16th week of 2012 patent applcation highlights part 65 |
Patent application number | Title | Published |
20120096475 | ORDERED PROCESSING OF GROUPS OF MESSAGES - A highly parallel, asynchronous data flow processing system in which processing is represented by a directed graph model, can include processing nodes that generate, and process, groups of dependent messages and that process messages within such groups in order. Other messages can be processed in whatever order they are received by a processing node. To identify a group of dependent messages, message identifiers are applied to a message. Processing of a message may generate child messages. A child message is assigned a message identifier that incorporates the associated message identifier of the parent message. The message identifier of the parent message is annotated to indicate the number of related child messages. When a group of messages is to be processed by a processing node in order, the processing node maintains a buffer in which messages in the group are stored. When a message is received, its message identifier indicates whether it is in a group, its parent node, if any, and the number of child nodes it has if it is a parent node. From this information, it can be determined whether all messages within the group have been received. When all of the messages within the group have been received, the processing node can process the messages in order. | 2012-04-19 |
20120096476 | VIRTUAL EVENT CHANNEL CONFIGURATION METHOD THROUGH COMBINATION OF EVENT CHANNELS AND EVENT MANAGEMENT APPARATUS USING THE METHOD - A virtual event channel configuration method according to an aspect of the present invention is a method for configuring and managing at least one virtual event channel by combining a plurality of event channels, in which each of the at least one virtual event channel comprises the steps of: receiving an event from at least one event sender; registering an event subscriber who wants to subscribe the sent event and an event filter designated by the event subscriber; validating whether the event filter designated by the event subscriber has an error in a given event filter grammar; and extracting an event to be sent from the received events using the event filter, if the event filter is validated. Accordingly, an event is received by dynamically combining interesting event channels, and thus it is possible to reduce an overhead due to unnecessary event processing. | 2012-04-19 |
20120096477 | APPARATUS AND METHOD FOR PROVIDING VEHICLE INFORMATION - An apparatus for providing vehicle information receives protocol information of an in-vehicle network, extracts a data analysis file corresponding to a protocol type among a plurality of pre-stored data analysis files, receives from the in-vehicle network, source data that contains a plurality of pieces of vehicle information, and extracts partial vehicle information from the source data according to the data analysis file. | 2012-04-19 |
20120096478 | Accessing a Data Structure - There is disclosed a method, apparatus, computer program and computer program product for facilitating access by an application to a data structure comprising a plurality of objects. A request is received from the application which initiates the return of the data structure. A handle is assigned to each of at least some of the plurality of objects. Objects in the data structure are retrieved and the application is informed of assigned handles thereby enabling the application to access retrieved objects. | 2012-04-19 |
20120096479 | OPTICAL DISC DRIVE - An optical disc drive including a conductive plate provided on a front surface of a disc tray. The conductive plate includes a structure of a hook portion at two places on the right and left and a structure of a pressure bar spring on the side end, in which the conductive plate is fixed using hook holes provided on the disc tray and the pressure bar spring presses and grounds a cabinet with the disc tray loaded in the inside of the cabinet. | 2012-04-19 |
20120096480 | DETECTING METHOD FOR LIMIT SWITCH OF OPTICAL DISC DRIVE BY SAMPLING VOLTAGE OF LIMIT SWITCH PREDETERMINED TIMES - A method is disclosed to detect the voltage of a limit switch in an optical disc drive. The method includes following steps: loading an optical disc when the voltage of the limit switch is at a high level, completing the disc loading process when the voltage is changed to a low level, sampling the voltage of the limit switch predetermined times when the voltage is changed to the high level again, detecting the sampling voltages, completing the disc ejecting process when the sampling voltages are all at the high level, and determining a voltage bouncing to maintain the disc loaded status to avoid disc ejection misjudgment of the optical disc drive when the sampling voltages are not all at the high level. | 2012-04-19 |
20120096481 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes an image analyzing unit performing a process of analyzing an image shot by a camera, a voice analyzing unit performing a process of analyzing voice input from a microphone, and a data processing unit receiving inputs of an analysis result of the image analyzing unit and an analysis result of the voice analyzing unit and controlling information to be output to a user. The data processing unit determines an output mode of the information to be provided to the user based on user information obtained from at least either one of the image analysis result and the voice analysis result, and system state information, and outputs the information to the user in the determined output mode. | 2012-04-19 |
20120096482 | METHODS AND APPARATUS FOR IDENTIFYING MEDIA CONTENT USING TEMPORAL SIGNAL CHARACTERISTICS - Methods and apparatus to identify media content using temporal signal characteristics are disclosed. An example method to identify media content includes generating a first signature based on a media content signal, the first signature comprising a plurality of first normalized features, each normalized feature corresponding to a signal peak and located at a temporal location of the signal peak in the audio signal, correlating the first signature to a reference signature comprising second normalized features to obtain an index, and determining that the first signature represents the same media content as the reference signature when the index is greater than a threshold. | 2012-04-19 |
20120096483 | Authenticated Broadcast Transmission Utilizing a Content Retransmitter - A content retransmitter receives information for receivers and forms an authorized list by transmitting authentication prompts, receiving authentication information, and adding receivers if the authentication information for the respective receiver is verified to match stored user information. Subsequently, the content retransmitter may receive content and broadcast the received content to some or all of the receivers on the authorized list. Additionally, the content retransmitter may store the received content in a storage medium and provide the stored content to receivers on the authorized list upon request. The user authentication information received from the receivers may be passwords, biometric information, and so on. The received content may be broadcast to a subset of the authorized list corresponding to users who are related to the content. The related users may be determined by examining metadata about the received content, facial recognition analysis of users present in the received content, and so on. | 2012-04-19 |
20120096484 | APPARATUS FOR RECEIVING BROADCAST SIGNAL - A broadcast signal receiving apparatus receives a plurality of transport streams and uses conditional access provided by an external adapter. The broadcast signal receiving apparatus includes a pre-processor operable to extract a part of information, by elementary stream unit, from each of the plurality of transport streams by receiving a filtering condition from the external adapter and performing filtering on the plurality of transport streams according to the filtering condition. The broadcast signal receiving apparatus also includes a multiplexer, an output interface, an input interface, and a demultiplexer. The external adapter is detachable from the broadcast signal receiving apparatus, and includes a conditional access descrambler that descrambles transport stream packets in the multiplexed data that are protected by conditional access with a packet identifier specified by the controller in the broadcast signal receiving apparatus. | 2012-04-19 |
20120096485 | MEDIA DISTRIBUTION ARCHITECTURE FOR TELEVISION VIEWING - A system distributes digital media content to a plurality of user devices, where a given user is associated with multiple user devices. First content is provided by a controller to a first user device and, in response, the controller determines interaction by the user with the first content. Thereafter, the controller provides second content to a second user device based on the prior provision of the first user content to the first user device and the first interaction information. More extensive user interaction history as well as device types may also be employed by the controller when determining the second content. | 2012-04-19 |
20120096486 | METHOD AND SYSTEM FOR MANAGING TELEVISION ADVERTS IN TIME SHIFTED BROADCAST CONTENT - There is provided a method of removing or replacing advert slots in linear broadcast television programming when replayed as a time-shifted television asset, comprising capturing an input linear broadcast video stream to form a time-shifted television asset, detecting advert cue signals indicative of advert slot timings within the time-shifted television asset, generating metadata indicative of the advert slot timings from the detected advert cue signals, and packaging the time-shifted television asset together with the metadata, for use by a downstream system to replace or remove adverts from the time-shifted television asset. There is also provided a time-shifted television asset capture device, comprising a linear broadcast video stream input, an advert cue signal detector to detect advert cue signals, a metadata generator adapted to generate metadata from the detected advert cue signals, and a metadata and time-shifted television asset packager adapted to package the metadata and time-shifted television asset together for delivery to a downstream system. | 2012-04-19 |
20120096487 | METHOD AND APPARATUS FOR RECOMMENDING MEDIA PROGRAMS - A method, system, and computer program product provide the ability to recommend, to a first viewer, alternative programming during playback of a first media program. The first media program is played. A second media program of potential interest to the user is identified. During an advertising break, an interface is presented to the user that identifies the second media program. An indication of interest in the second media program is received from the user. If the indication indicates that the user is interested in the second media program, a reference to the second media program is saved as a viewer recommendation for later playback. If not interested, additional input may be received from the user indicating why the user is not interested. | 2012-04-19 |
20120096488 | PROCESSING WORKFLOW FOR RECOMMENDING MEDIA PROGRAMS - A processing workflow method, system, and computer program product provide the ability; to recommend alternative programming during playback of a source media program. A media program player plays the source media program to a first viewer and provides information regarding the first viewer to a recommendation engine. The recommendation engine calculates and sends the media player a list of recommended media program candidates (including identifications of the candidates) based on the information. Prior to reaching an advertising break in the source media program, the media player transmits a request (including the identifications) for an advertisement to an advertising server and in response, receives an advertisement that is played to the first viewer during the advertising break. | 2012-04-19 |
20120096489 | Systems and methods for selecting television advertisements for a set-top box requesting an advertisement without knowing what program or channel is being watched - A computer system automatically identifies, in response to receipt of first electronic data indicating selected advertisements are desired for a set-top box, certain television programs/channels that permit or desire selected advertisements, and automatically makes available to a device a set of selected television advertisements. The programs/channels are identified using second electronic data. The programs/channels are available for viewing in a time slot during which the first electronic data was received. Each selected advertisement corresponds to an identified television program/channel. The device has access to third electronic data indicating which program/channel is currently being presented via the set-top box, so that a selected television advertisement can be presented via the set-top box while the corresponding program/channel is being presented. The computer system selects and makes available the first set of television advertisements without access to the third electronic data. | 2012-04-19 |
20120096490 | TRANSMITTING CUSTOM ADVERTISEMENTS TO A CLIENT DEVICE - Systems and methods are provided for transmitting an advertisement to a client device. The method comprises, receiving from a client device via a communication network a profile that includes information concerning a user, selecting, via a processor, an advertisement from a plurality of available advertisements based on the information concerning the user included in the profile and also based on targeting criteria associated with each of the available advertisements, and transmitting to the client device via the communication network the advertisement selected from the plurality of available advertisements so that the advertisement can be presented via the client device. | 2012-04-19 |
20120096491 | Correlating online behavior with presumed viewing of television advertisements - A method implemented using a programmed hardware computer system comprises: in response to a request to deliver an advertisement received from a TVP or STB (or another entity for the STB), causing a television advertisement to be directed to the STB; storing indicia derived from that direction; and taking an action with respect to an online user interface device (such as a computer, game machine, or mobile phone) associated with the STB, which action is either (i) causing delivery to the online user interface device of an online advertisement targeted based on the presumed viewing of the television advertisement, or (ii) identifying a correlation between the presumed viewing of the television advertisement and subsequent online behavior conducted using the online user interface device that is or has been tracked. | 2012-04-19 |
20120096492 | TRANSMISSION OF VIDEO SIGNALS - An apparatus, method, and system are described for transmitting a television program signal. A portion of a local frequency spectrum may be determined to be free, or relatively unused. A user selection of a television program or broadcast programming channel may be received from a program lineup in an electronic programming guide. The selected program may be selected from a gateway, translated, and transmitted over the portion of the frequency spectrum determined to be free. The translation may include converting a signal from the gateway into a National Television Systems Committee (NTSC) signal or a mobile TV signal. | 2012-04-19 |
20120096493 | ELECTRONIC PROGRAM GUIDE WITH DIGITAL STORAGE - An interactive television program guide system with digital storage is provided. The program guide gives users the ability to store information associated with recorded programs in a directory in the digital storage device thereby providing easy access to program information. The program guide may also provide a global media library for indicating the programs stored on removable storage media used with the program guide. The guide may also allow the user to manage and maintain a user media library to do the same. Non-time-sensitive data associated with recorded programs may be stored in a way that allows the user to interact with the data on playback as if the program were being originally aired. The program guide also allows the user to define “super-programs” for playback of a sequence of stored programs or program segments. | 2012-04-19 |
20120096494 | System and Method for Processing Multiple Broadcast Multimedia Streams - A computer-implemented method is disclosed including: receiving a broadcast signal containing a set of multiplexed multimedia channels; storing said multiplexed multimedia channels in a temporary storage buffer on a mass storage device; determining a point in said temporary storage buffer to begin demultiplexing and decoding a first channel responsive to a user request to view a particular program on said first channel in its entirety, said point indicating the start of said program on said first channel; and demultiplexing and decoding said first channel of said set of multiplexed multimedia channels from said point within said temporary storage buffer. | 2012-04-19 |
20120096495 | BROADCAST RECEPTION DEVICE, BROADCAST RECEPTION METHOD, AND BROADCAST TRANSMISSION DEVICE - A receiver in a broadcast receiving apparatus receives a broadcast signal including a content of a program and download control information corresponding to the program. A TLV demultiplexer separates the content of the program and the download control information from the received broadcast signal. A content storage and an ECG storage respectively store the separated content and download control information. A download processor acquires, when a missing portion exists in the stored content, a portion, which corresponds to the missing portion, of the content as a complementary portion from a distribution server by a communication unit accessing the distribution server in a distribution period represented by distribution schedule information included in the download control information. A coupler complements the missing portion of the content using the acquired complementary portion. | 2012-04-19 |
20120096496 | SYSTEM AND METHOD OF PROVIDING AN INTERACTIVE MENU THROUGH STREAMING VIDEO - A method of providing a menu for video content is disclosed and may include delivering a looping video clip over a first video channel. The looping video clip may be configured to be displayed on a video plane. The method may also include delivering side channel data over a second video channel. The side channel data may include two or more navigable menu elements that may be configured to be displayed on a graphics overlay plane. | 2012-04-19 |
20120096497 | RECORDING TELEVISION CONTENT - A method, in one embodiment, can include a server receiving data from a television via a communication medium. The data includes an identifier of a television channel that the television is tuned to. In addition, the server transmits a token to the television via the communication medium. Furthermore, the television transmits the token to a cloud storage via the communication medium. Moreover, the cloud storage stores a live broadcast television video from the television channel. | 2012-04-19 |
20120096498 | SYSTEMS AND ETIQUETTE FOR HOME GATEWAYS USING WHITE SPACE - Methods and systems for sharing white space with primary services and other emerging services are provided. Signal distribution within a specified location, such as a dwelling, is performed using a home gateway that identifies unused white space, reserves such white space spectrum, and delivers data to one or more devices at the respective location using the reserved spectrum. Signalling between the devices and the gateway is performed over a shared signalling channel, which enables the gateway to advise the devices from where and when to receive data. The gateway also uses a common spectrum reservation OFDM symbol to advise the neighbouring gateways of the local spectrum reservation. | 2012-04-19 |
20120096499 | APPARATUS AND METHOD FOR FACILITATING VIDEO-ON-DEMAND CATALOG SEARCH AND CONTENT DISTRIBUTION - A system and method of video-on-demand (VOD) content search and distribution via an Internet Protocol (IP) network. A user sends a scan of a bar-coded identifier placed on a packaging or advertising material for a movie or other audio-visual program. Using the received barcode scan, the cable operator's VOD system checks the availability of the requested title under the VOD service. If the title is available, the system allows the user to instantaneously purchase and/or bookmark the title via a mobile device. If the title is currently unavailable “on demand”, the VOD system may send a notification to the user when the title becomes available. The bar code scan-based methodology enables the user to request desired titles even when the user is unaware of the titles available in a cable operator's VOD catalog. The IP network-based communication affords users substantially universal and instantaneous access to the desired VOD content with increased mobility and flexibility. | 2012-04-19 |
20120096500 | SYSTEM AND METHOD FOR DELIVERING VIDEO ON DEMAND - A system and method of delivering video on demand includes a web site for receiving customer requests for video content, locating the requested content on one of a plurality of distributed video servers, and arranging the located content to be distributed to the customer's set top box via a broadband connection. | 2012-04-19 |
20120096501 | FRAME SHARING - A method including providing television content (TC) to a user; receiving a TC capture request; capturing TC frames based on the TC capture request; displaying to the user one or more TC frames included in the captured TC frames; receiving a user selection of one or more TC frames included in the displayed one or more TC frames; receiving a user selection of one or more destinations to send the selected one or more TC frames; and sending the selected one or more TC frames to the one or more destinations. | 2012-04-19 |
20120096502 | APPARATUS AND METHOD FOR DISTRIBUTING INTEGRATED BROADCAST - An integrated broadcast distributing apparatus and method capable of obtaining integrated broadcast including Cable Television (CATV) broadcast, Internet Protocol Television (IPTV) broadcast and real time terrestrial broadcast is provided. The apparatus includes a broadcast receiving unit configured to receive a plurality of pieces of broadcast information about the plurality of broadcasts, a channel information managing unit configured to check an existence of a plurality of subscriber terminals of the subscriber terminals requesting a same real time broadcast channel of the plurality of broadcasts, and a broadcast distribution unit configured to copy broadcast information corresponding to the same real time broadcast channel and distribute the copied broadcast information corresponding to the same real time broadcast channel to the subscriber terminals requesting the same real time broadcast channel, if a result of the checking is that a plurality of subscriber terminals requesting the same real time broadcast channel exist. | 2012-04-19 |
20120096503 | SYSTEMS AND METHODS FOR PROVIDING COMPANION SERVICES TO CUSTOMER EQUIPMENT USING AN IP-BASED INFRASTRUCTURE - Disclosed herein are systems and methods for providing companion services to customer premises equipment (CPE) using an IP-based service infrastructure. The infrastructure allows IP-enabled devices such as tablet PCs, smart phones, PDAs, and laptop computers to provide supplementary services to target systems and devices located at customer premises. Target systems and devices (CPE) may be TVs, PCs, set-top boxes, digital video recorders, or other electronics. An embodiment is disclosed which allows a mobile device to provide companion services to a television through a link with a set-top box in a cable TV network using the Internet. | 2012-04-19 |
20120096504 | VALIDATION & FAST CHANNEL CHANGE FOR BROADCAST SYSTEM - A method of enabling transmission of a data service from a content server to a terminal using a data channel in a system in which at least part of the data service is transmitted to the terminal using a broadcast channel, the method including: receiving, using the broadcast channel, first data comprising part of the data service; processing the first data using a signature-generating algorithm to derive first signature data; transmitting the first signature data using the data channel to the content server; validating the first signature data by comparing said first signature data with a signature derived by processing data comprising part of the data service using a corresponding signature-generating algorithm; and enabling the terminal to access the data service using the data channel dependent on validation of the first signature data. | 2012-04-19 |
20120096505 | METHOD OF DISPLAYING INTERNET SIGNAL ON TV - A method of displaying an Internet signal on a TV. Preferably, at least a portion of the Internet signal is selectively displayed by a remote activation control signal. | 2012-04-19 |
20120096506 | METHOD FOR DISPLAYING TV BROADCAST SIGNAL AND INTERNET SIGNAL ON TV - A method for displaying a TV broadcast signal and Internet signal on a a TV. Preferably, a Web link image is displayed on the TV, which a user can select to display IP content. | 2012-04-19 |
20120096507 | TV SYSTEM FOR DISPLAYING TV BROADCASTS SIGNAL AND INTERNET SIGNAL - A TV system for displaying TV broadcast signal and Internet signal. Preferably, the TV system is configured to simultaneously or selectively display the TV broadcast signal and Internet signal. | 2012-04-19 |
20120096508 | METHOD OF CONTROLLING AND APPARATUS OF RECEIVING MOBILE SERVICE DATA - A method of processing broadcast data in a broadcast transmitting system is presented. The method includes performing Reed-Solomon (RS) encoding and Cyclic Redundancy Check (CRC) encoding on mobile service data bytes to generate an RS frame, wherein the RS frame comprises an RS frame payload including the mobile service data bytes, RS parity data bytes added at bottom ends of columns of the RS frame payload and CRC data bytes added at right ends of rows of the RS frame payload having the RS parity data bytes, dividing the RS frame into a plurality of portions, wherein each of the plurality of portions has an equal size of data bytes, converting the data bytes of the plurality of portions into data bit, and encoding each of the data bits at a code rate of 1/H to output data symbols, wherein H is greater than 1. | 2012-04-19 |
20120096509 | DIGITAL VIDEO DATA RELAY - A video relay circuit is provided including an input channel to receive input video data packets; a first circuit to convert the input video data packets into data for a display device; a second circuit coupled to the first circuit to retime, recondition and re-drive the data channels; an output channel to couple the video data packets into an output stream. Also provided is a video data transmission link including a video relay circuit as above and a daisy chain of video display devices including a video source; a plurality of video display devices wherein a first video display device is coupled to the source of video data, and each further video display device receives the source signal from the previous display and provides the video signal to the next display; wherein at least one of the video display devices comprises a video relay circuit as above. | 2012-04-19 |
20120096510 | COMPUTER NETWORK SECURITY - A system comprises: a representation of a network; a communications requirements file for an application to be executed by a node of said network; and a security policy file defining a security policy for said node of said network. Said files are processed to determine whether said security policy and said communication requirements are compatible. | 2012-04-19 |
20120096511 | ENHANCED BROWSER SECURITY - A machine-executable method implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply at least one security policy to interaction between the system and web sites corresponding to domain identifiers populating the at least one security-context zone includes comparing a first set of domain identifiers populating a first security-context zone of the at least one security-context zone with a second set of domain identifiers. The method further includes populating the first security-context zone with at least one second-set identifier not included in the first set of domain identifiers. | 2012-04-19 |
20120096512 | POLICY SELECTOR REPRESENTATION FOR FAST RETRIEVAL - A method and apparatus for representing policies and searching for polices that matches packet are provided. The policies being represented and searched for include policies that overlap and policies that have “don't care” attributes. | 2012-04-19 |
20120096513 | Adapting Network Policies Based on Device Service Processor Configuration - Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems. | 2012-04-19 |
20120096514 | AGE VERIFICATION AND CONTENT FILTERING SYSTEMS AND METHODS - A system and method is provided for age verification and content filtering (AV/CF) on a wireless telecommunications system capable of providing enhanced products such as Internet, WAP, messaging, games, video, music, applications, etc. A profile controls content that is accessible by a user depending upon the user's age or restrictions placed on accessible content in accordance with content categories. Rating information is obtained from content providers and mapped to content categories or content is rated dynamically. User's requests for access may be recorded whether access is provided or denied and used to provide reports including reports to account holders responsible for the user's account. In some instances, attempts to access banned information may be reported to law enforcement officials. | 2012-04-19 |
20120096515 | METHOD AND APPLICATION FOR THE PARENTAL CONTROL OF THE USE OF A TERMINAL - The invention pertains to a method for the parental control of a terminal's usage, wherein said terminal's usage rules are configured beforehand, said rules being applied in order to allow or deny access to a service requested by the user by means of said terminal, said method further providing to determine events for which the user may be rewarded, and, if one of said events occurs, to define a usage reward (R) corresponding to said event, said reward being subject to parental approval prior to its being taken into account in the application of the usage rules. The invention also pertains to an application for the parental control of a terminal's usage. | 2012-04-19 |
20120096516 | Software Signing Certificate Reputation Model - A request from a software developer is received to digitally sign software included in the request. A security policy associated with the software developer is accessed where the security policy describes criteria for valid request by the software developer. A determination is made whether the request is valid based at least in part on the security policy. The software is digitally signed responsive to the determination indicating that the request is valid. The digitally signed software is provided to the software developer. | 2012-04-19 |
20120096517 | SYSTEM AND METHOD FOR PROVIDING A SECURE CONNECTION BETWEEN NETWORKED COMPUTERS - Embodiments disclosed herein provide a system, method, and computer program product for obtaining secure connectivity between networked computing devices. The invention comprises utilizing a network protocol inherent to an operating system on a client device to automatically set up and establish a transient secure network connection endpoint on the client device. The act of utilizing can be a result of a server device responding to a connection request from the client device. The act of establishing the transient secure network connection endpoint on the client device creates a transient secure network connection between the server device and the transient secure network connection endpoint on the client device without manual intervention or configuration by a user at the client device. Secured access by the client device to one or more network devices is permitted until the transient secure network connection between the server device and the client device is severed. | 2012-04-19 |
20120096518 | Secure Provisioning Methods And Apparatus For Mobile Communication Devices Operating In Wireless Local Area Networks (WLANs) - A method for use in enabling a mobile communication device for communication involves establishing communication with an IEEE 801.11 device which is configured to operate as an access point; while communicating with the IEEE 801.11 device: participating in an authentication procedure with the IEEE 802.11 device; after positive authentication from the authentication procedure, participating in a provisioning procedure with the IEEE 802.11 device for receiving information for programming in the mobile communication device; and communicating with use of the programmed information in the mobile communication device. | 2012-04-19 |
20120096519 | Methods and Apparatuses for Avoiding Denial of Service Attacks By Rogue Access Points - Methods and apparatuses are provided for avoiding denial of service attacks by rogue access points. A method may include attempting to verify activation of access stratum security by an access point based at least in part upon integrity protection information included in a received security mode command message sent by the access point, wherein a radio connection has been established with the access point. The method may further include detecting an occurrence of a security activation deadlock. The method may additionally include determining that a predefined number of security activation deadlocks with the access point have occurred. The method may also include identifying the access point as a rogue access point based at least in part upon the determination that a predefined number of security activation deadlocks with the access point have occurred. Corresponding apparatuses are also provided. | 2012-04-19 |
20120096520 | Key Cashing, QoS and Multicast Extensions to Media-Independent Pre-Authentication - This present application relates to, among other things, Key Caching, QoS and Multicast extensions and improvements to the Media-independent Pre-Authentication (MPA) framework, a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility optimization mechanisms. MPA is a mobile assisted, secure handover optimization scheme that works over any link-layer and with any mobility management protocol. | 2012-04-19 |
20120096521 | METHODS AND SYSTEMS FOR PROVISIONING ACCESS TO CUSTOMER ORGANIZATION DATA IN A MULTI-TENANT SYSTEM - Embodiments are described for providing support representative access to applications deployed in an enterprise network environment. An access provisioning system defines a support user class in a user profile database for an application executed on an organization partition within the network. The support user is granted read only privileges to metadata of the application. An organization administrator can grant support personnel access to the application as a support user, thus the ability to view, analyze, and possibly modify the metadata. The access provisioning system generates a Security Assertion Markup Language (SAML) assertion upon request by the support personnel to enable access to the data to the extent of the granted privileges. The SAML protocol includes authentication of the support representative as an authorized support user within the system. | 2012-04-19 |
20120096522 | METHOD FOR ASSEMBLING AUTHORIZATION CERTIFICATE CHAINS FOR SIGNED XML - A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access. | 2012-04-19 |
20120096523 | METHOD AND APPARATUS FOR LINKING MULTIPLE CONTACT IDENTIFIERS OF AN INDIVIDUAL - Techniques for linking multiple contact identifiers of an individual include receiving first data that indicates contacts of a first user at first services. Contact identifiers for a different second user at second services are determined based at least in part on the contacts. Second data that indicates an association among the second user and the candidate contact identifiers is sent to the first user. In some embodiments on a client, techniques include determining to send first data that indicates contacts of a first user at first services; and receiving second data. The second data indicates an association among a different second user and candidate contact identifiers for the second user at second services based at least in part on the contacts. A prompt is presented for the first user to approve an association between the second user and a candidate contact identifier. | 2012-04-19 |
20120096524 | METHOD AND SYSTEM FOR FAST ACCESS TO ADVANCED VISUALIZATION OF MEDICAL SCANS USING A DEDICATED WEB PORTAL - A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized databases employs a transmitter for securely sending volume visualization dataset from a remote location to the centralized database, more than one central data storage medium containing the volume visualization dataset, and a plurality of servers in communication with the centralized databases to create virtual views based on client requests. A resource manager load balances the servers, a security device controls communications between the client device and server and the resource manager and central storage medium. Physically secured sites house the components. A web application accepts at the remote location user requests for a virtual view of the volume visualization dataset, transmits the request to the servers, receives the resulting virtual view from the servers, and displays the resulting virtual view to the remote user. | 2012-04-19 |
20120096525 | Supporting Compliance in a Cloud Environment - Gathering auditable data concerning actions in a cloud computing environment is automated by determining that one or more auditable data items are available associated with a requester and with at least one application program; responsive to determining that data items are available, transmitting a list of the available auditable data items to a requesting cloud client computer; subsequent to transmitting the list, receiving a data request from the cloud client computer for one or more particular auditable data items from the list; preparing the requested particular auditable data items for transmission according to a predetermined format; and transmitting the prepared requested particular auditable data items to the cloud client computer. Optionally, in some embodiments, the requesting cloud client computer may negotiate a data exchange format with the cloud service provider for receipt of the requested auditable information. | 2012-04-19 |
20120096526 | FLEXIBLE MODULES FOR VIDEO AUTHENTICATION AND SHARING - A method for managing video authentication and sharing includes storing a playlist of video clips in a storage device, allowing a manager to define a degree of privacy for the playlist by the computer system, defining roles for a plurality of users in relation to the video clips, creating user tokens for the plurality of users according to the respective roles of the users, receiving a user token over a computer network, authenticating the user token and the role of a user associated with the user token, deciding on whether the user has the right to access the playlist of video clips based on the role of the user and the degree of privacy defined for the playlist, and if it is determined that the user has the right to access the playlist, allowing the user to access the playlist of video clips over the computer network. | 2012-04-19 |
20120096527 | POWERSHELL CMDLETS CODE GENERATING TOOL FOR COMMUNICATING TO THE WEB SERVICES - An objected oriented shell code generating tool receives data that identifies a Web service hosted by a server. The tool creates proxy code to generate a Web service client proxy to identify a plurality of methods for the Web service. For each method, the tool automatically creates object driven shell commands code that defines a class implementing parameters of the Web service method, wherein the object driven shell commands code is to be executed in an object driven shell platform to communicate with the Web service method via the client proxy. The tool generates invocation infrastructure code for communicating to the Web service method via the client proxy and deploys the proxy code, the invocation infrastructure code, and the object driven shell commands code in the object driven shell platform on the client to call a Web service method via the invocation infrastructure and the client proxy. | 2012-04-19 |
20120096528 | IMAGE FORMING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - To provide an authentication method of enabling a user to use a multifunction machine in which user information of the user is not registered on an authentication table thereof, without deteriorating a maintenance capability of the authentication table, the method is characterized to include steps of obtaining user information from the user, determining whether or not the obtained user information is included on a user information table, and transmitting, when the obtained user information is not included on the user information table, the user information to an image forming apparatus registered in a redirect destination list. The method is further characterized to cause the transmission-destination image forming apparatus to authenticate the transmitted user information, and permit use of the image forming apparatus by the user according to an authentication result of the transmission-destination image forming apparatus. | 2012-04-19 |
20120096529 | Method and Device for Managing Authentication of a User - A method and apparatus are provided for managing authentication of a user of a telecommunications network of an operator. The method includes the following steps: on receipt of a request for access to a service provided by the operator of this network by the user, issuing a request for identification of an authentication server destined for an authentication location server, the request including at least one identifier of the user; and on receipt of a response comprising an identifier of an authentication server associated with the identifier of the user, issuing a request for authentication of the user at the server identified for the requested service. | 2012-04-19 |
20120096530 | INFORMATION PROCESSING APPARATUS THAT PERFORMS AUTHENTICATION OF LOGIN FROM EXTERNAL APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus that, even when a user forgets a user ID or the like in remotely logging in to the information processing apparatus from an external apparatus, permits login from the external apparatus insofar as another authentication means satisfies predetermined conditions. Authentication information input by the user when logging in is transmitted to a management server connected to a network, and a login authentication result for the user is received from the management server. Whether or not to permit login by the user from an external apparatus connected to the network is determined based on identification information on the external apparatus. Login by the user from the external apparatus is permitted when the received login authentication result is indicative of successful authentication, and the identification information on the external apparatus is included in the authentication result. | 2012-04-19 |
20120096531 | Multimedia Aggregation in an Online Social Network - Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content and a content ID for the multimedia content. The configuration file, the source ID and the content ID are stored locally by the online social network so that any changes to the embed codes can be made by changing the configuration file associated with the source and regenerating the embed codes. By managing multimedia content in this manner, greater control can be exercised by the online social network over the multimedia content that are featured on its user pages. | 2012-04-19 |
20120096532 | Multimedia Aggregation in an Online Social Network - Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content and a content ID for the multimedia content. The configuration file, the source ID and the content ID are stored locally by the online social network so that any changes to the embed codes can be made by changing the configuration file associated with the source and regenerating the embed codes. By managing multimedia content in this manner, greater control can be exercised by the online social network over the multimedia content that are featured on its user pages. | 2012-04-19 |
20120096533 | Application Identity Design - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 2012-04-19 |
20120096534 | Application Identity Design - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 2012-04-19 |
20120096535 | One Time Password - A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10̂Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C′. If there is an initial mismatch, the validation server compensate for a lack of synchronization between counters C and C′ within a look-ahead window, whose size can be set by a parameter s. | 2012-04-19 |
20120096536 | Data Security System - A method, computer system, and computer program product for validating data contained in a request sent by a requestor to a server application. A computer receives the request from the requestor before receipt of the request by the server application. The computer identifies a set of data validation rules to apply to the data in the request based on a data format specification contained in the request sent by the requestor. The computer determines whether the data is valid based on the identified set of data validation rules. The computer forwards the request to the server application in response to the computer determining that the data is valid based on the identified set of data validation rules. | 2012-04-19 |
20120096537 | BASIC ARCHITECTURE FOR SECURE INTERNET COMPUTERS - A method of securely controlling through a private network a computer protected by a hardware-based inner access barrier or firewall and optionally configured to operate as a general purpose computer connected to the Internet, comprising: two separate network connections separated by an inner hardware-based access barrier or inner hardware-based firewall protecting a private network connection configured for connection to a private network of computers but not protecting a public network connection configured for connection to a public network configured to include the Internet, the method including the step of controlling at least one operation of the computer, the control being provided through the private network and the operation involving data and/or code transmitted to the public network. Another method includes the step of controlling an operation of a second or third private protected unit of the computer, the control being provided through a second or third private network, respectively. | 2012-04-19 |
20120096538 | DYNAMIC MOBILE STREAMING APPLICATION SUPPRESSION - A method performed by a network device may include obtaining an Internet Protocol address and a user device identifier associated with a user device, determining that the obtained user device identifier does not match a previous user device identifier associated with the obtained Internet Protocol address, and monitoring packets destined for the obtained Internet Protocol address to determine whether the packets are associated with a streaming application, based on determining that the obtained user device identifier does not match the previous user device identifier. The method may further include detecting a packet destined for the obtained Internet Protocol address, where the packet is associated with a streaming application and where the packet is received from a particular network device and signaling the particular network device to stop sending packets associated with the streaming application and destined for the obtained Internet Protocol address. | 2012-04-19 |
20120096539 | WIRELESS INTRUSION PREVENTION SYSTEM AND METHOD - A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack. | 2012-04-19 |
20120096540 | PROCESS FOR ESTABLISHING A VPN CONNECTION BETWEEN TWO NETWORKS - A VPN connection is established between two networks ( | 2012-04-19 |
20120096541 | SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES - A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link. | 2012-04-19 |
20120096542 | PORTABLE CONFIDENTIAL ACCOUNT INFORMATION MANAGEMENT DEVICE - In one general aspect, a portable confidential account information management device is disclosed that includes a biometric sensor, keyboard, processor, and storage. The storage includes account information storage including fields that each include an account identifier field and a password field. It also includes program storage including native account management software responsive to the biometric sensor and the keyboard to enable retrieval of contents of the account identifier field and password field for selected accounts. A display screen is responsive to the account management software and operative to display retrieved contents of the account identifier field and the retrieved password field for the selected accounts. In another aspect, removable portable data storage device port is responsive to the storage to store backup copies of information. Disclosed devices can be designed to improve security by isolating them from external access or connectivity. | 2012-04-19 |
20120096543 | AD HOC TRUST DELEGATION IN HUMAN BASED WORKFLOW SYSTEMS USING ONE TIME ACCESS KEY - A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system. | 2012-04-19 |
20120096544 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM - There are provided an information processing apparatus which provides a user credential sharing service on a user credential sharing condition intended by a vendor that creates an application, and a control method for the information processing apparatus. To accomplish this, the information processing apparatus generates sharing settings which defines a sharing condition for each item of a user credential among applications according to a manifest file acquired from each application. Upon receiving a request of a user credential from one of the applications, the information processing apparatus provides the user credential to the requesting application according to the generated sharing settings. | 2012-04-19 |
20120096545 | METHOD FOR RESTRICTING THE USE OF AN APPLICATION PROGRAM, SYSTEM FOR AUTHENTICATING THE USER OF A MEASURING APPARATUS, AUTHENTICATION SERVER, CLIENT APPARATUS AND STORAGE MEDIUM - A user authentication system is provided with a client apparatus and an authentication server. An application program used for processing the measurement results of the measuring apparatus is installed on the client apparatus. Databases for storing use authority information of the application program are provided on the authentication server. A user inputs authentication information when operating the client apparatus and the application program is started. The client apparatus sends the authentication information to the authentication server, and an authentication process is performed by the authentication server. When authentication is successful, the use authority information of this user is sent from the authentication server to the client apparatus, and the client apparatus sets the application use restrictions according to the use authority information. | 2012-04-19 |
20120096546 | Edge server HTTP POST message processing - A CDN edge server process receives an HTTP message, takes a given action with respect to that message, and then forwards a modified version of the message to a target server, typically a server associated with a CDN customer. The process may include an associated intermediate processing agent (IPA) or a sub-processing thread to facilitate the given action. In one embodiment, the message is an HTTP POST, and the given action comprises the following: (i) recognizing the POST, (ii) removing given data from the POST, (iii) issuing an intermediate (or subordinate) request to another process (e.g., a third party server), passing the given data removed from the POST to the process, (iv) receiving a response to the intermediate request, (v) incorporating data received from or associated with the response into a new HTTP message, and (vi) forwarding the new HTTP message onto the target server. In this manner, the given data in the POST may be protected as the HTTP message “passes through” the edge server on its way from the client to the target (merchant) server. In an alternative embodiment, data extracted from the POST message is enhanced by passing the data to an externalized process and adding a derived value (such as a fraud risk score based on the data) back into the message. | 2012-04-19 |
20120096547 | METHOD FOR DETECTING AN ATTEMPTED ATTACK, RECORDING MEDIUM, AND SECURITY PROCESSOR FOR SAID METHOD - This method in which an attempt to attack a security processor is detected by the security processor itself comprises:
| 2012-04-19 |
20120096548 | NETWORK ATTACK DETECTION - A method and apparatus are provided for detecting attacks on a data communication network. The apparatus includes a router with a mechanism for monitoring return messages addressed to an originating user system local to the router. The mechanism includes a message checker for identifying a return message of a specified nature and a rerouter for temporarily routing subsequent messages from the originating user system to the intrusion detection sensor. | 2012-04-19 |
20120096549 | ADAPTIVE CYBER-SECURITY ANALYTICS - Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value. | 2012-04-19 |
20120096550 | PROVIDING SECURITY FOR A VIRTUAL MACHINE BY SELECTIVELY TRIGGERING A HOST SECURITY SCAN - The disclosed embodiments provide a system that protects an application from malware on a host system. During operation, the system receives a command to commence execution of the application on the host system. In response to the command, the system causes a security scan to be performed on the host system to detect malware, wherein the malware can compromise the security of the application. The system also restricts one or more operations associated with the application until the security scan successfully completes. | 2012-04-19 |
20120096551 | INTRUSION DETECTING SYSTEM AND METHOD FOR ESTABLISHING CLASSIFYING RULES THEREOF - A method for establishing classifying rules of an intrusion detecting system is provided with the following steps. First, at least one decision tree is provided. Internal nodes of the decision tree respectively represent an attribute judgment condition, and leaf nodes respectively represent an attack event or non-attack event. Next, a plurality of attribute data of at least one new attack event is received. Then, a tree structure of the decision tree is adjusted according to the attribute data. Afterwards, at least one attack rule or at least one non-attack rule is outputted according to the adjusted decision tree. Further, the intrusion detection system is also provided. | 2012-04-19 |
20120096552 | SYSTEM FOR AN ENGINE FOR FORECASTING CYBER THREATS AND METHOD FOR FORECASTING CYBER THREATS USING THE SYSTEM - A system for an engine for forecasting cyber threats and a method enabling the forecast of a low-level cyber threat and the forecast of a high-level cyber threat using the low-level cyber threat in a hierarchical structure of cyber threats are provided. The system includes a forecast information database which stores forecast information including cyber threat forecast items, a forecast schedule related to the items, forecast simulation information, forecast item hierarchical structure information, time series data on cyber threats, and sample data on cyber threats; a forecast engine core subsystem which forecasts the levels of threats for the cyber threat forecast items having a hierarchical structure using the forecast information stored in the forecast information database; and a forecast engine control interface which receives control commands for the forecast engine core subsystem from a user or external system, and delivers the received control commands to the forecast engine core subsystem. | 2012-04-19 |
20120096553 | Social Engineering Protection Appliance - Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes. | 2012-04-19 |
20120096554 | Malware identification - A method for identifying a data collection as malware, comprising the steps of parsing the data collection to generate program code and to verify conformance to a language syntax, emulating the interaction between the program code and a processor, detecting presence of a portion of the program code that is likely to have been added to the program code for the purpose of avoiding detection by malware detection programs, and, in the presence of such code, identifying the data collection as malware. | 2012-04-19 |
20120096555 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device. | 2012-04-19 |
20120096556 | SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS ACTIVITIES THROUGH NON-LOGGED-IN HOST USAGE - A method for identifying malware activities, implemented within a computer infrastructure, includes receiving a data communication via a data channel and determining a user is not interactively logged in to a host. Additionally, the method includes identifying the data communication as a potential malware communication in response to the determining the user is not interactively logged in to the host. | 2012-04-19 |
20120096557 | VARIABLE RISK ENGINE - The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis. | 2012-04-19 |
20120096558 | Assessing Threat to at Least One Computer Network - Apparatus configured to determine predicted threat activity based on stochastic modelling of threat events capable of affecting at least one computer network in which a plurality of systems operate. | 2012-04-19 |
20120096559 | CANCELLING DIGITAL SIGNATURES FOR FORM FILES - The embodiments described herein generally relate to methods and systems for enabling a client to request a server to cancel the digital signing of a form file associated with a form. Successful cancellation of the digital signing process results in a return of the form file to its initial state, in which data are not lost, and the form can be resubmitted and/or the application of the digital signature can be retried. Request and response messages, communicated between a protocol client and a protocol server, cause the performance of protocol functions for applying a digital signature to a form file and for cancelling the signature thereof where errors in the signing process are detected. A versioning mechanism enabling the detection of version differences and resulting upgrades to the digital signature control allows for robust communications between a client and a server operating under different product versions. | 2012-04-19 |
20120096560 | Method and a Device for Protecting Private Content - In a method of enabling Digital Rights Management (DRM) of content in a communications network supporting a DRM system a first user equipment (RMUE), is registering with a first rights issuer of the DRM system from which a delegation assertion, authorizing the RMUE to become a private rights issuer, is retrieved. RMUE retrieves a first, signed rights object from the first rights issuer, that contains a first set of rights for the RMUE to DRM protect private content and to issue at least one second rights object, associated with the private content. DRM protection is then applied on private content, obtained by the RMUE, according to at least the first set of rights. RMUE issues a second rights object, defining a second set of rights for rendering the private content, according to the first set of rights. RMUE may then distribute the second rights object to a second user equipment which is able to render the private content on the basis of at least said second rights object, upon having acquired the private content and the delegate assertion. | 2012-04-19 |
20120096561 | IC CHIP, INFORMATION PROCESSING APPARATUS, SOFTWARE MODULE CONTROL METHOD, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An IC chip, an information processing apparatus, a software module control method, an information processing system, an information processing method, and a program for ensuring security before booting a software module reliably are provided. A reader/writer and a mobile phone terminal to be accessed by the reader/writer through proximity communication are provided. In the mobile phone terminal, a first software module transmits commands to second and third software modules. The first software module manages states of the second and third software modules. If during boot-up of the third software module, the processing of the second software module is started and completed, then the first software module resumes the boot-up of the third software module. | 2012-04-19 |
20120096562 | METHOD FOR PROTECTING THE SOURCE CODE OF A COMPUTER PROGRAM - The invention relates to a method for protection of a computer program source code comprising the following steps: | 2012-04-19 |
20120096563 | System and Method for Providing Access to Verified Personal Background Data - Access to verified personal background data is provided in the form of an electronic document that includes a data record having personal background data and corresponding verification information as well as an electronic authentication of the contents of the data record. The data record is associated with a unique identifier. The electronic document may be distributed over a communication network to a person providing the identifier. | 2012-04-19 |
20120096564 | DATA INTEGRITY PROTECTING AND VERIFYING METHODS, APPARATUSES AND SYSTEMS - The disclosure provides data integrity protecting and verifying methods, apparatuses and systems. A data integrity protecting method include: calculating a Hash value of each of the data blocks by using a first Hash function, to obtain a plurality of block Hash values which form a first series of Hash values; calculating a second series of Hash values based on the first series of Hash values, the second series of Hash values comprising a plurality of chain Hash values, each of which being associated with a corresponding block Hash value in the first series of Hash values and being associated with a neighbor chain Hash value in the second series of Hash values, wherein the first series of Hash values and the second series of Hash values used as integrity information of the data; and generating verification information of the data by using a last chain Hash value. | 2012-04-19 |
20120096565 | DEVICE, METHOD AND SYSTEM TO PREVENT TAMPERING WITH NETWORK CONTENT - The present invention discloses a system for preventing network content of one or more network servers from being tampered with. The system comprises a content caching and providing device to cache network content of the one or more network servers; and a content monitoring sub-system with one or more content monitoring client incorporated in the network servers respectively and a content monitoring server part incorporated in the content caching and providing device. The present invention further discloses a content caching and providing device, a network content providing system and a corresponding method. With the system, device and method according to the present invention, we can improve the speed and security of accessing network content while effectively preventing the network content from being tampered with. | 2012-04-19 |
20120096566 | FIRST COMPUTER PROCESS AND SECOND COMPUTER PROCESS PROXY-EXECUTING CODE ON BEHALF OF FIRST PROCESS - Upon a first process encountering a triggering device, a second process chooses whether to proxy-execute code corresponding to the triggering device of the first process on behalf of such first process based at least in part on whether a license evaluator of the second process has determined that the first process is to be operated in accordance with the terms and conditions of a corresponding digital license. The license evaluator at least in part performs such determination by running a script corresponding to the triggering device in the code of the first process. Thus, the first process is dependent upon the second process and the license for operation thereof. | 2012-04-19 |
20120096567 | SYSTEMS AND METHODS FOR MANAGEMENT OF SECURE DATA IN CLOUD-BASED NETWORK - Embodiments relate to systems and methods for the management of secure data in a cloud-based network. A secure data store can store sensitive or confidential data, such as account numbers, social security numbers, medical or other information in an on-premise data facility. Regulatory and/or operational requirements may prohibit the migration or unprotected transmission of the secure data to the cloud. An operator can instantiate a set of virtual machines to access and process the secure data, for example to process online purchase transactions. To prevent unauthorized disclosure of the secure data, the secure data store can receive data access requests via a translation module that translates the secure data. The secure data store can retrieve and transmit the secure data using a protection mechanism such as a masking and/or encryption mechanism, avoiding the unprotected transport or exposure of that data to the cloud. | 2012-04-19 |
20120096568 | TRANSGENIC LSD1 ANIMAL MODEL FOR CANCER - The present invention relates to a non-human transgenic animal whose genome comprises a stably integrated transgenic nucleotide sequence encoding Lysine-specific Demethylase 1 (LSD1) operably linked to a promoter. The invention further concerns methods for generating the non-human animal and its use as a cancer model. | 2012-04-19 |
20120096569 | ANTI-IL-6 ANTIBODIES,COMPOSITIONS, METHODS AND USES - The present invention relates to at least one novel chimeric, humanized or CDR-grafted anti-IL-6 antibodies derived from the murine CLB-8 antibody, including isolated nucleic acids that encode at least one such anti-IL-6 antibody, vectors, host cells, transgenic animals or plants, and methods of making and using thereof, including therapeutic compositions, methods and devices. | 2012-04-19 |
20120096570 | BASE FOR PROPAGATING AQUATIC ANIMALS - An aquatic animal such as coral is propagated on a base. The base has a top portion with a groove located therein. The groove has converging side walls. The groove intersects a depression that extends from the top portion to a bottom portion of the base. The depression has converging sides. An animal fragment is secured to the base by locating it in the groove, or alternatively in the groove and the depression. Water flow across the base may cause the fragment to move inside of the groove, wherein the fragment will sink down and become wedged in place, further securing or coupling the fragment to the base. The coral then grows and adheres itself to the base. | 2012-04-19 |
20120096571 | EGLN2 VARIANTS AND USE THEREOF IN PREVENTING OR TREATING THROMBOEMBOLIC DISORDERS AND CORONARY HEART DISEASES - The present invention refers to human EGLN2 variants having at position 58 of the amino acid sequence a serine or a leucine and their use in the prevention or treatment of thromboembolic or coronary heart diseases, in particular stroke, prolonged reversible ischemic neurological deficit (PRIND), transitoric ischemic attack (TIA), myocardial infarction and/or early myocardial infarction. | 2012-04-19 |
20120096572 | Mice That Make VL Binding Proteins - Genetically modified mice and methods for making an using them are provided, wherein the mice comprise a replacement of all or substantially all immunoglobulin heavy chain V gene segments, D gene segments, and J gene segments with at least one light chain V gene segment and at least one light chain J gene segment. Mice that make binding proteins that comprise a light chain variable domain operably linked to a heavy chain constant region are provided. Binding proteins that contain an immunoglobulin light chain variable domain, including a somatically hypermutated light chain variable domain, fused with a heavy chain constant region, are provided. Modified cells, embryos, and mice that encode sequences for making the binding proteins are provided. | 2012-04-19 |
20120096573 | Process for Generating Transgenic Animals Using Recombinant Lentiviruses - A process for generating transgenic animals using recombinant lentiviruses. The process comprises injecting recombinant lentiviruses into the interstituim of the testis of a male to produce mature spermatozoa within a few days. The male with transgene expressing lentivirus is mated with a female, forming a progeny carrying the transgene. | 2012-04-19 |
20120096574 | TOMATO HYBRID PS01819578 - The invention provides seed and plants of tomato hybrid PS01819578 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS01819578 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-04-19 |