43rd week of 2008 patent applcation highlights part 70 |
Patent application number | Title | Published |
20080263592 | SYSTEM FOR VIDEO CONTROL BY DIRECT MANIPULATION OF OBJECT TRAILS - One embodiment is a method for an interaction technique allowing users to control nonlinear video playback by directly manipulating objects seen in the video playback, comprising the steps of: tracking a moving object on a camera; recording a video; creating an object trail for the moving object which corresponds to the recorded video; allowing the user to select a point in the object trail; and displaying a frame in the recorded video that corresponds with the selected point in the object trail. | 2008-10-23 |
20080263593 | Data collection for a comprehensive program guide - Data collection for a comprehensive program guide is described. In embodiment(s), a content distributor communicates media content to client devices via an IP-based network. The client devices also receive off-air media content along with off-air program guide data that corresponds to the off-air media content. The content distributor can then receive the off-air program guide data from any one or more of the client devices to update a comprehensive program guide at the content distributor. | 2008-10-23 |
20080263594 | Schedule of a Broadcast Management System - The invention concerns schedules of a broadcast management system. In particular but not limited to, the invention concerns the managing of electronic schedules by a TV broadcaster having one or more television channels. The invention also concerns methods for creating, managing and broadcasting schedules database by a broadcast management system. The invention further concerns a datastore, a software application program and a computer system for implementing these methods. The schedule is comprised of events ( | 2008-10-23 |
20080263595 | Information processing apparatus and method and program - In the present invention, there is provide an information processing apparatus configured to present, to a user, a content guide arranged with a plurality of content frames including information for guiding predetermined content, the information processing apparatus including: a presentation control unit for presenting, to the user, if a first content guide of a first range is being presented, a second content guide formed by a second range different from the first range when a first condition is satisfied, the second content guide including a focus content frame focused as processing subject when the first condition was satisfied, instead of the first content guide. | 2008-10-23 |
20080263596 | APPARATUS AND METHOD FOR MANAGING PERSONAL SCHEDULE AND BROADCASTING PROGRAM - An apparatus for effectively managing a personal schedule and broadcasting programs includes a schedule management unit for managing a personal schedule, a broadcasting program management unit for managing basic information of broadcasting programs, an interface unit which receives an input signal, and a control unit which finds a first broadcasting program which overlaps with the personal schedule, searches for basic information for the first broadcasting program, and provides a first list including a title of the first broadcasting program, the basic information, and a display component for performing a control operation in response to an input signal. | 2008-10-23 |
20080263597 | Method and apparatus for displaying entertainment system data upon selection of a video data display - A graphical user interface (GUI) includes a first window that displays video data of a first entertainment selection. A first area of the first window displays entertainment system data that corresponds to the first entertainment selection. The GUI includes a second window that displays video data of a second entertainment selection. A second area of the second window, displays entertainment system data that corresponds to the second entertainment selection. Upon selection by a user of the respective window, entertainment system data regarding the entertainment selection corresponding to the respective window is displayed. | 2008-10-23 |
20080263598 | Optimally Selecting Tv Programs | 2008-10-23 |
20080263599 | PROGRAM GUIDE SYSTEM WITH REAL-TIME DATA SOURCES - A program guide system is provided in which an interactive television program guide that is implemented at least partially on user television equipment receives program listings data and real-time data such as sports scores, news data, and the like. The real-time data may be stored in a database maintained by the program guide, so that the program guide may access the stored real-time data at a later time. Updated program listings information may be provided to the program guide as part of the data stream in which the real-time data is provided. Unique keys may be generated for the program listings data and real-time data associated with each live event. The keys may be compared at the program guide to determine which program listings correspond to which items of real-time data. A controllable ticker may be displayed on top of a television program on the user television equipment. The controllable ticker may be sponsored. Different types of real-time data may be assigned different expiration times. When data has expired it may be removed from the database. | 2008-10-23 |
20080263600 | Systems and methods for providing remote access to interactive media guidance applications - Methods and systems for remotely accessing user equipment implementing an interactive media guidance application are provided. In particular, a method includes the steps of receiving user equipment identification information and receiving a user request from a user device indicating instructions for the user equipment. The user request is cross-referenced with an action request in a user equipment format selected from a plurality of formats to be compatible with the user equipment. The action request is transmitted for receipt by the user equipment for enabling execution of the indicated instructions. | 2008-10-23 |
20080263601 | Aeronautical satellite TV repeater - A repeater for digital satellite television broadcasts wherein the repeater receives digital television signals broadcast from a satellite using one or more antennas mounted on the outside of an aircraft; the repeater corrects for Doppler frequency offset, resulting from the aircraft and/or satellite motion, prior to re-transmission of the broadcast into the interior of the airframe. This correction is a shift of the received signal frequency; the repeater re-transmits the broadcast, in a modulated and coded format, into the inside of an aircraft, the re-transmitted signal is received by multiple users inside the aircraft; the repeated signal is in a modulated and/or coded form and consequently the multiple users of the signal must each have a receiver capable of performing the required demodulation and/or decoding. | 2008-10-23 |
20080263602 | SYSTEM FOR MANAGING DISTRIBUTED ASSETS IN AN ELECTRONIC CONTENT ASSET PUBLICATION SYSTEM - The Electronic Content Asset Publication System operates as an overlay application on the native multi-media communication network to receive individual subscriber requests for a selected electronic content asset and deliver that asset to the requesting subscriber. This system acquires, stores, publishes, distributes, accesses and processes electronic content on demand and delivers this content in the format of the subscriber's communication device over a selected multi-media communications infrastructure. This system provides access to specific subscriber-initiated electronic content assets that are of interest to the subscriber. The electronic content assets comprise individual multi-media streams, multi-media files, or streams of multi-media files initiated and published by individual subscribers rather than the mass media distributed by conventional content sources. | 2008-10-23 |
20080263603 | USER INTERFACE ARCHITECTURE FOR AN ELECTRONIC CONTENT ASSET PUBLICATION SYSTEM - The Electronic Content Asset Publication System operates as an overlay application on the native multi-media communication network to receive individual subscriber requests for a selected electronic content asset and deliver that asset to the requesting subscriber. This system acquires, stores, publishes, distributes, accesses and processes electronic content on demand and delivers this content in the format of the subscriber's communication device over a selected multi-media communications infrastructure. This system provides access to specific subscriber-initiated electronic content assets that are of interest to the subscriber. The electronic content assets comprise individual multi-media streams, multi-media files or streams of multi-media files, initiated and published by individual subscribers rather than the mass media distributed by conventional content sources. | 2008-10-23 |
20080263604 | PERSONAL CONTENT ARCHIVE OPERABLE IN AN ELECTRONIC CONTENT ASSET PUBLICATION SYSTEM - The Electronic Content Asset Publication System operates as an overlay application on the native multi-media communication network to receive individual subscriber requests for a selected electronic content asset and deliver that asset to the requesting subscriber. This system acquires, stores, publishes, distributes, accesses and processes electronic content on demand and delivers this content in the format of the subscriber's communication device over a selected multi-media communications infrastructure. This system provides access to specific subscriber-initiated electronic content assets that are of interest to the subscriber. The electronic content assets comprise individual multi-media streams, multi-media files or streams of multi-media files, initiated and published by individual subscribers rather than the mass media distributed by conventional content sources. | 2008-10-23 |
20080263605 | VIDEO DELIVERY DEVICE, VIDEO RECEIVER AND KEY FRAME DELIVERY METHOD - In this video delivery device including: a storage device storing key frame information including a key frame number included in a contents file and offset from the beginning of a file; and a delivery control unit, which executes delivery in a predetermined cycle, the delivery control unit refers to the key frame information cycle by cycle in executing the trick play, and transmits the key frame having the offset closest to the delivery time among the key frames included in the contents file. | 2008-10-23 |
20080263606 | High Quality Means to View the Internet and Dvds - The system and method for displaying Internet-sourced video programming utilizes a computer system to access and receive a video program from a video programming source. A video processor ( | 2008-10-23 |
20080263607 | Downloading and Transfer of Audio or Video Data from Video Broadcasts - A method for purchasing, downloading, and transferring audio and/or video data files through video broadcasts is disclosed. The user signals the set-top box of his video viewing system that he is interested in downloading the audio/video data file being offered. The box records the time, the channel being viewed, and, where applicable, the user ID. The box then sends this information to the controlling server when it next reports in. The server transmits the requested data, either over the Internet or by broadcasting it back to the set-top box, where it can be downloaded to a desired format. | 2008-10-23 |
20080263608 | SYSTEM AND METHOD FOR PRESENTING PROGRESSIVELY DOWNLOADED MEDIA PROGRAMS - A system and method for presenting progressively downloaded media programs is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a Set-Top Box (STB) having a controller element to determine a length of a media program from a catalog of media programs and present according to said length a portion of the media program while it is being delivered to the STB by a media delivery system. Other embodiments are disclosed. | 2008-10-23 |
20080263609 | MULTI-BAND CELLULAR SERVICE OVER CATV NETWORK - A CATV network distributing signals below 860 MHz is modified with a secondary transmission bi-directional capability above 860 MHz by adding filters to separate modified mobile-communications frequencies (above 860 MHz) from typical CATV services (below 860 MHz). CATV subscriber termination points function as extremely localized ultra-miniature cell sites within a building. Multiple cellular networks and possibly multiple providers are simultaneously accommodated over a CATV network. The modified network simultaneously handles traffic in combinations of known cellular air interface standards such as: UMTS, GSM, TDMA, CDMA and PDC. Cellular mobile radio terminals do not have to be modified. Signals traverse on non-utilized CATV frequencies. CATV active elements are modified, and new components are provided. A Cable Mounted Cellular Adapter at the CATV outlet acts as a transmit/receive unit and frequency translator for the cellular signals. | 2008-10-23 |
20080263610 | SYSTEM FOR DISTRIBUTING ELECTRONIC CONTENT ASSETS OVER COMMUNICATION MEDIA HAVING DIFFERING CHARACTERISTICS - The Electronic Content Asset Publication System operates as an overlay application on the native multi-media communication network to receive individual subscriber requests for a selected electronic content asset and deliver that asset to the requesting subscriber. This system acquires, stores, publishes, distributes, accesses and processes electronic content on demand and delivers this content in the format of the subscriber's communication device over a selected multi-media communications infrastructure. This system provides access to specific subscriber-initiated electronic content assets that are of interest to the subscriber. The electronic content assets comprise individual multi-media streams, multi-media files or streams of multi-media files, initiated and published by individual subscribers rather than the mass media distributed by conventional content sources. | 2008-10-23 |
20080263611 | VIDEO INTERFACING AND DISTRIBUTION SYSTEM AND METHOD FOR DELIVERING VIDEO PROGRAMS - A method of transmitting video programs or sequences containing reference images as I-frames including sending the video programs or the sequences to a user as divided into two parts: a first part corresponding to an original video program in which some or all of the I-frames are substituted, and a second part corresponding to the substituted I-frames and to information allowing reconstruction of the original video program from the first part. | 2008-10-23 |
20080263612 | Audio Video Synchronization Stimulus and Measurement - The present invention uses artificially generated unobtrusive audio and video synchronization events, which are essentially undetectable by normal human viewers, to send audio and video synchronization information by encoding audio and video events in normal program audio and video datastreams. By proper generation of unobtrusive audio and video synchronization events, and by proper use of modern electronics and software to automatically extract such unobtrusive synchronization events from audio and video signals, audio and video synchronization can be nearly continually provided, despite many rapid shifts in cameras and audio sources, without generating obtrusive events that distract the viewer or detract from the actual program material. At the same time, because such unobtrusive synchronization signals can be carried by standard (preexisting) audio and video transmission equipment, the improved unobtrusive synchronization technology of the present invention can be easily and inexpensively implemented because it is backward compatible with the large base of existing equipment. | 2008-10-23 |
20080263613 | Communication Framework and Connection Method for Providing a Remote Real-Time Audio and/or Video (AV) Signal - A connection method for providing a remote real-time audio and/or video (AV) signal includes: when a connection request that corresponds to a selected AV terminal is received from a user terminal, determining whether the selected AV terminal belongs to an AV terminal group, which includes a plurality of AV terminals; if it is determined that the selected AV terminal belongs to the AV terminal group, establishing connections with the selected AV terminal and at least one other AV terminal in the AV terminal group, and forwarding the AV signal of the selected AV terminal to the user terminal; and in response to a switch command from the user terminal, forwarding the AV signal of another one of the AV terminals in the AV terminal group to the user terminal. A communication framework that performs the method is also disclosed. | 2008-10-23 |
20080263614 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING BROADCAST SERVICE DATA IN A DIGITAL BROADCASTING SYSTEM - A system and method for transmitting broadcast service data in a digital broadcasting system. The method includes setting a flag indicating a service area representative of coverage where broadcast service data is provided, for each broadcast service; and transmitting broadcast service information including the flag and a Transport Stream (TS) including the broadcast service data. | 2008-10-23 |
20080263615 | INTEGRATED OPERATION MANAGEMENT SYSTEM OF VIDEO TRANSMISSION NETWORK AND OPERATION MANAGEMENT METHOD - An integrated operation management system of video transmission network operates and manages a network connecting between video transmission equipments, said integrated operation management system comprises: a detection means for detecting said video transmission equipments and transmission equipments in said network; an information collection means for collecting equipment information about the video transmission equipments and the transmission equipments detected by said detection means, path information, link information, and configuration information about a video session between said video transmission equipments; a record means for recording said system information, said path information, said link information, and said configuration information about the video session with associated each other; and a failure specification means for specifying failure points or performance degradation points from failure notifications or performance degradation notifications notified from said network based on said associated and recorded information. | 2008-10-23 |
20080263616 | Method and Device for Transferring Predictive and Non-Predictive Data Frames - A method and a device for transferring service data stream such as compressed video signal including both non-predictive and predictive data frames of a common data type. Larger non-predictive frames are transmitted on demand only ( | 2008-10-23 |
20080263617 | Portable Media Player - A portable media player has a decoder, an encoder, and a wireless transmission module. The decoder is used to convert an audio and video signal into a video stream and an audio stream. The encoder is used to encode the video stream and the audio stream to an audio and video stream signal. The wireless transmission module is used to transmit the audio and video stream signal to a display device having a wireless signal receiver. | 2008-10-23 |
20080263618 | SYSTEM FOR PRESENTING MEDIA PROGRAMS - A system for presenting media programs is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a multimedia system having a controller element to receive a request from a set-top box (STB) for an emulator that emulates a user interface of a media player, wherein the request identifies the media player, retrieve the emulator according to the identification of the media player, and transmit to the STB the emulator for emulating the user interface of the media player by way of the STB. Additional embodiments are disclosed. | 2008-10-23 |
20080263619 | Display of Enhanced Content - A decoder for use in an interactive television system in which items of enhanced content can be presented to users, the decoder: including a receiver for receiving enhanced content data, a signal including timing indications and a video stream; a memory for storing enhanced content data received by the receiver and a timing schedule indicating timings associated with the enhanced content data; a timer; playout means for presenting the video data to a user, and being responsive to the timer for presenting the enhanced content data stored in the memory to a user in accordance with the state of the timer and the timing schedule; and synchronising means for synchronising the timer in accordance with the received timing indications. | 2008-10-23 |
20080263620 | Script Synchronization Using Fingerprints Determined From a Content Stream - A content stream ( | 2008-10-23 |
20080263621 | Set top box with transcoding capabilities - A media stream transcoding set top box including an RF input interface, an RF receiver configured to receive from the RF input interface an RF signal including an original digital media stream, and produce an input digital media stream based, at least in part, on the original digital media stream, the input digital media stream including one or more channels, the channels carrying at least one media stream, a decoder configured to receive the input digital media stream and extract therefrom an uncompressed media stream, a processor configured to process the uncompressed media stream, to produce a processed media stream, an encoder configured to compress the processed media stream, to produce a compressed processed digital media stream, and an output interface configured to output the compressed processed digital media stream in a format suitable for a client device. Related apparatus and methods are also described. | 2008-10-23 |
20080263622 | Digital Broadcasting Receiving Apparatus and Method of Receiving Thererof - Provided is a digital broadcasting receiving apparatus and method. The digital broadcasting receiving apparatus includes an out-of-band signal receiving unit for receiving an out-of-band signal through a cable, a out-of-band signal transmission unit for transmitting the out-of-band signal through the cable, and a control unit for controlling a gain of the out-of-band signal of the out-of-band signal transmission unit in accordance with a level variation of the out-of-band signal received by the out-of-band signal receiving unit. | 2008-10-23 |
20080263623 | Method and System of Providing Signals - A method and system of supporting operation of customer equipment in systems having at least a portion of their signals being transported according to standards which are not supported by the customer equipment. | 2008-10-23 |
20080263624 | Contents Using Device, and Contents Using Method - A contents using device (or a terminal device) | 2008-10-23 |
20080263625 | METHOD AND SYSTEM FOR ACCESS CONTROL USING RESOURCE FILTERS - The present description refers in particular to a method, a system, and a computer program product for access control using resource filters for a strict separation of application and security logic. The computer-implemented method for access control may include receiving at least one access request to at least one resource from an application; providing a resource hierarchy for the at least one resource, the resource having at least one resource class, wherein the resource hierarchy is defined in a single resource; providing a policy comprising at least one access control rule for accessing at least one element of the at least one resource class; verifying the at least one access request based on the policy through an authorization service; and processing the at least one access request through a service interface. | 2008-10-23 |
20080263626 | Method and system for logging a network communication event - A method of logging a network communication event includes a step of identifying a network communication event within a communication leaving a computer network. The method also includes steps of identifying a network address associated with the communication, and associating a user identity with the network address. It should be appreciated that the network address may include a dynamic network address. In addition, information is logged associating the user identity with the network communication event. | 2008-10-23 |
20080263627 | System and Method for Identifying a Cookie as a Privacy Threat - A system and method for identifying a cookie as a privacy threat is disclosed. The system and method include receiving a request to install a cookie. A privacy policy associated with the cookie is also received, and that privacy policy may be evaluated against a set of predefined criteria. Based on this evaluation, the cookie may be determined to be a privacy threat. | 2008-10-23 |
20080263628 | MANAGING COMMUNICATIONS BETWEEN ROBOTS AND CONTROLLERS - The present disclosure is directed to a system and method for managing communications with robots. In some implementations, a computer network, where operators interface with the network to control movement of robots on a wireless computer network includes a network arena controller and a plurality of robot controllers. The network arena controller is configured to provide firewall policies to substantially secure communication between robot controllers and the associated robots. Each controller is included in a different robot and configured to wirelessly communicate with the network arena controller. Each robot controller executes firewall policies to substantially secure wireless communication. | 2008-10-23 |
20080263629 | METHODS AND SYSTEMS FOR COMPLETING, BY A SINGLE-SIGN ON COMPONENT, AN AUTHENTICATION PROCESS IN A FEDERATED ENVIRONMENT TO A RESOURCE NOT SUPPORTING FEDERATION - A system for distributed authentication includes a client machine, in a first domain in a federation, that receives from a user a first set of authentication credentials. The system also includes an intermediate machine in a second domain in the federation, a server, also in the second domain, a password management program executing on the server and a non-federated resource. The intermediate machine authenticates the user responsive to receiving the first set of authentication credentials and identifies a second set of authentication credentials. The server in the second domain authenticates the user, responsive to the second set of authentication credentials. The password management program, executing on the server, retrieves a third set of authentication credentials associated with the user. The non-federated resource authenticates the user, responsive to receiving, from the password management program, the third set of authentication credentials. | 2008-10-23 |
20080263630 | Confidential File Protecting Method and Confidential File Protecting Device for Security Measure Application - A confidential file protecting method for a security measure application is provided that can restrain degradation in the performance of a security measure application, and surely protect a confidential file. The confidential file protecting method for a security measure application according to the present invention is characterized by comprising: a first step of communicating between a authentication module for authenticating an application requesting access to the confidential file and a communication module implemented in the security measure application, and authenticating the application as an application permitted to access the confidential file and recording the application as an authenticated application in a management table if the communication module sends back a valid response code; and a second step by said authentication module, of permitting the request to access to said confidential file to access if the access requesting application is an authenticated application that has been recorded in said management table. | 2008-10-23 |
20080263631 | USER PROFILE, POLICY, AND PMIP KEY DISTRIBUTION IN A WIRELESS COMMUNICATION NETWORK - An authentication server may be adapted to (a) authenticate an authentication peer seeking to establish communications via a first network access node; (b) retrieve user profile information associated with the authentication peer; and/or (c) send the user profile information to a network gateway node that facilitates communication services for the authentication peer. A PMIP network node may be adapted to (a) provide wireless network connectivity to an authentication peer via a first network access node; (b) provide a PMIP key to both ends of a PMIP tunnel between the first network access node and a PMIP network node used to provide communications to the authentication peer; (c) provide the PMIP key to a first authenticator associated the first network access node; (d) receive a request at the PMIP network node from a requesting entity to reroute communications for the authentication peer; and/or (e) verify whether the requesting entity knows the PMIP key. | 2008-10-23 |
20080263632 | System and Method for Managing Use and Access of a Communication Network - The present invention provides a system and method for managing access and use of a communication network or service or service. When a user requests the use of a communication network or service and this network is experiencing a level of use which is above a predetermined threshold, one or more incentives can be offered to the user in return for deferring access to the communication network or service for a predetermined period of time. In this manner, usage of the communication network or service can be managed such that variability of the usage level over time can be reduced. | 2008-10-23 |
20080263633 | Systems and Methods of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision and/or Interoperability Features - According to some embodiments of the present invention, a system, apparatus and method of network operation and information processing, including data acquisition, data processing, data provision, and/or data interoperability features is presented. In some exemplary embodiments, the method includes registering users logging-on to a computer network and gathering user-related information from users. In one or more embodiments, user-profile and location-centric information for each user may be gathered and/or processed in connection with processing targeting and content information. | 2008-10-23 |
20080263634 | Method and System for Providing On-Demand Media Streaming from a User's Own Library to a Receiving Device of the User - A system and method are provided for on-demand media streaming from a user's own media library to a user's receiving device that may be located in a different location from that where the media library is stored. The present invention provides an out-of-the box on-demand media server device that may be used by itself, in conjunction with a personal computer, or in conjunction with a personal home stereo system or video system. The on-demand media server includes security mechanisms that allow a user to establish a private server that only the user may communicate with and gain access to the user's media library. In one particular embodiment, a smart card or other removable media are used as a security device to ensure that access to the media files on the user's personal on-demand media streaming server is limited to the user. In addition, the system and method provides an on-demand conversion of the media in the user's personal media library to an appropriate format. | 2008-10-23 |
20080263635 | POLICY STORE - A method for obtaining resource restriction information of a client application's resource includes: receiving authentication information from one of a plurality of authentication modules; identifying a client application's resource and authentication module based on the received authentication information; locating a policy store that is associated with the identified client application's resource, the policy store containing resource restriction information for each of the plurality of authentication modules; and obtaining the resource restriction information associated with the identified authentication module from the policy store. | 2008-10-23 |
20080263636 | METHOD AND SYSTEM FOR VALIDATING ACTIVE COMPUTER TERMINAL SESSIONS - Systems, methods and program codes are provided wherein an analyzer analyzes input from a terminal device; ascertains human-like behavior; and terminates an active session, generates a time-out warning, manipulates an idle session timer or presents a challenge in response to a humanness likelihood determination or to a challenge result. In one aspect a keystroke analyzer and a command sequence analyzer determine whether the terminal device input is likely from a human user or from an automaton. In another aspect a Completely Automated Public Turing Test to tell Computers and Humans Apart challenge is presented. Timing characteristics include maximum generation rate, burstiness, and keystroke sequence delays, and command characteristics include a no-action-required characteristic and a query characteristic. A command sequence analyzer may have an affinity for a command line interface. Weighting algorithms or artificial intelligence routines may be applied to humanness likelihood outputs. | 2008-10-23 |
20080263637 | Information Distribution System and Terminal Device - A terminal device that can, when delivering information to an other terminal device, control delivery of the information from a primary delivery destination to a secondary delivery destination is provided. The terminal device stores a primary delivery condition regarding whether delivery of the information to the primary delivery destination is prohibited or permitted, and trustability showing a degree of trust of a user in the primary delivery destination. The terminal device judges whether or not to deliver the information to the primary delivery destination, by using the primary delivery condition. When judging to deliver the information, the terminal device calculates a secondary delivery condition using the trustability and the primary delivery condition, the secondary delivery condition regarding whether delivery of the information from the primary delivery destination to the secondary delivery destination is prohibited or permitted. The terminal device sends the generated secondary delivery condition to the primary delivery destination. | 2008-10-23 |
20080263638 | AUTHORIZATION FOR ACCESS TO WEB SERVICE RESOURCES - A web service includes a protected resource. A requester requests access to the protected resource by sending a request to the web service. The web service prevents access to the web service until the request has been authorized by an authorizer. After the request has been authorized by the authorizer, the web service allows the requester to access the protected resource. | 2008-10-23 |
20080263639 | System for securing inbound and outbound data packet flow in a computer network - A method provides for control of access to network resources. A virtual identity machine resides in the network and is pre-authorized to access certain network resources. End users desiring access to those network resources attempt to logically connect to the virtual identity machines. If the logical connection attempt is successful, then the end user assumes the virtual identity of the virtual identity machine and has access to all of the same information that was available to the virtual identity machine. | 2008-10-23 |
20080263640 | Translation Engine for Computer Authorizations Between Active Directory and Mainframe System - The invention provides a method and system of implementing a high performance “non-RACF external security-manager product,” which maintains and translates a merged single source of authorizations to both mainframe and Microsoft Windows Active Directory (AD) systems. In one embodiment, a method comprises generating at a server computer access information for a mainframe computer indicative of mainframe authorization for a set of users, receiving from the mainframe computer information indicative of an authorization request, the information indicative of the authorization request identifying a user trying to access the mainframe computer, and sending at least a portion of the access information from the server computer to the mainframe computer, the portion of the access information including mainframe access information for the user. | 2008-10-23 |
20080263641 | APPARATUS FOR FACILITATING TRANSACTIONS BETWEEN THIN-CLIENTS AND MESSAGE FORMAT SERVICE (MFS)-BASED INFORMATION MANAGEMENT SYSTEM (IMS) APPLICATIONS - An apparatus is disclosed for facilitating conversational and non-conversational transactions between thin-clients and MFS-based IMS applications. The apparatus stores conversation attributes associated with a conversational transaction between a thin-client and an MFS-based IMS application, the conversation attributes comprising connection information and conversation-specific information. Next, one or more transaction messages from the thin-client are preprocessed based on a transaction message type. The stored conversation attributes are updated in response changes in the conversation attributes caused by the one or more transaction messages. Then, a conversation output message is formatted for the thin-client. The apparatus may include a security module that authenticates user, a connection module that establishes a connection with an MFS-based IMS application, a state module that preserves and maintains conversation attributes, and a control module to process a transaction message having one or more transaction message types. | 2008-10-23 |
20080263642 | SYSTEMS AND METHODS FOR A COMPUTER NETWORK SECURITY SYSTEM USING DYNAMICALLY GENERATED PASSWORDS - Methods and systems for a computer network security system are disclosed. A computer security system includes at least one computer configured to be operably coupled to a remote network and having an application program comprising a login scripts database and a variable database. The security system further includes a client device configured to be operably coupled to the computer to allow for the use of the application program. The application program is configured to dynamically generate a password upon attempting to access a remote network. Furthermore, the application program may update passwords within a user's login scripts database. Additionally, a remote network may support the security system and may include at least one computer system having an administrator application program installed thereon and configured to receive a network device and an administrator device. A network administrator may use the network and administrator device to monitor and modify contents of the security system. | 2008-10-23 |
20080263643 | METHOD AND SYSTEM FOR PASSWORD APPLICATION - Methods, systems, and program products for a client application provide child passwords mapped to a parent password authorized for login to a secure network resource server. A child user logs in to the client application by entering the child password. When a child user properly requests a secure resource from the secure network resource server, the client application uses the authorized parent password to login to the secure server and retrieve a secure resource without communicating the child password to the secure server. The child user login session is administered by the local application pursuant to access rules or limitation parameters associated with the child password. Child passwords may be set to expire. The client application may also monitor secure server access by a child user; monitored use may also be reported, and an access rule or password limitation parameter may be revised in response to monitoring and use reporting. | 2008-10-23 |
20080263644 | FEDERATED AUTHORIZATION FOR DISTRIBUTED COMPUTING - Distributed computing systems can exchange authorization information in a manner which alleviates the need for a receiving system to utilize any external systems when making an authorization decision. The trusted authorization provider can digitally sign authorization snippets of information. The requestor sends the digitally signed authorization snippet with the request. Because both computing processes trust the same authorization provider, the servicer of the request is able to grant or deny access in a completely autonomous fashion without having to rely on external resources for authorization. A requesting process can determine the digitally signed authorization snippet corresponding with the request. The servicing process can rely on the digitally signed authorization snippet to perform the authorization. | 2008-10-23 |
20080263645 | PRIVACY IDENTIFIER REMEDIATION - A secure server installation is provided that abstracts credit card identifiers from its server, network, application and database environments, thus reducing investment in securing, segregating and/or isolating these environments in their entirety. The secure server installation intercepts credit card transactions sent from front end applications to back end applications, and forwards tokens in replacement of credit card identifiers for processing by the back end applications. | 2008-10-23 |
20080263646 | SYSTEMS AND METHODS FOR A COMPUTER NETWORK SECURITY SYSTEM USING DYNAMICALLY GENERATED PASSWORDS - Methods and systems for a computer network security system are disclosed. A computer security system includes at least one computer configured to be operably coupled to a remote network and having an application program comprising a login scripts database and a variable database. The security system further includes a client device configured to be operably coupled to the computer to allow for the use of the application program. The application program is configured to dynamically generate a password upon attempting to access a remote network. Furthermore, the application program may update passwords within a user's login scripts database. Additionally, a remote network may support the security system and may include at least one computer system having an administrator application program installed thereon and configured to receive a network device and an administrator device. A network administrator may use the network and administrator device to monitor and modify contents of the security system. | 2008-10-23 |
20080263647 | System and Method For Providing Network Device Authentication - A secure framework for wireless sensor networks. The framework provides a system and method for providing network device authentication. The system and method comprises installing a unique device key in a network device and creating a chain of keys, wherein each subsequent key is encrypted using the previous key. The method executes an authentication process for storing and issuing keys, wherein the authentication process uses a unique device key to install a device site key in the network device and uses the device site key and the unique device key to authenticate the network device for communicating with a wireless network router, wherein the wireless network router creates a unique network-device-router key. The unique network-device-router key is used to authenticate the network device for communicating over the wireless network using an encrypted network session key and allows secure encrypted link-layer communications over the wireless network. | 2008-10-23 |
20080263648 | SECURE CONFERENCING OVER IP-BASED NETWORKS - Methods and systems for secure conferencing over an IMS network or other networks include sending request by at least one user to access to an application server. The user is validated using a validation coupon provided by the user equipment followed by identifying and allowing the user equipment to download a valid media client. Conference data is encrypted and transmitted to the user equipment, and processed by the media client. Typically, the encrypted conference data is decrypted by the media client and communicated to a user interface presentation to the user. In some examples, the conference data is validated prior to downloading to the user equipment. | 2008-10-23 |
20080263649 | Personal Token and a Method for Controlled Authentication - The invention relates to a personal token ( | 2008-10-23 |
20080263650 | ENHANCED CROSS-SITE ATTACK PREVENTION - Efficient cross-site attack prevention, in which web pages are stored on a site, the web pages being organized into entry pages that do not accept input, and protected pages that are not entry pages. A request is received from a user application to receive a requested web page, the request including a referrer string indicative of a referring web page, and identification data. It is determined whether the requested web page is an entry page or a protected page, and it is further determined, if the requested web page is determined to be a protected page, if the user application is authorized based upon the identification data, and if the referring web page is stored on the site based upon the referrer string. The requested web page is transmitted to the user application if the user application is determined to be authorized and if the referring web page is determined to be stored on the site, and the request is redirected to an entry page if the user application is determined to be not authorized or if the referring web page is determined to be not stored on the site. | 2008-10-23 |
20080263651 | Integrating operating systems with content offered by web based entities - Example embodiments are provided for integrating operating systems with content offered by internet based entities. | 2008-10-23 |
20080263652 | REQUEST-SPECIFIC AUTHENTICATION FOR ACCESSING WEB SERVICE RESOURCES - Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource. | 2008-10-23 |
20080263653 | APPARATUS, SYSTEM, AND METHOD FOR ESTABLISHING A REUSABLE AND RECONFIGURABLE MODEL FOR FAST AND PERSISTENT CONNECTIONS IN DATABASE DRIVERS - An apparatus, system, and method for establishing a reusable and reconfigurable trusted connection within a trusted context. The invention enhances interoperability with any existing authentication methods including the Kerberos, the DCE, and a combination of a user name and a password. The present invention includes common interfaces in a database driver for a middleware server to obtain a trusted connection. The invention enhances trusted context interoperability by allowing different types of trusted connections such as a normal connection, a pooled connection, or even a distribution transaction connection. The database driver generates unique identifiable information once a trusted connection is authenticated that can be utilized to reuse and reconfigure the trusted connection without re-authentication. The present invention allows various types of trusted connections to be established through any authentication mechanisms and allows those trusted connections to be reused and reconfigured, even by a different client, in a fast and persistent way. | 2008-10-23 |
20080263654 | Dynamic security shielding through a network resource - Architecture for facilitating access of remote system software functionality by a host machine for the redirection of incoming and/or outgoing host traffic through the remote system for protection services to the host machine. The host machine can gain the benefits of effective protection software such as firewall, intrusion protection software, and anti-malware services, of the remote machine. The host machine can choose to exercise traffic redirection when there is a risk of being compromised, and then revert back to direct communications when the risk has been averted. The host machine takes advantage of the resources available on the remote machine in substantially realtime with minimal disruption to the host and/or the remote machine operations. This facilitates widespread and temporary protection of network systems for a more secure working environment and improved customer experience. | 2008-10-23 |
20080263655 | INFORMATION-PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION-PROCESSING APPARATUS, AND STORAGE MEDIUM - The present invention can control a logout procedure of each user according to an operation state and provides an information-processing apparatus with enhanced security and excellent usability. A method for controlling an information-processing apparatus capable of maintaining a state in which a plurality of users has been logged in to the information-processing apparatus comprises causing a display unit to switch an operation screen for a user who currently logs in to the information-processing apparatus between an active state and an inactive state where the user can or cannot operate the screen respectively; automatically logging out the user of the information-processing apparatus when a predetermined time has elapsed; and controlling so as not to automatically log out a user whose operation screen is in the inactive state of the information-processing apparatus when the predetermined time has elapsed. | 2008-10-23 |
20080263656 | Device, System and Method of Performing an Administrative Operation on a Security Token - Some demonstrative embodiments of the invention include a method, device and/or system of performing an administrative operation on a user token. The method may include, for example, providing to an admin token user-identification data identifying the user token; receiving from the admin token an administrator code to enable performing the administrative operation; and providing the administrator code to the user token. Other embodiments are described and claimed. | 2008-10-23 |
20080263657 | Control of Media Components in a Session - A method for applying control to a plurality of media components in a media session, comprising determining a level of control for at least one component, and applying the determined level of control to said at least one component. | 2008-10-23 |
20080263658 | USING ANTIMALWARE TECHNOLOGIES TO PERFORM OFFLINE SCANNING OF VIRTUAL MACHINE IMAGES - Methods and systems for scanning a virtual machine image. The virtual machine image may be stored as a collection of one or more virtual hard disk files. The virtual machine image may be stored by taking the virtual machine off-line or may be stored by taking a checkpoint of the virtual machine while the virtual machine is on-line. The virtual machine image is rendered to file-system data. Rendering the virtual machine image to file-system data may comprise mounting the virtual machine image's virtual hard disk drives. An anti-malware engine is invoked to scan the exposed file-system data, and data indicative of the scanning may be stored. | 2008-10-23 |
20080263659 | SYSTEM AND METHOD FOR DETECTING MALICIOUS MOBILE PROGRAM CODE - A system and method of detecting malware. A program file is received and analysis performed to identify URLs embedded in the program file. The URLs are categorized as a function of a URL filter database and a malware probability is assigned to each URL identified. A decision is made on how to dispose of the program file as a function of the malware probability of one or more of the URLs identified. In one example approach, a malware type is also assigned to the program file as a function of one or more of the URLs identified. | 2008-10-23 |
20080263660 | Method, Device and Program for Detection of Address Spoofing in a Wireless Network - The invention relates to a method, device and program for detection of address spoofing in a wireless network. According to the invention, a sensor is installed in order to capture frames transmitted over the wireless network which have an address field comprising an address of a network access point. The captured frames are analyzed in order to establish a list of stations that are associated with the access point. Another list of stations associated with the access point is obtained from the latter. The two station lists are compared in order to detect possible access point address spoofing. | 2008-10-23 |
20080263661 | DETECTING ANOMALIES IN SIGNALING FLOWS - The present invention relates to a method of detecting anomalies in signaling flows in a communication device connected to a database. In accordance with the method, a communication device receives ( | 2008-10-23 |
20080263662 | SYSTEM AND METHOD FOR FUZZY MULTI-LEVEL SECURITY - An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range. | 2008-10-23 |
20080263663 | ANOMALY DETECTION BASED ON DIRECTIONAL DATA - Properly detects an anomaly on the basis of directional data that are obtained in sequence from a monitored object. An anomaly detecting method includes: sequentially generating directional data indicating a feature of each piece of monitored data correspondingly to the monitored data which are input in sequence; calculating the dissimilarity of the directional data to a reference vector; updating a moment of the distribution of the dissimilarity appearing when the directional data is modeled with a multi-dimensional probability distribution, based on the moment already corresponding to the monitored data; calculating a parameter determining the variance of the multi-dimensional probability distribution, on the basis of the moment; calculating a threshold of the dissimilarity on the basis of the multi-dimensional probability distribution the variance of which is determined by the parameter; and detecting an anomaly in the monitored data that corresponds to the dissimilarity if the dissimilarity exceeds the threshold. | 2008-10-23 |
20080263664 | METHOD OF INTEGRATING A SECURITY OPERATIONS POLICY INTO A THREAT MANAGEMENT VECTOR - The invention relates to the integration of a security operations policy into a threat management vector. In one embodiment, a method according to the invention includes receiving at least one threat management vector (TMV) from a TMV generator, the TMV including a root vulnerability vector, at least one system vector, at least one system level vector, and a countermeasures payload including intrusion detection countermeasures (IDC), intrusion response countermeasures (IRC), and vulnerability remediation countermeasures (VRC); forwarding to the TMDC a TMV including only the root vulnerability vector, the at least one system vector, and the at least one system level vector; propagating the TMV through a hierarchy of policy mediation regions (PMRs), each PMR being operable to refine at least one of the IDC, the IRC, and the VRC; refining at least one of the IDC, the IRC, and the VRC to conform to a security operations policy of the PMR; forwarding the refined TMV to a threat management domain controller (TMDC); recording refinements made by each PMR to each of the IDC, the IRC, and the VRC; transferring the recorded refinements to a threat management control book (TMCB); and marking the refined TMV as having been refined by each PMR making a refinement. | 2008-10-23 |
20080263665 | NETWORK ATTACK DETECTION USING PARTIAL DETERMINISTIC FINITE AUTOMATON PATTERN MATCHING - This disclosure describes techniques for determining whether network traffic contains one or more computer security threats. In order to determine whether a symbol stream conforms to the symbol pattern, a security device stores a full deterministic finite automaton (fDFA) that accepts streams of symbols that conform to the symbol pattern. The security device also creates a partial deterministic finite automaton (pDFA) that includes nodes that correspond to the nodes in the fDFA that have the highest visitation levels. The security device processes each symbol in the symbol stream using the pDFA until a symbol causes the pDFA to transition to a failure node or to an accepting node. If the symbol causes the pDFA to transition to the failure node, the security device processes the symbol and subsequent symbols in the symbol stream using the fDFA. | 2008-10-23 |
20080263666 | METHOD AND APPARATUS FOR DETECTING PORT SCANS WITH FAKE SOURCE ADDRESS - A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan. | 2008-10-23 |
20080263667 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND RECORDING MEDIUM USED THEREWITH - Encoded data that is obtained by embedding subdata in advertisement information and embedding the subdata-embedded advertisement information in main data is provided to a user. At the user side, the encoded data is decoded to reproduce the main data and the subdata-embedded advertisement information, and the subdata-embedded advertisement information is decoded to reproduce the advertisement information and the subdata embedded therein. | 2008-10-23 |
20080263668 | Automatic Client Responses To Worm Or Hacker Attacks - A system in which a networked device automatically evaluates hacker attack notification information and, based thereon, selects and executes responses to the attack. The notification may include information such as the address of the infected system, identification of the specific worm, and a list of vulnerable applications and operating systems. The evaluation is based on factors including criticality and vulnerability of applications running on the system and connectivity of the device. A variety of automatic responses can be selected, including notification of network administration, shutdown of the device or services running on the device, updating and activation of anti-virus software, and selective handling of data sent from the address of the suspect network device. The selection of responses can occur automatically based on rules input during setup or by intervention of network administration. | 2008-10-23 |
20080263669 | SYSTEMS, APPARATUS, AND METHODS FOR DETECTING MALWARE - Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity approximations and weightings for each of a plurality of blocks within the known malware file, creating a second fuzzy fingerprint of a file to be checked, the second fuzzy fingerprint including a second set of calculated complexity approximations and weightings for each of a plurality of blocks within the file to be checked, comparing the second fuzzy fingerprint to the first fuzzy fingerprint, calculating a similarity probability for each of the block-wise comparisons, the calculation including a respective weightings for each of the plurality of blocks within the known malware file and for each of the plurality of blocks within the file to be checked, and the calculation including a distance between the compared blocks; and calculating an overall similarity probability for the plurality of blocks compared. | 2008-10-23 |
20080263670 | Methods, software and apparatus for detecting and neutralizing viruses from computer systems and networks - Methods, software or computer programs, and apparatus for detecting viruses and mitigating their harm to computers communicating through a gateway node to another network are disclosed. Upon detection of a virus in an incoming data stream or plurality of data packets directed to a gateway device or node, the data requesting recipient is notified and provided with a plurality of pre-defined virus handling action options. If the recipient, or designated proxy, fails to select an action option, then a random selection is made. If a selection is made, then that selection, to the exclusion of other action options, is carried out. Thus, the recipient is empowered to dynamically select, as circumstances dictate and without future prejudice, the appropriate response upon detection of a particular virus. Action options may include data encryption and forwarding with recipient notification, or where email is the vector, attachment removal and location link insertion may be used. Software embodiments of the invention provide the machine readable instructions to carry out the methods according to the invention. | 2008-10-23 |
20080263671 | System and Method for Providing Application Penetration Testing - A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed. | 2008-10-23 |
20080263672 | Protecting sensitive data intended for a remote application - A method and apparatus is provided of protecting sensitive data input via an input device of a processing platform from a data logger, the sensitive data being user account data intended for a remote application. To protect the sensitive data, the data is used as a password in a secure, password-authenticated key agreement protocol executed between a security entity and the remote application, the security entity being installed in the input device or in secure communication therewith. In one preferred embodiment the input device is a keyboard and the security entity is a unit installed in the keyboard and selectively operable in a pass-through mode and a security mode. | 2008-10-23 |
20080263673 | System and method for delivering promotional and information content during a computer-based application and collecting impression metrics - The present invention includes a system and method for displaying information content, such as advertisements, during a computer-based application, for example, an online video game or any Internet-enabled application, and for collecting user impression metrics associated with the information content, even if the application is not connected to the Internet or an associated application server. The system and method include a campaign management system for receiving information content to be displayed during a computer-based application, including a pack manager application for creating an information content pack containing the information content in content sets, a content delivery network to distribute the information content pack, and a client software development kit that downloads the information content pack to display the information content during the computer-based application, and collects and sends user impression metrics associated with the information content back to the campaign management system for reporting. | 2008-10-23 |
20080263674 | Wireless network system, information providing apparatus and wireless terminal - A wireless network system, information providing apparatus and wireless terminal that can prevent the leak of information such as an address of the wireless terminal. A wireless network system includes an information providing apparatus that provides service information over a wireless network, and multiple wireless terminals each of which receives the service information provided from the information providing apparatus. In this case, the information providing apparatus includes destination possibility data in the service information, and each of the wireless terminals determines the destination possibility that the destination of the provided service information is the wireless terminal based on the destination possibility data included in the provided service information accepts the provided service information only if it is determined that there is the destination possibility. | 2008-10-23 |
20080263675 | System and method of network printing - A method of printing a document, the method includes assigning a permission classification to a document to be printed; assigning a user permission profile to a user; and determining from the user permission profile and the permission classification of the document whether the user is authorized to print the document. Another method of printing a document includes assigning a permission classification to a document to be printed; assigning a printer permission profile to each of a number of network printers; and determining from the permission profile of the network printer and the permission classification of the document whether a the network printer is authorized to print the document. | 2008-10-23 |
20080263676 | SYSTEM AND METHOD FOR PROTECTING DATA INFORMATION STORED IN STORAGE - A system and method are provided for protecting data information stored in a storage medium. The system includes a memory unit which is divided into a plurality of storage regions in which data information is stored; a domain unit which includes a plurality of OS domains, which are access subjects, and loads the data information stored in the storage regions that are accessed by the OS domains; and a control unit which controls access of the domain unit to the memory unit. | 2008-10-23 |
20080263677 | Client Health Validation Using Historical Data - Implementations of client health validation using historical data are described. In one implementation, historical data on a client, such as a laptop, attempting to access a network is scanned. The historical data can come in many forms, including cookies and application data caches saved on the client. The historical data can be used to assess a health of the client. For example, if historical data stored in an application data cache indicates interactions between the client and a website known to disseminate malicious agents, the client can be assessed to have unacceptable health. Alternately, if the historical data indicates that the client has not interacted with enough suspicious sources to constitute a danger to the network, the client can be assessed to have acceptable health. In such a case, the client can be allowed to access the network. | 2008-10-23 |
20080263678 | Path Protection - A software configuration management system receives a request to prevent code change to code within a filesystem path. The system also receives parameters for a trigger-based rule to protect code within the filesystem path against changes. Metadata for the trigger-based rule is extracted and dumped into a file. The file is replicated to a server. When the server receives a submission to change code within the filesystem path, the server compares the submission against the metadata in the replicated file. The submission is denied based at least in part on the trigger-based rule with which the metadata in the replicated file is associated. | 2008-10-23 |
20080263679 | STORING INFORMATION IN CLOSED COMPUTING DEVICES - Mechanisms for securely storing unsigned information in closed computing devices are disclosed. Unsigned media entities, such as independently developed games, can be stored in a closed computing device, such as a gaming console. The storing of media entities can include preventing any content, whether residing on the closed console or remotely, from accessing the unsigned media entities. In this aspect, unsigned media entities can be isolated from such content on a per unsigned media entity basis (the media entity being the unit of isolation). Moreover, the media entities can be stored in directory structures that logically isolate the unsigned media entities from any other content. The closed computing device can also use a directory structure to guarantee that a specified signed loader can load unsigned media entities. Once stored, the media entities can also be secured from tampering by using a unique hardware key associated with the closed computing device. | 2008-10-23 |
20080263680 | Portable Electronic Entity Capable of Receiving Broadcast Multimedia Data Flow - A portable electronic entity includes a communication interface ( | 2008-10-23 |
20080263681 | System and Method for Transferring Media Rights Under Predetermined Conditions - A method for distributing media rights includes obtaining ( | 2008-10-23 |
20080263682 | SYSTEM FOR PREVENTING UNAUTHORIZED ACTIVATION OF COMPUTER - An exemplary network system includes a remote computer and a network server. The remote computer includes a baseboard management controller (BMC), a south bridge chipset, a power button, and a switching circuit. The switching circuit has a control terminal connected to an output of the BMC, a power terminal connected to a power supply, and also connected to a SB_PWRBTN pin of the south bridge chipset, and a ground terminal connected to ground via the power button. The network server is connected to an input of the BMC of the remote computer, the network server outputs a control signal for forbidding activating the remote computer, the BMC receives the control signal and outputs a low level voltage signal to turn off the transistor, and the remote computer can not be activated. | 2008-10-23 |
20080263683 | Megsin/Rage/Inos-Overexpressing Renal Disease Model Animals and Methods for Evaluating Compounds Using the Model Animals - Triple Tg (megsin/RAGE/iNOS-Tg) was created by crossing megsin-Tg with RAGE/iNOS-Tg. The megsin/RAGE/iNOS-Tg develops marked pathologies of diabetic nephropathy unfound in conventional models at early stages, and various pathological conditions such as glomerular hypertrophy were observed uniformly in the megsin/RAGE/iNOS-Tg mice. In addition, it was also found that animals exhibiting these symptoms were useful as a disease model animal for diabetic nephropathy. Specifically, the disease model animals of the present invention overexpress the megsin gene, a gene encoding the receptor for advanced glycation end-products, and an inducible nitric oxide synthase gene. As a result, accompanying kidney function disorders of glomerular failure develop at early stages. | 2008-10-23 |
20080263684 | Pik4ca As Modifier of the Rac Pathway and Methods of Use - Human PIK4CA genes are identified as modulators of the RAC pathway, and thus are therapeutic targets for disorders associated with defective RAC function. Methods for identifying modulators of RAC, comprising screening for agents that modulate the activity of PIK4CA are provided. | 2008-10-23 |
20080263685 | Animal model, cells, and treatment for malignant melanoma - The present invention provides transgenic non-human animal models and cell lines which express a metabotropic glutamate receptor 1 in a melanocyte-specific manner and, as a result, exhibit a predisposition to the development of melanoma. The invention further teaches methods of using the transgenic animals and cell lines to identify therapeutic agents. Diagnostic methods for detecting a melanoma are also provided. | 2008-10-23 |
20080263686 | ANIMAL MODEL FOR PIGMENT SPOTS - An animal model for pigment spots in which the formation of pigment spots in human skin is faithfully simulated is provided. An animal model for pigment spots, wherein a black person's skin is grafted onto a non-human animal, is provided. | 2008-10-23 |
20080263687 | CHIMERIC RETINOID X RECEPTORS AND THEIR USE IN A NOVEL ECDYSONE RECEPTOR-BASED INDUCIBLE GENE EXPRESSION SYSTEM - This invention relates to the field of biotechnology or genetic engineering. Specifically, this invention relates to the field of gene expression. More specifically, this invention relates to a novel ecdysone receptor/chimeric retinoid X receptor-based inducible gene expression system and methods of modulating gene expression in a host cell for applications such as gene therapy, large-scale production of proteins and antibodies, cell-based high throughput screening assays, functional genomics and regulation of traits in transgenic organisms. | 2008-10-23 |
20080263688 | Hafnia Phytase - The present invention relates to isolated polypeptides having phytase activity and isolated polynucleotides encoding the polypeptides. The polypeptides are related to a phytase derived from | 2008-10-23 |
20080263689 | Methods for Identifying Modulators of Protein Kinase C-Epsilon (Pkce) and Method of Treatment of Aberrant Glucose Metabolism Associated Therewith - The present invention provides novel cell-based and animal-based assays for determining antagonists of PKCε and uses of the isolated antagonist compounds for modulating insulin clearance and secretion. The invention also provides novel animals and cells such as animals and cells suitable for use in the assays. | 2008-10-23 |
20080263690 | NEUREGULIN-1 TRANSGENIC MOUSE AND METHODS OF USE - Nucleic acids comprising the neuregulin 1 gene (NRG1) and encoding NRG1 polypeptides are disclosed. Also described are related nucleic acids encoding NRG1 polypeptides; NRG1 polypeptides; antibodies that bind to NRG1 polypeptides; methods of diagnosis of susceptibility to schizophrenia; assays for agents that alter the activity of NRG1 polypeptide or which identify NRG1 binding agents, and the agents or binding agents identified by the assays; NRG1 therapeutic agents, including the NRG1 nucleic acids, NRG1 polypeptides, or agents that alter the activity of an NRG1 polypeptides; pharmaceutical compositions comprising the NRG1 therapeutic agents; as well as methods of therapy of schizophrenia. Novel haplotypes with a common core haplotype in affected individuals are described, as well as their use in methods for screening for susceptibility to schizophrenia. Also described are hypomorphic mice for use in identifying phenotypes associated with schizophrenia, as well as for use in assessing agents of interest for neuroleptic activity and for potential therapeutic use for treatment of schizophrenia. | 2008-10-23 |
20080263691 | Compositions And Methods For Regulating Cardiac Performance - The present invention relates to cardiac performance, in particular to regulating cardiac performance via recombinant troponin I (TnI) protein and nucleic acids encoding recombinant TnI. The present invention provides nucleic acids encoding gain of function TnI proteins (e.g., cTnlA164H), vectors containing such nucleic acids, host cells containing such vectors, transgenic animals carrying a gain of function TnI protein (e.g., a cTnlA164H transgene), and therapeutic agents (e.g., comprising recombinant TnI, TnI analogues, synthetic TnI, or the like) or agents for gene therapy of heart failure or disease for research and therapeutic uses. | 2008-10-23 |