Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2011 patent applcation highlights part 68
Patent application numberTitlePublished
20110138400AUTOMATED MERGER OF LOGICALLY ASSOCIATED MESSAGES IN A MESSAGE QUEUE - Embodiments of the invention provide a method, system and computer program product for message merging in a messaging queue. In an embodiment of the invention, a method for message merging in a messaging queue can be provided. The method can include receiving a request to add a new message to a message queue in a message queue manager executing in memory by a processor of a host computing platform. The method can also include a merge indicator to stipulate whether or not a merge should take place. The method also can include identifying an association key associating the new message with an existing message in the message queue and locating an associated message in the message queue corresponding to the identified association key. Finally, the method can include merging the new message with the located associated message in the message queue.2011-06-09
20110138401LIVE UPDATE OF USER SEGMENTS - The real-time updating of segments of users defined by applying a function to at least one user attribute. In response to an event, the segment may be updated in real-time to either or both of removing the user from a segment, or adding a user to a segment. In one embodiment, user profile groups are populated by performing combinatory operations upon multiple segments. In that case, any profile group that depends on the updated segment may also be updated. Thus, operations that rely upon segment and/or profile group membership need not wait until the next calculation of the segment and profile group membership before correctly reflecting the newly discovered user attributes.2011-06-09
20110138402Cross-Platform Event Engine - A system and method for translating, synthesizing and acting upon disparate event sets is provided. The disclosed cross-platform event engine comprises an event module with information pertaining to various event inputs as they relate to different operating platforms and devices. Logic utilized by the cross-platform event engine determines how to handle a particular event within an operating environment. Methods of updating and training the engine are also provided.2011-06-09
20110138403PUSH-BASED APPLICATION PROGRAM INTERFACE BASED ON DUALS OF A PULL-BASED APPLICATION PROGRAM INTERFACE - Methods and devices are provided for defining push-based standard sequence operators based on respective duals of corresponding pull-based standard sequence operators. A push-based application program interface (API) may be defined based on mathematical duals of a corresponding pull-based API. The push-based API may include a library of routines, which further may include push-based standard sequence operators defined based on deriving mathematical duals of corresponding pull-based standard sequence operators. A protocol for processing a push-based collection may be defined as a mathematical dual of a protocol for processing a pull-based collection. In various embodiments, mathematical duality with respect to synchronous, pull-based, collections may be exploited to define operators for processing asynchronous push-based collections.2011-06-09
20110138404REMOTE PROCEDURE CALL (RPC) BIND SERVICE WITH PHYSICAL INTERFACE QUERY AND SELECTION - A service module that provides for discovery of one or more network interfaces connecting a prospective remote procedure call (RPC) client, facilitates the provision of RPC programs in a network including multi-horned systems. When a request for a network address to an RPC application providing an RPC program is received from the RPC client, the RPC bind daemon discovers from the module, using the client response address, over which interface(s) the client is accessible. The daemon then selects an address of a network path to the RPC application that the prospective client can access and returns the corresponding network address. The service module monitors the network stack for RPC get address requests and builds tables of client address entries with corresponding network interface identifiers. The entries are retired according to an aging policy. When multiple network paths to the RPC application are available, the service can be selected using a heuristic such as preferred interface, non-firewalled interface, least number of return path links or other criteria.2011-06-09
20110138405OPTICAL INFORMATION REPRODUCING APPARATUS, INFORMATION REPRODUCING METHOD OF OPTICAL INFORMATION REPRODUCING APPARATUS, PROGRAM AND RECORDING MEDIUM - A deterioration of reproduction light is occurred by a laser drive current on which a high-frequency current is superimposed. The present invention, for example, is an optical information reproducing apparatus which irradiates a laser beam to an optical disc 2011-06-09
20110138406ELECTRONIC DEVICE - The electronic device pertaining to an embodiment comprises a housing that holds an optical disk. The housing comprises a holding space holding an optical disk, a first internal space being apart from the holding space and in which a first electronic component controlling a pickup is disposed, an intake channel leading from the first internal space to the holding space, and an exhaust channel leading from the holding space to a specific space being distinct from the first internal space.2011-06-09
20110138407SPINDLE MOTOR AND CLAMPER - A low-cost disk device with which the same spindle motor and clamper can be used for different types of disk device, such as a DVD drive. A clamper includes a clamper main body and a plurality of positioning components. The clamper main body clamps a disk between itself and a spindle motor that holds and rotates the disk. The plurality of positioning components are formed on the clamper main body for the relative positioning of the clamper main body and each of the plurality of spindle motors in the radial direction.2011-06-09
20110138408TELEVISION INTERACTION INFORMATION AND RELATED ICONOGRAPHY - A method may include receiving identification information associated with each of one or more users. Interactions may be received from the one or more users relating to content displayed on a television device. Interaction information associated with the interactions may be captured, wherein the interaction information includes at least interaction type information, interaction status information, interaction origin information, and user identification information. The captured interaction information may be stored. A request to display at least some of the captured interaction information may be received. At least some of the captured information may be retrieved and displayed responsive to the request.2011-06-09
20110138409METHOD OF MANAGING RESTRICTED MEDIA CONTENT IN A TV SYSTEM - A method in a communication network and an IPTV Control Server (2011-06-09
20110138410TELEVISION RECEIVER AND METHOD OF OPERATING A SERVER - There is provided a television receiver which comprises a browser for accessing a web site via the internet. The television receiver is arranged to download data represented by the Wireless Markup Language (WML). The television receiver processes the data to output a signal representative of an interactive television image allowing user interaction with the web site via a remote control. The television receiver supports an extended WML Document Type Definition (DTD) which provides for the representation of additional layout and functional attributes pertaining to the interactive image. The layout of the interactive images determined by metalevel information contained in broadcast television signals. Services from the interactive image can be selected by entering a set of numbers via the numeric keyboard on the remote control, wherein each of the numeric keys of the numeric keys is associated with a number of letters such that the set of numbers to be entered corresponds to a keyword descriptive of the service to be selected. There is also provided an on-line server for connecting the television receiver with the web site. The server is arranged to perform authentication, authorization, compilation, pre-processing and decryption/encryption as part of the connection process.2011-06-09
20110138411Broadcast Synchronization - A first media server delivers content for broadcast via a first media channel, and a second media server delivers media content for broadcast via a second media channel. The first media server operates in a synchronized mode, under control of the second media server during some periods of time, and during other periods of time operates in an independent mode. When operating in the synchronized mode, content delivered by the first and second media servers can be synchronized, so that the timing of spot blocks played on the two servers generally coincides. When the first server operates in the independent mode, the timing of spot blocks and other content broadcast on the first media channel are not synchronized under control of the second media server.2011-06-09
20110138412METHODS AND SYSTEMS FOR PROVIDING ENHANCED CONTENT ASSOCIATED WITH A MEDIA CONTENT INSTANCE AVAILABLE FOR PURCHASE - An exemplary method includes presenting, by a media content delivery system, an advertisement for a media content instance that is accessible only at or after a scheduled release time, receiving, by the media content delivery system, a request input by a user to purchase access to the media content instance, and providing, by the media content delivery system in response to the received request, enhanced content associated with the media content instance for experiencing by the user before the scheduled release time. Corresponding methods and systems are also disclosed.2011-06-09
20110138413METHOD AND SYSTEM FOR PERSONALIZING AND REDIRECTING CONTENT OBJECT - A first terminal sends a message to an application server in order to redirect the same content object to a second terminal. The application server receives the message and forwards it with content object preference of the second user to the content server. The content server redirects distribution of the content object with the advertisement to the second terminal. The advertisement is personalized for the second user based on the content object preference of the second user. The advertisement for the first user is also personalized based on a content object preference of the first user. The first and second users enjoy the same content object with the different advertisement.2011-06-09
20110138414Modification and Distribution of Video Content - A data stream processing system receives a transport stream containing single/multiple program/s and receives alternate content. The system identifies portions of the transport stream to replace with the alternate content. An alternate content data stream is generated that includes the alternate content and at least one sync packet. The sync packet enables synchronous replacement of the alternate content into the transport stream. The system then distributes the alternate content data stream.2011-06-09
20110138415METHOD AND APPARATUS FOR ENTERTAINMENT AND INFORMATION SERVICES DELIVERED VIA MOBILE TELECOMMUNICATION DEVICES - A method and system for entertainment and information services delivered via mobile telecommunication devices include a communication network, and a station communicatively linked to the communication network. The station includes an output and an interface. Also included is a head-end having at least one database configured to store programs including an audio content. The head-end receives a request from the station for a desired one of the programs, verifies the request, transmits a first portion of the desired program to the station, and records an association between the identification and the desired program. The head-end further suspends transmission of a second portion of the program based upon detection of an indication to suspend transmission. The head-end further transmits the second portion of the program based upon detection of an indication to resume transmission and stored bookmark data indicating the starting location in the program of the second portion.2011-06-09
20110138416AUGMENTED REMOTE CONTROLLER AND METHOD FOR OPERATING THE SAME - An image display may be controlled on a remote controller based on augmented reality. An image display apparatus may be identified that is connected to a network or located about the remote controller. A search may be made for content information regarding content playable in the identified image display apparatus. The content information may be received based on the searching. A screen may display a content guide image based on the received content information while simultaneously displaying an image of the identified image display apparatus.2011-06-09
20110138417SYSTEMS AND METHODS FOR PROVIDING INTERACTIVE CONTENT WITH A MEDIA ASSET ON A MEDIA EQUIPMENT DEVICE - Systems and methods for providing interactive content during writing and production of a media asset are provided. A script of a media asset that includes natural language textual annotations that define uniquely interactive content and timing contingencies during which to display the interactive content may be received. After the media asset corresponding to the script is produced, computer language instructions may be generated based on the natural language annotations. The computer language instructions and the media asset may be stored on a master storage medium. The media asset and computer language instructions may be transmitted to a media equipment device. Playback time codes may be transmitted with the media asset. When a playback time code corresponds to an event that identifies interactive content, the media equipment device may display the interactive content represented by the computer language instructions during a time interval defined by the computer language instructions.2011-06-09
20110138418APPARATUS AND METHOD FOR GENERATING PROGRAM SUMMARY INFORMATION REGARDING BROADCASTING CONTENT, METHOD OF PROVIDING PROGRAM SUMMARY INFORMATION REGARDING BROADCASTING CONTENT, AND BROADCASTING RECEIVER - An apparatus and method of receiving broadcasting content and generating program summary information corresponding to received broadcasting content, and an apparatus and method of providing the generated program summary information are provided. Real-time broadcasting content may be received through a tuner of a program summary information generating apparatus. The program summary information is extracted from the received real-time broadcasting content, and may be stored and provided to a user via a display unit. In view of the program summary information, a user may understand, for example, the flow of the broadcasting content, even if the user missed a part of the broadcasting content.2011-06-09
20110138419METHOD AND APPARATUS FOR DISPLAYING VIDEO CLIPS - A television viewer uses a PIP format for display of program related information such as television program listings from a program schedule data base in the background and moving, real time or stored video clip images of a program selected from the displayed listings in the PIP window. All the text of the background information lies outside the PIP window. In one embodiment, as the viewer selects a particular program from the display of current television program listings by means of a cursor or a code number, the corresponding program automatically appears in the PIP window.2011-06-09
20110138420SYSTEMS AND METHODS FOR IMAGE PROCESSING - A facility is provided for recognizing blank and nearly blank images. In various embodiments, the facility receives an indication of an image, creates an analysis image based on the received image by detecting edges, determines an edge ratio for the analysis image, determines whether the edge ratio exceeds a threshold and, when the edge ratio does not exceed the threshold, identifies the received image as a blank image. The facility can include an edge detector component that creates an analysis image based on a selected image by detecting edges in the selected image, a calculator component that calculates an edge ratio for the analysis image, and an analysis component that determines whether the calculated edge ratio exceeds a threshold.2011-06-09
20110138421METHOD OF PROCESSING EPG METADATA IN NETWORK DEVICE AND THE NETWORK DEVICE FOR CONTROLLING THE SAME - A method of processing EPG metadata in a network according to one embodiment of the present invention includes the steps of performing a services discovery procedure utilizing multiple service discovery metadata components supplied by a service provider and processing an EPG metadata. Preferably, the performing step includes the steps of receiving a master SI table which locates in a master SI table location in provisioning information, wherein the provisioning information includes multiple elements, an EPG provider information element in the multiple elements having both a first target virtual channel map identifier element and an EPG data locator element, the first target virtual channel map identifier element indicating that services are covered by each of the EPG metadata provider's EPG data sources, receiving a virtual channel map table which locates in virtual channel map locations in the received master SI table, receiving a virtual channel description table which locates in virtual channel description table locations in the received virtual channel map table, and receiving a source table which locates in source table locations in the received virtual channel description table.2011-06-09
20110138422TECHNIQUES FOR DISPLAYING DATA BASED ON CHARACTERISTICS OF A DISPLAY DEVICE - A method of selecting a portion of a block of data for display based on characteristics of a display device. The method comprises several steps. In the first step, a block of Electronic Program Guide (EPG) data is received at a communication device adapted to process this data. Next, an input is received at the communication device regarding an appearance of the display device. The communication device can be a set-top box. The appearance of the display includes, but is not limited to, the resolution, the aspect ratio (AR), and the physical size of the display. Based on these inputs, the communication device next selects a portion, more or fewer columns or rows, of the block of EPG data to be displayed on the display device. The portion of the EPG data selected is formatted and communicated to the display device, e.g. television, for viewing by the user.2011-06-09
20110138423Content Recommendations - Content recommendations may be provided. First, in response to a received input and concurrent with a shrunken programming content, a media guide may be displayed. The media guide may comprise a first card, a second card, and a third card. The first card may comprise a plurality of recommendation types. The second card may comprise a plurality of subcategories corresponding to a selected one of the plurality of recommendation types. The third card may comprise a plurality of content program names corresponding to a selected one of the plurality of subcategories. The plurality of content program names may be in an order. Next, in response to a selection of a one of the plurality of content program names, an action card maybe displayed. Then a selected one of the plurality of actions may be executed.2011-06-09
20110138424DYNAMIC SWITCHING BETWEEN DIGITAL TV SERVICES - A method for creating variants of a DTV service, a method which is simpler than the method defined in GBS0600, and the method can handle all use-case scenarios for simulcast linking in a way almost equal to that defined in GBS0600. The method introduces switching between a mother service and a variant service, the mother service being a default service to which a receiver should tune, and the variant service being a service selected at a receiver side and linked to the mother service by a service link defining a switching relation between the mother service and the variant service. The method is defined by including switching information into the data-stream of the mother service, receiving the mother service data-stream, reading the switching information, and switching from the mother service to the variant service accordingly. The switching information can be carried in EPG data and thus utilize existing data structures. EPG data of the mother service, e.g. in the form of EIT data, can be used to carry switching data, expect for variant service events different from the mother service, where the EPG/EIT data are preferably cross-carried by the mother and variant service. Preferably, the receiver selects which one of a plurality of possible variant service to switch to, e.g. based on receiver capabilities and/or user access rights. Thus, EIT carriage efficiency for services with a large degree of sharing is high, and it offers advantages in tuning speed. Further, the method will lead to simpler and consistent receiver implementations.2011-06-09
20110138425METHOD AND SYSTEM FOR SHARING CHANNEL MAP OF DIGITAL BROADCAST IN HOME NETWORK - A method and system for a plurality of devices to share a channel map of digital broadcast in a home network is provided. In a system and method for sharing a channel map of digital broadcast in a home network according to the present invention, a Remote User Interface Server (RUIS) stores a channel map including an occupied count field for indicating a number of devices using each of a plurality of digital broadcast channels and an occupier indicator field including indicators of the devices using corresponding digital broadcast channels, and at least one Remote User Interface Client (RUIC) as one of the devices receives and displays the channels for which occupier indicator fields include the occupier indicator of the RUIC.2011-06-09
20110138426VIDEO SWITCHING AND SIGNAL PROCESSING APPARATUS - An apparatus integrates a plurality of television signal sources into a cohesive audio/video environment. Internal provisions include a standard broadcast-frequency tuner, cable tuner as well as other optional inputs such as for a direct-broadcast satellite, previously recorded video material, etc. In the preferred embodiment, means are provided whereby a main or primary program channel may be linked to additional channels providing supplementary information to enhance resolution, sound quality, or to facilitate special effects.2011-06-09
20110138427Video Service Buffer Management in a Mobile Rate Control Enabled Network - A system for a mobile wireless device to receive and display a video stream while preventing overflow or starvation of its receive buffer by requesting changes to the video streaming or encoding rates and by controlling the video playback frame rate. The current receive buffer level is used to make comparisons with several thresholds, the results of which are used to trigger actions. If the current receive buffer level has risen above a start level, then playback of the video can begin. If the current receive buffer level rises above an early detection threshold, then the video streaming device is requested to slow its streaming rate. If the current receive buffer level rises above a high level threshold, then the video streaming device is requested to stop streaming the video. If the current receive buffer level drops below a low level threshold, then the playback frame rate is slowed.2011-06-09
20110138428Transporting home networking frame-based communication signals over coaxial cables - A method and apparatus for coupling a system propagating wireless home networking communication signals to a system propagating television signals over a coaxial cable system to a device capable of receiving television signals that includes a three-port adapter having an antenna port, a first coaxial cable port and a second coaxial cable port. The antenna port is coupled to the system propagating home networking communications signals. The first coaxial cable port is coupled to the system propagating television signals over a coaxial cable. The second coaxial cable port is coupled to a device capable of receiving television signals.2011-06-09
20110138429SYSTEM AND METHOD FOR DELIVERING SELECTIONS OF MULTI-MEDIA CONTENT TO END USER DISPLAY SYSTEMS - This disclosure provides systems, methods and apparatus for providing user selected IP Data Network Protocol multi-media content via a CATV communication channel. In one example, a method of providing multi-media content includes receiving control data at a cable television provider server system from an controller device at an end-user location via an IP Data Network, the controller device having a display screen, a user interface, and at least one processor, and being configured to send and receive signals from the IP Data Network, where the control data indicating multi-media content to be provided by the provider system to a display system at the end-user location. The method can include retrieving to the server system the indicated multi-media content, converting the multi-media content from an IP Data Network format to a data format suitable for delivery by the provider system through a cable television communication channel of a CATV network to the display system, and providing from the server system the converted multi-media content through the cable television communication channel of a CATV network to the display system.2011-06-09
20110138430METHOD AND APPARATUS FOR UTILIZING A BROADCASTING CHANNEL - A method and computer readable medium for encoding data onto a channel broadcasting a program are disclosed. For example, the method selects a channel that is being used to broadcast a program, generates data having characteristics in accordance with an error burst signature and transmits the data on the channel that is being used to broadcast the program.2011-06-09
20110138431POLICIES FOR CONTENT DOWNLOADING AND CONTENT UPLOADING - Methods and arrangements for setting up a policy for downloading of IPTV media content from a Content Server (2011-06-09
20110138432Media Bookmarks - Specific instances in time, e.g., scenes, in a program or other media content can be marked in an unambiguous manner. A scene's marking information, which can be called a bookmark, is preferably stored in communication network as a part of a user's service profile. With such a bookmark, a user can, among other things, resume watching a program from the bookmarked point onwards on the same or a different media device, and send the bookmark to others, e.g., as a link in chat or other social networking interactions, so that they can watch the program from or around the bookmarked scene (provided, of course, that they have rights to access that content).2011-06-09
20110138433SYSTEM AND METHOD FOR BROADCASTING VIDEO WITH A SECONDARY AUDIO SOURCE - Embodiments of the disclosed invention include an apparatus, method, and computer program product for providing a video source with a secondary audio source. For example, in one embodiment, a content provider receives a broadcast signal that includes a video component and an audio component from a content producer. The content provider receives a second audio component that provides audio corresponding to the video component of the broadcast signal. The second audio component is received from a second source, such as, but not limited to, a radio broadcast and/or an internet source. The content producer transmits the video component and the second audio component to a consumer device.2011-06-09
20110138434SYSTEM AND METHOD FOR A DIGITAL TV CONVERTER WITH IPTV CAPABILITIES - A video content system and method that includes a video server connected to a public communication network and a video content network, and a computing device connected to the video content network and a video display device. The computing device establishes a communication channel between the computing device and the video server. The computing device receives a digital video stream on the communication channel, where the digital video stream includes video data and message data, and the message data includes at least one request to perform a service. The computing device performs the service and sends data on the communication channel, where the data is a response to each request to perform the service. The computing device processes the video data to prepare it for transmission to the video display device.2011-06-09
20110138435METHOD AND APPARATUS FOR ACHIEVING BROADBAND MATCHING OF NARROW-BAND RESONATOR FILTER IMPEDANCES TO LOADS AND SOURCES2011-06-09
20110138436RETURN FEED FORWARD - Provided is a device for use with a headend, a household and an amplifier. The headend is able to provide signals within a high-frequency band f2011-06-09
20110138437METHOD AND SYSTEM FOR PROVIDING BOTH LIVE VIEWING AND VIDEO ON DEMAND - A method in which user generated video content is distributed over a peer to peer network as live broadcast but may be viewed at any point using 2 overlayed peer networks. Video is rendered during download and a user may request a specific point in the video content and that point and all subsequent video content will be downloaded and rendered first via a peer to peer network.2011-06-09
20110138438MEDIA CONTENT SUBSCRIPTION ENFORCEMENT FOR A MEDIA CONTENT RECEIVER - A method of enforcing a media content subscription for a media content receiver is presented. In the method, a media content receiver is determined to be a primary receiver or a secondary receiver. If the media content receiver is determined to be a primary receiver, the primary receiver is operated according to a content subscription associated with the primary receiver, and communication with a secondary receiver is attempted. If the media content receiver is determined to be a secondary receiver, and the primary receiver communicates with the secondary receiver, the secondary receiver is operated according to a content subscription associated with the secondary receiver. If the primary receiver does not communicate with the secondary receiver, the secondary receiver is operated at a reduced level than determined by the content subscription of the secondary receiver.2011-06-09
20110138439Reception device, reception method, transmission device, and transmission method - A receiving device includes a first data receiving unit to receive image data from an external device, with multiple channels, by differential signals, via a transfer path; a second data receiving unit to receive predetermined data from the external device, via a bi-directional communication path made up using predetermined lines of the transfer path; a capability confirming unit to confirm the existence of capability to transmit the predetermined data to the external device, via the bi-directional communication path; and a transmission request unit to request transmission of the predetermined data to the external device when confirmation is made by the capability confirming unit that the external device has the capability.2011-06-09
20110138440Downstream output level tilt compensation device between CATV distribution system and CATV user - A downstream bandwidth output level tilt compensation device that can be inserted into a signal transmission line of a CATV system on a premise of a user. The device includes first and second filters to output first and second band signals, respectively. Detectors output a measurement representative of a characteristic (e.g., RF power) in the first and second band signals, respectively. A comparator uses the measurements from the detectors to determine a correction signal. A variable slope adjusting circuit is provided to adjust the gain slope of the downstream bandwidth responsive to the correction signal. The device includes a third filter after the variable slope adjusting circuit to pass a third band signals corresponding to the first and second signals. A second comparator uses measurements from the third signal to adjust the connection signal.2011-06-09
20110138441MODEL BASED SYSTEMS MANAGEMENT IN VIRTUALIZED AND NON-VIRTUALIZED ENVIRONMENTS - Architecture that provides model-based systems management in virtualized and non-virtualized environments. A security component provides security models which define security requirements for services. A management component applies one or more of the security models during the lifecycle of virtual machines and services. The lifecycle can include initial deployment, expansion, moving servers, monitoring, and reporting. The architecture creates a formal description model of how a virtual machine or a service (composition of multiple virtual machines) is secured. The security requirements information can also be fed back to the general management system which uses this information in its own activities such as to guide the placement of workloads on servers can be security related.2011-06-09
20110138442AUTOMATED SECURITY CLASSIFICATION AND PROPAGATION OF VIRTUALIZED AND PHYSICAL VIRTUAL MACHINES - Architecture that provides additional data that can be obtained and employed in security models in order to provide security to services over the service lifecycle. The architecture automatically propagates security classifications throughout the lifecycle of the service, which can include initial deployment, expansion, moving servers, monitoring, and reporting, for example, and further include classification propagation from the workload (computer), classification propagation in the model, classification propagation according to the lineage of the storage location (e.g., virtual hard drive), status propagation in the model and classification based on data stored in the machine.2011-06-09
20110138443SYSTEM AND METHOD FOR VALIDATING A LOCATION OF AN UNTRUSTED DEVICE - In a system of mobile agents operating in a region of interest, it may be necessary to validate the position of an untrusted device prior to allowing the untrusted device to perform agent functions within the region of interest. Trusted mobile agents within the region of interest may activate wireless access points with randomly generated identifiers. The untrusted device may be instructed to provide a list of identifiers of visible wireless access points to confirm that the untrusted device is within the ROI.2011-06-09
20110138444AUGMENTED REMOTE CONTROLLER AND METHOD FOR OPERATING THE SAME - An image display may be displayed by augmented reality on a remote controller. This may include identifying an electronic device having playable content, receiving information regarding a locked status of the playable content of the identified electronic device, and displaying, on a screen, an object indicating a locked status when the playable content of the identified electronic device requires a user authentication for playing the content. A user authentication input may be received and a determination may be made whether the received user authentication input matches a previously stored user authentication information. The playable content may be released from the locked status when it is determined that the received user authentication input matches the previously stored user authentication information, and information relating to the released playable content may be displayed.2011-06-09
20110138445SYSTEMS AND METHODS FOR DYNAMIC ACCESS TO PROGRAM FEATURES - The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that determines which features are to be made available to a particular user. The server system may send the feature access information to the user such that the information is accessible to the multimedia client program. The multimedia client program may dynamically control the user's access to the program's feature set by using the feature access information to validate and verify the user. In addition, the feature access information may be accessible to the server system, such that the server system may periodically update the feature access information, such as, for example, when the user accesses the server system to download multimedia content.2011-06-09
20110138446SYSTEM AND METHOD FOR PROVIDING USER AUTHENTICATION AND IDENTITY MANAGEMENT - A distributed client/server system comprises a network of servers and clients, such as the Internet, in which user access to certain restricted resources is controlled by a logon procedure that identifies an authorized user to the respective administering server. The disclosed system and method includes a logon server that comprises a user authentication procedure by which a user can logon to the logon server from any client in the network and uniquely identify itself to the logon server. The logon server also includes a library of usernames and passwords for the restricted resources chosen by each user and the ability to automatically log the users on to any of the restricted resources when selected by the user through a personal catalog maintained by the logon server. The disclosure system and method also includes various other features for providing user authentication and identity management in a network environment, such as the Internet.2011-06-09
20110138447Method, System and Device for Obtaining a Trust Type of a Non-3GPP Access System - The invention provides a method for obtaining a trust type of a non-3GPP access system comprising the following steps: a user equipment UE establishing a underlying link with a non-3GPP access system selected by the UE; the UE initiating an access authentication request and sending the identification information of the UE and the information of the non-3GPP access system to an Authentication, Authorization, Accounting server through the non-3GPP access system; the UE receiving a returned access authentication response and the trust type of the non-3GPP access system, and the trust type of the non-3GPP access system being determined by the AAA server based on the identification information of the UE, the information of the non-3GPP access system and the operator's strategy. The invention can realize that the trust type of the non-3GPP access system is determined and is informed to the UE by the AAA server during the access authentication performed by the UE, so that the UE can obtain the trust type of the non-3GPP access system.2011-06-09
20110138448METHOD AND APPARATUS FOR ENABLING MOBILITY IN MOBILE IP BASED WIRELESS COMMUNICATION SYSTEMS - A method is provided for providing secured mobile IP services to a mobile terminal which is currently associated with an access network different from its own home access network. The method is characterized by creating a virtual mobile node at an access network server of the current access network, which communicates with a Home Agent associated with the terminal's home mobile network and with one or more access points associated with the current access network, at which the mobile terminal is currently located.2011-06-09
20110138449PURE OFFLINE SOFTWARE APPLIANCE CONFIGURATION - One or more online configuration settings are received prior to deployment and execution of a software appliance. Once the configuration settings have been received, the online configuration settings can be utilized to configure a software appliance image prior to executing the image at a host computer. Once the application of the configuration settings to the image has been completed, the image may executed at a host computer.2011-06-09
20110138450Secure Transaction Systems and Methods using User Authenticating Biometric Information - A user transaction request is received at a client device. A web browser plug-in communicates the user transaction request to a server that determines whether the user transaction request is a secure transaction. Transaction data is received from the server via the web browser plug-in. If the received transaction data indicates a secure transaction, the user is prompted to provide biometric data from a user using a biometric device and related security protocols. The web browser plug-in then communicates a transaction confirmation to the server.2011-06-09
20110138451METHOD AND SYSTEM FOR AN INTERCEPT CHAIN OF CUSTODY PROTOCOL - Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party.2011-06-09
20110138452CROSS SECURITY-DOMAIN IDENTITY CONTEXT PROJECTION WITHIN A COMPUTING ENVIRONMENT - Processing within a computing environment is facilitated by: determining by a local security manager of a first system in a first security domain whether a local security context of a user is acceptable to a second system in a second security domain; responsive to the user's security context being unacceptable to the second system, creating by a local security manager of the second system a runtime security context for the user in the second system; and providing the first system with a reference to the runtime security context for the user in the second system which is resolvable within the computing environment or a portable representation of the runtime security context for the user in the second system, the reference or the portable representation being subsequently returned to the second system with a request from the first system to process work at the second system.2011-06-09
20110138453SINGLE SIGN-ON IN MIXED HTTP AND SIP ENVIRONMENTS - In a first embodiment of the present invention, a method for providing single sign-on in a network having a HyperText Transfer Protocol (HTTP) portion and a Session Initiation Protocol (SIP) portion is provided, the method performed at a gateway and comprising: receiving an HTTP request for an assertion from a requester over the HTTP portion; generating a SIP request using the request for assertion; sending the SIP request to a SIP registrar over the SIP portion; receiving a SIP response including information regarding an assertion from the SIP registrar; and sending the information regarding the assertion in an HTTP response to the requester, such that the requester can use the information regarding the assertion in authenticating the requester to a web server.2011-06-09
20110138454SYSTEMS AND METHODS FOR FACILITATING USER AUTHENTICATION OVER A NETWORK - In accordance with embodiments of the present disclosure, systems and methods for facilitating network transactions include user authentication over a network by providing strong mutual authentication of client web application to server side application server, providing session encryption key negotiation after authentication to continue encryption during communication, and providing a high-level encryption technique referred to as an effective zero knowledge proof of identity (eZKPI) algorithm. In various implementations, the eZKPI algorithm is adapted to couple something the user Knows (e.g., a password or personal identification number) with something the user Has (e.g., a secure identification card) to create a stronger identity authentication proof for access to a mobile device and applications running on the mobile device.2011-06-09
20110138455FIREWALL FILTERING USING NETWORK CONTROLLER CIRCUITRY - An embodiment may include network controller circuitry to be comprised in a host computer that includes a host processor to execute an operating system environment. The circuitry may be coupled to the processor, receive at least one packet via a network, store at least one firewall filter parameter set, and execute, based at least in part upon the parameter set and packet, at least one firewall filter action involving, at least in part, the packet. The action may implement, at least in part, at least one firewall rule supplied by a firewall application to an interface of a driver associated with the circuitry. The application may be executed, at least in part, in the environment. The circuitry may generate and store the parameter set based at least in part upon at least one command from the driver. The command may be based at least in part upon the rule.2011-06-09
20110138456SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION - A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.2011-06-09
20110138457Securing Communications Between Different Network Zones - In an embodiment, a method is provided for communicating a protocol request at a network zone. In this method, the protocol request is received from a computing device and this protocol request is encapsulated in a different protocol. The protocol request is then transmitted to a different network zone by way of the different protocol. A message is then accessed from the different network zone by way of the different protocol, and this message includes a protocol response to the protocol request. The protocol response is extracted from the message and transmitted to the computing device.2011-06-09
20110138458Establishing Internet Protocol Security Sessions Using the Extensible Messaging and Presence Protocol - Techniques are provided for sending from a client in a first network device a session initiate message over a first secure network connection that is configured to initiate a communications session with a client in a second network device. The session initiate message is configured to supply connection information for the second network device to establish a second secure network connection with the first network device. A session accept message is received from the client in the second network device over the first secure network connection that is configured to accept the communications session with the client in the first network device. The session accept message is configured to supply connection information for the first network device to establish the second secure network connection with the second network device. The second secure network connection is established between the first network device and the second network device using the connection information.2011-06-09
20110138459TERMINAL AND METHOD FOR CONTROLLING THEREOF - Disclosed are a terminal and a method for controlling thereof that load a user authorization function in a terminal such as a remote controller that remotely controls an external display apparatus such as a TV, etc. and allow only users who accept user authorization to use the display apparatus.2011-06-09
20110138460SYSTEM AND METHOD FOR LOADING APPLICATION CLASSES - In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the application's security permissions, e.g. by decoding a security token. The class is then retrieved from a repository that stores class variants matching the required security level. The retrieved class variant, which may have a full or a reduced functionality as appropriate for the security permission may then by loaded.2011-06-09
20110138461EXECUTION ENVIRONMENT FILE INVENTORY - A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system.2011-06-09
20110138462SYSTEM AND METHOD FOR DETECTING VOIP TOLL FRAUD ATTACK FOR INTERNET TELEPHONE - Provided is a system for detecting a voice over Internet protocol (VoIP) toll fraud attack. The system includes: a database (DB) storing registration information of normal users; a packet reception module receiving a call set-up packet from a network; and a VoIP signaling message forgery/falsification detection module receiving the call set-up packet from the packet reception module and comparing sender address information or header information of the call set-up packet with the registration information stored in the DB to detect whether the call set-up packet is a packet received from one of the normal users.2011-06-09
20110138463METHOD AND SYSTEM FOR DDOS TRAFFIC DETECTION AND TRAFFIC MITIGATION USING FLOW STATISTICS - Disclosed are a method and system for distributed denial of service (DDoS) attack detection and traffic mitigation using flow statistics. The method for DDoS attack detection and traffic mitigation using flow statistics includes: collecting first statistics for each flow based on flow information generated by traffic flow of a network connection device; and grouping the first statistics for each flow on a per-flow basis and processing the same into second statistics containing at least one of the number of bytes, the number of packets, and the number of flows per unit time.2011-06-09
20110138464STATE NOTIFICATION APPARATUS, STATE NOTIFICATION METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - A state notification apparatus comprises: a holding unit that, when one or more secure runtime environments and one or more non-secure runtime environments are selectively executed in a foreground, holds an identifier of a runtime environment that is being executed in the foreground; a determination unit that determines a state of the runtime environment executed in the foreground based on the identifier held by the holding unit; and a notification unit that causes a hardware device that cannot be accessed from the one or more non-secure runtime environments to notify the state determined by the determination unit.2011-06-09
20110138465MITIGATING MALICIOUS FILE PROPAGATION WITH PROGRESSIVE IDENTIFIERS - A method and system for mitigating a propagation of a file that includes malicious code. Segments of the file are determined by a series of sizes determined by a function ƒ. Signatures identifying segments of the file are determined by applying a hash function to each segment. A complete match between the file and a malicious file is determined by determining a first match between signature(s) identifying a first set of segment(s) of the file and signature(s) identifying corresponding segment(s) of the malicious file and by determining a second match between a signature identifying a final segment of the file and a signature identifying a last segment of the malicious file. Responsive to determining the complete match, the file is identified as the malicious file and a transfer of the final segment of the file is interdicted.2011-06-09
20110138466METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING AGAINST IP PREFIX HIJACKING - A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each of the at least one potential hijack AS.2011-06-09
20110138467Method and System for Content Distribution Network Security - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.2011-06-09
20110138468Distributed Security Provisioning - Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.2011-06-09
20110138469SYSTEM AND METHOD FOR RESOLVING VULNERABILITIES IN A COMPUTER NETWORK - In a computer network, a remedy server may be provided that controls vulnerability scans of the computer nodes. The remedy server determines a security level of a computer node and dispatches an agent to the node with a scan matching the security level. The agent executes the scan and reports the scan results to the remedy server. The remedy server collates scan results from a plurality of the network computers and determines which computers have a common vulnerability. A fix for the vulnerability, such as an executable patch file, is retrieved and multicast to those relevant computers.2011-06-09
20110138470AUTOMATED TESTING FOR SECURITY VULNERABILITIES OF DEVICES - A method includes selecting an attack signature from an attack signature database; generating a fingerprint that includes parameters indicative of the attack signature; generating configuration data for one or more test devices based on the fingerprint, wherein the configuration data is capable of configuring the one or more test devices to provide a security response to the attack signature; providing the configuration data to the one or more test devices; transmitting the attack signature to the one or more test devices; examining a security response to the attack signature from the one or more test devices; and outputting a result of the examining.2011-06-09
20110138471SECURITY HANDLING BASED ON RISK MANAGEMENT - A security device may receive information relating to a security event in a customer network. The security device may further determine, in response to receiving the information, a likelihood score that reflects a likelihood that the security event will succeed and an impact score that provides an indication of an impact that the security event will have on the customer network. The security device may also determine a risk score based on the likelihood score and the impact score, where the risk score provides an indication of a risk that the security event will affect the customer network. The security device may provide the risk score to a customer associated with the customer network.2011-06-09
20110138472USER-ADMINISTERED LICENSE STATE VERIFICATION - The product keys of software applications that can be utilized to identify, and activate to a higher functional state, legitimate copies of such software applications can be asymmetrically encrypted. Such encrypted product keys can be provided to potential purchasers without fear of theft of the original product keys. The encrypted product keys can be provided to an independent, trusted third-party validation authority that can decrypt such encrypted product keys and can, such as in conjunction with the software application manufacturer, verify the validity of the software applications associated with such product keys. For software applications bundled on a computing device, a tool can be executed by either the seller or potential purchaser to collect and display encrypted product keys for verification purposes. For software applications sold in an online environment, an escrow service can be utilized to keep, and provide when requested, product keys of software applications offered for sale.2011-06-09
20110138473DYNAMIC CODE INSERTION AND REMOVAL FOR STATIC ANALYSIS BASED SANDBOXES - Methods and apparatus for dynamically adding and deleting new code to previously validated application executing in a secured runtime. New code is written to a portion of secured memory not executable by application. New code is validated to ensure it cannot directly call operating system, address memory outside of secured memory, or modify secured memory state. Indirect branch instructions may only target addresses aligned on fixed size boundaries within the secured memory. Validated code is copied to portion of secured memory executable by application in two stage process that ensures partially copied segments cannot be executed. Validated new code can be deleted once all threads reach safe execution point, provided code was previously inserted as unit or contains no internal targets that can be called by code not also being deleted.2011-06-09
20110138474DYNAMIC CODE INSERTION AND REMOVAL FOR STATIC ANALYSIS BASED SANDBOXES - Methods and apparatus for dynamically adding and deleting new code to previously validated application executing in a secured runtime. New code is written to a portion of secured memory not executable by application. New code is validated to ensure it cannot directly call operating system, address memory outside of secured memory, or modify secured memory state. Indirect branch instructions may only target addresses aligned on fixed size boundaries within the secured memory. Validated code is copied to portion of secured memory executable by application in two stage process that ensures partially copied segments cannot be executed. Validated new code can be deleted once all threads reach safe execution point, provided code was previously inserted as unit or contains no internal targets that can be called by code not also being deleted.2011-06-09
20110138475SYSTEMS AND METHOD FOR PROVIDING TRUSTED SYSTEM FUNCTIONALITIES IN A CLUSTER BASED SYSTEM - A framework for providing cluster-wide cryptographic operations, including: signing, sealing, binding, unsealing, and unbinding. The framework includes an interface module (a.k.a., HAT agent) on each of a plurality of nodes in the cluster. Each HAT agent is configured to respond to an application's request for a cluster crypto operation by communication with other HAT agents in the cluster and utilizing a trusted platform module local to the node where the HAT agent resides.2011-06-09
20110138476Software Fault Isolation Using Byte-Granularity Memory Protection - Software fault isolation methods using byte-granularity memory protection are described. In an embodiment, untrusted drivers or other extensions to a software system are run in a separate domain from the host portion of the software system, but share the same address space as the host portion. Calls between domains are mediated using an interposition library and access control data is maintained for substantially each byte of relevant virtual address space. Instrumentation added to the untrusted extension at compile-time, before load-time, or at runtime and added by the interposition library enforces the isolation between domains, for example by adding access right checks before any writes or indirect calls and by redirecting function calls to call wrappers in the interposition library. The instrumentation also updates the access control data to grant and revoke access rights on a fine granularity according to the semantics of the operation being invoked.2011-06-09
20110138477Location Sensitive Solid State Drive - A data storage system including a SSD includes a capability to detect whether its location is acceptable for function, and a capability to self-disable in the event the location of the device is unacceptable, or to self-enable only while the location of the device is acceptable.2011-06-09
20110138478Metadata Broker - The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.2011-06-09
20110138479Maintaining The Integrity Of Email Authorship - Maintaining the integrity of email authorship including receiving, by a receiving email client, an email message containing content created by a sender; identifying, in dependence upon the email message, an edit authority value; receiving, from a recipient of the email message, an instruction to forward the received email message; receiving, from the recipient, an instruction to edit the content contained in the received email message; and determining, in dependence upon the edit authority value, whether to allow the recipient to edit the content; if the recipient is allowed to edit the content, determining, in dependence upon the edit authority value, whether to enforce edit tracking in the content; and forwarding the email message with the recipient's edits tracked if edit tracking is enforced; or forwarding the email message with the recipient's edits untracked if edit tracking is not enforced.2011-06-09
20110138480METHOD AND APPARATUS FOR PROVIDING MOBILE SOCIAL NETWORKING PRIVACY - A method, computer readable medium and apparatus for providing mobile social networking privacy are disclosed. For example, the method receives a request from a third party application for location information of a mobile endpoint device user, determines whether the third party application is a multiple user application and provides the location information of the mobile endpoint device user to the third party application in accordance with a privacy setting pre-defined by an authorized user if the third party application is a multiple user application.2011-06-09
20110138481RECORDING MEDIUM, AND RECORDING/REPRODUCING METHOD AND RECORDING/REPRODUCING APPARATUS FOR RECORDING MEDIUM - The present invention provides a recording/reproducing method for a recording medium including a data recording layer and a user information recording layer, wherein the recording/reproducing method includes the steps of: receiving inputted user information; determining whether the inputted user information matches the user information recorded on the user information recording layer of the recording medium; and recording data onto the data recording layer of the recording medium, or reproducing data of the data recording layer, in accordance with the result of the determination.2011-06-09
20110138482DATA DELIVERY APPARATUS AND DATA DELIVERY METHOD - A data delivery apparatus including a storage adapted to store limited-access data which associates user data for specifying a user, with data, access to which is permitted or limited to the user; a function determination unit adapted to determine whether a destination device to which the limited-access data is to be transmitted has an access control function of permitting or limiting access to the limited-access data for each user; an authentication unit adapted to, when the limited-access data destination device is determined not to have the access control function, request input of authentication information and performing an authentication process using the input authentication information; and a transmission control unit adapted to, when the authentication process by said authentication unit is successful, transmitting the limited-access data to the destination device.2011-06-09
20110138483MOBILE PHONE AND IP ADDRESS CORRELATION SERVICE - A system, method and program product for controlling access to a restricted item. A method is provided that includes: receiving a request for access to a restricted item at a computer system associated with a provider, said request originating from a client system; determining an IP address of the client system; determining a mobile phone number of a mobile phone associated with the requester; transmitting to a third party service provider the IP address and mobile phone number; and receiving back from the third party service provider a confirmation message indicating whether or not the IP address and mobile phone are located within an acceptable range of each other.2011-06-09
20110138484Embedded content requests in a rights locker system for digital content access control - Access to digital content may be controlled by determining a digital content specification and associated authenticated rights locker access request, sending the authenticated rights locker access request and the digital content specification, and receiving a new authenticated rights locker access request and a Web page with clickable links in response to the sending, where at least one of the clickable links is associated with an authenticated digital content request. When an indication of a user selection of one of the clickable links is received, an authenticated digital content request associated with the user-selected clickable link is sent to a digital content repository. The digital content is received in response to the sending of the authenticated digital content request.2011-06-09
20110138485MONITOR METHOD AND MONITOR APPARATUS FOR MONITORING DATA OF HARDWARE - A monitor method and a monitor apparatus for monitoring a data of hardware are provided. The data has private information, identification information and at least one first network transmission address. The monitor apparatus comprises a storage unit and a processing unit. The data is stored in the storage unit according to the identification information. The processing unit is configured to record the identification information and the at least one first network transmission address of the data in a mark information table. In response to a sending system call, when a transmission is arranged to transmit the private information of the data to a second network transmission address which is different from the at least one first network transmission address, the processing unit will output a signal to cease the transmission.2011-06-09
20110138486Methods and Apparatus for Secure Distribution of Protected Content - Systems and techniques for protection and delivery of content. Upon initiation of a user account for use in conducting transactions involving delivery of content to a user, digital rights management (DRM) information is created and stored in association with user information. A copy of the DRM information is provided to or made accessible to the user in such a way that the DRM information can made accessible to a suitable playback device to allow playing of content protected with the DRM information. When a user enters into a transaction to receive content, the DRM information associated with the user is used to protect the content before delivery to the user. When the user wishes to play the content, the removable media device storing the user's DRM information must be present in order to allow playing of the content.2011-06-09
20110138487Storage Device and Method for Using a Virtual File in a Public Memory Area to Access a Plurality of Protected Files in a Private Memory Area - A storage device and method for using a virtual file in a public memory area to access a plurality of protected files in a private memory area are disclosed. In one embodiment, a storage device receives a request from a host for access to a virtual file in the public memory area, wherein the virtual file is associated with a plurality of protected files stored in the private memory area. The storage device responds to the request by selecting and providing the host with access to one of the plurality of protected files stored in the private memory area. The storage device receives an additional request from the host for access to the virtual file and responds to the additional request by selecting and providing the host with access to a different one of the plurality of protected files stored in the private memory area.2011-06-09
20110138488DEFICIENCY IN THE HISTONE DEMETHYLASE JHDM2A RESULTS IN IMPAIRED ENERGY EXPENDITURE AND OBESITY - The present invention relates to animal models of metabolic disorders such as obesity, diabetes, metabolic syndrome, insulin resistance, hyperinsulinemia, glucose intolerance, hyperlipidemia, and the like. In particular, the invention relates to transgenic non-human animals having a reduction in functional Jhdm2a gene expression and use of such animals and cells having reduced Jhdm2a expression in drug discovery. The invention further relates to the identification of subjects having or at increased risk for developing a metabolic disorder based on a genetic marker in the Jhdm2a gene.2011-06-09
20110138489TRANSGENIC ANIMALS EXPRESSING CHIMERIC ANTIBODIES FOR USE IN PREPARING HUMAN ANTIBODIES - The invention provides transgene constructs for expressing chimeric antibodies, and transgenic non-human host animals carrying such constructs, wherein the chimeric antibodies comprise human variable regions and constant regions of the non-human transgenic host animal. The presence of immunoglobulin constant regions of the host animal allows for generation of improved antibodies in such transgenic host animals. Subsequently, the chimeric antibodies can be readily converted to fully human antibodies using recombinant DNA techniques. Thus, the invention provides compositions and methods for generating human antibodies in which chimeric antibodies raised in vivo in transgenic mice are used as intermediates and then converted to fully human antibodies in vitro.2011-06-09
20110138490DESATURASE AND METHOD FOR THE PRODUCTION OF POLYUNSATURATED FATTY ACIDS IN TRANSGENIC ORGANISMS - The present invention relates to a polynucleotide from 2011-06-09
20110138491Compositions and Method for Epigenetic Modification of Nucleic Acid Sequences in Vivo - Demethylation of a methylated DNA sequence in a eukaryotic cell is described, utilising a molecule that includes at least a first domain that exhibits a cytidine deaminase activity and at least a second domain that confers either a specific or non-specific DNA binding activity. The molecules of the invention are useful in somatic cell nuclear transfer and also in cancer therapy.2011-06-09
20110138492TRANSGENIC SUGAR BEET PLANTS - The invention relates to transgenic sugar beet plants having a phenotype of delayed bolting. The invention further relates to polynucleotides that are closely linked to the bolting gene or B gene within the sugar beet genome and can be used for the discrimination between the annual and biennial genotype or between different haplotypes within plant groupings of sugar beet plants exhibiting a biennial genotype.2011-06-09
20110138493BREEDING AND SELECTION FOR RESISTANCE TO MELON SEVERE MOSAIC VIRUS (MeSMV) - The invention provides methods of detecting MeSMV; methods of screening plants for resistance or susceptibility to MeSMV; and methods of breeding to produce plants that are resistant to MeSMV; and to the resistant plants produced by such methods.2011-06-09
20110138494PEA LINE 08240772 - The invention provides seed and plants of the pea line designated 08240772. The invention thus relates to the plants, seeds and tissue cultures of pea line 08240772, and to methods for producing a pea plant produced by crossing a plant of pea line 08240772 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line 08240772, including the seed, pod, and gametes of such plants.2011-06-09
20110138495Methods and Compositions for Expressing Proteins In Plants - Methods and compositions comprising an expression construct and a suppressor of posttranscriptional gene silencing construct are described. The expression construct and suppressor construct may comprise a viral amplicon. The expression construct may comprise fusing the target gene to the 3′ and/or 5′ end of a gene encoding a transit peptide sequence or a signaling peptide sequences. The transit or signal peptide sequence directs the target gene product to a subcellular location. Methods comprise the production of several heterologous proteins in a single plant. The invention comprises methods for plant production and protein harvest that will yield useful amounts of the desired protein(s) in as little as one to two weeks after the initiation of the production cycle. Methods for the inoculation of recipient plants by spraying with recombinant 2011-06-09
20110138496POLYPEPTIDE FOR IMPROVING TOLERANCE TO IRON DEFICIENCY IN PLANTS, AND USE THEREOF - The present invention provides a polypeptide which binds to a cis-element in the vicinity of a gene related to an iron-acquisition mechanism. The polypeptide can increase expression of the gene related to the iron-acquiring mechanism. This makes it possible to obtin a plant improved in tolerance to iron deficiency.2011-06-09
20110138497Non-Diffusing Plant Virus Vector - The present invention is to provide a novel non-diffusing plant virus vector wherein virus vector infection and proliferation are possible only in a recombinant plant transfected with a gene necessary for viral proliferation, thereby enabling avoidance of unintended diffusion of a recombinant virus, a selective and specific expression system therefor, and a method of expression thereof which comprises combining a non-diffusing virus vector lacking a gene involved in intercellular movement of a cucumber mosaic virus (CMV) genome and a transgenic plant transfected with the lacked gene involved in intercellular movement for the non-diffusing virus vector to establish infection and proliferation selectively and specifically in the transgenic plant.2011-06-09
20110138498Modulation of receptor-like kinases for promotion of plant growth - The invention provides the disclosure of a novel plant growth pathway involving several receptor like kinases. The pathway was shown to work largely independent of brassinosteroids and involves several members of the CrRLK1L family of receptor kinases. According to the invention, HERK1, HERK2, FER, THE1 and the brassinosteroid BES1 may be modulated to influence plant growth and elongation. The invention includes methods, and transformed plants, cells tissues and seeds with increased cellular elongation and other related yield traits.2011-06-09
20110138499PLANT QUALITY TRAITS - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties, including increased soluble solids, lycopene, and improved plant volume or yield, as compared to wild-type or control plants. The invention also pertains to expression systems that may be used to regulate these transcription factor polynucleotides, providing constitutive, transient, inducible and tissue-specific regulation.2011-06-09
Website © 2025 Advameg, Inc.