embodiments the method comprises, in addition, a step of invisibly marking the identification mark on said document.2012-06-07
20120144504CASPASE-8 AND SKIN DISEASE - The invention relates to the treatment or prevention of an inflammatory skin disease, disorder or condition, by modulating a protein that is normally regulated by caspase-8 in the skin or by increasing caspase-8 activity or level in the skin. Another aspect of the invention relates to methods for diagnosing an inflammatory skin disease, disorder or condition or a predisposition to develop said disease disorder or condition in an individual. Further aspects of the invention relate to methods for identifying target proteins involved in the course or pathology of an inflammatory skin disease, disorder or condition and to methods of screening a candidate compound for treating said disease, disorder or condition. In particular, the invention relates to inflammatory skin diseases such as atopic dermatitis and psoriasis.2012-06-07
20120144505TARGETED AND REGIONAL CELLULAR ABLATION IN ZEBRAFISH - A system including: (i) a methodology for targeted cellular ablation in zebrafish; (ii) a methodology for regional cellular ablation in zebrafish. These methodologies are used to identify genetic components that regulate cellular regeneration and to identify drug compounds that influence cellular regeneration for the purpose of developing therapies for degenerative conditions. Transgenic zebrafish disclosed herein contain transgenic constructs composed of: (i) cell and/or tissue-type specific regulatory elements (e.g. promoter and/or enhancer regions) which delimit expression of operably linked gene product(s) to discrete cellular populations; (ii) a gene product that promotes cellular ablation composed of a pro-drug conversion system capable of converting nontoxic pro-drugs into cytotoxic drugs, which is expressed alone or in connection with; (iii) a reporter gene product that allows selective detection of cells expressing the reporter—both prior to (initial cells) and following cellular ablation (regenerated cells). Here we describe genetic delivery of a pro-drug converting system in order to enable targeted cellular ablation in zebrafish, Transgenic zebrafish of this invention provide a high-throughput system for genetic dissection of the process of cellular regeneration and, compound screening for the discovery of drugs capable of promoting cellular regeneration.2012-06-07
20120144506DOUBLE-FUSION HUMAN EMBRYONIC STEM CELLS, METHOD OF MAKING DOUBLE-FUSION HUMAN EMBRYONIC STEM CELLS, TRIPLE-FUSION HUMAN EMBRYONIC STEM CELLS, METHOD OF MAKING TRIPLE-FUSION HUMAN EMBRYONIC STEM CELLS, AND METHODS OF MONITORING DOUBLE-FUSION HUMAN EMBRYONIC STEM CELLS AND TRIPLE-FUSION HUMAN EMBRYONIC STEM CELLS - Embodiments of the present disclosure include double-fusion human embryonic stem cells, methods of imaging double-fusion human embryonic stem cells, double-fusion polynucleotides, double-fusion proteins, triple-fusion human embryonic stem cells, methods of imaging triple-fusion human embryonic stem cells, triple-fusion polynucleotides, triple-fusion proteins, methods of monitoring the progression of human embryonic stem cells, methods of making isolated double-fusion human embryonic stem cells, methods of making isolated triple-fusion human embryonic stem cells, and the like.2012-06-07
20120144507F1B-TMIR PLASMID VECTOR AND TRANSGENIC MOUSE - A trifusion reporter plasmid is described that comprises a plasmid operably coupled to a mammalian FGF1B promoter that is operably coupled to a bioluminescence gene fused to a fluorescence gene fused to a nuclear medical imaging gene. The new reporter allows in vivo or ex vivo detection of gene expression in three different ways, in addition to traditional in vitro detection methods. Transgenic animals containing this new trifusion reporter and uses of same are described.2012-06-07
20120144508ARTIFICIAL SELECTION METHOD AND REAGENTS - The present invention provides methods for estimating the breeding value of individuals in populations such as those having small effective population size (Ne) e.g., to identify selection candidates having high breeding values, wherein the methods comprise inferring one or more genotypes for one or more markers at a locus or QTL to be the same as for an ancestor or founder or a subset of ancestors and/or founders from which a corresponding chromosome segment is derived and estimating the breeding value of the individual based on the inferred genotype(s).2012-06-07
20120144509NOVEL STRAINS OF HELICOBACTER PYLORI AND USES THEREOF - The present invention relates to strains of 2012-06-07
20120144510TREATMENT OF ASTROCYTES-TUMOR CELLS INHIBITORS OF ENDOTHELIN RECEPTORS - The disclosure relates to an endothelin receptor antagonist for use in the prevention or treatment of brain metastases in combination with a cytotoxic chemotherapy agent, radiotherapy or both. The endothelin receptor antagonist may for example be bosentan, macitentan or a mixture of bosentan and macitentan.2012-06-07
Website © 2025 Advameg, Inc.