Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


27th week of 2013 patent applcation highlights part 70
Patent application numberTitlePublished
20130174194Systems and Methods for Associating Ratings with Media and for Providing Ratings-Based Parental Controls - Certain embodiments provide an identifier in a piece of media content that can be used to reference ratings information from another location, such as from a ratings repository. When the media content is accessed by a viewing client, the identifier can be retrieved from the piece of media content and used to retrieve a rating from a ratings repository. A rating may also be included in the media content itself to ensure that at least one rating is available even if accessing a rating from the remote repository is not possible, for example, due to lack of network connectivity. The viewing client can use a rating to control use of the media content. One embodiment allows a user on a client device such as a computer or television consumption device to set rating controls that restrict the media content that can be played at the device.2013-07-04
20130174195SYSTEMS AND METHODS OF IMAGE SEARCHING - Systems and methods of image searching include receiving content, receiving a request to select an image from content, selecting a plurality of items in the image, retrieving information about the selected item, and providing display data based on the retrieved information.2013-07-04
20130174196METHOD AND SYSTEM FOR DETERMINING IDENTITY/PRESENCE OF A MOBILE DEVICE USER FOR CONTROL AND INTERACTION IN CONTENT DISTRIBUTION - A method and system for using a mobile device identifier, such as an Electronic Serial Number (ESN) or a Mobile Equipment Identifier (MEID), of a mobile device for communication in a content distribution environment includes detecting the ESN of a mobile device when in or within a predetermined range of the content distribution environment. Once the mobile device identifier has been detected, demographic and user identification information of the mobile device is obtained via one or more databases and selected media content is then delivered to one or more selected display devices, such as a display device nearest to the mobile device.2013-07-04
20130174197VIDEO PREVIEW MODULE TO ENHANCE ONLINE VIDEO EXPERIENCE - A Video Preview Module, a fast and adaptable software module designed to generate an on-the-fly video storyboard that enhances the online video browsing experience of the user. The VP module is a client-side implementation. This allows the module to be scalable and adaptable in bringing a uniform online video browsing experience over multiple consumer devices.2013-07-04
20130174198SYSTEM FOR PRESENTING MEDIA PROGRAMS - A system that incorporates the subject disclosure may use, for example, a method for sending a set-top box an identification of the media player, receiving operational instructions from the set-top box according to the emulator executed by the set-top box that emulates a user interface of the media player by presenting a representation of the media player in a graphical user interface, and transmitting media content to the set-top box according to the operational instructions. The emulator can be supplied to the set-top box by way of a multimedia system communicatively coupled to the set-top box. The user interface presented by the set-top box by way of the emulator substantially mimics functions of the media player. Additional embodiments are disclosed.2013-07-04
20130174199METHODS, SYSTEMS, AND MEANS FOR PRESENTING MENU OPTIONS IN A MEDIA GUIDANCE APPLICATION - Methods, systems, and means for presenting menu options in a media guidance application are provided. In particular, a user selection of a primary menu option is received in the media guidance application. A plurality of sub-menu options that correspond to the primary option selected is determined. Subsequently, for each of the plurality of sub-menu options, it is determined whether the sub-menu option has guidance data and/or content associated with the primary menu option selected. This guidance data and/or content can be either data and/or media in accordance with some embodiments of the invention. For each of the plurality of sub-menu options that does not have guidance data and/or content associated with the primary menu option selected, the sub-menu option is prevented from being presented to a user.2013-07-04
20130174200SYSTEMS AND METHODS FOR PRESENTING MULTIPLE ASSETS IN AN INTERACTIVE MEDIA GUIDANCE APPLICATION - Systems and methods for presenting multiple assets in an interactive media guidance application are provided. A guidance display containing media guidance application listings is provided, where non-linear media assets are extracted from the media guidance application listings and the guidance display is divided into different portions to present media guidance application listings of non-on-demand media assets and non-linear media assets. One portion of the guidance display may include media guidance application listings of non-on-demand assets and may indicate the non-linear media assets extracted from the portion of the guidance display. Another portion may include media guidance application listings of non-linear media assets that were extracted from the media guidance application listings. This portion may also include additional non-linear assets that are available for retrieval and playback.2013-07-04
20130174201SYSTEMS AND METHODS FOR PRESENTING THREE-DIMENSIONAL OBJECTS IN AN INTERACTIVE MEDIA GUIDANCE APPLICATION - Systems and methods for presenting an interactive media guidance application are provided. One or more three-dimensional objects are presented in a guidance display, where each three-dimensional object represents a media asset. In response to receiving an indication from the user of one of the three-dimensional objects, the selected three-dimensional object or a region containing the selected three-dimensional object may be animated. The animation of the selected three-dimensional object or the region containing the selected three-dimensional object in the guidance display may be made relative to the remainder of three-dimensional objects that have not been selected by the user.2013-07-04
20130174202IMAGE PROCESSING APPARATUS WHICH CAN PLAY CONTENTS AND CONTROL METHOD THEREOF - An image processing apparatus and a method of controlling the image processing apparatus, are provided. The method includes: receiving a user command to select contents; searching for image quality control information which corresponds to contents selected according to the user command; and performing an image quality control according to the searched image quality control information. The apparatus includes a user interface (UI) unit which receives a user command to select contents; and a controller which searches for image quality control information which corresponds to contents selected according to the user command and performs an image quality control according to the searched image quality control information.2013-07-04
20130174203SERVER APPARATUS, VIDEO IMAGE QUALITY MEASUREMENT SYSTEM, VIDEO IMAGE QUALITY MEASUREMENT METHOD AND PROGRAM - A server apparatus includes: a compression and encoding unit that compresses and encodes screen information or image information downloaded from a Web serve on the Internet in response to an instruction from a mobile terminal; a packet transmission unit that stores an output signal from the compression and encoding unit into a packet and transmits the packet to the mobile terminal via a packet forwarding apparatus(es); and a video image quality measurement unit that measures video image quality by referring to an input signal to the compression and encoding unit, a signal decoded from the output signal of the compression and encoding unit, a transmission timing of the packets, and a timing at which the mobile terminal receives the packet.2013-07-04
20130174204Systems and Methods for Networked Music Playback - Systems, methods, apparatus, and articles of manufacture to facilitate connection to a multimedia playback network are disclosed. An example method provides content to a local playback network. The example method includes identifying multimedia content from a content provider. The example method includes passing information regarding the multimedia content to a local playback system including one or more multimedia playback devices in response to a trigger. The example method includes facilitating play of the multimedia content via a local playback network associated with the local playback system.2013-07-04
20130174205Wireless Hands-Free Computing Head Mounted Video Eyewear for Local/Remote Diagnosis and Repair - The present application relates to human/computer interfaces and more particularly to a wireless computing headset with one or more microdisplay devices that can provide hands-free remote control of attached or remote peripheral devices, systems and/or networks. A wireless hands-free video computing headset, and corresponding method, enabling communication with a host processor to provide the user omnipresent expertise is disclosed. The wireless hands-free video computing headset, which includes a microdisplay device to present information to the user graphically, communicates with a host processor to provide the user with an expert resource. The expert resource may take numerous forms, such as diagnostic software, or live human support. The wireless hands-free video computing headset is useful by enabling the user to focus his or her attention, and maintain his or her focus, on a physical subject by enabling hands-free control, enabling the user the ability to continuously manipulate the subject manually with his or her hands as needed.2013-07-04
20130174206VCR CONTROL CAPABILITIES FOR INFORMATION PLAY SESSIONS - The present invention relates to IMS networks and, more particularly, to information recording sessions in IMS networks. System and method for enabling control options while information is being recorded from a user. A Media Gateway Controller sends the control options to a Media Server. The Media Server receives a control command from the user, wherein the control command is based on the control options and the Media Server performs an action on the information based on the control command. The user is an Internet Protocol Multimedia Subsystem (IMS) user. The Media Gateway Controller sends the control options to the Media Server in a Session Initiation Protocol (SIP) INFO message using Media Server Markup Language (MSML) format.2013-07-04
20130174207APPARATUS FOR PROVIDING SUPPLEMENTARY INFORMATION OF MULTIMEDIA CONTENTS, RECORDED MEDIUM THEREOF, AND PERSONAL STORAGE DEVICE - An apparatus and method for providing content supplementary information, a recorded medium related thereto, a personal storage device, and a method of controlling the personal storage device are disclosed. One aspect of the invention provides an apparatus for providing supplementary information of a multimedia content that is connected over a network with a user terminal. The apparatus includes: a receiving unit configured to receive from the user terminal a request for supplementary information of a multimedia content currently in use by a user, where the request for supplementary information comprises at least one of an identifier of the multimedia content, an identifier of supplementary information related to the multimedia content, and address information of a personal storage device matching the user terminal; and a control unit configured to provide control such that the requested supplementary information is read from a database and transmitted to the personal storage device.2013-07-04
20130174208METHOD AND APPARATUS FOR ELECTRONIC DEVICE COMMUNICATION - The present disclosure relates to a method and apparatus for electronic device communication. A method includes translating monitor control commands to an internet protocol (IP) format to produce IP formatted monitor control commands, and communicating the IP formatted monitor control commands to an IP port dedicated for communicating IP formatted monitor control commands.2013-07-04
20130174209METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING UHD BROADCASTING SERVICE IN DIGITAL BROADCASTING SYSTEM - A method and apparatus for transmitting and receiving Ultra High Definition (UHD) broadcasting service in a digital broadcasting system are provided. The method includes receiving a TS through a transport channel, determining whether or not the TS includes information about an association relation with other TSs, analyzing the information about the association relation from the TS, determining whether or not the TS includes information about a program provided in association with the other TSs based on the information about the association relation, extracting the information about the program from the TS, and obtaining the program based on the information about the program. In accordance with the present invention, high definition broadcasting service can be provided because a broadcasting program having a great transmission bandwidth can be transmitted and received in a digital broadcasting system.2013-07-04
20130174210SYSTEM FOR DATA FLOW PROTECTION AND USE CONTROL OF APPLICATIONS AND PORTABLE DEVICES CONFIGURED BY LOCATION - The present invention relates to a system for implementing a firewall service on portable devices such as mobile phones, tablets or notebooks, which has changed their security settings depending on the location where they are. More specifically, the invention relates to a method of protecting data flow and control of use of devices and functional applications present in a portable device and configured from their location.2013-07-04
20130174211Method And Apparatus Providing Privacy Setting And Monitoring User Interface - A method and an apparatus provide for operating a user interface of a device to receive from a user, for individual ones of a plurality of user privacy categories, a user privacy setting; to map each user privacy setting to one or more device sensors to form a sensor policy for the user privacy category; and to monitor application program accesses to device sensors to detect a violation of a sensor policy. An aspect of the exemplary embodiments of this invention is the user interface that can represent privacy levels of each application program to the user in a “user-friendly” format. Another aspect of the exemplary embodiments is to provide the user device with an ability to detect and act on or at least report privacy violations by the application programs.2013-07-04
20130174212Indication of Authorized and Unauthorized PCC Rules - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving the set of PCC rules at the network device from a partner device; determining that the set of PCC rules includes an unauthorized PCC rule, wherein the unauthorized PCC rule fails an authorization; determining that the set of PCC rules includes an authorized PCC rule, wherein the authorized PCC rule passes the authorization; generating an unauthorized rules list including an indication of the unauthorized PCC rule; generating an authorized rules list including an indication of the authorized PCC rule; transmitting the unauthorized rules list and the authorized rules list to the partner device.2013-07-04
20130174213IMPLICIT SHARING AND PRIVACY CONTROL THROUGH PHYSICAL BEHAVIORS USING SENSOR-RICH DEVICES - A system for automatically sharing virtual objects between different mixed reality environments is described. In some embodiments, a see-through head-mounted display device (HMD) automatically determines a privacy setting associated with another HMD by inferring a particular social relationship with a person associated with the other HMD (e.g., inferring that the person is a friend or acquaintance). The particular social relationship may be inferred by considering the distance to the person associated with the other HMD, the type of environment (e.g., at home or work), and particular physical interactions involving the person (e.g., handshakes or hugs). The HMD may subsequently transmit one or more virtual objects associated with the privacy setting to the other HMD. The HMD may also receive and display one or more other virtual objects from the other HMD based on the privacy setting.2013-07-04
20130174214Management Tracking Agent for Removable Media - A management agent stored on removable storage media is operable, when the storage media is coupled with a host device, to, via the host device, track data events and report the data events to a remote management console.2013-07-04
20130174215Multi-Layer System for Privacy Enforcement and Monitoring of Suspicious Data Access Behavior - A method for controlling data access in a data-at-rest system includes executing a link intrusion prevention analysis between multiple layers of the data-at-rest system, introducing a privacy policy at enforcement points that span multiple system layers, and dynamically altering the privacy policy.2013-07-04
20130174216Application of Differential Policies to at Least One Digital Document - In a method (2013-07-04
20130174217ACCESS CONTROL INFORMATION GENERATING SYSTEM2013-07-04
20130174218SECURITY POLICY ENFORCEMENT SYSTEM AND SECURITY POLICY ENFORCEMENT METHOD - An object of the present invention is to distribute a processing load of security measures and enforce a security policy to be applicable to a large system. Policy information indicating a security measure to be executed on user information transmitted from a client to a server is stored in a policy storing section. Measure arrangement information indicating the security measure executable in each of a plurality of policy enforcement sections is stored in a measure-arrangement storing section. Among the plurality of policy enforcement sections, one or more of the policy enforcement sections that execute the security measure on the user information are selected on the basis of the policy information and the measure arrangement information. Each of the one or more policy enforcement sections executes the security measure on the user information and outputs, on the basis of a selection result, the user information to the other policy enforcement sections among the one or more policy enforcement sections or to the server.2013-07-04
20130174219Dynamically Updating Current Communication Information - A method, system and computer readable media for dynamically updating current communication information, for enabling access to current communication based upon biometric information and/or for allowing communication information to be associated with biometric information and then allowing this communication information to be provided to desired recipients.2013-07-04
20130174220SECURE BOOT OF A DATA BREAKOUT APPLIANCE WITH MULTIPLE SUBSYSTEMS AT THE EDGE OF A MOBILE DATA NETWORK - A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple subsystems. Further described is utilizing a first TPM to boot a service processor and then utilizing a second TPM to secure boot two additional subsystems. Booting of the final subsystem is accomplished in a two step process which first loads a boot loader and verifies the boot loader, and then second loads an operating system load image and verifies the operating system code.2013-07-04
20130174221AUTHENTICATION SERVER, AUTHENTICATION METHOD AND COMPUTER PROGRAM - There is provided an authentication server including: a network access authenticating unit and an address notifying unit wherein the network access authenticating unit receives, from an authentication relay connected to a network, a first authentication message for a communication device existing under the authentication relay, and execute network access authentication process with the communication device, and the address notifying unit notifies the communication device of the server's address information in accordance with a result of the network access authentication process.2013-07-04
20130174222METHOD AND APPARATUS FOR AN EPHEMERAL TRUSTED DEVICE - A method and system is performed by a requesting apparatus for accessing protected content from a content provider. The method includes receiving an indication of a level of trust needed to access specific protected content from a content provider, and supplying an identity attestation and an attribute attestation and the received level of trust to a third party evaluator. The evaluator determines if the requesting apparatus meets the level of trust needed to access the protected content. A trust attestation is generated indicating a level of trust of the requesting apparatus and is sent to the requesting device. The trust attestation is evaluated by the requesting device to determine what version of the protected content can be downloaded from a content provider. The requesting apparatus then asks for the protected content if the trust level attestation meets the level of trust needed to access the specific content from the content provider.2013-07-04
20130174223SYSTEMS AND METHODS FOR TEMPORARY ASSIGNMENT AND EXCHANGE OF DIGITAL ACCESS RIGHTS - Systems and methods are provided for assignment and exchange of temporary access rights, based on a physical or virtual proximity of user devices. A first user device may receive a temporary access right that enables access on a second user device to a content asset which the first user device is not authorized to access. In response to receiving the temporary access right, the first user device may enable access on the first user device to the content asset. Access to the content asset may be maintained after the first user device leaves the proximity of the second user device until the content asset is played back in its entirety. The proximity may be based on physical location or virtual connections through online services. The temporary access right may be requested from the second user device by the first user device or assigned to the first user device from the second user device and may limit the number of times that the content asset may be accessed on the first user device.2013-07-04
20130174224INFORMATION PROCESSING APPARATUS AND UNAUTHORIZED ACCESS PREVENTION METHOD - An information processing apparatus includes nodes having a first node and a second node each of which includes a processor and a memory in which at least a part of area is set as a shared memory area, and an interconnect that connects the nodes. The first node transmits communication data to be transmitted to the second node by attaching identification information used for accessing a memory in the second node. The second node determines whether or not an access to the shared memory area in the memory in the second node is permitted on the basis of the identification information that is attached to the communication data transmitted from the first node and identification information stored in a storing unit and used for controlling permission to access, from another node, the shared memory area in the memory in the second node.2013-07-04
20130174225MESSAGING SYSTEMS AND METHODS - A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In particular, the subscriber can send a trust indicator to the group member, who can then determine whether to accept the trust indicator for all or specific groups that are associated with the group member, as appropriate. In at least one embodiment, the group member can send a trust indicator acceptance message to the subscriber that identifies the group member, and any or all group lists associated with the group member. The subscriber can then receive messages directed to the trusted group member or group lists, and can send group messages to the group lists subject to a receive setting associated with the group lists or group members of the group lists.2013-07-04
20130174226LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE - Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.2013-07-04
20130174227COMPUTER-READABLE MEDIUM, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING SYSTEM - An example system causes a computer of an information processing device including a restriction unit for restricting use of functions and a handwritten input receiving unit to carry out functions of requesting an input of a handwritten signature, sending, to a server, a result of a handwritten input which has been input in response to the request of the signature input, and receiving the input of authorization information which has been issued by the server that has received the handwritten input result and which shows that the use of the functions is authorized, and moreover cancelling the restriction by the restriction unit when the input of the authorization information is received.2013-07-04
20130174228METHOD AND SYSTEM FOR IMPLEMENTING ZONE-RESTRICTED BEHAVIOR OF A COMPUTING DEVICE - A method for implementing zone-restricted behavior of a computing device includes identifying wireless access points using the computing device, determining a number of authorized wireless access points from the wireless access points identified by the computing device, determining that the computing device is located within a restricted access zone when the number of authorized wireless access points identified by the computing device exceeds a predetermined threshold of authorized wireless access points identified, and enabling a zone mode of the computing device when the computing device is determined to be located within the restricted access zone.2013-07-04
20130174229Web-Based Collaborative Framework - Embodiments of the present disclosure provide systems and methods for facilitating network communications. Briefly described, one embodiment of the system, among others, includes a server-based application configured to produce web pages for a web site in accordance with input received from a user; and an interface to the server-based application receiving selections of features which are available to be added to the web site in response to user prompts and to set access rights on which features are to be available to different roles of users. Other systems and methods are also provided.2013-07-04
20130174230Method and system for secure linking with authentication and authorization in a media exchange network - Certain embodiments of the invention may be found in a method for establishing a communication pathway for subsequent media exchanges between a television display in a first home and storage that contains media in a second home. The method may comprise securely receiving address correlation information associated with the television display in the first home and securely receiving address correlation information associated with the storage in the second home. Affirmative confirmation may be received and/or stored using the received address correlation information associated with at least one of the television display and the storage. The invention may also include verifying that affirmative information has been stored in association with any subsequent media exchanges.2013-07-04
20130174231MEDIA EXPOSURE DATA COLLECTION AND SECURITY - Systems and methods are disclosed for securely transferring research data relating to media exposure data, such as radio, television, streaming media and the Internet. A plurality of portable computing devices seek and bond to a collector via Bluetooth in a specific area, such as a household. The collector authenticates itself with each of the portable computing devices and vice versa where the collector arranges a secure research data transfer session with each respective device using exchanged authentication files. As each secure session is made, each portable computing device transmits stored research data during the session.2013-07-04
20130174232SERVICE PROVIDER INVOCATION - A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.2013-07-04
20130174233SERVICE PROVIDER INVOCATION - A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.2013-07-04
20130174234LIGHT-WEIGHT CREDENTIAL SYNCHRONIZATION - Aspects of the subject matter described herein relate to credential synchronization. In aspects, an entity may have access to resources on two or more systems. After the entity's credentials are changed on a first system, the first system updates the credentials on a second system so that the entity can access resources on the second system using the new credentials. The first system maintains a mapping data structure that maps between the credentials data of the two systems. The first system may obtain credential requirements from the second system and provide these requirements in conjunction with receiving a request to change credentials so that a user changing the credentials may satisfy both systems.2013-07-04
20130174235Dynamically Updating Current Communication Information - A method, system and computer readable media for dynamically updating current communication information, for enabling access to current communication based upon biometric information and/or for allowing communication information to be associated with biometric information and then allowing this communication information to be provided to desired recipients.2013-07-04
20130174236SERVER AND METHOD FOR PASSWORD RECOVERY - An exemplary password recovery method is applied on a server. The server is connected to one user terminal. The server stores email addresses and email boxes associated with the corresponding email address. Each email box includes emails sent to each corresponding email address. Each email may be a registration email that includes a website and a username. The method receives a password recovery request for a submitted email address of a user, and determines whether there is a registration email in the email box. If yes, the method obtains the website and the username. The method then controls the user terminal to display the prompt information corresponding to the obtained website. Further, the method receives the input username, and determines whether the input username matches the obtained username. If yes, the method generates a new email password, and controls the user terminal to display the new email password.2013-07-04
20130174237SYSTEM AND METHOD FOR TRANSFERRING STATES BETWEEN ELECTRONIC DEVICES - In various example embodiments, a system and method for transferring the state of a first device to a second device are disclosed. An instruction to transfer a state of a first device to a second device is received. In response, information related to the state of the first device is packaged into a file. A type of connection to be used to transfer the state of the device is determined based on the connections available to the first device and the second device. The file containing the information of the state of the first device is transferred to the second device using the connection type. The file, when processed by the second device, causes the second device to reproduce the state of the first device.2013-07-04
20130174238MECHANISM TO DETERMINE SOURCE DEVICE SERVICE TIER BASED ON THE VERSION OF THE HDCP KEY - A source device and method for authenticating a sink device. The source device and method include detecting when the sink device connects to a communication interface and in response to detecting a connected sink device, activating a sink device authentication protocol which authenticates whether the connected sink device is an approved sink device for connecting via the communication interface. The source device determines a level of authentication of the connected sink device from among a first-level authentication and a second-level authentication based on first and second authentication components, respectively derived from different master keys, which affects the type of content provided to the sink device. Responsive to the level of authentication provided through the connected sink device, modifying the content transmitted to the connected sink device, and preventing transfer of any content from the source device to the sink device in response to the sink device not being authenticated.2013-07-04
20130174239REINFORCED AUTHENTICATION SYSTEM AND METHOD USING CONTEXT INFORMATION AT THE TIME OF ACCESS TO MOBILE CLOUD SERVICE - Provided are a reinforced authentication system and method using context information at the time of access to a mobile cloud service. The system comprises a mobile terminal transmitting a context information message, which comprises context information, and authentication information and a context information-based authentication server receiving the context information message and the authentication information, determining an authentication mechanism based on the context information message, and authenticating a user of the mobile terminal.2013-07-04
20130174240Computer Implemented System and Method for Providing Challenge-Response Solutions to Authenticate a User - A system and method for providing challenge-response solutions to authenticate a user have been provided. The system includes web server comprising interlinking means adapted to interlink a plurality of images with unique index values such that each of the images has a unique index value. The web server includes registration means adapted to enable users to select at least two interlinked images for the purpose of registration. The web server includes challenge generation means adapted to generate, transmit an authentication challenge of the form of one-time equation. The web server, prior to transmitting the one-time equation, computes the value of the equation based on at least the sequence specified by the user. The web server compares the value calculated by the user with the value calculated prior to transmission and authenticates the user only in the event that said value calculated by the user is equivalent to the stored value.2013-07-04
20130174241AUTOMATED NEGOTIATION AND SELECTION OF AUTHENTICATION PROTOCOLS - Wireless telecommunications networks may implement various forms of authentication. There are a variety of different user and device authentication protocols that follow a similar network architecture, involving various network entities such as a user equipment (UE), a service provider (SP), and an authentication endpoint (AEP). To select an acceptable authentication protocol or credential for authenticating a user or UE, authentication protocol negotiations may take place between various network entities. For example, negotiations may take place in networks implementing a single-sign on (SSO) architecture and/or networks implementing a Generic Bootstrapping Architecture (GBA).2013-07-04
20130174242Remote Access Manager for Virtual Computing Services - A remote access manager in a virtual computing services environment negotiates a time limited NAT routing rule to establish a connection between a remote device and virtual desktop resource providing user computing services. A series of NAT connection rules are revised in a dynamic manner such that a pool of ports is available to connect a plurality of remote users to local virtual compute resources over one or more public IP addresses. Once a connection is established, an entry is made in a firewall state table such that the firewall state table allows uninterrupted use of the established connection. After an entry has been made in the state table, or the routing rule has timed out, the port associated with the original NAT routing rule is removed and the same port can be re-used to establish another connection without disrupting active connections.2013-07-04
20130174243BIOMETRIC AUTHENTICATION SYSTEM, COMMUNICATION TERMINAL DEVICE, BIOMETRIC AUTHENTICATION DEVICE, AND BIOMETRIC AUTHENTICATION METHOD - Provided is a biometric authentication system capable of preventing spoofing attacks even if leakage of key information and a registration conversion template occurs. A communication terminal device (2013-07-04
20130174244APPLICATIONS LOGIN USING A MECHANISM RELATING SUB-TOKENS TO THE QUALITY OF A MASTER TOKEN - Methods and systems allow a user to log in to a device so that a number of apps become accessible on the device without the user repeatedly logging in to each different app as the user launches multiple apps. A mechanism of providing a master token with a quality score and providing sub-tokens for each app that can use the sub-token and the score quality to evaluate the level of security provided by the initial login allows each app to skip its own login process and provides a level of enhanced efficiency and convenience for the user. A method includes authenticating a user; creating a master token on the user device; creating a sub-token of the master token for an app launched on the device; the app skipping the login process of the app in response to the sub-token so that the app proceeds directly to validating a transaction.2013-07-04
20130174245METHOD OF SECURELY CONTROLLING A COMPUTER OR MICROCHIP WITHA MASTER OR CENTRAL CONTROLLER CONNECTED BY A SECURE CONTROL BUSTO NETWORKED MICROPROCESSORS OR CORES - A method of securely controlling a computer or microchip through a private network. The computer or microchip includes a secure private unit protected by an inner hardware-based access barrier or firewall; an unprotected public unit including at least one network connection configured to connect to a network; a separate private network connection located in the secure private unit a microprocessor, core or processing unit configured for general purposes, in the unprotected public unit and separate from the access barrier or firewall; a master or central controlling device located in the secure private unit; and a secure control bus configured to connect the master or central controlling device with the microprocessor, core or processing unit. The secure control bus is isolated from input from both the network and components of the unprotected public unit. The method includes securely controlling an operation executed by the microprocessor, core or processing unit. The secure control is provided by the master or central controlling device through the separate private network to the separate private network connection via the secure control bus.2013-07-04
20130174246SYSTEM AND METHOD FOR CLOUD BASED SCANNING FOR COMPUTER VULNERABILITIES IN A NETWORK ENVIRONMENT - A method in one embodiment includes establishing a first secure tunnel between a scanner and a configuration manager, and a second secure tunnel between the scanner and a scan controller, where the scanner is located in a public network and the configuration manager and the scan controller are located in a private network, communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel, and communicating scan information between the scanner and the scan controller over the second secure tunnel. The secure tunnels may be established from within the private network, by forwarding a first origination port and a second origination port to a first destination port and a second destination port, respectively. The first and second origination ports may be located in the public network, and the first and second destination ports may be located in the private network.2013-07-04
20130174247Photo Combination Lock - A simple, customizable and intuitive virtual combination unlock method and system. More specifically, an unlock system and method is disclosed which includes a virtual combination lock, where the virtual combination lock includes several rows of user-selectable images such as pictures or icons as the virtual combination wheels. In certain embodiments, the images are accessed via the user's database. To unlock the device, the user touches and drags pre-selected images into alignment with each other. Security can be adjusted by changing the number of images that need to be aligned to unlock the device.2013-07-04
20130174248PORTABLE DATA-STORAGE DEVICE CONFIGURED TO ENABLE A PLURALITY OF HOST DEVICES SECURE ACCESS TO DATA THROUGH MUTUAL AUTHENTICATION - A portable data-storage device configured to enable a plurality of host devices secure access to data through mutual authentication. The portable data-storage device includes a storage-device enclosure, a data-storage medium, a data-writing element, a data-reading element, and an electronic authenticator. The data-writing element and the data-reading element are configured to write data to, and to read the data from, the data-storage medium. The electronic authenticator is configured to mutually authenticate the portable data-storage device with a first host device, and at least a second host device. The electronic authenticator is configured to enable secure access to the data on the data-storage medium by the first host device and by the second host device, if the electronic authenticator mutually authenticates the portable data-storage device with the first host device and with the second host device. A method and system configured to enable host devices secure access to data are also provided.2013-07-04
20130174249SECURE LOCK FUNCTION FOR AN ENDPOINT - Disclosed are apparatus and methodology for providing secure control over stored metrology parameters. A random number key is generated and associated with identifiable information such as a serial number associated with a device. The random number and identification information are stored in a database separate and remote from the device. Alteration of the stored metrology parameters are permitted only upon use of the random number as a key to unlock the device.2013-07-04
20130174250ELECTRONIC DEVICE AND METHOD FOR RESTRICTING ACCESS TO THE ELECTRONIC DEVICE UTILIZING BIOS PASSWORD - A method for restricting access to an electronic device using basic input output system (BIOS) password comprises: generating a first window on a display to receive a first user input in response to a password pre-setting input via an input module; formatting the first user input into American Standard Code for Information Interchange (ASCII); and writing the ASCII into a BIOS chip as the preset password. The electronic device is also provided.2013-07-04
20130174251METHODS AND SYSTEMS FOR SERVICE DELIVERY - A system for providing a service comprising: a service provisioning control means adapted for identifying a user, and for providing services to said user; the system further comprising: a location information retrieval means adapted for receiving location information of user; and for identifying a local service delivery system; an available service pack information retrieval means adapted for retrieving available service pack information corresponding to local service delivery system, the available service pack information comprising information about the set of possible services which can be delivered to user by local service delivery system; and wherein service provisioning control means is adapted for selecting a subset of services of available service pack information corresponding, based on at least a set of priority rules; and for providing at least one of subset of services to the user; and associated methods and devices.2013-07-04
20130174252Secure User Authentication for Bluetooth Enabled Computer Storage Devices - A storage device may be operably coupleable with a host computing device, and the storage device and/or host computing device may be Bluetooth enabled. The storage device may include authentication information. Access to the storage device may be permitted via Bluetooth communication between the Bluetooth enabled device and at least one of the storage device and a host computing device, wherein the Bluetooth enabled device may be within a maximum Bluetooth range of the storage device. The Bluetooth communication may be performed without Bluetooth pairing.2013-07-04
20130174253SYSTEMS AND METHODS FOR DETECTING SIMILARITIES IN NETWORK TRAFFIC - A system, computer-readable medium, and method for identifying similarities in network traffic are provided. Hash values are calculated from Internet Protocol (IP) addresses in a group of IP addresses that request a domain name, a hash signature is generated from the hash values and paired with the domain name, and the domain name is then clustered with another domain name having a paired hash of the same value. The clustered domain names are then extracted and used in a similarity calculation.2013-07-04
20130174254METHOD FOR ADMINISTERING A TOP-LEVEL DOMAIN - A method for administering a top-level domain by analyzing domain name registrations for requests for suspicious or malicious domain names. A request to register a domain name is received. The requested domain name's information may be stored in a registry database. The requested domain name may also be conditionally stored in the domain name system (DNS) zone. The requested domain name is compared to a list of botnet domain names stored in a watch list database. If the requested domain name corresponds to one of the botnet domain names, the requested domain name is prevented from being added to the DNS zone or is removed from the DNS zone, if it has already been stored there. The information regarding the requested domain name is stored in the registry database, even if the domain name does not ultimately stay in the DNS zone.2013-07-04
20130174255APPARATUS METHOD AND MEDIUM FOR TRACING THE ORIGIN OF NETWORK TRANSMISSIONS USING N-GRAM DISTRIBUTION OF DATA - A method, apparatus, and medium are provided for tracing the origin of network transmissions. Connection records are maintained at computer system for storing source and destination addresses. The connection records also maintain a statistical distribution of data corresponding to the data payload being transmitted. The statistical distribution can be compared to that of the connection records in order to identify the sender. The location of the sender can subsequently be determined from the source address stored in the connection record. The process can be repeated multiple times until the location of the original sender has been traced.2013-07-04
20130174256NETWORK DEFENSE SYSTEM AND FRAMEWORK FOR DETECTING AND GEOLOCATING BOTNET CYBER ATTACKS - A network defense system is described that provides network sensor infrastructure and a framework for managing and executing advanced cyber security algorithms specialized for detecting highly-distributed, stealth network attacks. In one example, a system includes a data collection and storage subsystem that provides a central repository to store network traffic data received from sensors positioned within geographically separate networks. Cyber defense algorithms analyze the network traffic data and detect centrally-controlled malware that is configured to perform distributed network attacks (“botnet attacks”) from devices within the geographically separate networks. A visualization and decision-making subsystem generates a user interface that presents an electronic map of geographic locations of source devices and target devices of the botnet attacks. The data collection and storage subsystem stores a manifest of parameters for the network traffic data to be analyzed by each of the cyber defense algorithms.2013-07-04
20130174257Active Defense Method on The Basis of Cloud Security - The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.2013-07-04
20130174258Execution of Multiple Execution Paths - Techniques for execution of multiple execution paths are described. In one or more embodiments, an execution of a portion of executable code is conditioned upon a particular environment-specific value. For example, the execution of the executable code can cause one type of output if the value of the variable equals a particular value, and can cause a different type of output if the value of the variable equals a different value. Techniques discussed herein can enable the executable code to be executed such that multiple outputs are produced, e.g., by executing the code according to the different values for the variable. In implementations, the multiple outputs can be analyzed for various attributes, such as presence of malware, implementation and coding errors, and so on.2013-07-04
20130174259GEO-MAPPING SYSTEM SECURITY EVENTS - A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A particular grouping of assets in a plurality of asset groupings within the particular computing system is identified as including the particular computing device. A source of the particular security event is also identified and at least one of a geographic location and a grouping of assets in the plurality of asset groupings is associated with the identified source. Data is generated that is adapted to cause a presentation of a graphical representation of the particular security event on a display device, the graphical representation including a first graphical element representing the particular computing device as included in the particular grouping of assets and a second graphical element representing the source associated with the at least one of a geographic location and a grouping of assets.2013-07-04
20130174260TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads.2013-07-04
20130174261System and Method of Securing Monitoring Devices on a Public Network - A method for determining whether or not a monitor is registered with a security service. The method includes using a device search engine to perform a search for and find a monitor. Then it is determined whether or not the found monitor is registered with the security service. When the found monitor is not currently registered with the security service, an owner of the unregistered monitor is automatically contacted.2013-07-04
20130174262TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads.2013-07-04
20130174263AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS - Systems and methods which provide a new application security assessment framework that allows auditing and testing systems to automatically perform security and compliance audits, detect technical security vulnerabilities, and illustrate the associated security risks affecting business-critical applications.2013-07-04
20130174264SYSTEM AND METHOD FOR PROTECTING DATA STORED ON A REMOVABLE DATA STORAGE DEVICE - A system for protecting data stored in a memory of a removable data storage device is provided. The system includes a personal electronic device, a removable solid state data storage device operatively coupled to the personal electronic device, and a circuit configured to protect data stored in a memory of the data storage device in response to detecting impending removal of the data storage device from the personal electronic device.2013-07-04
20130174265SYSTEM AND METHOD FOR PROTECTING DATA STORED ON A REMOVABLE DATA STORAGE DEVICE - A system for protecting data stored in a memory of a removable data storage device is provided. The system includes a personal electronic device, a removable solid state data storage device operatively coupled to the personal electronic device, and a circuit configured to alter data stored in the memory of the data storage device in response to detecting that the data storage device has been removed from the personal electronic device.2013-07-04
20130174266DATA EXCHANGE BETWEEN A SECURE ELEMENT AND A TERMINAL - A method for data exchange between a secure element and a terminal, the secure element including a CRS (Contactless Registry Service) application, a CREL (Contactless Registry Event Listener), and at least one service application, the terminal including a SEUI (Secure Element User Interface) configured to interact with at least one out of the CRS application, the CREL application, or the service application, includes exchanging, between the secure element and the terminal, an STID (Service Type Identification) information relating to the at least one service application. The STID information indicates the service type of the at least one service application of a predetermined set of different service types.2013-07-04
20130174267Method for Secure Web Browsing - The invention relates to a computer-implemented method for secure web browsing. The method includes: 2013-07-04
20130174268METHOD AND SYSTEM FOR DOCUMENT DATA SECURITY MANAGEMENT - The present invention discloses a system for document security control to improve the security of document data, and the system comprises: an application, embedded in a machine readable medium, which performs a security control operation on abstract unstructured information by issuing an instruction to a platform software; the platform software, embedded in a machine readable medium, which accepts the instruction from the application and performs the security control operation on storage data corresponding to the abstract unstructured information; wherein, said abstract unstructured information are independent of a way in which said storage data are stored.2013-07-04
20130174269MANAGING LICENSE KEYS - For managing license keys, a license key service module creates a license key service object of a license key service class. The license key service object includes a plurality of management operations including a get all license keys operation that acquires a license key for licensing services. A hosted license key service module creates a hosted license key service object of a hosted license key service class that includes the license key service object. A license key module creates a license key object of a license key class. The license key object includes the license key and employs the plurality of management operations. A management module manages the license key using the license key object, license key service object, and hosted license key service object.2013-07-04
20130174270LICENSE INSTALL SUPPORT SYSTEM, LICENSE INSTALL SUPPORT METHOD - A license install support method includes receiving input of a first license identifier used for receiving license data, the license data being used by an electronic device for determining whether activation of a program is allowable; sending, to a license source determining device connected via a network, an acquisition request specifying the first license identifier for acquiring issuing source information including issuing source identification information of the license data; receiving the issuing source information returned from the license source determining device; and using a license install processing unit to acquire the license data corresponding to the first license identifier from a license management device relevant to the issuing source information included among plural license management devices connected via the network, and to send the license data to the electronic device.2013-07-04
20130174271DEVICE AUTHENTICATION FOR SECURE KEY RETRIEVAL FOR STREAMING MEDIA PLAYERS - Systems and methods are disclosed that authenticate devices or users, and enable playback of secured streaming content through a media player. In one embodiment, the invention is a system for receiving secure content over an unmanaged network, including a security application configured operate on a user device with access to a network, where the security application is configured to receive a request for playlist data from the media player, send a playlist request to a content server, receive playlist data from the content server, send playlist data to a media player, receive a security access request from the media player, send a security access request to a security server, receive security access data from the security server; and send security access data to a media player.2013-07-04
20130174272Digital Content Distribution and Protection - Embodiments provide a system for content distribution and protection. The system first receives an order from a user for a protected document. In response to a successful user authentication, the system generates an access code for the user to access the protected document. In response to a received user reading request, the system validates the access code for a reading session. The system then transfers a set of URLs for accessing a set of pages and associated metadata in the protected document to the user. The set of URLs are valid for a period of time. Responsive to a request for reading a next set of pages, the system again validates the access code for the session and transfers another set of URLs for accessing the next set of pages. The system also logs user activities related to the protected document.2013-07-04
20130174273SYSTEMS AND METHODS FOR MANAGING DIGITAL RIGHTS BASED ON A UNION OR INTERSECTION OF INDIVIDUAL RIGHTS - Systems and methods are provided for aggregating digital access rights owned by a group of individuals and for correlating access rights to physical presence of the users to more accurately control access and distribution of copyrighted media. The intersection of content authorization information associated with each individual of a group may be analyzed. The aggregation and analysis of digital access rights enables multiple users to share the cost of a digital access right to access a content asset in a common area.2013-07-04
20130174274DATA POLICIES FOR ONLINE SERVICES - An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.2013-07-04
20130174275Computer Implemented Methods And Apparatus For Providing Access To An Online Social Network - Disclosed are systems, apparatus, methods, and computer-readable storage media for providing access to an online social network. The online social network can be specific to an organization having one or more internal users. In some implementations, a request message is received from a requesting user to access social network data of the online social network. The requesting user is identified as an external user of the organization, and it is determined that the requesting user has an authorized status. Access to only a portion of the social network data is provided to the authorized requesting user.2013-07-04
20130174276CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION METHOD, AND CLIENT TERMINAL - If the user of a first portable terminal intends to let a second portable terminal try out a certain content, the user sends to a distribution server trial permission information including the user's own user ID, a content ID of the content of interest, and a digital signature. The distribution server authenticates the received information before distributing a streaming data of a trial-oriented content with the content ID and user ID attached to it as search keys. This allows the content that can be used on a given user terminal to be tried out on another user terminal without the latter user having recourse to the steps of searching for the content in question.2013-07-04
20130174277METHOD AND APPARATUS FOR CONTROLLING ACCESS TO RESOURCES - An approach is provided for controlling access to resources according to social connections and/or characteristics of the resources. An access control platform determines one or more resources associated with at least one user, at least one device associated with the at least one user, or a combination thereof. The access control platform further processes and/or facilitates a processing of social networking information associated with the at least one user, the at least one device, or a combination thereof to determine one or more social networking groups. The access control platform also causes, at least in part, a controlling of access to the one or more resources for one or more other users, one or more other devices associated with the one or more other users, or a combination thereof based, at least in part, on membership in the one or more social networking groups.2013-07-04
20130174278DIGITAL RIGHTS MANAGEMENT (DRM) SERVICE CONTROL METHOD, APPARATUS, AND SYSTEM - A digital rights management service control method, including: receiving an authorization file request transmitted from a client terminal for a selected service operation; obtaining an authorization file template matching an authorization type included in the authorization file request; generating, based on the obtained authorization file template, an authorization file including digital resource feature information included in the authorization file request and rights feature information; and transmitting the generated authorization file to the client terminal.2013-07-04
20130174279Secure Read-Write Storage Device - A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket storing data, and employing the controller to corrupt at least a portion of the data.2013-07-04
20130174280DOCUMENT CONTROL BASED ON COPYRIGHT PERMISSION WHEN PRINTING COMPILATION OF WORKS - A method for controlling copyright permissions when assembling multiple copyrighted works into a compiled file. The copyright permission level of each file is analyzed, either based on the copyright permission information present in metadata associated with the file or based on the digital file format of the file which reflects the permission level. The compiled file is assigned a permission level which is the same as or more restrictive than all of the permission level of the files in the compilation, and is generated in a format that enforces the assigned permission level. A notification may be displayed to the user to notify the use of the permission level assigned to the compiled file.2013-07-04
20130174281MESSAGING STAMP AUTHORITY - Electronic messages may be processed using a stamp authority by receiving an electronic message, identifying a stamp associated the message, determining if the stamp is valid, and, if the stamp is determined to be valid, distinguishing the message from messages with which a valid stamp is not identified.2013-07-04
20130174282DIGITAL RIGHT MANAGEMENT METHOD, APPARATUS, AND SYSTEM - A digital right management method, including: encrypting, by a first user equipment which has access right to shared digital contents, a key of the digital contents with at least an equipment key of a second user equipment intended to share the digital contents to generate a ciphertext of the key of the digital contents; generating, by the first user equipment, from the ciphertext a new authorization certificate corresponding to the digital contents; and transmitting, by the first user equipment, the new authorization certificate and the digital contents to the second user equipment to instruct the second user equipment to share the digital contents in accordance with the new authorization certificate.2013-07-04
20130174283PORTABLE DATA CARRIER HAVING AN OPERATING ERROR COUNTER - A method in a portable data carrier for safeguarding the data carrier against external attacks on the data carrier, wherein at least one counter is employed in the data carrier. A specified command is safeguarded such that it is executed by the data carrier only when the at least one counter lies in a specified values range. The at least one counter is decremented before an execution of the command and incremented only when the command has been executed without interruption. The at least one counter here is settable multiple times, in particular even after the issuance of the data carrier to a user.2013-07-04
20130174284TRANSGENIC MOUSE FOR EXPRESSING HUMAN FERRITIN IN TISSUE NON-SPECIFIC MANNER AND USE THEREOF - The present invention relates to a recombinant vector and a transgenic mouse for expressing human ferritin in a tissue non-specific manner, and more particularly, to a vector prepared by operably linking a human ferritin gene to a promoter including a cytomegalovirus (CMV) early enhancer element and a β-actin promoter, and a transgenic mouse expressing human ferritin in a tissue non-specific manner, which is transformed with the vector. Further, the present invention relates to a method for preparing a transgenic mouse, and a method for monitoring cell or tissue therapy using the transgenic mouse.2013-07-04
20130174285Model Animal for Studying Hair Growth Cycle - The present invention prepared a non-human animal in which Fgf18 gene was knocked out in a keratin-5 positive cell-specific manner using a Cre-loxP system; it provides a non-human model animal in which FGF18 expression has been inhibited in a hair follicle-specific manner to shorten the telogen phase of hair growth cycle. The non-human model animal is useful in studying hair follicles and skin, particularly hair growth occurring cyclically in hair follicle cells, and is applicable to the development of and screening for novel drugs against hair follicle or skin disorders.2013-07-04
20130174286In Vivo Gene Silencing By Chemically Modified and Stable siRNA - The present invention provides compositions for RNA interference and methods of use thereof. In particular, the invention provides small interfering RNAs (siRNAs) having modification that enhance the stability of the siRNA without a concomitant loss in the ability of the siRNA to participate in RNA interference (RNAi). The invention also provides siRNAs having modification that increase targeting efficiency. Modifications include chemical crosslinking between the two complementary strands of an siRNA and chemical modification of a 3′ terminus of a strand of an siRNA. Preferred modifications are internal modifications, for example, sugar modification, nucleobase modification and/or backbone modifications. Such modifications are also useful, e.g., to improve uptake of the siRNA by a cell. Functional and genomic and proteomic methods are featured. Therapeutic methods are also featured.2013-07-04
20130174287HIGH TROUGHPUT MULTIWELL SYSTEM FOR CULTURING 3D TISSUE CONSTRUCTS IN-VITRO OR IN-VIVO, METHOD FOR PRODUCING SAID MULTIWELL SYTEM AND METHODS FOR PREPARING 3D TISSUE CONSTRUCTS FROM CELLS USING SAID MULTIWELL SYSTEM - The invention relates to a multiwell system, characterized that said multiwell system having at least 3 wells, wherein said wells have a volume between 0.125 and 4.0 mm2013-07-04
20130174288ANTIBODIES FOR THE TREATMENT OF HIV - The present invention relates to isolated antibodies, or the derivatives or antigen binding fragments of same, capable of binding to CXCR4 but also of inducing conformational change of the CXCR4 homodimers and able to inhibit HIV-1 primary isolate replication in PBMC. More particularly, the present invention relates to the 515H7 and 301 aE5 monoclonal antibodies, specific to the CXCR4 protein, as well as their use for the treatment of HIV infection. Pharmaceutical compositions comprising such antibodies and a process for the selection of such antibodies are also covered.2013-07-04
20130174289Na+/Mg2+ Exchanger - The invention relates to methods to identify new SLC41A1 functions at the cell, tissue, organ and organism level. In part, it is related to methods useful in (a) identifying molecules that bind SLC41A1 polypeptides, which (b) modulate SLC41A1 related Na2013-07-04
20130174290BEAN VARIETY RS 08071160 - The invention provides seed and plants of the bean line designated RS 08071160. The invention thus relates to the plants, seeds and tissue cultures of bean line RS 08071160, and to methods for producing a bean plant produced by crossing a plant of bean line RS 08071160 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line RS 08071160, including the pods and gametes of such plants.2013-07-04
20130174291BEAN VARIETY RS 08061275 - The invention provides seed and plants of the bean line designated RS 08061275. The invention thus relates to the plants, seeds and tissue cultures of bean line RS 08061275, and to methods for producing a bean plant produced by crossing a plant of bean line RS 08061275 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line RS 08061275, including the pods and gametes of such plants.2013-07-04
20130174292BEAN VARIETY RS 08061277 - The invention provides seed and plants of the bean line designated RS 08061277. The invention thus relates to the plants, seeds and tissue cultures of bean line RS 08061277, and to methods for producing a bean plant produced by crossing a plant of bean line RS 08061277 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line RS 08061277, including the pods and gametes of such plants.2013-07-04
20130174293COLORIMETRIC DETERMINATION OF THE TOTAL OIL CONTENT OF A PLANT TISSUE SAMPLE USING ALKALINE SAPONIFICATION - This disclosure concerns plants, plant materials, and the oil characteristics thereof. In embodiments, compositions and methods for determining the total oil content of plant materials are provided. Such methods and compositions may in some embodiments allow for the characterization and screening of oil traits and sub-traits that are difficult or impossible to distinguish by conventional techniques.2013-07-04
Website © 2025 Advameg, Inc.