12th week of 2012 patent applcation highlights part 62 |
Patent application number | Title | Published |
20120072917 | METHOD AND APPARATUS FOR DISTRIBUTING COMPUTATION CLOSURES - An approach is provided for backend based computation closure oriented distributed computing. A computational processing support infrastructure receives a request for specifying one or more processes executing on a device for distribution over a computation space. The computational processing support infrastructure also causes, at least in part, serialization of the one or more processes as one or more closure primitives, the one or more closure primitives representing computation closures of the one or more processes. The computational processing support infrastructure further causes, at least in part, distribution of the one or more closure primitives over the computation space based, at least in part, on a cost function. | 2012-03-22 |
20120072918 | GENERATION OF GENERIC UNIVERSAL RESOURCE INDICATORS - Various arrangements for creating and using generic universal resource indicators are presented. To create a generic universal resource indicator, one or more parameters of a universal resource indicator may be identified. An interface that permits a parameter of the one or more parameters to be selected and mapped to a variable may be presented. A selection of the parameter for mapping may be received. An indication of the variable to map to the parameter of the selection may also be received. The generic universal resource indicator having a generic parameter corresponding to the parameter of the selection may be created. | 2012-03-22 |
20120072919 | MOBILE DEVICE AND METHOD FOR EXPOSING AND MANAGING A SET OF PERFORMANCE SCALING ALGORITHMS - A mobile device, a method for managing and exposing a set of performance scaling algorithms on the device, and a computer program product are disclosed. The mobile device includes a multiple-core processor communicatively coupled to a non-volatile memory. The non-volatile memory includes a set of programs defined by a respective combination of a performance scaling algorithm and a set of parameters, a startup program that when executed by the multiple-core processor identifies at least one member of the set of programs suitable for monitoring operation of the mobile device and scaling the performance of an identified processor core and an application programming interface that exposes the set of programs. | 2012-03-22 |
20120072920 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING APPARATUS CONTROL METHOD - A information processing apparatus having a processor is controlled to execute a procedure of reading from the memory attribute information indicating a usage frequency of a register used by a process to be executed as a next process by the processor when the processor switches a process currently being executed, saving a value of the register used by the next process to be executed by the processor to the memory when the usage frequency of the register indicated by the attribute information is larger than a certain frequency, reading from the memory owner information indicating a process using the register to be used by the next process when the usage frequency of the register indicated by the attribute information is larger than the certain frequency, and restoring a register value saved in the memory to the register when the owner information indicates a process other than the next process. | 2012-03-22 |
20120072921 | Laptop Computer for Processing Original High Resolution Images and Image-data-processing device thereof - An image-data-processing device for processing first image data includes an image processing chip with a first memory and a second memory. The image processing chip further includes a data managing unit and a coding module, wherein the memory space of the second memory is greater than the memory space of the first memory. The data managing unit receives the first image data from an image sensor and transmits the image data to the encoding module, wherein the encoding module generates a second image data based on the first image data received. The data managing unit then selectively stores the second image data in the first memory or the second memory. | 2012-03-22 |
20120072922 | EVALUATING TRIGGERS FOR APPLICATION CONTROL AND MACHINE CONFIGURATION - Evaluation of control and configuration triggers may be provided. A data transmission may be received from a machine. A first initial filter criteria may be determined to apply to the transmitted data, and the transmitted data may be provided to an application service associated with the initial filter criteria. A return message may be received from the application service and may be evaluated to determine whether the transmitted data should be compared to additional initial filter criteria. | 2012-03-22 |
20120072923 | SYSTEM FOR CONVENIENTLY MOVING AN ENTIRE COMPUTER ENVIRONMENT AMONG A PLURALITY OF COMPUTING PLATFORMS - A system is provided for conveniently moving an entire computer environment among a plurality of computing platforms. The system includes a portable storage medium able to couple to a host machine of a computing platform. The portable storage medium stores an emulator program able to run a guest operating system (OS) and an executable script able to prepare and launch a computer environment based on the guest OS. The host machine includes a computer environment based on a native operating system (OS), the native OS being able to detect and mount the portable storage medium, the native OS also being able to execute the executable script. | 2012-03-22 |
20120072924 | SAS SMP TUNNELING USING SCSI COMMANDS - A storage system comprising: a SCSI initiator being configured for receiving a data request and providing a SMP request corresponding to the data request, the SCSI initiator being further configured for encapsulating the SMP request into a first SCSI command; a SCSI target being configured for receiving the first SCSI command, the SCSI target being further configured for recognizing encapsulation of the SMP request and obtaining the SMP request from the first SCSI command; and an SMP target being configured for processing the SMP request and providing an SMP response to the SCSI target. The SCSI target being further configured for acknowledging the SCSI initiator upon reception of the SMP response; and the SCSI initiator being further configured for sending a second SCSI command to the SCSI target to retrieve the SMP response. | 2012-03-22 |
20120072925 | Automated Service Interface Optimization - Disclosed are various embodiments for automated service interface optimization. A plurality of usage metrics for at least one service client corresponding to a set of data items within a data object are determined in at least one computing device. The data object is obtainable by at least one service client from a service provider. The service provider is configured to provide an optimized data object to the at least one service client. The optimized data object includes a proper subset of the set of data items. The proper subset is determined based at least in part on the usage metrics. | 2012-03-22 |
20120072926 | METHOD AND APPARATUS FOR CONSTRUCTING A WIDGET ENVIRONMENT - A method and apparatus construct a widget environment. The method converts an application programming interface (API) into an API call in a Web service format in response to identifying that the API that is not executable in a current device is called. The method transmits the API call in the Web service format to a remote device in which the API is executable. The method receives a result obtained from the API call being executed in the Web service format in the remote device. | 2012-03-22 |
20120072927 | AGENT-BASED REMOTE FUNCTION EXECUTION - A function call can be received at a remote execution module in a host environment. The call can instruct the remote execution module to remotely execute a specified function in a remote environment. The call can be received while an agent is executing in the remote environment. The function can be sent to the agent in the remote environment in response to receiving the call. The agent can be employed to perform acts, which can include receiving the function at the remote environment, executing the function in the remote environment in response to receiving the function, and sending results of executing the function to the execution module. Additionally, the execution module can be employed to receive the results from the agent and return the results as a response to the call. | 2012-03-22 |
20120072928 | SLIM OPTICAL DISK DRIVE - A slim optical disk drive includes a lower housing, a tray, a protection plate, a flexible cable and an isolated part. The tray is supported by two slide rails for sliding in or sliding out of an opening of the lower housing. The protection plate is for covering a bottom of the tray. The flexible cable includes a plurality of wires. The flexible cable extends toward the opening and is stuck on the lower housing. A curved area is formed by bending the flexible cable near the opening. The flexible cable is accommodated between the protection plate and the lower housing when the tray is slid inside the lower housing. The isolated part is disposed on the protection plate. The isolated part is for shielding predetermined wires of the plurality of the wires to reduce noise of signals. | 2012-03-22 |
20120072929 | OPTICAL DISC PLAYER - An optical disc player includes a main body, a lid, a rotator, and a protective structure. The lid is pivotably connected to the main body. The rotator is disposed in the main body for rotating discs and can be covered by the lid. The protective structure is disposed between the rotator and the lid. The protective structure is capable of suppressing noise and/or damage caused by contact between the rotator and the lid when the rotator operates. | 2012-03-22 |
20120072930 | DEVICE FOR REDUCING POWER CONSUMPTION OF OPTICAL DRIVE AND METHOD FOR THE SAME - A device and method for reducing power consumption of an optical drive are proposed. The present invention samples a carrier control signal and then compares the samples of the signals with predetermined threshold signals. According to the comparison result, the present invention produces at least one diphase excitation control signal. The diphase excitation control signal comprises at least one impulse signal, and a negative edge of the impulse signal is adjusted to a predetermined level during the period of the diphase excitation control signal. The present invention reduces the time for outputting the control signals and greatly reduces the power consumption of the optical drive thereby. | 2012-03-22 |
20120072931 | SURFACE EMITTING SEMICONDUCTOR LASER, OPTICAL RECORDING HEAD, AND OPTICAL RECORDING APPARATUS - Disclosed is an optical recording head which is provided with a surface emitting laser that emits laser light which is efficiently introduced into a waveguide through a grating coupler (diffraction grating). Specifically disclosed is an optical recording head which is provided with a surface emitting laser comprising at least a light source, and a waveguide that is connected thereto through a diffraction grating and irradiates a recording medium with the light from the light source. The light source has a two-dimensional photonic crystal structure in the surface that faces the waveguide. Regions of the two-dimensional photonic crystal structure other than the region facing the diffraction grating are converted, and the region facing the diffraction grating serves as a surface emitting. | 2012-03-22 |
20120072932 | SYSTEM AND METHOD FOR CONTROLLING AND MANAGING THE DELIVERY OF DIGITAL MEDIA TO DEVICES ON HOME NETWORKS - A system and method for controlling and managing delivery of digital media to devices on a home network is presented. The system comprises an application server executed by a physical or virtual CPU, the application server notified by each device when each device initializes, a plurality of plug-ins, each device corresponding to at least one plug-in, and a control plane, wherein the control plane receives notice of an event from one device and sends the notice of the event to the application server, which sends the notice of the event to the plug-in corresponding to the one device having the event, and the plug-in performs the event. The plug-in can perform the event by streaming content data to a desired device. The application server can maintain user information and when the plug-in performs the event, the plug-in updates the user information. The application server can have an interactive program guide. | 2012-03-22 |
20120072933 | System for Subscriber-Specific TV and Multimedia Content Distribution Over High Speed Broadcast Mediums - Systems, management and distribution methodologies (including both hardware and software components) for the delivery of subscriber-specific TV and multimedia broadcasts. The system delivers multimedia files, regardless of compression or format, to subscribers; instead of normal linear broadcasts or content streaming. Delayed Negative Acknowledgment allows the client application to request any missing packets via a low speed return path to the TV Aggregation Servers. These negative acknowledgments are aggregated over a long delay period based on the initial broadcasts' time to live. Once a considerable threshold has been reached the missing content is rebroadcast, clients receive any missing packets and mark the initial broadcast as complete thus making it available for viewing. | 2012-03-22 |
20120072934 | CALL ORDERING SYSTEM USING A PRE-FILLED TRANSACTION RECORD IN A CALL CENTER TRANSACTION FROM A MOBILE PHONE - A call-ordering system and method enables convenient ordering in a call center transaction from a mobile phone. User profiles with identification data and a mobile phone number are matched to advertiser offers. Text messages are sent to the mobile phone numbers for matched users with a direct inward dialed (DID) number for response. Upon receiving an incoming call to the DID number from a responding user, an OfferRouter uses the caller and DID numbers to retrieve identification data for the user and offer data for the advertiser offer. The incoming call is then routed to a call center associated with the advertiser offer and the retrieved data are pushed to the call center's terminal system for pre-filling a transaction record for the offered item. The system may also be operated in tandem with a hotel guest registration system to register traveler profiles, the hotel's purchase management system to bill call center transactions to a guest's hotel bill, and the hotel's networked TV system to give guests an option to respond to an offer by using signals sent from the TV remote control unit to complete a transaction. | 2012-03-22 |
20120072935 | CHANNEL TUNE DWELL TIME LOG PROCESSING - Reporting data related to content processing devices, e.g., television devices, are processed to identify channel tunes and corresponding tune times of the content processing devices. Automatically generated channel tunes based on the corresponding tune times are identified. Content items that are aired during a time period defined by the corresponding tune times can be adjusted. | 2012-03-22 |
20120072936 | Automatic Customized Advertisement Generation System - A system for generating a customized advertisement for a user is provided. Multimedia content associated with a current broadcast is received and displayed. The multimedia content may include recorded video content, video-on-demand content, television content, television programs, advertisements, commercials, music, movies, video clips, and other on-demand media content. One or more users are identified in a field of view of a capture device connected to a computing device. User-specific information related to a user is tracked. An emotional response of a user to the multimedia content viewed by the user is tracked. A targeted advertisement is provided to a user based on the multimedia content viewed by the user, the user's identification information and the user's emotional response. The targeted advertisement is automatically customized based on the user-specific information related to the user to generate a customized advertisement for the user. The targeted and customized advertisement is displayed to the user during a pre-programmed time interval, via an audiovisual device connected to the computing device. | 2012-03-22 |
20120072937 | CONTEXT-BASED AUTOMATIC SELECTION OF FACTOR FOR USE IN ESTIMATING CHARACTERISTICS OF VIEWERS VIEWING SAME CONTENT - A method of selecting a factor for estimating characteristics of viewers who view a same content is disclosed. This method includes: storing a multi-layered hierarchal list of attribute words expressing viewer attributes, each of which is a candidate of the factor; extracting the attribute words from the same content; generating a first vector indicative of frequencies with which the attribute words occur in the same content; for a successively-selected one of the attribute words, successively generating a second vector indicative of frequencies with which the attribute words occur in ones of sets of learned-text information which contain the successively-selected attribute word; calculating a similarity score between the vectors on a per-attribute-word basis; and selecting one of the attribute words as the factor, which is associated with subordinate attribute words on a lower layer, based on a dispersion level of the similarity scores calculated for the subordinate attribute words. | 2012-03-22 |
20120072938 | SYSTEM AND METHOD FOR PROVIDING A SERVICE OR CONTENT BASED ON EMOTIONAL INFORMATION - Provided are an apparatus and method for providing a service or content based on emotional information. A service receiving apparatus extracts and analyzes emotional information of a received service or content to use the corresponding service or content according to an environment that is set. | 2012-03-22 |
20120072939 | System and Method for Measuring Audience Reaction to Media Content - A system and method of measuring audience reaction to media content includes obtaining images or other information of each individual of the audience as the individual views the content and analyzing the images or other information with software to generate emotional response source data for each individual. The emotional response source data identifies the emotion or emotions or change of emotions of the individual as interpreted by the software. The emotional response source data of the individuals is aggregated to identify a set of primary emotions of the audience, and thereafter, the emotional response source data is re-evaluated in view of the primary emotions to refine and more accurately classify the emotional responses of each individual of the audience. | 2012-03-22 |
20120072940 | METHODS, APPARATUS, AND SYSTEMS TO COLLECT AUDIENCE MEASUREMENT DATA - Methods, apparatus, and systems to collect audience measurement data are disclosed. A disclosed example method includes collecting first program identification data and audience identification data during a first time period, the audience identification data being collected by prompting audience members in the monitored household to self-identify using a people meter, developing audience member behavior data based on the first program identification data and the audience identification data collected in the first time period, collecting second program identification data in a second time period after the first time period without collecting audience identification data, and identifying the audience members associated with the second program identification data based on the audience member behavior data. | 2012-03-22 |
20120072941 | Automatic "Spoiler" Prevention - Control of output of programme content from an apparatus including a receiver for receiving programme content and an output includes storing one or more dependencies and determining whether a programme to be output by the apparatus has any dependencies associated with it. The dependencies may be indicative of whether the content of a given programme is dependent upon the content of one or more other programmes. If the programme to be output by the apparatus has any dependencies associated with it, the output of the programme content by the apparatus may impaired based on the dependencies. A corresponding apparatus and computer programme are also provided. | 2012-03-22 |
20120072942 | BROADCAST-CONTENTS MANAGEMENT APPARATUS AND CONTROL METHOD FOR USE IN A BROADCAST-CONTENTS MANAGEMENT APPARATUS - According to one embodiment, a broadcast-contents management apparatus includes a plurality of network interface modules, a plurality of storage modules and a controller. The plurality of network interface modules connect with an information processing apparatus including functions relating to process on contents data. The plurality of storage modules store the contents data sent from the information processing apparatus. The controller monitors or controls the plurality of network interface modules and the plurality of storage modules. The controller includes a selector. The selector selects a combination of a network interface module and a storage module to use, based on use statuses of the plurality of network interface modules and the plurality of storage modules or based on a preset condition, when the controller performs process on the contents data. The selector performs the process on contents data by the selected combination. | 2012-03-22 |
20120072943 | Delivering Advertisements Based on Electronic Coupons Transmitted from a Digital Television System to a Mobile Communication Device - A system for delivering advertisements based on a digital television system and a mobile communication device is disclosed. The television system and the mobile device are connectable in an ad hoc manner. When a user is attracted by an advertisement being broadcasted by the television, an instruction may be sent from a remote control device of the television system to trigger the television system to send an electronic coupon to the mobile device. An icon may then be displayed on a display screen of the mobile device to represent the coupon. When the icon is selected, the electronic coupon is displayed. The electronic coupon may include an advertising message. The user may select the message for receiving detailed information about the product from a data manager connected to the mobile device through a communication network. | 2012-03-22 |
20120072944 | METHOD AND APPARATUS FOR PROVIDING SEAMLESS VIEWING - An approach is provided for presenting content seamlessly. Content is presented by one of a plurality of set-top boxes to a display for viewing by a user, wherein the plurality of set-top boxes are situated within a plurality of regions of a premise. The one set-top box is situated within one of the regions. The presentation of the content is paused in response to detection of movement of the user to another region of the premise. An inactive state is entered by the set-top box upon determining that another one of the set-top boxes is resuming the presentation of the content, wherein the other one of the set-top box corresponds to the other region. | 2012-03-22 |
20120072945 | TRANSMITTING SPORTS AND ENTERTAINMENT DATA TO WIRELESS HAND HELD DEVICES OVER A TELECOMMUNICATIONS NETWORK - A method and system for wirelessly providing venue-based data to one or more wireless hand held devices. Venue-based data can be acquired from one or more venues. The venue-based data can be authenticated and wirelessly transmitted to one or more hand held devices through one or more wireless telecommunications networks, in response to authenticating the venue-based data and/or the hand held device(s) and/or a user of the hand held device(s), in order to permit the venue-based data to be accessible via one or more hand held devices at locations remote from the venue(s). | 2012-03-22 |
20120072946 | CUSTOMIZED BARKER CHANNELS FOR VIEWERS OF A CABLE SYSTEM - A barker management system provides customized barker channels to a viewer, where the barker management system may be integrated into a VOD service. In one embodiment, the headend is informed when the viewer requests the VOD service and is further informed of a set top box (“STB”) identifier. The headend ascertains a rating of a barker channel, and may create a playlist of trailers having a compatible rating and streams the trailers on the barker channel to the SIB. The STB is informed which channel to use, and generates a display with the barker channel presented in one window of the display, while the VOD menu selections are presented in another window of the display. The selection of trailers in the barker channel can be based on ratings, content, or other criteria. The headend can statically or dynamically generate various customized barker channels for viewers. | 2012-03-22 |
20120072947 | METHOD FOR PROVIDING MEDIA-CONTENT RELATED INFORMATION, DEVICE, SERVER, AND COMPUTER-READABLE STORAGE MEDIUM FOR EXECUTING THE METHOD - A method for providing media content-related information by using a device capable of accessing a server via a network is provided, the method comprising: generating identification information of media content being reproduced by the device; transmitting the identification information from the device to the server; receiving at least one of key information and media content-related information, from the server, in response to the identification information; and providing a user of the device with the media content-related information about the media content based on the at least one of the key information and the media content-related information received from the server. | 2012-03-22 |
20120072948 | METHOD, EQUIPMENT AND SYSTEM FOR REDUCING MEDIA DELAY - A method, an equipment and a system for reducing a media delay are disclosed. A media processing unit receives a media switching request sent from a media receiving unit, and sends a response message and a media stream of a second media service to the media receiving unit according to the media switching request, where the response message includes information for the media receiving unit to reduce the media delay, so that the media receiving unit performs a media quickening process on the media stream of the second media service according to the received message including the information for reducing the media delay. An equipment and a system for reducing a media delay are also provided, which increase the switching efficiency of the media streams, reduce the difference of the display delay among different user media, and improve the degree of user experience. | 2012-03-22 |
20120072949 | COMMON PURCHASE PLAN BASED ADVERTISEMENT - A method, system, and computer program product are disclosed for selecting an advertisement for play on a specified device for one or more users. Each of the users has a defined relationship with the specified device, and has an information description stored on a mobile communications device. In one embodiment, the method comprises transmitting the respective information description of each of one or more users from the user's communications device to a provider server. The server analyzes one or more information descriptions to identify an advertisement for playing on the specified device. The specified device, in one embodiment, is a television. In an embodiment, advertisements are displayed based on common purchase profiles and common purchase plans among different people. The purchase plans may be sent to the television when the users are in a defined area or come within a given distance of the television. | 2012-03-22 |
20120072950 | System and Method for Independent Media Auditing and Media Serving for Marketing Campaigns Presented Via Media Devices in Public Places - An independent auditing and ad service system that may be utilized with a system for presenting marketing campaigns to audiences via a network of players in public locations. Independent agents in the players monitor media content that is presented to audiences during marketing campaigns and generate independent agent playlogs that are provided to a content registry service which compares the independent agent playlogs with playlogs that are provided by a network operator to validate the network-operator-generated playlogs. The independent agent playlogs may also be provided to an analytics service where they are used to analyze the performance of marketing campaigns. From the analyzed performance, the service may determine that the media content presented to audiences via the media players should be changed. The independent agents may be instructed to implement recommended changes by modifying the media content being presented on the players. | 2012-03-22 |
20120072951 | CONFIGURATION APPARATUS AND METHOD OF CONFIGURING ONE OR MORE DEVICES HAVING HIDDEN CONFIGURATION SETTINGS - A configuration apparatus includes a user interface allowing a user to initiate configuration of at least a target configurable device selected from a plurality of configurable devices. A command module is coupled to the user interface for dynamically generating a sequence of commands required to configure the target configurable device. The sequence of commands includes commands for entering a hidden service-configuration menu of the target configurable device. A communication module is coupled to the command module for transmitting the sequence of commands to the target configurable device. | 2012-03-22 |
20120072952 | VIDEO STREAM ZOOM CONTROL BASED UPON DYNAMIC VIDEO MOSAIC ELEMENT SELECTION - The present invention teaches a method of creating and presenting a user interface comprising a Dynamic Mosaic Extended Electronic Programming Guide (DMXEPG) using video, audio, special applications, and service dynamic metadata. The system enables television or digital radio service subscribers to select and display of various programs including video, interactive TV applications, or any combination of audio or visual components grouped and presented in accordance with the dynamic program/show metadata, business rules and objectives of service providers, broadcasters, and/or personal subscriber choices, collectively referred to as mosaic element presentation criteria. | 2012-03-22 |
20120072953 | METHOD AND DEVICE FOR REVEALING IMAGES OBSCURED BY A PROGRAM GUIDE IN ELECTRONIC DEVICES - Methods and devices enable users of electronic devices to temporarily move a program guide to view an underlying image by executing a recognizable touch movement on a touchscreen display. When a program guide or other menu is activated, a processor of the device may monitor touches to the display for recognizable movements, such as horizontal, linear or other shaped paths. Upon recognizing a touch event movement that corresponds to the program guide hide function, the processor may cause the program guide to slide to the left, right, up or down, or to disappear in order to reveal the underlying video program. When the device processor detects an end to the touch event, the processor returns the program guide to its original position on the display. Movements of the program guide may be animated on the display. The devices may be mobile television receivers and the video may be broadcast programs. | 2012-03-22 |
20120072954 | PORTABLE MEDIA PROCESSING UNIT IN A MEDIA EXCHANGE NETWORK - A method for communication includes performing by one or more circuits integrated within a single chip in a first communication device, functions that include storing media and meta-data corresponding to the stored media. The storing may occur at a first location of the first communication device. A channel guide including representations of the stored media that can be selected for presentation on a television in a second location, may be caused based on the meta-data corresponding to the stored media when the first communication device is communicatively coupled to a second communication device at the second location. In response to receiving a selection via the presented channel guide, at least one media file corresponding to the received selection may be displayed based on the meta-data corresponding to the stored media, on one or both of the television and/or a media player in the second location. | 2012-03-22 |
20120072955 | STREAMING SERVER AND MOBILE TERMINAL FOR REDUCING CHANNEL-CHANGING DELAY, AND A METHOD THEREFOR - Provided is a method and apparatus for reducing zapping delay, which may transmit base layer data for each burst in a time-slicing scheme, and output the base layer data of a channel to be changed at the time of changing the channel, thereby reducing the zapping delay. | 2012-03-22 |
20120072956 | INTERACTIVE MEDIA SYSTEM AND METHOD FOR PRESENTING PAUSE-TIME CONTENT - Interactive media systems and methods are provided for substituting pause-time content in place of media that has been paused. The user may pause media such as real-time media, video-on-demand media, near video-on-demand, or recorded media. If the user pauses real-time media or near video-on-demand media, the interactive media application may store the media. The interactive media application may also provide the user with the ability to rewind, resume play of, and fast-forward the media. The pause-time content may be audio or video media and may be an advertisement, trivia, program summaries or any other suitable pause-time content. The interactive media application may provide customized pause-time content specific to the user or specific to the media paused by using media data associated with the media. The interactive media application may also prevent the user from accessing features (e.g., fast-forward) of the system. | 2012-03-22 |
20120072957 | Providing Dynamic Content with an Electronic Video - In one implementation, a computer-implemented method includes receiving a request from a client computing device for an electronic video, and dynamically identifying content to display while the video is played based on one or more content parameters associated with the video that indicate, at least, a type of dynamic content to be identified after the request is received. The method can further include providing the identified dynamic content to the client computing device in a form so that the dynamic content will be displayed on the client computing device in accordance with one or more display parameters that indicate, at least, a time during playback of the video or a location in relation to the video at which the dynamic content is displayed. | 2012-03-22 |
20120072958 | METHOD FOR REDUCING LATENCY IN AN INTERACTIVE INFORMATION DISTRIBUTION SYSTEM - A method and apparatus for reducing latency caused by information server processing of subscriber request wherein a plurality of content streams defined by a playlist are sequentially provided to a subscriber in a substantially seamless manner and wherein the playlist is updated and otherwise maintained in response to subscriber commands and requests. | 2012-03-22 |
20120072959 | NETWORK-BASED SERVICE TO PROVIDE ON-DEMAND VIDEO SUMMARIES OF TELEVISION PROGRAMS - A network-based device allows customers to receive television programming and to view summaries of the programming. A method of providing the summaries comprises: dividing a received program into program segments each identified by index marks, summarizing each program segment into summary segments identified by similar index marks, generating metadata files for delimiting a beginning and an end of summary segments and program segments, storing the summary segments and accessing the summary segments to supply the summary segments in lieu of program segments upon demand. | 2012-03-22 |
20120072960 | Method and system for pause ads - A system and method for placing ads on a client-side video replay system during a pause mode. | 2012-03-22 |
20120072961 | PROCESS AND SYSTEM FOR MANAGEMENT OF A CONTINUOUS BROADCAST SESSION OF A POSTED DIRECT VIDEO STREAM - A process and an associated system for management of a live streaming session posted directly on terminals connected to a communications network, the process includes stages of:
| 2012-03-22 |
20120072962 | Set-Top Box-Based TV Streaming and Redirecting - A method for redirecting video content includes receiving a video signal at the set-top box and decoding the video signal to produce unrendered video data. The unrendered video data is encoded and provided to the remote device via a wide area network. By encoding unrendered, rather than rendered, video data for transmission to the remote device, the need for an encoding device external to the set-top box is obviated. | 2012-03-22 |
20120072963 | SYSTEM AND METHOD OF MESSAGE NOTIFICATION AND ACCESS VIA A VIDEO DISTRIBUTION NETWORK - A method includes receiving, via an internet protocol television network, a broadcast signal comprising video content at a device. The device is associated with a person. The method includes receiving, via the internet protocol television network, a message notification directed to a communication address associated with the person. The message notification includes a visual indication based at least in part on the communication address. The method also includes sending a display signal to a display device. The display signal includes the broadcast signal and the visual indication. | 2012-03-22 |
20120072964 | STB Messaging System - A system that incorporates teachings of the present disclosure may include, for example, a video terminal device having a processor adapted to submit a query to a mobile device to determine whether to redirect one or more mobile messages destined for the mobile device to the video terminal device, receive from the mobile device an affirmative response to the query, transmit a request to a wireless carrier system to redirect transmission of the one or more mobile messages to the video terminal device, receive from the wireless carrier system the one or more mobile messages while the mobile device remains communicatively coupled to the video terminal device. Other embodiments are disclosed. | 2012-03-22 |
20120072965 | RECEPTION APPARATUS, RECEPTION METHOD, TRANSMISSION APPARATUS, TRANSMISSION METHOD, PROGRAM, AND BROADCASTING SYSTEM - Disclosed herein is a reception apparatus for receiving AV content, including: a receiver configured to trigger information for controlling processing associated with an application program to be executed in conjugation with a progress of the AV content; a holder configured to hold the application program; and a controller configured to control a state of a first application program depending on whether first trigger information for specifying processing associated with the first application program held in the holder as a subject of control has been received in synchronization with a predetermined reception timing. | 2012-03-22 |
20120072966 | SYSTEM AND METHOD FOR RECORDING AND TIME-SHIFTING PROGRAMMING IN A TELEVISION DISTRIBUTION SYSTEM WITH LIMITED CONTENT RETENTION - Various embodiments of the disclosed subject matter provide methods and systems to record broadcast programming for at least one television channel for a period of time, wherein the recording is performed upstream from subscribers in a television distribution system, and further including after the period of time, keeping recorded programming by request from at least one subscriber. And further wherein the request is for at least one television program contained in the recorded programming or for a time window for a particular channel. According to another embodiment a subscriber requests that broadcast programming be saved for the subscriber upstream from the subscriber in a television distribution system, and wherein the subscriber may request the programming be saved for later viewing by the subscriber between the time the programming was broadcast and a later point in time. | 2012-03-22 |
20120072967 | IMS SERVICE PROXY IN HiGA - The present invention relates to a communication system (SYS), a gateway apparatus (HiGA) and a method for allowing services of a first type provided by a communication server (IMS-S) to be provided to terminal devices (T | 2012-03-22 |
20120072968 | ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS IN VIRTUAL MACHINES - Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports. | 2012-03-22 |
20120072969 | DETERMINING A SENSITIVITY LABEL OF DOCUMENT INFORMATION IN REAL TIME - A sensitivity label for document information in a document may be determined in real time, according to one embodiment, by flexibly and dynamically determining a sensitivity label for the document based on content included in information within the document. Information within a document varies from day to day, for example, document information may decrease in importance with time, increase in importance due to an event, etc. Therefore, the sensitivity label of the document, according to embodiments described herein, may also change dynamically in accordance with document content, information, etc. | 2012-03-22 |
20120072970 | CHAINING INFORMATION CARD SELECTORS - A machine includes card stores to store information cards. For each card store, one or more card selectors can be provided. When performing a transaction involving information cards, a generic card selector, using a selector policy engine, can identify a card selector to use for the transaction. The identified card selector can be used to identify an information card in a card store to use in performing the transaction, which can be used to provide a security token to the relying party. | 2012-03-22 |
20120072971 | DATA SHARING SYSTEM, SHARED DATA MANAGEMENT APARATUS, AND CONTROL METHOD OF SHARED DATA MANAGEMENT APPARATUS - The traffic amount of the radio communication is reduced and the load applied to the management side of the system is reduced, thereby making the data shared with only prescribed users in an efficient manner. There is provided a shared data management apparatus, for managing sharing of data stored in a plurality of data storage units, is provided with: a profile group management unit | 2012-03-22 |
20120072972 | SECONDARY CREDENTIALS FOR BATCH SYSTEM - A batch job system may create a second set of credentials for a user and associate the second set of credentials with the user in an authentication server. The second set of credentials may allow computers running the batch jobs to have user-level authentication for execution and reporting of results. The second set of credentials may be a single sign on type of credential, and may consist of a virtual smartcard that each worker computer may use for authentication. In some embodiments, authentication requests may be routed to a virtual or physical Hardware Security Module. | 2012-03-22 |
20120072973 | METHOD AND APPARATUS FOR AUTHENTICATION IN PASSIVE OPTICAL NETWORK AND PASSIVE OPTICAL NETWORK - The embodiments of the present disclosure provide a method and an apparatus for authentication in a Passive Optical Network (PON), and a PON. The method includes: receiving, by an Optical Network Unit/Optical Network Terminal (ONU/ONT), a first negotiation message sent by an Optical Line Terminal (OLT), and authenticating the OLT according to a logic registration ID of the OLT; sending, by the ONU/ONT, a second negotiation message to the OLT, the logic registration ID of the ONU/ONT is used to enable the OLT to authenticate the ONU/ONT according to a logic registration ID of the ONU/ONT, and allocates a terminal identifier for the ONU/ONT after the authentication succeeds. In the embodiments of the present disclosure, the OLT and the ONU/ONT are authenticated through the logic registration IDs, thus eliminating security threats in the authentication process. | 2012-03-22 |
20120072974 | STREAMING CONTENT IN GUEST MODE - The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system which includes a guest mode and an authorized user mode. One example embodiment comprises establishing a secure connection to a network requiring access credentials, detecting a content source, establishing a non-secure connection to receive image data from the content source, receiving the image data from the content source, and providing the image data to a display, wherein the content source is not provided access over the secure connection. | 2012-03-22 |
20120072975 | Circumstantial Authentication - An authentication system is provided. The authentication system comprises a first component configured to obtain information specific to an individual, a second component configured to dynamically formulate at least one challenge question based on the information, a third component configured to cause the at least one challenge question to be presented on a device when the device is used to perform an act that involves authentication, and a fourth component configured to judge authenticity based on an answer to the at least one challenge question. | 2012-03-22 |
20120072976 | Dynamic Account Creation With Secured Hotspot Network - A secure network access point transmits a beacon transmission. A user device receiving it determines it does not have credentials necessary to attach with the secure network access point oint, and so a preliminary association is formed between the user device and the secure network access point. During the preliminary association, the user device receives or creates credentials necessary to associate with the secure network access point, forms an association with the secure network access point using the received or created credentials, and obtains internet connectivity via the secure network access point. In this embodiment there is only the secure network access point, but in another embodiment there is also a non-secure network access point which transmits a beacon using the same SSID as the secure network access point, and the preliminary association is with the non-secure network access point. | 2012-03-22 |
20120072977 | Method and Apparatus for Securely Synchronizing Password Systems - A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the domains and applications on the network may be required, by design, to maintain a separate password infrastructure. For these systems, the CPR establishes a secure and authenticated communication channel and software on the system interfaces with the password infrastructure to synchronize the password in the system password infrastructure with the password in the CPR. For other systems not required to maintain a separate password infrastructure, the CPR performs password services by responding to requests from those systems seeking to validate user IDs and passwords. The CPR enables an administrator to modify network privileges and enables a user to alter passwords on the network through a single interface. | 2012-03-22 |
20120072978 | Desired Font Rendering - An embodiment of the invention provides a method for displaying a message from a first user to a second user, wherein the message from the first user is received in a system of the second user. The message includes text in an intended font and metadata, wherein the metadata includes a link to a font source. It is determined whether the intended font is on the system of the second user; and, if the intended font is not on the system of the second user, rendering instructions are obtained from the font source. The rendering instructions include instructions on how to display the text in the intended font on the system of the second user without downloading the intended font to the system of the second user. The text is displayed in the intended font on the system of the second user using the rendering instructions. | 2012-03-22 |
20120072979 | Method And Apparatus For Trusted Federated Identity - A trusted computing environment, such as a smartcard, UICC, Java card, global platform, or the like may be used as a local host trust center and a proxy for a single-sign on (SSO) provider. This may be referred to as a local SSO provider (OP). This may be done, for example, to keep authentication traffic local and to prevent over the air communications, which may burden an operator network. To establish the OP proxy in the trusted environment, the trusted environment may bind to the SSO provider in a number of ways. For example, the SSO provider may interoperate with UICC-based UE authentication or GBA. In this way, user equipment may leverage the trusted environment in order to provide increased security and reduce over the air communications and authentication burden on the OP or operator network. | 2012-03-22 |
20120072980 | Method and Apparatus for Authenticating Users of An Emergency Communication Network - An authentication system is configured to weight multiple available network supplied and user supplied authentication factors to determine whether a user should be provided with access to an Emergency Communication Network (ECN). The multiple factors may include the location of the user, MIN, short PIN, token, biometric information, and other information. The level of access to be provided to the user may be tiered based on the authentication level achieved during the weighting process. Authentication information may be shared between groups of individuals, so that the authentication requirements for group members may be reduced as other members of the group supply authentication information to the ECN. Group authentication may be used to enable group services such as conferencing and push-to-talk to be set up automatically for the group. | 2012-03-22 |
20120072981 | IMAGE PROCESSING APPARATUS, CONTROLLING METHOD OF IMAGE PROCESSING APPARATUS, AND COMPUTER PROGRAM - In a case where a plurality of users are made correspondent to one IC card, user changeover is performed without a logout process. When the IC card is passed over a card reader while a user is logging in, it is judged whether or not the passed card is the IC card used in a login process of the user who is logging in. If NO, a logout process of the user who is logging in is performed, and a user login process using the newly passed IC card is performed. On the other hand, if YES, it is further judged whether or not the plurality of users are made correspondent to the passed IC card. If YES, selection of the user who intends to newly log in is accepted. | 2012-03-22 |
20120072982 | DETECTING POTENTIAL FRAUDULENT ONLINE USER ACTIVITY - One or more techniques and/or systems are disclosed herein for identifying potentially fraudulent use of user generated content (UGC) for an online activity by a user. Server-based information and browser-based information associated with the user is identified and used to create a user signature. The user signature is associated with the UGC for the online activity in a cache-key. The cache-key is compared to a desired threshold for identifying potentially fraudulent use of the UGC for the online activity, where potential fraud may be detected if the cache key meets the desired threshold. | 2012-03-22 |
20120072983 | SYSTEM AND METHOD FOR PRIVACY-ENHANCED CYBER DATA FUSION USING TEMPORAL-BEHAVIORAL AGGREGATION AND ANALYSIS - A method of determining, within a deployed environment over a data communication network, network threats and their associated behaviors. The method includes the steps of acquiring sensor data that identifies a specific contact, normalizing the acquired sensor data to generate transformed sensor data, deriving, for the specific contact from the transformed sensor data, a contact behavior feature vector for each of a plurality of time periods, determining, for the specific contact, scores associated with each of a plurality of classification modules to form a contact score vector, the contact score vector being independent of an identity of the specific contact, identifying a type of the specific contact based on the contact score vector, and determining a threat type, based on the contact behavioral profile and the contact score vector, when the specific contact is determined to be a threat in the identifying step. | 2012-03-22 |
20120072984 | REGULATING ATOMIC MEMORY OPERATIONS TO PREVENT DENIAL OF SERVICE ATTACK - In one embodiment, the present invention includes a method for identifying a termination sequence for an atomic memory operation executed by a first thread, associating a timer with the first thread, and preventing the first thread from execution of a memory cluster operation after completion of the atomic memory operation until a prevention window has passed. This method may be executed by regulation logic associated with a memory execution unit of a processor, in some embodiments. Other embodiments are described and claimed. | 2012-03-22 |
20120072985 | MANAGING SERVICES IN A CLOUD COMPUTING ENVIRONMENT - What is provided are a system and method which enables an organization or user to manage computational services in a cloud computing network for security, compliance and governance. The management including creating a trusted virtual network including encrypted data storage, encrypted data transport, and trusted instances of servers all communicatively coupled together forming a trusted cloud computing environment that is associated with the organization. A web portal running on a web server provides a point of access to the cloud computing environment. A workflow is accessed to implement one or more policies in trusted computing environment to manage the trusted cloud computing environment, the workflow customized to the organization. The access control; and to the trusted cloud computing environment is used to ensure access by users authorized by the organization to ensure compliance with adopted standards. | 2012-03-22 |
20120072986 | METHODS FOR DETECTING AND CLASSIFYING SIGNALS TRANSMITTED OVER A RADIO FREQUENCY SPECTRUM - A method for classifying a signal is disclosed. The method can be used by a station or stations within a network to classify the signal as non-cooperative (NC) or a target signal. The method performs classification over channels within a frequency spectrum. The percentage of power above a first threshold is computed for a channel. Based on the percentage, a signal is classified as a narrowband signal. If the percentage indicates the absence of a narrowband signal, then a lower second threshold is applied to confirm the absence according to the percentage of power above the second threshold. The signal is classified as a narrowband signal or pre-classified as a wideband signal based on the percentage. Pre-classified wideband signals are classified as a wideband NC signal or target signal using spectrum masks. | 2012-03-22 |
20120072987 | METHOD FOR EVOLVING DETECTORS TO DETECT MALIGN BEHAVIOR IN AN ARTIFICIAL IMMUNE SYSTEM - A system, apparatus, and method are directed to evolving detectors in an Artificial Immune System for use in detecting unauthorized computing activities. In one embodiment, a population of detectors is generated with a matching value and expectation value of zero. The detectors are then compared to logged fragments of system calls within a computing device to modify the matching value. When the matching value for a given detector is equal to or greater than an expectation value, the detector's expectation value may be set to the matching value. The detectors may then evolve and/or generate other detectors using mutation, and/or recombination, or the like. Detectors continue to generate and/or to evolve until a detector's matching value reaches a determined value, in which case, the detector may be evaluated to determine if an unauthorized activity is detected. If an unauthorized activity is detected, a detection response may be performed. | 2012-03-22 |
20120072988 | DETECTION OF GLOBAL METAMORPHIC MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSIS - Malware feature extraction derives semantic summaries of executable malware using global, inter-procedural program analysis techniques. A combination of global, inter-procedural program analysis techniques constructs semantic summaries of malware which automatically detect and discard any noise introduced by transformations and capture the essence of the underlying computations in a succinct form. This is achieved in two ways. First, global control flow analysis techniques are used to derive a high level representation of malware code that, for instance, removes the effects of subroutine calls. Second, global data flow analysis techniques are employed to detect and remove all spurious elements of malware that do not contribute towards its underlying computation, thereby preventing the resulting summaries from being “corrupted” with unnecessary, extraneous elements. | 2012-03-22 |
20120072989 | INFORMATION PROCESSING SYSTEM, MANAGEMENT APPARATUS, AND INFORMATION PROCESSING METHOD - In an information processing system, a management apparatus reads all data from a storage device connected to an information processing apparatus, and stores the data as one image file in a backup storage device. A virus detection apparatus performs a virus detection process on the image file stored in the backup storage device in response to a request from the management apparatus, and if a computer virus is detected, performs a virus removal process on the image file. When the virus removal process is completed, the management apparatus reads and writes the image file from the backup storage device back to the storage device. | 2012-03-22 |
20120072990 | COST FUNCTION FOR DATA TRANSMISSION - A method, system, and apparatus are disclosed for cost functions for data transmission. In one or more embodiments, the method, system, and apparatus involve assigning costs associated with the data transmission corresponding to risks. The method, system, and apparatus further involve adjusting data transmission performance parameters according to the costs and the risks. The risks are associated with potential danger, harm, and/or data loss. Data transmission operation costs are related to available radio frequency (RF) bandwidth, data transmission levels of service (LoS) and/or data transmission quality of service (QoS). In at least one embodiment, each different LoS has an associated trigger boundary, which is located at a specific distance away from a risk area and indicates where and/or when to begin data transmission. The risks are related to a number of various factors including topographical features of a terrain, weather factors, conflict factors, crime factors, terrorism factors, and/or environmental region factors. | 2012-03-22 |
20120072991 | METHODS AND SYSTEMS FOR RATING PRIVACY RISK OF APPLICATIONS FOR SMART PHONES AND OTHER MOBILE PLATFORMS - Methods and systems for evaluating and rating privacy risks posed by applications intended for deployment on mobile platforms. Validating the “intent” of a mobile platform application vis-à-vis its impact on user privacy, as viewed from an end-user's perspective allows those end-users to make better-informed decisions concerning the downloading, installation and/or operation of mobile platform applications. In making such assessments user preferences can be taken into account. Privacy scores are provided through sales channels for the applications, thereby affording potential users the opportunity to assess whether they wish to incur the associated privacy risk, before purchasing a subject application. | 2012-03-22 |
20120072992 | SECURING SENSITIVE DATA FOR CLOUD COMPUTING - A system and associated method for securing sensitive data in a cloud computing environment. A customer system has proprietary data as a record stored in a database. The customer system associates a hashing directive with the record prior to sending the data out to a cloud for computing services. The hashing directive classifies each data field of the record into sensitive and transactional. The hashing directive controls a mode of hashing, either one-way hashing or two-way hashing for each sensitive data field associated with the hashing directive. A cloud receives the record secured according to the hashing directive and process the record to generate a result value for a cloud process result field of the record. The customer system reconstitutes the record the record according to the mode of hashing indicated in the hashing directive. | 2012-03-22 |
20120072993 | APPARATUS AND METHOD FOR MUTATING SENSITIVE DATA - A computer readable storage medium includes executable instructions to receive data from a data source. Data mutation criteria is applied to designated data elements to produce mutated data that preserves an identifiable relationship between an original designated data element and a corresponding mutated data element. The data mutation criteria also produces mutated data with an identifiable relationship between related mutated data elements. The mutated data is loaded into a report and the report is displayed. | 2012-03-22 |
20120072994 | METHOD TO PRODUCE SECURING DATA, CORRESPONDING DEVICE AND COMPUTER PROGRAM - A method and apparatus are provided for generating security data for implementing a secure session between a first and at least a second entity according to a secure session establishment protocol. Such a method includes: initializing a third secure entity connected to the first entity; generating at least a portion of the security data within the third entity; transmitting the generated security data from the secure third entity to the first entity; and transmitting at least a portion of the security data generated in the third secure entity to at least a previously initialized fourth secure entity connected to the third secure entity. | 2012-03-22 |
20120072995 | SYSTEMS AND METHODS FOR MANAGING SOFTWARE LICENSES - In one embodiment, an apparatus for managing software licenses comprises: a plurality of computers connected together in a peer to peer computer network wherein each computer is a computer node of the network; wherein each computer node comprises a software license management controller that operates in one of: a disconnected mode of operation of distributed license management without network connectivity and a normal online mode of operation of distributed license management. | 2012-03-22 |
20120072996 | FACEMAIL - Systems and methods are disclosed for generating, sending, and delivering a message addressed using an image of an intended message recipient of the message. In one embodiment, a central server receives a message including an image of an intended message recipient from a first user device of a first user. The central server then identifies a second user as the intended message recipient based on the image of the intended message recipient. Then, before delivering the message, the central server obtains an image of a user at a second user device associated with the second user and sends the image to the first user device where the image is presented to the first user. Upon receiving authentication from the first user device that the user at the second user device is the intended message recipient, the central server delivers the message to the second user device of the second user. | 2012-03-22 |
20120072997 | Systems and Methods to Modify Interaction Rules During Run Time - In one aspect, a computing apparatus is configured to represent offer rules based on requirements for the detection of predefined types of events and actions scheduled to be performed in response to the detection of each occurrence of the events. The events are independent from each other in processing and are linked via prerequisite conditions to formulate the requirements of an offer campaign. The computing apparatus is configured to store data indicating the completion statuses of the events and process the events, including the scheduled actions, if any, in an atomic way. Thus, the offer rules can be changed on-the-fly during run time execution by the computing apparatus. | 2012-03-22 |
20120072998 | Electronic Meeting Management System For Mobile Wireless Devices - A device management system includes a meeting support system that is configured to generate and transmit a plurality of electronic meeting invitations to a plurality of mobile wireless devices that correspond to a plurality of meeting participants and receive responses indicating whether the plurality of participants will attend the electronic meeting. The device management system receives identification data that identifies one or more documents or information that will be made available to the plurality of participants. The meeting support system determines whether the plurality of participants is authorized to access the one or more electronic documents or information. If any of the participants are not authorized to access any of the electronic documents or information, the meeting support system notifies the meeting organizer. The device management system may also include a meeting session management system that is configured to share information among the plurality of mobile wireless devices. | 2012-03-22 |
20120072999 | SYSTEM AND METHOD OF PROCESSING DOCUMENTS PROTECTED UNDER A DIGITAL RIGHTS MANAGEMENT SCHEME - A method of processing a document having digital rights management privileges may include receiving a document to be processed according a workflow. The received document may be associated with a license including one or more digital rights management (DRM) privileges. The method may include identifying one or more document production operations associated with the workflow and for each document production operation, determining whether the document production operation violates any of the DRM privileges associated with the document, in response to the document production operation violating one or more of the DRM privileges, assigning a first status to the document production operation, and in response to the document production operation not violating one or more of the DRM privileges, assigning a second status to the document production operation. The method may include automatically causing only document production operations to which the second status is assigned to be performed on the document. | 2012-03-22 |
20120073000 | EMBEDDED ANTI-THIEF SYSTEM AND ANTI-THIEF METHOD THEREOF - The present invention relates to an embedded anti-thief system and a method thereof for executing anti-thief procedures, the embedded anti-thief system comprises: a core firmware module, an embedded system module and a cloud server module, wherein the core firmware module is disposed in a firmware device of a portable computer and capable of automatically inspecting the security status of the portable computer when the portable computer is booted. The embedded system module is disposed on a hard disk device of the portable computer and able to communicate with the core firmware module and the cloud server module, so as to confirm the security status of the portable computer. Through the method, the core firmware module and the embedded system module can be loaded and effectively cooperate with the cloud server module for executing the anti-theft procedures for the portable computer at any time. | 2012-03-22 |
20120073001 | METHODS AND COMPOSITIONS FOR TREATING OR PREVENTING PRURITIS - The invention features therapeutic compositions comprising agents useful for the treatment or prevention of pruritis, and methods useful for identifying such agents. | 2012-03-22 |
20120073002 | PREVENTION AND TREATMENT OF BLOOD COAGULATION-RELATED DISASES - Provided herein is an animal having a persistent hypercoagulable state by implanting a cell, for example a tumor cell, in which the gene of human tissue factor is implanted to an experimental animal such as a mouse and then growing the cell, thereby persistently supplying human tissue factor to the experimental animal. This animal model is useful for research and development of therapeutic agents for diseases having a persistent hypercoagulable state. Also provided are preventive or therapeutic agents for diseases having a persistent hypercoagulable state, a hypercoagulable state resulting from infections, venous thrombosis, arterial thrombosis, and diseases resulting from the hypertrophy of vascular media, the agent comprising an antibody against human tissue factor (human TF) as an active ingredient. | 2012-03-22 |
20120073003 | APOBEC3 MEDIATED DNA EDITING - The present invention relates to methods and compositions for preventing the occurance or progression of a cancer or pre-cancerous condition associated with expression, or over-expression of human cytidine deaminases of the APOBEC3 family. The invention also relates to drug screening assays designed to identify compounds that regulate the activity, or level of expression, of hA3A, hA3C and hA3H. The invention further relates to transgenic mice, as well as cells derived from said mice, that have been genetically engineered to express, or over-express hA3A, hA3C and/or hA3H. Such mice may be utilized to screen for, or identify, compounds that modulate the activity, or expression, of the human cytidine deaminases. The present invention also provides topical compositions such as cosmetic lotion, crème, or sunscreen for use on the skin, which comprise one or more inhibitors of human cytidine deaminase activity. The present invention relates to a double stranded DNA obtained following opening up of its duplex structure, said DNA being edited with cellular protein normally or abnormally expressed in the nucleus of an eukaryotic cell. The mono stranded DNA derived from the said double stranded DNA is a part of the present invention. | 2012-03-22 |
20120073004 | Hybrid Light Chain Mice - Genetically modified mice are provided that express human λ variable (hVλ) sequences, including mice that express hVλ sequences from an endogenous mouse λ light chain locus, mice that express hVλ sequences from an endogenous mouse κ light chain locus, and mice that express hVλ sequences from a transgene or an episome wherein the hVλ sequence is linked to a mouse constant sequence. Mice are provided that are a source of somatically mutated human λ variable sequences useful for making antigen-binding proteins. Compositions and methods for making antigen-binding proteins that comprise human λ variable sequences, including human antibodies, are provided. | 2012-03-22 |
20120073005 | TRANSGENIC ANIMAL CARRYING AT LEAST TWO TYPES OF FOREIGN FUNCTIONAL RNA - The present invention relates to a transgenic animal which intracellularly expresses at least two types of foreign functional RNA and has resistance to a pathogen such as a virus. In the animal carrying multiple types of foreign functional RNA, the proliferation of a pathogen can be more significantly inhibited compared to an animal carrying one type of foreign functional RNA. | 2012-03-22 |
20120073006 | PLANTS AND SEEDS OF SORGHUM VARIETY GSV682287 - According to the invention, there is provided plants and plant parts of the variety designated GSV682287. The invention also relates to methods for using a GSV682287 plant to produce various plants and plant parts. | 2012-03-22 |
20120073007 | PEA LINE 08560906 - The invention provides seed and plants of the pea line designated 08560906. The invention thus relates to the plants, seeds and tissue cultures of pea line 08560906, and to methods for producing a pea plant produced by crossing a plant of pea line 08560906 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line 08560906, including the seed, pod, and gametes of such plants. | 2012-03-22 |
20120073008 | Brilliant White Cauliflower - The present invention includes cauliflowers with enhanced whiteness and methods for obtaining such cauliflowers. The present invention also provides reagents that can be used in methods for obtaining such cauliflowers. | 2012-03-22 |
20120073009 | METHOD OF CREATING A SPRING BRASSICA NAPUS - Crossing a winter | 2012-03-22 |
20120073010 | PLANTS AND SEEDS OF SORGHUM VARIETY GSV958220 - According to the invention, there is provided plants and plant parts of the variety designated GSV958220. The invention also relates to methods for using a GSV958220 plant to produce various plants and plant parts. | 2012-03-22 |
20120073011 | LETTUCE CULTIVAR GANDHI - A lettuce cultivar, designated Gandhi, is disclosed. The invention relates to the seeds of lettuce cultivar Gandhi, to the plants of lettuce cultivar Gandhi and to methods for producing a lettuce plant by crossing the cultivar Gandhi with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Gandhi, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Gandhi and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Gandhi with another lettuce cultivar. | 2012-03-22 |
20120073012 | LETTUCE VARIETY CARINI (LS9499) - A lettuce cultivar, designated Carini, is disclosed. The invention relates to the seeds of lettuce cultivar Carini, to the plants of lettuce cultivar Carini and to methods for producing a lettuce plant by crossing the cultivar Carini with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Carini, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Carini and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Carini with another lettuce cultivar. | 2012-03-22 |
20120073013 | LETTUCE VARIETY PAULITA (LS9498) - A lettuce cultivar, designated Paulita, is disclosed. The invention relates to the seeds of lettuce cultivar Paulita, to the plants of lettuce cultivar Paulita and to methods for producing a lettuce plant by crossing the cultivar Paulita with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Paulita, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Paulita and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Paulita with another lettuce cultivar. | 2012-03-22 |
20120073014 | Zantedeschia Variety 110167-55633 | 2012-03-22 |
20120073015 | METHODS FOR PLANT TRANSFORMATION USING SPECTINOMYCIN SELECTION - The present invention relates to methods and compositions for transforming soybean, corn, cotton, or canola explants using spectinomycin as a selective agent for transformation of the explants. The method may further comprise treatment of the explants with cytokinin during the transformation and regeneration process. | 2012-03-22 |
20120073016 | AXMI-150 DELTA-ENDOTOXIN GENE AND METHODS FOR ITS USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions including a coding sequence for pesticidal polypeptides are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also include transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated pesticidal nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated nucleic acid molecules having nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:2, the nucleotide sequence set forth in SEQ ID NO:1, 3, 4, 5, 6, 7, 8, 9, 10, 11, or 12, as well as variants and fragments thereof. | 2012-03-22 |