Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


36th week of 2008 patent applcation highlights part 66
Patent application numberTitlePublished
20080216124Video System Showing Original Channel During Zapping on a Tv - The invention relates to a video system which is able to show more than one channel at the same time. If a user, after watching an original channel sufficiently long, zaps to another channel, the original channel is displayed in for example a PIP, together with the new channel in a main picture. After zapping yet to a third channel, the original channel is still displayed in the PIP. In this way, the user can keep track of the original channel while zapping other channels.2008-09-04
20080216125Mobile Device Collaboration - Systems and methods are described for mobile device collaboration. An exemplary collaborative architecture enables aggregation of resources across two or more mobile devices, in such a manner that the aggregation of resources is practical even considering the miniaturized and limited battery power of most mobile devices. In a video implementation, the exemplary collaborative architecture senses when another mobile device is in close enough proximity to aggregate resources. The collaborative architecture applies an adaptive video decoder so that each mobile device can participate in playing back a larger and higher-resolution video across combined display screens than any single mobile device could playback alone. A cross-display motion prediction technique saves battery power by balancing the amount of collaborative communication between devices against the local processing that each device performs to display visual motion across the boundary separating displays.2008-09-04
20080216126Mass storage repository for a wireless network - A video repository unit includes a plurality of disk drives arranged in a redundant array and circuitry to control writing/reading of video programs to/from the redundant array. A wireless transceiver receives video programs and transmits a selected video program to a remote viewer responsive to a request received by the wireless transceiver. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.2008-09-04
20080216127LIVE VIDEO MANAGEMENT SYSTEM - The present invention discloses a mosaic video channel and a system for generating the mosaic video channel. A mosaic video channel in accordance with the present invention is displayed on a monitor with a plurality of individual video feeds being presented at a given time, and comprises a plurality of video cells presenting at least video information, each video cell associated with one of the plurality of individual video feeds, a cursor, which can be moved between the plurality of video cells, for selecting at least one characteristic associated with a selected video cell, and a receiver, coupled to the monitor and receiving the mosaic video channel, wherein the mosaic channel is changed via a controller which initiates a logo wipe across the mosaic video channel.2008-09-04
20080216128Apparatus for Receiving Satellite Broadcasting and Method Thereof - A method for receiving satellite broadcasting includes: amplifying an inputted satellite broadcasting signal; converting the amplified signal to a baseband signal by mixing the amplified signal with a center frequency of a selected channel; and varying a channel bandwidth of the baseband signal.2008-09-04
20080216129Method and system for providing data from audio/visual source devices to audio/visual sink devices in a network - A method and system for providing data from one or more audio/visual (A/V) source devices to one or more A/V sink devices in a network is provided. The system implements a rendering method in a video rendering module configured to render display data related to digital videos from an A/V source device to one or more sink devices across the network. The video rendering module includes a presentation module configured to obtain selected display data from one or more of the A/V source devices across the network, and a navigation module configured to control the presentation module for obtaining the selected display data, and to allow one or more users to navigate through the display data to access the digital videos.2008-09-04
20080216130Information processing system, information processing apparatus, information processing method, program and recording medium - An information processing system may include first apparatus and second apparatus coupled to each other through communications means. The first apparatus may include a transmitting/receiving unit effecting two-way communications with the second apparatus, and a control unit that transmits data corresponding to the operating signal from the transmitting/receiving unit to the second apparatus in response to an operating signal transmitted from the second apparatus, and to perform control of the first apparatus. The second apparatus may include a transmitting/receiving unit effecting two-way communications with the first apparatus, a display displaying an image based on the data transmitted from the first apparatus, and a control unit that displays, on a screen of the display, a first operating image for operating the first apparatus and a second operating image for operating a menu screen related to the first apparatus, in response to a remote controller signal supplied from a remote controller.2008-09-04
20080216131SHARING A STREAMING VIDEO - A video segment can be shared over a computer network by first receiving the video segment at a receiving computer on the network. The receiving computer assures that the video segment is in a streaming video format, and creates at least one identification tag for the video segment. The receiving computer also stores the video segment, and communicates the identification tag to another computer on the network. Upon subsequent receipt of that identification tag, the receiving computer streams the video segment to a destination computer on the network.2008-09-04
20080216132METHOD FOR ESTABLISHING A NETWORK PLATFORM FOR RENTING THE ELECTRONIC PUBLICATIONS - A method for establishing a network platform for renting the electronic publications adopts a grid algorithm, links to the Internet via various networks, and establishes the network platform having an information service grid character for renting the electronic publication. Three types of nodes are established in the information service grid: a first type of node is established as service domain owner and the administrator grid node; a second type of node is established as service provider grid node that is composed of the consumers of the electronic publication; and the third type of node is established as the service provider grid node which is composed of the publishers of the electronic publication; the three types of node provide the network information service by utilizing the grid computing mode and the SOAP. The service provider grid nodes can do online maintenance on the content of the electronic publication provided by them and collect the charge. And the service consumer grid nodes can obtain the service provided by the service provider nodes through the variant service paths, which are provided by the service domain owner and the administrator grid nodes, and pay the service fee.2008-09-04
20080216133Transmission of Pre-Set Channel Allocation Information - The present application provides transferring channel allocation tables for receiving radio frequency services. Automatic updating channel allocation tables is provided by storing within at least one central database at least one channel allocation table, storing within each of a plurality of distributed consumer electronic devices at channel allocation table for receiving the radio frequency services, and transferring the channel allocation tables between the central database, and the distributed consumer electronic device via a bidirectional communication link.2008-09-04
20080216134Multimedia Presentation Resumption within an Environment of Multiple Presentation Systems - With at least one implementation described herein, one or more viewers are able to watch the same source multimedia content at multiple locations within an environment (e.g., a household). With at least one implementation described herein, a viewer is able to resume watching such content at a new location (or “locus”) from the point that she bookmarked the content at an original location. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.2008-09-04
20080216135METHODS AND APPARATUS FOR IMPROVED CONTENT DELIVERY INCLUDING CONTENT DELIVERY STREAMS DYNAMICALLY POPULATED IN RESPONSE TO USER REQUESTS - In response to user requests for content, content may be dynamically mapped to communications channels, e.g., QAM channels, used to communicate multiple programs during the same transmission time slot, e.g., through the use of multiplexed MPEG streams. A customer premise device, e.g., STB, uses a tuner tuned to the QAM channel to receive the communicated stream, recovers multiple programs communicated using the single communications channel, and records and/or displays the recovered programs. In this manner, more programs can be received and recorded than there are tuners in the customer premise device, e.g., STB. In some embodiments a content service provider control node processes user requests for content, maps requested programs to transport streams, communicates mapping decision information to a content distribution node, and communicates QAM tuning information to the user devices which can then receive and record multiple programs communicated via a single communications channel.2008-09-04
20080216136METHODS AND APPARATUS SUPPORTING THE RECORDING OF MULTIPLE SIMULTANEOUSLY BROADCAST PROGRAMS COMMUNICATED USING THE SAME COMMUNICATIONS CHANNEL - A user recovers and records multiple programs communicated simultaneously using a communications channel, e.g., QAM communications channel. The simultaneous communication may be by communicating, e.g., an MPEG-2 transport stream including data corresponding to multiple programs through a corresponding to QAM communications channel. Thus a user device, e.g., a set top box, is able to receive and record programs corresponding to multiple simultaneously broadcast programs using a single tuner. This allows a device to receive and record or display more programs at any given time, than the number of QAM tuners and/or receivers in the user device. Novel user interface features which facilitate a user's ability to identify and record multiple programs corresponding to a QAM channel are also described. Methods and apparatus for determining program to communication channel mappings based on user program recordation information are also described.2008-09-04
20080216137Triggering Enhanced Content - A receiver for an enhanced television system in which video data defining a video stream, enhanced content data defining items of enhanced content, and trigger messages for triggering the play-out of the enhanced content are transmitted to receivers over a data network, the receiver comprising an enhanced content decoder for receiving and playing out enhanced content, and the enhanced content decoder including a cache for caching enhanced content data received from the network; and a play-out controller for controlling the play-out of enhanced content, the play-out controller being arranged to receive trigger messages over the network and on receiving a trigger message that indicates an item of enhanced content for which enhanced content data is stored in the cache and that is to be played out, to play out that item of enhanced content data at a time indicated by the trigger message, and on receiving a trigger message that includes a definition of enhanced content, to play out the enhanced content defined in the trigger message at a time indicated by the trigger message.2008-09-04
20080216138TELEVISION CONVERTER DEVICE INCLUDING AN INTERNET PROTOCOL INTERFACE - A television converter device is provided which includes a channel selector and an Internet Protocol (IP) interface. The channel selector is configured to receive multiple channels of television programming from at least one of a satellite, cable, and over-the-air broadcasting source, select one of the channels from the multiple channels, and deliver the selected channel to at least one television (TV). The IP interface is configured to receive television programming over an IP connection, and to deliver the television programming received over the IP connection to the at least one TV.2008-09-04
20080216139METHOD AND SYSTEM FOR SHARING VIDEO OVER A NETWORK - A user can create a video segment or employ an existing video segment, and then share it over a computer network. The user provides an indication that one or more particular video segments are to be shared over the network. The video segment(s) is/are then automatically assessed and determined to be compatible with streaming video, or not. If the video segment(s) is/are not compatible with streaming video, it/they are converted to a compatible format automatically. An identifier for the video segment is automatically created and the segment and the identifier are automatically uploaded to a host computer over the network such as the Internet. The video segment and the identifier (optionally with other identifying material such as an identity of the sender, an access authorization for the video, a number of accesses permitted, and a duration for the availability of the video) can be stored at the direction of the host computer. A viewer can be sent an identifier of the video, and can request that the video be served as a streaming video to the viewer's computer. Alternatively, the viewer can be sent a location of the video such as a URL, can be served the video as an embedded portion of a Web page, or can be served the video as a consequence of being sent a link in an e-mail or as an e-mail greeting card.2008-09-04
20080216140SHARING A STREAMING VIDEO - A video segment can be shared over a computer network by first receiving the video segment at a receiving computer on the network. The receiving computer assures that the video segment is in a streaming video format, and creates at least one identification tag for the video segment. The receiving computer also stores the video segment, and communicates the identification tag to another computer on the network. Upon subsequent receipt of that identification tag, the receiving computer streams the video segment to a destination computer on the network.2008-09-04
20080216141ON DEMAND RF VIDEO FEED FOR PORTABLE VIDEO MONITOR - The present invention discloses systems for selectively viewing video information. A system in accordance with the present invention comprises a portable monitor, a video router, and a controller, coupled to the video router, wherein the video router selectively sends requested video information to the portable monitor based on commands from the controller.2008-09-04
20080216142System and method of digital media distribution - A system and method for the managed distribution of digital media. A capture station captures media resources by converting the media resources into digital form. Once captured in digital form, the digital media is communicated to a formatting server. The formatting server encodes and encrypts the digital media into a desired form for distribution by the system. The digital media is stored in a master media server. Users are allowed to access the digital media using a media presentation client. A user can request access to digital media stored on the master media server. The system allows various access restrictions to be defined to restrict access to the digital media. If a user is authorized to access a piece of digital media, the digital media may be delivered to the media presentation client by the master media server.2008-09-04
20080216143 METHOD FOR RECEIVING IP BROADCAST AND A RECEIVING TERMINAL - An IP broadcast terminal 2008-09-04
20080216144SYSTEM AND METHOD FOR SPECTRAL NODE SPLITTING IN A HYBRID FIBER OPTIC-COAXIAL CABLE NETWORK - A system and method for spectral node splitting in cable TV network based on hybrid fiber-coax architecture is disclosed. Two-way optical signals carrying video and/or multimedia content are received at a signal distribution node. Portions of the received signals are processed according to the functionality the direction thereof. Certain frequency ranges are passed intact while specific different downstream and specific different upstream frequency bands are converted in a manner as to be allowed to be multiplexed into an extended broadband signal. The frequency bands within the extended broadband signal are distributed selectively among separate branches of the network. The frequency bands dedicated to the upstream traffic are received selectively from the separate network branches to be back converted and transmitted upstream to the network controller.2008-09-04
20080216145System and Method for Media Transmission - System and method for transmitting and protecting media data set in a data communication medium. The invention provides encryption of media data and authorization prior to the media data being accessible on the end-user device. A Set Top Box provides for storage of media data downloaded through an access point, with security structures built in to the downloaded media data. The Set Top Box sends media data through a network to end-user devices that are recognized as authorized end-user devices. The system may further include limitations on the availability of the media data at the end-user device based upon wired, wireless, physics-based and location based security.2008-09-04
20080216146AUTOMATIC IDENTIFICATION OF A SET-TOP BOX USER TO A NETWORK - Methods, apparatus, and computer-readable media are disclosed for enabling a user of data services over a network to automatically register for such services by plugging in a set-top box, such as an advanced set-top box, or other IP clients such as a Web pad, and entering certain information through a member services screen. The invention also allows a user to have several accounts distributed over several set-top boxes or IP clients and have all accounts map to a single network identity. That is, it allows a user to have multiple viewer identities for different purposes yet have all of them map back to a single network identity for that user.2008-09-04
20080216147Data Processing Apparatus And Method - There is a described a method of certifying compliance with a designated process defined by a plurality of rules which are specified in a public template, wherein at least one rule associated with a process includes a certification requirement which requires compliance with that rule to be certified by a rule certifying authority. A processing apparatus operating in a secure environment receives rule compliance data and checks the received rule compliance data to verify that any certification requirement has been satisfied. If the processing apparatus confirms that all the rules specified in the public template are satisfied, then the processing apparatus issues a process compliance certificate which is digitally signed by the process certifying authority.2008-09-04
20080216148Systems and methods for policy-based service management - Systems and method for policy-based service management are provided. An exemplary system includes a rule definition interface module configured to receive a plurality of rule definitions and a separate policy management interface module configured to allow a user to define a rule instance from an existing rule definition instance and to define a policy instance based on the defined rule instance. A policy may be simply expressed via the policy management interface as “perform the following set of action if all of the following rule instances are true unless any of the following rule instances are true.” Additionally, policies may be associated with a context at a specific a level in a context hierarchy having multiple levels. The policy may therefore inherit rules from contexts at a higher level in the hierarchy.2008-09-04
20080216149Digital Authentication with Analog Documents - Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph.2008-09-04
20080216150Offload Processing for Secure Data Transfer - Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing. Improved offloading of security processing is also disclosed, which provides processing efficiencies over prior art offloading techniques. Offload components can be controlled from the kernel, an SSL layer or an application.2008-09-04
20080216151Electronic data authenticity assurance method and program - The present invention provides an electronic document authenticity assuring method in which a series of procedures concerning redactable signature are divided into procedures dependent on a document to be signed and procedures dependent on a redactable signature method. Further, the present invention provides program codes that realize the divided procedures and a system comprising apparatuses for implementing those program codes. According to the present invention, even when type of electronic document to be signed is changed or added to, it is sufficient to add a procedure dependent on a document to be signed, without changing procedures dependent on redactable signature methods. Similarly, even when a redactable signature method is to be changed or added, it is sufficient to add a procedure dependent on the redactable signature method without changing procedures dependent on document to be signed.2008-09-04
20080216152PASSWORD GENERATOR, SYSTEM AND USE THEREOF - A password generator for use with a detector and a verifier in an encapsulated system is provided, as is a system for generating and verifying passwords. The password generator comprises a support, a sensor for detecting a signal from the detector, a data transmitter for transmitting binary data as pulses, a processor that is initialized by the verifier and that controls the data to be sent, a controller for activating the processor and a connector to releasably connect the password generator with the verifier. The system employs a mouse as the detector.2008-09-04
20080216153Systems and methods for facilitating authentication of network devices - Systems, apparatuses and methods for facilitating authentication and logons for network devices. An identifier that is already affiliated with a device is used as a username in an authentication process. A password and an authentication key are generated based on at least the username, and the password and authentication key are provided to the device. Upon attempted access to a network service by the device, the username, password and authentication key are exchanged in some manner to determine the authenticity of the device.2008-09-04
20080216154IDENTITY-BASED WIRELESS DEVICE CONFIGURATION - Techniques are provided for the relating identity information with wireless configuration information for a wireless device or a wireless network. A trusted system may be used to generate wireless configuration parameters for a wireless network based on identity information. The identity-based wireless configuration information may be stored on the trusted system remote to the wireless network and accessible to the wireless device. The wireless configuration may be migrated from the trusted system to the wireless device.2008-09-04
20080216155Image forming apparatus - An image forming apparatus is provided that is capable of preventing a print data from being leaked even where a user forgets to print out the print data with which an authentication data is attached. The image forming apparatus of the present invention has: a network interface receiving the print data, the authentication data, and an importance degree data; a hard disk drive storing the print data, the authentication data, and the importance degree data received by the network interface; an operation panel with which the user inputs the authentication data that is used to authenticate the print data; an authentication control unit comparing the authentication data stored in the hard disk drive with the authentication data input by the user; a control comprising a print processing unit controlling print processing of the print data stored in the hard disk drive based on the comparison result; and a time management unit measuring a time for which the print data is stored in the hard disk drive, wherein the control unit deletes the print data based on the importance degree data and the time for which the print data is stored in the hard disk drive.2008-09-04
20080216156Fault tolerant security system, method and apparatus - A security system comprises a host system, a plurality of master controllers and a plurality of sub-controllers, wherein each sub-controller is assigned a specific master controller as well as alternate master controllers for communication access upon failure of the primary master controller. The host, master controller and sub-controllers are all coupled by a series of primary communication networks and paths and have multiple alternative communication network paths which function should there be a failure of the primary communication network. The host system comprises system and application software, data storage devices and communication ports to support the application requirements of the master controller, sub-controller network and access control devices attached thereto necessary to support a fault tolerant network. The system is configured with backup communication networks between the components so that upon failure of one or more components or communication paths the function of the failed component or path is assumed by alternative predesignated components or paths such that the operations of the system is not interrupted.2008-09-04
20080216157Method, System and Computer Program Product for Providing Access Policies for Services - The invention relates to a method, system and computer program product for provisioning in a communications network. According to the method at least one request is received form a client system (2008-09-04
20080216158Lawful Interception of Unauthorized Subscribers and Equipments - The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises the following steps: —Receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request (2008-09-04
20080216159System and method for electronic consent and delivery of financial and/or other transaction-related information - The present invention relates to a method and system for effectively and efficiently delivering financial and/or other transaction-related information to investors while complying with relevant governmental rules and regulations regarding notice, access and proof of delivery. The method and system of the present invention enable individual consent of electronic delivery of financial and/or other transaction-related information from investors and electronically delivering such information and/or documentation to the consented recipients. The system can manage and update investor lists for issuers and/or market intermediaries; prepare financial and other transaction-related information for review; replace or supplement hardcopy documents by disseminating such financial and other transaction-related information through an electronic delivery fulfillment system that complies with governmental rules and regulations; and enable real-time audit tracking of the electronic delivery to confirm both delivery and access of delivered information and to track corrupted electronic deliveries.2008-09-04
20080216160ROBUST DIGEST AUTHENTICATION METHOD - The present invention relates to a method of authenticating a user in a communication system comprising a user terminal and an authentication server which is capable of storing two types of nonce values, namely dedicated nonce values unique in the system and common nonce values shared between users in the system. In the method the authentication server receives (2008-09-04
20080216161SYSTEM AND METHOD FOR SECURE CONFIGURATION OF SENSITIVE WEB SERVICES - The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of requested configuration changes initiated by the client system the Web-Server system provides a configuration data file to the client system preferably using a SOAP-communication protocol. The changes of the configuration data file are exclusively performed offline at the client side and the updated configuration data file is signed with authentication information and sent as a part of a SOAP-request to the Web-Server system. The Web-Server system provides a filter component for identifying and discarding non-SOAP requests as well as an access control manager for providing authentication examination for incoming SOAP-requests. After successful passing these components the SOAP-request is used for updating the existing configuration data file.2008-09-04
20080216162NETWORK DEVICE MANAGEMENT APPARATUS AND NETWORK DEVICE MANAGEMENT METHOD - A network device management apparatus according to this invention is directed to a network device management apparatus, which is connected to a network and manages a network device connected to the network, acquires status information indicating the status of the network device from the network device, saves the acquired status information in a storage unit, randomly generates an address required to access the storage unit, and notifies a pre-registered destination of the generated address, and provides, when an access is made to the address, the status information saved in the storage unit to an accessing party.2008-09-04
20080216163Method and Apparatus for Network Authentication of Human Interaction and User Identity - A method and apparatus are provided to enable a server to determine if a client connecting to the server is doing so by means of human user interaction, as opposed to an automated process. In order to authorize access to services, the option of determining user identity, such as by means of a graphical shared secret, is also provided. Three aspects are described: (i) image formation from an object model; (ii) presentation of image choices to a user, and (iii) user action. Image formation includes the creation of one or more categorized 2-dimensional images with object regions for each image automatically qualified. These one or more categorized images can be created by means of a Randomizable Image Generation Object for Human Recognition, comprised of (i) a 3-dimensional object model, (ii) a plurality of rendering threshold and constraint parameters, and (iii) categorization and qualitative metadata. The one or more 2-dimensional images are preferably transmitted to the user for authentication without the image metadata, which may be retained on the server. Related inquiry text can be sent when human user interaction is being determined and not user identity authentication.2008-09-04
20080216164METHOD FOR PROVIDING ACCESS CONTROL TO SINGLE SIGN-ON COMPUTER NETWORKS - A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.2008-09-04
20080216165Method and System for Providing On-Demand Media Streaming from a User's Own Library to a Receiving Device of the User - A system and method are provided for on-demand media streaming from a user's own media library to a user's receiving device that may be located in a different location from that where the media library is stored. The present invention provides an out-of-the box on-demand media server device that may be used by itself, in conjunction with a personal computer, or in conjunction with a personal home stereo system or video system. The on-demand media server includes security mechanisms that allow a user to establish a private server that only the user may communicate with and gain access to the user's media library. In one particular embodiment, a smart card or other removable media are used as a security device to ensure that access to the media files on the user's personal on-demand media streaming server is limited to the user. In addition, the system and method provides an on-demand conversion of the media in the user's personal media library to an appropriate format.2008-09-04
20080216166Method and Apparatus for Detecting Grid Intrusions - A method, apparatus, and computer instructions for authorizing a user to access grid resources. A request is received from the user to access a resource on the data processing system. This request includes a certificate. An authentication process is performed using the certificate when the request is received. In response to successfully authenticating the user in the authentication process, a first host name for the certificate is requested from a trusted source. A reply containing the first host name is received. Access to the resource is provided if the first host name returned by the trusted source matches a second host name for the user from which the request originated.2008-09-04
20080216167PROXY CONNECTION METHOD AND ADAPTER TO IMS/MMD NETWORK - A client for IPv4 having a SIP function sends first REGISTER to adapter. Then, the adapter executes an authentication sequence of EAP-AKA for an access gateway connected to the interval of an IMS/MMD network and the IPv4 network, then establishes the tunnel connection. Then, the adapter generates second REGISTER corresponding to the IPv6 based on first REGISTER corresponding to IPv4. And, the adapter sends second REGISTER to a SIP server connected to the IMS/MMD network through the tunnel connection to the access gateway.2008-09-04
20080216168METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK BETWEEN COMPUTERS OF VIRTUAL PRIVATE NETWORK - A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.2008-09-04
20080216169SETTING APPARATUS, SETTING METHOD, PROGRAM, AND RECORDING MEDIUM - A setting apparatus sets any of authorization for and prohibition of access to data with a hierarchical structure. The setting apparatus includes: an object selection unit for selecting at least one object from a plurality of objects constituting the hierarchical structure; a pattern selection unit for selecting at least one pattern from a plurality of patterns, each of which determines a relative position in the hierarchical structure to the object selected by the object selection unit; and an access control policy setting unit for setting any of authorization for and prohibition of access to the object selected by the object selection unit and each of objects at the relative position to the selected object, which relative position is determined by the pattern selected by the pattern selection unit.2008-09-04
20080216170Password strength checking method and appartatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof - A password strength checking method includes operations of inputting a password to be checked, generating a plaintext password candidate according to the same generation procedure as that used by a password guessing tool, determining whether or not the inputted password and the generated password candidate match each other, directing generation of the next password candidate when the match is not determined, determining strength of the inputted password based on the number of the generated password candidates when the match is determined, and outputting information of the determined password strength.2008-09-04
20080216171Wearable device, authentication method, and recording medium - A wearable device is provided that is used while being worn on a body of a user. The wearable device includes a biometric-information authentication portion that acquires biometric information from the user for biometric authentication. The wearable device acquires biometric information from a portion in contact with or in the vicinity of the user's body to perform the biometric authentication without requesting the user to operate for the biometric authentication.2008-09-04
20080216172SYSTEMS, METHODS, AND APPARATUS FOR SECURE TRANSACTIONS IN TRUSTED SYSTEMS - Systems, methods, and software for protecting the identities of individuals, groups, and organizations are provided. In one embodiment, the systems, methods, and software provided by the present invention include a challenge-response architecture based upon entity-specific knowledge for verification of identity. In one aspect, a method for authenticating a first entity to at least one other entity includes creating an authenticator effective to authenticate said first entity to said at least one other entity; providing said authenticator or a substantially secure derivative thereof to an intermediary authentication service configured to interrogate said first entity; receiving a response to an identity interrogation from said first entity at said intermediary; and comparing at said intermediary the content of said response, or a derivative of said content, to said authenticator or said substantially secure derivative thereof to generate an estimation as to whether said first entity is authentic at said intermediary.2008-09-04
20080216173Method and Apparatus for Auditing Network Security - In an apparatus for auditing security of a computer systems at least one secure application server is in communication with a global computer network. The secure application server is programmed to receive selectively security audit instruction data from a remote computer system via the global computer network. A plurality of scanning machines each are in communication with the global computer network and are programmed to execute selectively a security audit scan of the remote computer system via the global computer network. A central computer, having a memory, is configured as a database server and as a scheduler. The central computer is in communication with the secure application server and the scanning machine. The central computer is programmed to perform the following operations: evaluate a database to determine if a security audit scan is currently scheduled to be run for a user; determine which of the plurality of scanning machines is available to perform a security audit scan; copy scan-related information into a scanning machine determined to be available and instruct the scanning machine to begin scan; and record the results of the scan in the memory.2008-09-04
20080216174Sensitive Data Scanner - A method and system of scanning a client for sensitive data. A server may receive, from the client, a request to scan the data stored in the data storage of the client for sensitive data. In response to receiving the request, the server may provide the client with a scanner, which causes the client to carry out functions including: (a) scanning the data stored in data storage to identify sensitive data; (b) collecting data based on the identified sensitive data; and (c) reporting the collected data. The server may then receive the collected data from the client and responsively analyze the data. The server may also provide feedback about the identified sensitive data to the client or another server.2008-09-04
20080216175COMPUTATIONAL SYSTEM INCLUDING MECHANISMS FOR TRACKING TAINT - Mechanisms have been developed for securing computational systems against certain forms of attack. Taint status for data accessible by processes is selectively maintained and propagated in correspondence with information flows of instructions executed by a computing system, so that a security (or other appropriate) response can be provided if and when a control transfer (or other restricted use) is attempted based on tainted data. One response that may be triggered is a change in the privilege level (root and guest) that is used to process code executing in a virtual environment, so as to allow remediation to be performed. The triggering events may be specified in a control block.2008-09-04
20080216176HARDWARE-ASSISTED ROOTKIT BLOCKER FOR NETWORKED COMPUTERS - A hardware-assisted security system for networked computers can detect, prevent, and mitigate rootkits. The solution relies upon an add-on card that monitors the system, alerting administrators when malicious changes are made to a system. The technical detail lies in the techniques needed to detect rootkits, preventing rootkits when possible, and granting administration of protected systems. A beneficial side-effect of the solution is that it allows many other security features, like system auditing, forensic capabilities to determine what happened after an attack, and hardware lock-down of important system resources.2008-09-04
20080216177Contents Distribution System - When the DRM mode indicated by a client terminal 2008-09-04
20080216178METHOD OF ACCESSING MULTIMEDIA CONTENT IN ACCORDANCE WITH INFORMATION OF A RECORDING MEDIUM - This invention relates to a process for an individual (2008-09-04
20080216179Computer chassis for improved security and connectivity of secured items - An apparatus for improving the security and connectivity of secured items. Embodiments provide an apparatus for securing items that comprises at least one interface for coupling the secured item to an external system, external device, external component, etc. The item may be coupled to the interface before placing the apparatus in a secured state, where a portion of the interface accessible from the outside of the apparatus provides electrical access to the item when in the secured state. Additionally, embodiments provide movement detection and alert mechanisms to enable the apparatus to detect movement thereof and generate an alert, thereby deterring theft of and/or tampering with the secured item.2008-09-04
20080216180Animal model for cancer, methods of producing the same and associated methods of use - A transgenic animal having a somatic cell in which at least one allele of an endogenous p53 and Pten gene is functionally disrupted is provided. The cell of the animal may be heterozygous or, more preferably, homozygous for the gene disruptions. The animals of the invention can be used to evaluate the efficacy of novel therapeutics and to identify novel points of therapeutic intervention for cancer. In certain embodiments, the transgenic animal is a transgenic mouse having functionally disrupted endogenous p53 and Pten genes. This mouse can be used to identify agents that inhibit the development of cancers, namely bladder cancers in humans in vivo. Nucleic acid constructs for functionally disrupting an endogenous p53 and Pten gene in a host cell, recombinant vectors including the nucleic acid construct, and host cells into which the nucleic acid construct has been introduced are also encompassed by the invention2008-09-04
20080216181Novel Alcohol Dehydrogenases - The invention relates to novel polypeptides which have the biological activity of an NAD- or NADP-dependent alcohol dehydrogenase. The invention furthermore relates to nucleic acids encoding said polypeptides, to non-human hosts or host cells and to reaction systems which may be used for preparing desired products. The polypeptides of the invention are preferably used in the preparation, starting from aldehydes or ketones, of primary and enantiomerically pure secondary alcohol's which may serve as intermediates for medicaments. Alternatively, the polypeptides of the invention may also be employed in the reverse reaction, i.e. the oxidation of alcohol's with the formation of aldehydes or ketones.2008-09-04
20080216182Animal Model for the Human Immune System, and Method for Producing the Same - In a method for preparing an animal model for the human immune system in a non-human mammal, human stem cells with hematopoietic potential are transplanted into a non-human mammal. The non-human mammal is conditioned with cell culture supernatant of a culture of human cell lines, cells and/or tissue. The cell culture supernatant is derived from cell lines producing cytokines and other molecular mediators.2008-09-04
20080216183Model of infantile spasm syndrome - Provided are non-human mammals treated with doxorubicin, lipopolysaccharide (LPS), and p-chlorophenylalanine (PCPA), where the mammal exhibits a symptom characteristic of infantile spasms. Also provided are methods of making a non-human mammal exhibit a symptom of infantile spasms. Additionally, methods are provided for screening a compound for the potential to attenuate a symptom of infantile spasms.2008-09-04
20080216184MUTANT RECEPTORS AND THEIR USE IN A NUCLEAR RECEPTOR-BASED INDUCIBLE GENE EXPRESSION SYSTEM - This invention relates to the field of biotechnology or genetic engineering. Specifically, this invention relates to the field of gene expression. More specifically, this invention relates to novel substitution mutant receptors and their use in a nuclear receptor-based inducible gene expression system and methods of modulating the expression of a gene in a host cell for applications such as gene therapy, large scale production of proteins and antibodies, cell-based high throughput screening assays, functional genomics and regulation of traits in transgenic organisms.2008-09-04
20080216185Compositions and Methods for Genetic Manipulation and Monitoring of Cell Lines - The disclosure relates generally to stem cell biology and more specifically to genetic manipulation of stem cells. Methods and compositions using recombinational cloning techniques are disclosed which allow the construction and insertion of complex genetic constructs into embryonic and adult stem cells and progenitor cells. The methods disclosed will allow the harvesting of adult stem cells pre-engineered with integration sites to facilitate early passage genetic modification.2008-09-04
20080216186Potato Cultivar FL 2085 - A potato cultivar designated FL 2085 is disclosed. The invention relates to the tubers of potato cultivar FL 2085, to the seeds of potato cultivar FL 2085, to the plants of potato FL 2085, to the plant parts of potato cultivar FL 2085 and to methods for producing a potato plant produced by crossing potato cultivar FL 2085 with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety FL 2085, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar FL 2085 and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar FL 2085 with another potato cultivar.2008-09-04
20080216187Acetolactate Synthase Herbicide Resistant Sorghum - The present invention provides for compositions and methods for producing sorghum crop plants that are resistant to herbicides. In particular, the present invention provides for 2008-09-04
20080216188PROCESS FOR SELECTING INDIVIDUALS AND DESIGNING A BREEDING PROGRAM - The presently disclosed subject matter provides methods for improving the efficacy of a plant breeding program aimed at altering phenotypic traits for which associations with genetic markers can be established. Genome-wide genetic values of individuals are computed based on the individuals' marker genotypes and the associations established between genetic markers and phenotypic traits. Individuals and breeding schemes are then selected based both on the individuals' genome-wide genetic value and on the distributions of these genetic values for the potential progenies derived through the breeding schemes under evaluation. The presently disclosed subject matter also provides systems and computer program products for performing the disclosed methods as well as plants selected, provided, or produced by any of the methods herein and transgenic plants created by any of the methods herein.2008-09-04
20080216189SOYBEAN VARIETY 4158090 - The invention relates to the soybean variety designated 4158090. Provided by the invention are the seeds, plants and derivatives of the soybean variety 4158090. Also provided by the invention are tissue cultures of the soybean variety 4158090 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety 4158090 with itself or another soybean variety and plants produced by such methods.2008-09-04
20080216190SOYBEAN VARIETY 4991629 - The invention relates to the soybean variety designated 4991629. Provided by the invention are the seeds, plants and derivatives of the soybean variety 4991629. Also provided by the invention are tissue cultures of the soybean variety 4991629 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety 4991629 with itself or another soybean variety and plants produced by such methods.2008-09-04
20080216191Doubling of Chromosomes in Haploid Embryos - Methods for producing doubled haploid corn (2008-09-04
20080216192Potato Cultivar FL 2086 - A potato cultivar designated FL 2086 is disclosed. The invention relates to the tubers of potato cultivar FL 2086, to the seeds of potato cultivar FL 2086, to the plants of potato FL 2086, to the plant parts of potato cultivar FL 2086 and to methods for producing a potato plant produced by crossing potato cultivar FL 2086 with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety FL 2086, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar FL 2086 and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar FL 2086 with another potato cultivar.2008-09-04
20080216193MATERIALS AND METHODS FOR THE MODULATION OF CYCLIN-DEPENDENT KINASE INHIBITOR-LIKE POLYPEPTIDES IN MAIZE - Isolated or purified nucleic acid molecules encoding polypeptides having cyclin-dependent kinase (CDK) inhibitor-like activity; vectors; host cells; polypeptides having CDK inhibitor-like activity; nucleic acid constructs for suppression of CDK inhibitor-like activity; methods of suppressing and up-regulating the expression of one or more CDK inhibitor-like genes in a maize cell, tissue, organ, or plant; a maize cell, tissue, organ, or plant in which the expression of a CDK inhibitor-like gene has been suppressed or up-regulated in accordance with such methods; and a seed (and the oil and meal thereof) obtained from a plant in which the expression of one or more CDK inhibitor-like genes has been suppressed or up-regulated.2008-09-04
20080216194METHOD TO PRODUCE STERILE MALE FLOWERS AND PARTENOCARPIC FRUITS BY GENETIC SILENCING, ASSOCIATED SEQUENCES AND VECTORS CONTAINING SAID SEQUENCES - Genes VvPI from 2008-09-04
20080216195Drought and high light tolerant transgenic plants - Transformed plants and/or plant cells having increased tolerance to high light, drought, water-deficit, and/or other stress-inducing conditions are provided. Plants and plant cells expressing or over-expressing an exogenous nucleic acid encoding a polypeptide involved in a CET pathway, including but not limited to, a PGR5 polypeptide, and methods of making the transformed plants and plant cells are also provided.2008-09-04
20080216196Environmental stress-responsive promoter and a gene encoding environmental stress-responsive transcriptional factor - The present invention provides a method of regulating expression of a gene by (a) preparing a recombinant plant cell line, plant tissue or plant with an expression vector having an abiotic environmental stress-responsive promoter of SEQ ID NO: 27 and the gene downstream thereof; and (b) culturing and cultivating the recombinant plant cell, plant tissue or plant under an abiotic environmental stress, wherein the promoter regulates the expression of the gene under the abiotic environmental stress.2008-09-04
20080216197Polypeptide Having Function Related to Pyridoxine Biosynthesis, Polynucleotide Coding the Polypeptide, and Those Use - Disclosed herein are a polypeptide having a pyridoxine biosynthesis-related function, a polypeptide encoding the same, and uses thereof.2008-09-04
20080216198Doubled haploid cells, embryos and plants - Methods for producing homozygous plants, seeds, and plant cells are provided. Also provided are methods of transformation.2008-09-04
20080216199Molybdenum Transporter and Gene Thereof - It is to provide a novel molybdenum ion transporter MoTR1 gene responsible for molybdenum transport for the first time in plants, enabling to promote effectively molybdenum absorption from the environment or molybdenum transport in vivo. By QTL analysis of 2008-09-04
20080216200Alternative splicing factors polynucleotides, polypeptides and uses thereof - The invention provides isolated polynucleotides and their encoded proteins that are involved in splicing or modulating splicing activity. The invention further provides recombinant expression cassettes, host cells, transgenic plants, and antibody compositions. The present invention provides methods and compositions relating to altering splicing protein content and/or composition of plants.2008-09-04
20080216201Gene Expression Modulating Element - The present invention provides a method of screening for the purpose of obtaining gene expression modulating elements and gene insulator elements. The invention includes a method of identifying gene expression modulating elements and gene insulator elements through use of the following steps: a) locating intergenic regions of a plant genome that are flanked by a gene on each side that have differing gene expressions b) taking that intergenic region or a portion of that intergenic region and adding it to a cassette comprising an isolated gene c) introducing the cassette into a plant cell d) analyzing expression of the isolated gene. The present invention also includes identified sequences that act as gene expression modulating elements.2008-09-04
Website © 2025 Advameg, Inc.