41st week of 2009 patent applcation highlights part 55 |
Patent application number | Title | Published |
20090254941 | LINEUP DETECTION - The technology is a system and method for selecting a television lineup. The available television lineups capable of being viewed on a digital device are identified. One of the tuner positions is selected and the television channel designated in each available television lineup identified. If any of the television channels identified is a likely identifiable channel and is designated by approximately half of the available television lineups, available television lineups may be deleted based on the television signal received by the selected tuner position. In on embodiment, the tuner positions are selected in numerical order. In an alternative embodiment, the tuner positions are first sorted before one is selected. It may not be possible to delete lineups based on likely identifiable channels. In this case, a viewer may be prompted to identify a channel. | 2009-10-08 |
20090254942 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, BROADCAST SYSTEM, STORAGE MEDIUM, AND COMPUTER PROGRAM - An information processing apparatus has the capability of making a registration for timer-controlled automatic viewing/recording not only in units of programs but also in units of sub-programs. The information processing apparatus includes a display control unit for displaying information on a display on the basis of the program information data such that when a program includes a plurality of sub-programs, sub-program information associated with sub-programs is displayed on the display, a processing unit for performing a specified process on sub-program content data of a sub-program included in the program content data received by the receiving means, and a timer-controlled automatic operation setting unit for specifying a sub-program indicated by the sub-program information displayed on the display and setting a timer-controlled automatic operation for the specified sub-program such that the specified process is to be performed on the specified sub-program at a specified time. | 2009-10-08 |
20090254943 | TECHNIQUE FOR IDENTIFYING FAVORITE PROGRAM CHANNELS FOR RECEIVING ENTERTAINMENT PROGRAMMING CONTENT OVER A COMMUNICATIONS NETWORK - A favorites list of program channels which a cable TV user likely prefers is generated automatically from which the user may select a program channel to watch. Each program channel in the favorites list is identified based on a measure of the duration in which the program channel is continuously tuned to. In an embodiment, this measure varies nonlinearly with such a duration. The favorites list may further comprise sublists of program channels which may correspond to different periods of a day, week, etc. The favorites list may be generated from programs watched on multiple viewing devices. | 2009-10-08 |
20090254944 | ALERT MANAGEMENT APPARATUS AND A METHOD OF ALERT MANAGMENT THEREFOR - An alert management apparatus ( | 2009-10-08 |
20090254945 | PLAYBACK APPARATUS, PLAYBACK METHOD, PROGRAM, RECORDING MEDIUM, SERVER, AND SERVER METHOD - A playback apparatus that communicates with a server and plays back data of a content item in accordance with a control file sent from the server includes a medium-information obtaining unit that obtains medium specifying information specifying a recording medium inserted into the medium-information obtaining unit; a playback-mode specifying unit that specifies a playback mode of a content item recorded on the recording medium; a sending unit that sends the medium specifying information and information specifying the playback mode to the server; and a playback control unit that receives a control file sent by the server in accordance with the sent medium specifying information and the sent information specifying the playback mode and controls playback of the content item recorded on the recording medium in accordance with the control file. | 2009-10-08 |
20090254946 | Click-through television advertising - An indicator appears on a TV screen when additional information is available about items in the scene being viewed. If the viewer presses an “info” button the action freezes and an overlay appears on the picture highlighting one or more products for which additional advertising is available. If the viewer moves the cursor to the item of interest and presses “OK”, an advertisement offering additional information about the cursored item plays or other information is displayed, such as special offers, links to retailer's website, opportunity to purchase etc. Similarly, when the credits roll at the end of a show, the viewer can press the “info” button and the credits freeze. A cursor appears on the first item in the credits. This cursor can be navigated around the credits to items that have links attached. If the user presses “OK” they are taken to the website of the credited body, or a prerecorded ad is played off hard disk. In some cases the frozen scene can be partly or completely replaced by a graphic or an animation. | 2009-10-08 |
20090254947 | METHOD FOR PROVIDING INTERACTIVE MENUS UPON REQUEST TO TERMINALS COUPLED TO A COMMUNICATION NETWORK - A method is dedicated to providing interactive menus upon the request of a user communication terminal (T | 2009-10-08 |
20090254948 | System And Method For Streaming Video Over A Wireless Network - A system and method are described for streaming video to a wireless device. For example, one embodiment of a computer-implemented method for providing a multimedia stream to a wireless device over a wireless network comprises: receiving a request for a video stream from a wireless device; requesting the video stream from a streaming server on behalf of the wireless device; streaming the video stream from the streaming server and storing the video stream or portions thereof in a buffer; streaming the video stream from the buffer to the wireless device; detecting that the wireless device has lost communication with the wireless network; sending a command to the streaming server to pause the streaming of the video stream and maintaining a network connection to the remote streaming server; detecting that the wireless device has regained communication with the wireless network; determining a point within the video stream at which the wireless device lost communication; and resuming streaming of the video stream to the wireless device at the determined point within the video stream. | 2009-10-08 |
20090254949 | METHOD AND SYSTEM FOR ARBITRATING RECORDING REQUESTS FROM MULTIPLE RECEIVING UNITS IN A NETWORK TO RECEIVE THE SAME CONTENT - A method and system for providing content includes a network having a plurality of receiving units generating a plurality of recording or tuning requests for content and communicating the recording or tuning requests through the network. The system includes a first receiving unit of the plurality of receiving units that is selected by the network to receive content corresponding to the request and stream the content to the network. A second receiving unit receives the content from the network. | 2009-10-08 |
20090254950 | Home media network - According to one embodiment, a method is described. The method includes receiving a request at a control module from a first remote device to access media data from a storage management module and determining that a first user is requesting access to the data based upon a first remote identification (ID). The method further includes opening a second stream between the playback module and the storage management module and receiving the data at the playback module. | 2009-10-08 |
20090254951 | METHOD AND SYSTEM FOR ALLOWING MULTIPLE RECEIVING UNITS IN A NETWORK TO RECORD THE SAME CONTENT WHILE MINIMIZING NETWORK RESOURCE USE - A method and system for providing content includes a network having a plurality of receiving units generating a plurality of recording requests for content and communicating the recording requests through the network. The system also includes a first receiving unit of the plurality of receiving units that is selected by the network to record content corresponding to the request in a first memory and storing the content in a first memory of the first receiving unit. The network communicates a do-not record signal to the plurality of receiving units except the first receiving unit. A second receiving unit of the plurality of receiving units forms a selection for the content and communicating the selection to the first receiving unit. The first receiving unit streams the content to the second receiving unit through the network. The second receiving unit displays the content on a display associated with the second receiving unit. | 2009-10-08 |
20090254952 | IPTV Network with D-Server Controller, VoD-Server Controller and Policy Server that Implement Diagnostic Tools - A D-server controller, a VoD-server controller and a policy server are described herein which implement diagnostic tools that proactively detect and prevent potential problems with different components and services in an Internet Protocol Television (IPTV) network. | 2009-10-08 |
20090254953 | Wireless video and audio broadcasting device - A broadcasting device includes a video and audio transmitter, several video and audio receivers to wirelessly receive signals from the video and audio transmitter, and a remote control; the video and audio transmitter is connected to a multimedia broadcasting device such as computers, MP3, MP4, CD and DVD players; the video and audio receivers are each connected to a respective second broadcasting device such as televisions, overhead projectors, stereos, and speakers so that video and audio information contained in the multimedia broadcasting device can be transmitted through the transmitter, received with the receivers, and broadcasted through the second broadcasting devices connected to the receivers; the remote control is used to control the video and audio transmitter and the broadcasting devices connected to the receivers. | 2009-10-08 |
20090254954 | METHOD AND APPARATUS FOR REQUESTING SERVICE USING MULTI-DIMENSIONAL CODE - The present invention is directed to a method for requesting a service, using a multi-dimensional code. According to a preferred embodiment of this invention, a user terminal recognizes a multi-dimensional code displayed with information or advertisement in any of information delivery media (e.g., television, newspaper, magazine, etc.), and receives and displays detailed information corresponding to the information or advertisement or performs ordering/making a payment for a product corresponding to the advertisement. With the present invention, not only does it become more convenient to order/make a payment for an advertised product, but also a variety of services corresponding to the pertinent product can be provided. | 2009-10-08 |
20090254955 | LOW NOISE BLOCK CONVERTER FEEDHORN - A circuit, electrical device or other apparatus for band stacking and/or band translating multiple transmissions. Such transmissions may be satellite transmissions, terrestrial transmissions, signals carried across a wired network such as a cable network, and so forth. Two sets of left-hand polarized and right-hand polarized signals may be accepted by an embodiment. One left-hand polarized signal and one right-hand polarized signal may be band stacked such that the left-hand polarized signal occupies a first frequency and the right-hand polarized signal occupies a second frequency, thereby permitting the two signals to be transmitted simultaneously across a single transmission line as a first unique signal. The second left-hand polarized signal and second right-hand polarized signal may likewise be combined into a second unique signal for transmission. The first and second unique signals may be stacked as a first stacked output and a second stacked output by a band translating circuit. | 2009-10-08 |
20090254956 | COMMUNICATION SIGNAL CHARACTERISTIC MEASUREMENT SYSTEM - A communication signal characteristic measurement system comprising: detecting a quiet line including: storing a specific characteristic data, detecting a vertical synchronization pulse in the specific characteristic data, and applying an eight line delay in the specific characteristic data; and displaying a data set showing the quiet line relative to the vertical synchronization pulse. | 2009-10-08 |
20090254957 | System and Method for Presenting Location Data for Broadcasted Media - System and method for providing location data associated with broadcasted media to a display device. In one embodiment, the method may include receiving broadcasted media data over a communication network connection, displaying the received media data on a display device and receiving location data associated with the broadcasted media data. The method may further include displaying a graphical representation of the location data on the display. | 2009-10-08 |
20090254958 | VIDEO SYSTEM - A network node apparatus is disclosed for the capture, storage and replay of video data at separate respective nodes of a communications network arranged to operably couple the node apparatus. The node apparatus may include a video capture node operable to capture video data and to transmit captured data via the communications network to a video storage node. The video storage node is arranged to store captured video data, and to transmit stored data via the communications network to a video replay node which renders an image therefrom. The video storage node transmits video data to the video replay node only if the content of a transmit buffer therein matches or exceeds a predetermined lower content value and the content of a receive buffer in the replay node does not exceed a predetermined upper content value. | 2009-10-08 |
20090254959 | DISTRIBUTION OF AMBIENCE AND CONTENT - A system for supporting entertainment distribution via at least one network comprises a content provider ( | 2009-10-08 |
20090254960 | METHOD FOR A CLUSTERED CENTRALIZED STREAMING SYSTEM - Methods and systems for providing centralized video accounts where videos are received over a communication network from video sources associated with a plurality of accounts and the videos or processed versions thereof are transmitted over a communication network to corresponding users of the plurality of accounts. In another aspect of the invention a new communication protocol for network components is disclosed. | 2009-10-08 |
20090254961 | METHOD FOR CONTROLLING A RECEIVER SYSTEM AND RECEIVER SYSTEM, IN PARTICULAR FOR WIRELESS IP DATACAST NETWORKS - The invention relates to a method for controlling a receiver system ( | 2009-10-08 |
20090254962 | OPERATIONS CENTER FOR A TELEVISION PROGRAM PACKAGING AND DELIVERY SYSTEM - An apparatus and a method provide optimum packaging of programs for delivery over a television program delivery system. The apparatus includes a central processor unit (CPU) that is used to select program categories and identify external and internal programs. For packaging. The CPU includes advanced features to weight programs according to established criteria including previous buying history, programs watched data, and viewer demographics. The CPU formats a menu having a program lineup and assigns transponder space. Other advanced features include the use of multiple operations centers to support the packaging, delivery of the packaged programs to cable television headends, insertion of local avails, and direct transmission of program packages to individual television terminals. | 2009-10-08 |
20090254963 | METHOD AND APPARATUS FOR PROVIDING A VIRTUAL CHANNEL SERVICE - A method and an apparatus for providing a virtual channel service are disclosed. The method includes maintaining a contents list recorded in a personal video recorder and a virtual channel information, determining a playback order of recorded contents included in the list in accordance with a preset algorithm, and playing back in sequence the recorded contents through a predetermined virtual channel. As a result, a user may approach easily to the recorded contents. | 2009-10-08 |
20090254964 | Method for providing record information in a digital broadcast receiver and a digital broadcast receiver for providing record information - A method for providing record information in a digital broadcast receiver and a digital broadcast receiver for providing record information are disclosed. A reception unit receives a broadcast signal including a data broadcast-associated application. A storage medium stores records. And a controller manages the application, receives an information request for requesting information related with a record from the application, finds provision information of the record from a list of the stored records, generates a thumbnail image of the record based on the found provision information, and transmits the generated thumbnail image to the application. | 2009-10-08 |
20090254965 | METHOD AND SYSTEM FOR ENHANCING DISPLAY FUNCTIONALITY IN A SET-TOP ENVIRONMENT - Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g., code) for securely storing and retrieving digital content, a display obfuscation/encryption mechanism, and a secure data repository. Methods and systems for displaying dynamic, floating graphics using an EDC are also provided. These graphics may be used to as interfaces to invoke the secure storage and playback mechanisms of the EDC and to navigate through display spaces presented on the television display. | 2009-10-08 |
20090254966 | METHODS AND APPARATUS FOR UPGRADING SET TOP BOX DEVICES WITHOUT THE LOSS OF STORED CONTENT - Methods and apparatus for smoothly and efficiently upgrading set top boxes, e.g., personal video recorders, which have customer selected content stored thereon are described. The described methods allow content stored on a set top box to be uploaded to a network storage device, e.g., automatically at a predetermined time prior to a scheduled upgrade, or in some cases, via manual control of the set top box to be upgraded. After stored content is uploaded to the network storage device, the set top box is replaced with a new set top box. The new set top box can be preloaded with the previously uploaded content or a content download can be triggered, e.g., by activating a hidden application and by supplying information identifying the set top box being replaced as part of the upgrade process. | 2009-10-08 |
20090254967 | VIRTUAL PRIVATE NETWORKS (VPN) ACCESS BASED ON CLIENT WORKSTATION SECURITY COMPLIANCE - Techniques for virtual private network (VPN) access, which is based on client workstation security compliance, are provided. When a user successfully logs into a secure network, client integrity checks are processed on a client workstation of the user to gather configuration information related to a processing environment of the client workstation. Metrics associated with the client integrity checks are compared with security policy and an assigned security access level is set for the user during a VPN session. Traffic policy is then enforced against the VPN session by configuring attributes of the VPN session. | 2009-10-08 |
20090254968 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR VIRTUAL WORLD ACCESS CONTROL MANAGEMENT - A method for virtual world (VW) access control management includes intercepting a policy object from a VW network in response to a request from a VW client system to access a VW space, the policy object intercepted by a proxy server located outside of the network. The method also includes selecting an identity based upon the policy object, which provides credentials required in the policy object as a condition of granting access to the network, generating proof from the selected identity, and transmitting the proof to a verifier avatar located inside the network, the verifier avatar logically mapped to, and controlled by, a verification system located outside of the network. The method further includes receiving, at the verification system, the proof from the verifier avatar. In response to successful validation of the proof, the verification avatar places an avatar of the client system on a list of avatars having access to the space. | 2009-10-08 |
20090254969 | Method and system for managing security of mobile terminal - A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy. | 2009-10-08 |
20090254970 | MULTI-TIER SECURITY EVENT CORRELATION AND MITIGATION - The present invention is directed to the use of a multi-tiered security architecture that includes vendor-operated global security services and policy servers able to exchange security events and mitigation measures. | 2009-10-08 |
20090254971 | SECURE DATA INTERCHANGE - A secure data interchange system enables information about bilateral and multilateral interactions between multiple persistent parties to be exchanged and leveraged within an environment that uses a combination of techniques to control access to information, release of information, and matching of information back to parties. Access to data records can be controlled using an associated price rule. A data owner can specify a price for different types and amounts of information access. | 2009-10-08 |
20090254972 | Method and System for Implementing Changes to Security Policies in a Distributed Security System - Improved approaches for effectuating changes to security policies in a distributed security system are disclosed. The changes to security policies are distributed to those users (e.g., user and/or computers) in the security system that are affected. The distribution of such changes to security policies can be deferred for those affected users that are not activated (e.g., logged-in or on-line) with the security system. | 2009-10-08 |
20090254973 | SYSTEM AND METHOD FOR SOURCE IP ANTI-SPOOFING SECURITY - A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datalink (layer 2) level, and to use the information derived from such analysis to block access through a port where a host device is using a false, or spoofed, source IP address in transmitted data packets. | 2009-10-08 |
20090254974 | Method and Apparatus for Open Internet Security for Mobile Wireless Devices - A method and apparatus for a wireless communication network with mobile wireless devices, where the wireless communication network is at least in part controlled by a wireless network service provider that provides wireless network services to subscribers, the wireless devices including terminals capable of communication in the wireless communication network and capable of connecting to the Internet, each terminal having a removable USIM under the control of the wireless network service provider, wherein the USIM is provided to a subscriber for installation in the subscriber's terminal for controlling the terminal's access to the service provider's wireless communication network and to the Internet. | 2009-10-08 |
20090254975 | Location Based Authentication - The present invention relates to authenticating a mobile device using logical location information associated with the device which provides an indication of the proximity of the device to other devices. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device identifies or discovers other devices, using direct wireless communication, within its vicinity and forwards this information to the authenticating authority. If this information matches previous or otherwise predetermined information, then the device is authenticated. | 2009-10-08 |
20090254976 | CONDITIONAL DATA DELIVERY TO REMOTE DEVICES - In one embodiment a method comprises enrolling a mobile device in a local area network by setting a variable to a mobile device identifier and authenticating the mobile device using a network gateway and the mobile device identifier. A request for data is received from the mobile device and the data is delivered from a service provider to the mobile device. | 2009-10-08 |
20090254977 | Method and Apparatus for Communicating Information Between Devices - A network of devices permits data to be stored on the devices and subsequently searched and accessed from any other one of the devices. A plurality of channels are defined to distribute a plurality of access points throughout the network. A mechanism securely assigns authorizations to users to read or write from or to specified ones of the channels, which authorizations are capable of being checked by each of the access points. To write into a channel, a request is made to one of the access points which checks if the requesting user is authorized to write onto the requested channel. If appropriate, the data is associated with the requested channel. To search for data from a particular channel or group of channels, a search request is made to one of the access points which first checks the requesting user is authorized to read from the requested channel or group of channels. If appropriate it issues a corresponding search request or requests to a subset of the devices which checks to see if stored data satisfying the request exists there and, if so, the data is transmitted to the requesting user. Otherwise the search request is forwarded to another one or more of the devices. | 2009-10-08 |
20090254978 | DELEGATED AUTHENTICATION FOR WEB SERVICES - Embodiments of the claimed subject matter provide a method and an apparatus for enabling delegated authentication for web services. Delegated authentication is provided without divulging the information the user requires to complete an authorization procedure of another web service or otherwise subjecting the user to unnecessary risk. Furthermore, delegated authentication is granted for a limited duration and access is subject to further limitations to prevent unnecessary intrusion to the user, the user's data, and the host web service. | 2009-10-08 |
20090254979 | Method of and System for Enforcing Authentication Strength for Remote Portlets - In a method of and system for enforcing authentication strength for remote portlets, a portlet is provided by a producer portal and consumed as remote portlet by a consumer portal. The producer portal defines an authentication strength level requirement for the portlet. A user requests the remote portlet from the consumer portal. The consumer portal authenticates the user with a particular authentication method that implies a particular authentication strength level. The producer portal authenticates the consumer portal with a particular authentication method that implies a particular authentication strength assertion level. The consumer portal requests the portlet from the producer portal with an assertion of the authentication strength level of the user. The producer portal rejects the request from the consumer portal if the authentication strength level of the user is less than the authentication strength level requirement for the portlet. The producer portal also rejects the request from the consumer portal if the authentication strength assertion level of the consumer portal is not high enough to assert the authentication strength level of the user. The producer portal accepts the request from the consumer portal only if the authentication strength level of the user is not less than the authentication strength level requirement for the portlet and the authentication strength assertion level of the consumer portal is high enough to assert the authentication strength level of the user. | 2009-10-08 |
20090254980 | METHOD OF PROVIDING ACCESS RIGHTS BASED ON DEVICE PROXIMITY AND CENTRAL ACCESS DEVICE USED FOR THE METHOD - Provided is method of providing access rights based on device proximity and central access device used for method. Method of providing access rights to mobile device includes: determining proximity showing how close mobile device is to central access device when mobile device connects to central access device in home network; and granting access right to mobile device according to determined proximity. Access rights used for protecting contents of various devices in home network can be seamlessly controlled, and in network, identity of person (identified by his/her device) can be generated and his/her access right can be properly controlled. In addition, there is no need to concern about leakage of data beyond the house and there is no need to try to change anything of set parameters for this purpose, and there is no need to try to protect data in a ubiquitous information network. | 2009-10-08 |
20090254981 | Volatile Device Keys And Applications Thereof - A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software. | 2009-10-08 |
20090254982 | METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS - The invention relates to a method of providing access to one or more resources accessible via a remote computer. The resources are assigned to a remote security context. Access to at least one of said remote resources within the remote security context is controlled by access rules that are valid for said at least one of said remote resources, on receipt of a terminal services request for a terminal session from a local computer. A user of said local computer has already been authenticated in a local security context by local authentication information. The local computer runs a local agent and contains identification information in addition to the local authentication information. The method involves obtaining at least said identification information from said local agent; performing access control to said at least one of said remote resources using said access rules on the basis of at least said identification information, and providing access for said local computer to said at least one of said remote resources for which said access rules permit access. | 2009-10-08 |
20090254983 | METHOD AND APPARATUS FOR MANAGING TOKENS FOR DIGITAL RIGHTS MANAGEMENT - A method and apparatus for managing tokens for Digital Rights Management (DRM) in a terminal are provided. In the method, at least one token is acquired from a Rights Issuer (RI), and the token is moved to a Secure Removable Media (SRM) through a token move request message. The token can be shared by several terminals. | 2009-10-08 |
20090254984 | HARDWARE INTERFACE FOR ENABLING DIRECT ACCESS AND SECURITY ASSESSMENT SHARING - Native IPv6 capabilities are provided to an IPv4 network node, device, or endpoint using a hardware interface that supports network communication under a Direct Access model. The Direct Access model supports IPv6 communication with IPsec and enforces Network Access Protection (“NAP”) health requirement policies for endpoints that are network clients. A Direct Access-ready server is enabled using a hardware interface that implements IPv4 to IPv6 translation and optionally IPsec termination capability. A Direct Access-ready client is enabled using a hardware interface that implements IPv4 to IPv6 translation, IPsec termination capability, and which optionally provides NAP (Network Access Protection) capabilities for Direct Access-ready clients that are configured as mobile information appliances. The hardware interface may be implemented as a network interface card (“NIC”) or as a chipset. | 2009-10-08 |
20090254985 | Secure network interface device - An interface device for a protected workstation or host has a network interface for connection to a multi-level secure network, a first address corresponding to a guard control port, and a second address corresponding to a guard data port. A transport guard in the device has a control component coupled to the guard control port for processing configuration data sent to the first address and producing a desired security configuration, a guard component coupled to the output of the control component and to the guard data port of the network interface, and a host interface coupled to the guard component for exchanging data with the protected host. Only when permitted by the desired security configuration, the guard component passes network data addressed to the second address of the network interface to the host interface, and passes outbound data from the host interface to the network through the guard data port. | 2009-10-08 |
20090254986 | Method and apparatus for processing and displaying secure and non-secure data - A data processing apparatus is disclosed that comprises: at least one processor; a display for displaying data processed by said at least one processor; at least one display buffer for storing an array of display elements for subsequent output to said display, said display elements being secure display elements for displaying secure data and non-secure display elements; and a user interface; wherein said at least one processor is operable to execute at least one untrusted process and at least one secure process, said at least one secure process having access to secure data; said data processing apparatus further comprising: a secure user input for receiving a user input, said received user input not being accessible to said at least one untrusted process; and said data processing apparatus being responsive to an input received at said secure user input to transform data to be displayed on said display such that said secure display elements and said non-secure display elements are transformed differently to each other. | 2009-10-08 |
20090254987 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM, OUTPUT CONTROL METHOD AND SYSTEM - An output control apparatus and method in which at least either a first access authority at a first level or a second access authority at a second level that is higher than the first level may be set according to a user. The method includes referring to a first storage unit that stores authority information indicating an access authority level of a current user, selecting composing information stored in a second storage unit in association with the user to which the access authority is set from the second storage unit when the authority information indicates the first access authority, composing the selected composing information and output target data generated based on an output instruction by the current user, and outputting composed data of processing results by the composing. | 2009-10-08 |
20090254988 | EVALUATION APPARATUS, EVALUATION METHOD, EVALUATION PROGRAM AND INTEGRATED CIRCUIT - In a system for transmitting/receiving information, each of users of terminals subjectively determines a direct evaluation value of a party that the user knows personally and so on. Since the direct evaluation value determined in this way changes depending on the subjective evaluation criterion, the direct evaluation value is not generated based on the single evaluation criterion. In view of this, a terminal device | 2009-10-08 |
20090254989 | CLUSTERING BOTNET BEHAVIOR USING PARAMETERIZED MODELS - Identification and prevention of email spam that originates from botnets may be performed by finding similarity in their host property and behavior patterns using a set of labeled data. Clustering models of host properties pertaining to previously identified and appropriately tagged botnet hosts may be learned. Given labeled data, each botnet may be examined individually and a clustering model learned to reflect upon a set of selected host properties. Once a model has been learned for every botnet, clustering behavior may be used to look for host properties that fit into a profile. Such traffic can be either discarded or tagged for subsequent analysis and can also be used to profile botnets preventing them from launching other attacks. In addition, models of individual botnets can be further clustered to form superclusters, which can help understand botnet behavior and detect future attacks. | 2009-10-08 |
20090254990 | SYSTEM AND METHOD FOR INTELLIGENT COORDINATION OF HOST AND GUEST INTRUSION PREVENTION IN VIRTUALIZED ENVIRONMENT - A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention. | 2009-10-08 |
20090254991 | INTRUSION DETECTION USING A NETWORK PROCESSOR AND A PARALLEL PATTERN DETECTION ENGINE - An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures. | 2009-10-08 |
20090254992 | SYSTEMS AND METHODS FOR DETECTION OF NEW MALICIOUS EXECUTABLES - A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold. The system can notify the user when the number of borderline attachments exceeds the threshold in order to refine the classification rule set. | 2009-10-08 |
20090254993 | SYSTEM FOR IMPLEMENTING SECURITY ON TELECOMMUNICATIONS TERMINALS - A system includes at least one telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications, wherein each software application has associated therewith a respective indicator adapted to indicate a level of security of the software application, the level of security being susceptible of varying in time; a software agent executed by the at least one telecommunications terminal, the software agent being adapted to conditionally allow the installation of software applications on the telecommunications terminal based on the respective level of security; a server in communications relationship with the software agent, the server being adapted to dynamically calculate the level of security of the software applications, and to communicate to the software agent the calculated level of security of the software applications to be installed on the telecommunications terminal. | 2009-10-08 |
20090254994 | Security methods and systems - A system/method for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in that communicates with a messaging client and a messaging server. The interception component alters messages from the server and destined for the client. The interception component replaces message addresses in incoming messages with a unique identifier. The interception component also alters messages from the client destined for the server. The interception component replaces a unique identifier with a message addresses. A system/method for preventing keyboard sniffer programs from intercepting input, a system for preventing a computer virus from activating a send confirmation of a messaging client and a method for altering displayed objects to show encrypted data in decrypted form are also described and claimed. A system/method for reducing the impact of keyboard sniffer programs by altering keyboard input. | 2009-10-08 |
20090254995 | CLIENT CONTROLLED LOCK FOR ELECTRONIC DEVICES - An electronic device can be locked and secured by activating a hardware locking mechanism on the device. The locking mechanism is controlled by a locking policy that is defined and implemented from the client side. If the locking mechanism is activated, then the device operates in a limited mode of operation instead of in a normal mode of operation. The locking mechanism can be deactivated, placing the device into the normal mode of operation, when a specified condition is satisfied. | 2009-10-08 |
20090254996 | Security module for audio/video data processing unit - The aim of the present invention is to limit the impact of security breaches, which are the emulators of the security module. This aim is reached by a processing unit of audio/video digital conditional access data, encrypted by control words, responsible for processing security messages containing at least one cryptogram relative to a control word and one instruction relative to the control word, characterised in that it includes means to receive at least two micro programs by security messages, executable by the security module, said security module comprising means to store at least two micro programs and means to receive an instruction contained in the security message, for selecting the micro program indicated by the instruction, for executing the said micro program with at least the cryptogram as a parameter of execution, this execution allowing the calculation of the control word to be sent back to the audio/video processing unit. | 2009-10-08 |
20090254997 | Method and apparatus for content rights management - The instant invention relates to a method and apparatus for restricting access to digital content through the use of an exemplary form of digital encryption which ties the delivered content to a user, a specific destination device, a specific network, or one or more of the above. Specifically, the encryption/decryption keys are unique in each content consumption session, whether download or stream, which permits the content owner to provide multiple levels of access, i.e. different users may purchase different levels of access to the same content. For example, one user might want to use content on multiple playback devices, while another user might only need access on a single playback device. | 2009-10-08 |
20090254998 | WEB-BROWSER BASED GRID COMPUTING SYSTEM - A system and method for web-based grid computing are disclosed herein. A method for web-based grid computing includes receiving a data component request from a node computer of a grid computing system. The request indicates that the node computer is configured to process the data component as a part of the grid computing system. A data component is sent to the node computer in response to the request. The data component is configured to be processed by a grid computing system web-based processing program executing in a web browser of the node computer. A grid computing client program is provided that is included on a web page accessed by the node computer. The client program is configured to be executed in the web browser of the node computer, and when executed causes the node computer to operate as a part of the grid computing system. | 2009-10-08 |
20090254999 | MEDIATED ACCESS OF SOFTWARE DUMPED DATA THROUGH SPECIALIZED ANALYSIS MODULES - The present invention can include a method, computer program product, and system for mediating access to content of a software dump. The invention can identify an event occurring within a computing device, which causes data to be dumped to file. A dump file can be created responsive to the event, wherein the dump file includes data defining a state of the computing device. Using an analysis module to analyze the dump file to determine content to be placed in a tailored dump file. In one embodiment, custom analysis modules or custom modifications to existing analysis modules can be added to the computing device at any time, which permits a tailoring of dumps to cover circumstances not originally known in advance of a situation for which they are needed. The tailored dump file can include a subset of the content of the dump file for which access privileges have been granted in accordance with the analysis module. The output file can be created, which comprises the determined content. | 2009-10-08 |
20090255000 | Internet Protocol (IP) Location, Privacy and Presence - An extension to the Location Information Service (LIS) architecture uses a centralized, user-selected, Privacy Profile Register (PPR) and Presence Register (PR) element, the User Privacy and Presence Register (UPPR) (also known as the Home Register (HR)). This centralized model provides access to value added services that allow the user to be located anywhere in the world by people and services of his choosing. It also provides network elements using this location information with security that the location being provided has certification. | 2009-10-08 |
20090255001 | Parkinson's Disease-Related Gene GRK5 and Uses Thereof - Large-scale SNP analyses conducted on subjects in a Parkinson's disease patient group and a normal control group led to the successful identification of a gene (GRK5) associated with Parkinson's disease. In addition, it was newly discovered that phosphorylation of α-synuclein is promoted by enhanced expression of the GRK5 gene, and as a result, the formation of soluble α-synuclein oligomers is promoted, leading to Parkinson's disease. The present invention enables the assessment of Parkinson's disease as well as the screening of therapeutic agents for Parkinson's disease using as an index the expression of GRK5 gene. | 2009-10-08 |
20090255002 | Transgenic Non-Human Animals For Producing Chimeric Antibodies - The invention relates to transgenic non-human animals capable of producing heterologous antibodies and methods for producing human sequence antibodies which bind to human antigens with substantial affinity. | 2009-10-08 |
20090255003 | Diagnostic and therapeutic target SLC39A11 proteins for neurodegenerative diseases - The present invention discloses a dysregulation of the SLC39A11 gene and the protein products thereof in Alzheimer's disease patients. Based on this finding, the invention provides methods for diagnosing and prognosticating Alzheimer's disease in a subject, and for determining whether a subject is at increased risk of developing Alzheimer's disease. Furthermore, this invention provides therapeutic and prophylactic methods for treating and preventing Alzheimer's disease and related neurodegenerative disorders using the SLC39A11 gene and its corresponding gene products. Screening methods for modulating agents of neurodegenerative diseases are also disclosed. | 2009-10-08 |
20090255004 | G-Protein Coupled Receptor and Uses Therefor - The present invention is based on the identification of a G-protein coupled receptor (GPCR) that is expressed predominantly in the brain and placenta and nucleic acid molecules that encoded the GPCR, which is referred to herein as the hCAR protein and hCAR gene respectively (for human Constitutively Active Receptor). Based on this identification, the present invention provides: (1) isolated hCAR protein; (2) isolated nucleic acid molecules that encode an hCAR protein; (3) antibodies that selectively bind to the hCAR protein; (4) methods of isolating allelic variants of the hCAR protein and gene; (5) methods of identifying cells and tissues that express the hCAR protein/gene; (6) methods of identifying agents and cellular compounds that bind to the hCAR protein; (7) methods of identifying agents that modulate the expression of the hCAR gene; and (8) methods of modulating the activity of the hCAR protein in a cell or organism. | 2009-10-08 |
20090255005 | Method for Preparing Fish Embryo - An object of the invention is to effectively prepare a fish embryo with a correct chromosomal ploidy by nuclear transplantation in which an exogenous fish nucleus is transplanted in a cytoplasmic recipient. For this object, the invention comprises a step of preparing a fish embryo by transplanting a fish cell nucleus to an unfertilized egg. The step of preparing a fish embryo comprises a step of imposing physical and/or chemical stress to the unfertilized egg after activation. By imposing such stress, the stage of haplosis in a female nucleus which happens at the early stage of a series of developmental steps occurring in an unfertilized egg is suppressed and the correct ploidy of an obtained embryo is at least secured. | 2009-10-08 |
20090255006 | Transgenic Zebrafish - Transgenic zebrafish containing sqt genomic sequences driving expression of a reporter gene are provided. This line faithfully reproduces the spatiotemporal expression pattern of endogenous sqt, and at the late blastula stage is expressed in the YSL as well as in the blastomeres. The data show that expression in embryonic and extra-embryonic tissues is controlled by separable regulatory elements, including at least two elements that mediate the response to Nodal signals in different cell types. An element upstream of the transcription start site mediates the response to Nodal signaling specifically in the EVL cells. By contrast, a conserved Nodal response element (NRE) in the first introns is required for transgene expression in the blastomeres. The data show that expression of the transgene in the blastomeres depends on Nodal signaling activity. Furthermore, expression of sqt and cyc in the blastomeres depends upon Nodal signals from the YSL. These experiments suggest that Nodal signals in the YSL act to induce nodal-related gene expression in the embryo margin by activating the Nodal autoregulatory pathway. Targeted depletion of Nodal signals from the YSL results in embryos lacking endoderm and head mesoderm, similar to the defects observed in mice lacking Nodal function in the visceral endoderm. Thus, the data provides strong genetic evidence for the functional conservation between the YSL and the visceral endoderm. This suggests a common evolutionary origin for teleost and mammalian extra-embryonic tissues, despite their profound morphological differences. | 2009-10-08 |
20090255007 | BEAN LINE RS08051272 - The invention provides seed and plants of the bean line designated RS08051272. The invention thus relates to the plants, seeds and tissue cultures of bean line RS08051272, and to methods for producing a bean plant produced by crossing a plant of bean line RS08051272 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line RS08051272, including the pods and gametes of such plants. | 2009-10-08 |
20090255008 | COTTON VARIETY FM 9180B2F - A novel cotton variety, designated as FM 9180B2F, is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9180B2F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9180B2F and to plants of FM 9180B2F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9180B2F. | 2009-10-08 |
20090255009 | COTTON VARIETY FM 9150F - A novel cotton variety, designated as FM 9150F, is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9150F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9150F and to plants of FM 9150F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9150F. | 2009-10-08 |
20090255010 | TOMATO HYBRID BS 01031842 - The invention provides seed and plants of the tomato hybrid designated BS 01031842. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid BS 01031842, and to methods for producing a tomato plant produced by crossing a plant of tomato hybrid BS 01031842 with itself or with another tomato plant, such as a plant of another hybrid. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of tomato hybrid BS 01031842, including the fruit and gametes of such plants. | 2009-10-08 |
20090255011 | SWEET PEPPER HYBRID 9954288 - The invention provides seed and plants of pepper varieties designated 9954288, SBR 99-1274 and SBY 99-1273. The invention thus relates to the plants, seeds and tissue cultures of sweet pepper hybrid 9954288, pepper line SBR 99-1274 and pepper line SBY 99-1273, and to methods for producing a pepper plant produced by crossing a plant with itself or with another pepper plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of the invention, including the fruit and gametes of such plants. | 2009-10-08 |
20090255012 | SWEET PEPPER HYBRID 9942595 - The invention provides seed and plants of the pepper hybrid 9942595 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid 9942595 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts such plants, including the fruit and gametes of such plants. | 2009-10-08 |
20090255013 | Use of virus induced gene silencing (VIGS) to down-regulate gene use in plants - The present invention provides nucleic acid molecules and methods to down-regulate by virus-induced gene silencing (VIGS) vernalization genes in winter annuals, specifically the Flowering Locus C (FLC) gene in | 2009-10-08 |
20090255014 | Transgenic organisms with lower growth temperature - The invention relates to the growth temperature of organisms, especially plants and microorganisms and the manipulation of the tolerable cultivation temperature. More specifically, the present invention relates to the expression of heterologous proteins in microorganisms, and especially to the heterologous expression of heat sensitive proteins in bacteria, either gram-negative or gram-positive. In a first aspect, the present invention provides a method for manipulation of cells and the resultant cells, wherein at least one gene from a psychrophilic micro organism coding for at least one chaperone or chaperonin is expressed. Such cells are selected among cultivated eukaryotic cells, i.e. animal and plant cells and entire plants, gram-negative and gram-positive bacteria, fungi and yeasts. | 2009-10-08 |
20090255015 | NON-TOXIC ENDOPHYTES, PLANTS INJECTED THEREWITH AND METHODS FOR INJECTING PLANTS - Seeds of plants stably infected with isolated endophytes selected from the group consisting of ATCC Deposit No. PTA-6499, PTA-8827, PTA-8828, and PTA-8829 are disclosed. | 2009-10-08 |
20090255016 | APPARATUS STRUCTURE AND SCANNING PROBE MICROSCOPE INCLUDING APPARATUS STRUCTURE - Provided are a structure of an apparatus for analysis, inspection, and measurement in which a support structure supporting a detection unit is resistant to disturbance, suppresses a reduction in resolution during large-sample measurement, and has high rigidity, and a probe microscope using the apparatus structure. The apparatus structure supporting the detection unit which is opposed to a sample which is located on a unit movable in at least one axis direction and is an object to be analyzed has an arch shape. In the apparatus structure having the arch shape and supporting the detection unit, a surface substantially perpendicular to a flat surface portion of a sample holder located immediately under the apparatus structure is formed. The detection unit is supported on the perpendicular surface. The arch-shaped apparatus structure is a curved structure consistent with a catenary curve. | 2009-10-08 |
20090255017 | 'Vas-One' Olive tree - The present selection comprises a new and distinct seedling system of | 2009-10-08 |
20090255018 | 'VAS-ONE' olive tree - The present selection comprises a new and distinct seedling system of | 2009-10-08 |
20090255019 | Hydrangea plant named 'Glory" - A new and distinct cultivar of | 2009-10-08 |
20090255020 | CORDYLINE PLANT NAMED 'SUNRISE' - A new and distinct | 2009-10-08 |
20090255021 | BIDENS PLANT NAMED 'KLEBF07003' - A new cultivar of | 2009-10-08 |