Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


17th week of 2013 patent applcation highlights part 65
Patent application numberTitlePublished
20130104159TELEVISION AUDIENCE TARGETING ONLINE - Users receive a data feed that has information relating to a first media and extracts events from the received data feed. The method generates a profile relating to a first item in the first media, and processes behavior of a first group of users of a second media. The behavior of the first group of users is modeled to generate a scoring function. A system for targeting a user includes a data feed, an event extractor, one or more profiles, a behavior processor, and a model. The data feed has information relating to a first media. The event extractor receives the data feed and extracts particular information based on a second media to generate profile(s). The behavior processor compares the profile to a first group of users of the second media. The model space models user behavior by using the profile.2013-04-25
20130104160METHOD AND SYSTEM FOR USING A SECOND SCREEN DEVICE TO TUNE A SET TOP BOX TO DISPLAY CONTENT PLAYING ON THE SECOND SCREEN DEVICE - A system and method for displaying operating a receiving device includes a second screen device in communication with the receiving device. The second screen device displays streamed content having an identifier associated therewith having a touch screen, forms a tune command comprising the identifier and a receiving device identifier in response to a gesture on the touch screen and communicates the tune command to the receiving device from the second screen device. The receiving device is tuned to receive a channel corresponding to the streamed content in response to the tune command. The receiving device displays the channel.2013-04-25
20130104161Method and apparatus for interaction with hyperlinks in a television broadcast - Various embodiments of the present invention relate to systems, methods, and computer-readable medium providing licensing rights for media content that follows a subscriber so that the subscriber may experience the media content on various content distribution platforms. In particular embodiments, the systems, methods, and computer-readable medium transfer licensing rights for a user for particular media content that is associated with a first device on a first distribution platform so that the rights are associated with a second device on a second distribution platform. As a result, in various embodiments, the user is able to experience the particular media content with the use of the second device on the second distribution platform.2013-04-25
20130104162TECHNIQUE FOR SECURELY COMMUNICATING PROGRAMMING CONTENT - A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc. The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.2013-04-25
20130104163ENCRYPTION METHOD FOR TELEVISION SERVICE OF MOBILE TERMINAL, MOBILE TERMINAL AND SERVER - The disclosure provides an encryption method for a television service of a mobile terminal, a mobile terminal and a server. The method comprises: a mobile terminal ordering and obtaining a program that has not been subscribed; the mobile terminal encrypting the program to shield a part of data of the program; and the mobile terminal playing the program that is encrypted. The encryption method for the television service of the mobile terminal, the mobile terminal and the server provided in the disclosure can encrypt the program, which is ordered but has not been subscribed by the user, at the mobile terminal side or the server side so as to play the program after shielding a part of data of the program, thus certain experience can be enjoyed by the user, and the content of the program is protected.2013-04-25
20130104164TARGETING OF ADVERTISEMENTS BASED ON MUTUAL INFORMATION SHARING BETWEEN DEVICES OVER A NETWORK - A system and method to facilitate targeting of advertisements based on mutual information sharing between devices over a network are described. A user connects to one or more media devices and performs specific actions, such as viewing content. The actions are then transmitted to the entity via the network and are stored within the entity along with respective categories associated with each user action. Subsequently, if the user connects to the entity through a client machine and through the network, the entity selects advertisements to be displayed within the display area of the client machine along with content information requested by the user, such that each selected advertisement is related to the previously stored events or actions performed on the media device and their respective categories.2013-04-25
20130104165METHOD AND APPARATUS FOR RECEIVING AUGMENTED BROADCASTING CONTENT, METHOD AND APPARATUS FOR PROVIDING AUGMENTED CONTENT, AND SYSTEM FOR PROVIDING AUGMENTED CONTENT - The system includes a metadata generation apparatus for generating metadata to designate a specific space and time in and on which a speech balloon or a music book will be displayed on broadcasting content, a multiplexing broadcasting server for multiplexing the metadata received from the metadata generation apparatus and the broadcasting content and sending the multiplexed result to a reception apparatus, an augmented content providing apparatus for sending the speech balloon suitable for speech included in the broadcasting content or the music book suitable for music included in the broadcasting content to the reception apparatus, and the reception apparatus for displaying the broadcasting content and displaying the augmented content in a specific space and time of the broadcasting content based on the metadata.2013-04-25
20130104166AUDIO-BASED SYNCHRONIZATION TO LIVE MEDIA BROADCASTS - A variety of enhancements are described for synchronizing delivery of content to media that includes a mix of live television, re-broadcast television, recorded television, and pre-recorded multi-media.2013-04-25
20130104167METHODS AND APPARATUS TO BROADCAST ADVANCED TELEVISION SYSTEM COMMITTEE VIDEO IN SWITCHED DIGITAL VIDEO SYSTEMS - Methods and apparatus are disclosed to broadcast advanced television system committee (ATSC) video in switched digital video (SDV) systems. An example SDV broadcast method includes configuring a de-multiplexer to de-multiplex at least one of the plurality of MPTSs into a plurality of program streams, the at least one of the plurality of program streams comprising a first program stream and a second program stream, wherein the first program stream is selected and the second program stream is excluded based on a rating region table (RRT), independent of any user provided program stream request, and independent of any contractual commitment associated with any user. The example method includes configuring a switch to deliver the first program stream to an SDV broadcast engine.2013-04-25
20130104168RECOMMENDER SYSTEM WITH CONSISTENT PROFILE APPLICATION - The present invention relates to an apparatus, a method and a computer program product for controlling distribution and processing of content-related metadata of different content sources (2013-04-25
20130104169System for Transmission and Distribution of Broadcast Digital Data - The invention relates to a data receiving and distribution apparatus and system which allows received data, typically that which can be used for generation of video and/or audio, to a number of points within a receiving location such as a number of rooms in a domestic premises or a number of apartments in a multi-dweller building and/or points in each of the apartments. There is provided data processing means intermediate the receiving means and the receiving location which allow the data to be processed from a first format into a format which can then be used at the receiving location to allow the data to be distributed efficiently within the receiving location.2013-04-25
20130104170Method for Processing Electronic Television Program - A method for processing an electronic television program that arranges a viewing schedule for a user is provided, in which the method receives an electronic television program list that includes electronic television program information, and records the electronic television program selected by the user from the electronic television program list, and receives a calendar information including at least one schedule event, and compares and determines whether a time period of the electronic television program selected by the user conflicts with a time period of the scheduled event, and generates a reminder message reminding the user of recording the electronic television program in advance or to alter the scheduled event when the time periods are in conflict.2013-04-25
20130104171LOCALLY STORED CONTENT PREVIEWS: REPRESENTATIVE OF PROGRAMMING CONTENT IN AN ELECTRONIC PROGRAMMING GUIDE THROUGH A GRAPHIC IMAGE ACCESSED FROM THE HARD DRIVE OF A SET TOP BOX - An integrated DSS/WebTV receiver is communicatively connected to an Internet service provider, a DSS service provider, and (optionally) a local broadcast station to provide a display of DSS programs, Internet web sites, and local broadcast channels in a seamless fashion. The DSS/WebTV receiver downloads graphic images, corresponding to DSS programs, from a DSS communication medium or the Internet into a local memory. The graphic images are periodically updated by the DSS service provider or Internet service provider. The DSS/WebTV receiver generates a graphical user interface (GUI), displayed on a television screen, for facilitating a user's navigation through the DSS, Internet, and local broadcast data. The GUI includes a selectable DSS program listing that displays DSS programs that are currently being broadcast or that will be broadcasted in the future. If a user selects a currently broadcasted program, the DSS/WebTV receiver displays the selected program on the television. If the user selects a program that is broadcasted in the future, the DSS/WebTV receiver displays a downloaded graphic image, corresponding to the selected program, on the television. The graphic image may be the selected program's name or logo, still shots from the selected program, short video clips related to the selected program, or advertisements related to the selected program.2013-04-25
20130104172SEARCHING METHOD AND MOBILE DEVICE USING THE METHOD - A method of controlling a mobile device and which includes wirelessly communicating, via a wireless communication unit of the mobile terminal, with an external reproduction device reproducing content on a display of the reproduction device; inputting, via an input unit of the mobile terminal, a search request requesting information about at least one item identifiable in the reproducing content; searching, via a controller of the mobile terminal, the information about said at least one item; and displaying, on a display unit of the mobile terminal, the information found during the search.2013-04-25
20130104173BROADCAST VIDEO PROVISIONING SYSTEM - A device receives, from a network device, information associated with an event, and assigns an event identifier to the event based on the event information. The device also provides the event identifier to a cell control device located at a location associated with the event, and determines a cell capacity of the location to ensure that there is sufficient cell capacity at the location to broadcast the event. The network device instructs a device capturing the event to provide live event data to the cell control device for a predetermined time period.2013-04-25
20130104174VIDEO TRANSMITTING AND RECEIVING METHOD BETWEEN DOCKED TERMINALS AND DOCKING SYSTEM USING THE SAME - A video transmitting and receiving method between docked terminals and docking system using the same are disclosed. The video transmitting and receiving method between docked terminals includes determining whether or not the first terminal is connected to the second terminal through an HDMI interface, receiving by the first terminal information on the second terminal, when it is determined that the first terminal is connected to the second terminal through the HDMI interface, providing by the first terminal video to the second terminal, based on information on the second terminal, and activating by the second terminal devices related to displaying of the video, when it is determined that the video is received from the first terminal. This method grants maximum authority regarding the HDMI interface itself, minimizing operational delay and error.2013-04-25
20130104175Using Video Viewing Patterns to Determine Content Placement - A method includes receiving demand information for a first segment of a media content item and receiving demand information for a second segment of the media content item. The method includes assigning the first segment to a first set of distribution nodes of a media content distribution system based at least partially on the demand information for the first segment and based at least partially on a first cost function and assigning the second segment to a second set of distribution nodes of the media content distribution system based at least partially on the demand information for the second segment and based at least partially on a second cost function. The media content distribution system includes a plurality of distribution nodes and each distribution node is configured to provide media content items to at least some of a plurality of endpoints.2013-04-25
20130104176Technique for Providing a Virtual Digital Video Recorder Service Through a Communications Network - In response to a request initiated by a user at a user terminal, selected entertainment programming content, when broadcast, is recorded at a location remote from the user terminal. The request is communicated through a communications network, e.g., cable TV network, which is also used for transmission of entertainment programming content to user terminals. The recorded programming content is stored in a storage space at the remote location, which is allocated to the user terminal. In response to a review request from the user terminal, the recorded programming content is retrieved from the storage space allocated thereto, and transmitted to the user terminal through the communications network. The presentation of the recorded programming content may be manipulated by the user to perform rewinding, pausing and fast-forwarding thereon.2013-04-25
20130104177DISTRIBUTED REAL-TIME VIDEO PROCESSING - A system and method provide distributed real-time video processing. The distributed real-time video processing method comprises receiving a request for processing a video and determines one or more processing parameters based on the request. The method partitions the video into a sequence comprising multiple video chunks, where a video chunk identifies a portion of video data of the video for processing. The method further transmits the processing parameters associated with one or more video chunks for parallel processing. The method processes the video chunks in parallel and accesses the processed video chunks. The method assembles the processed video chunks and provides the assembled video chunks responsive to the request.2013-04-25
20130104178SET TOP BOX RESOURCE ALLOCATION FOR EXECUTING A WIDGET - A system is configured to receive a request to establish a session with a set top box device executing an application; obtaining a profile that identifies usage patterns of resources associated with the device; obtain another profile that identifies a first quantity of the resources to be used by the application; identify a second quantity of the resources to be allocated for executing the application based on the profile and other profile; receive information that identifies a third quantity of the resources used, by the application, during the session; transmit a notification indicating that a condition is associated with the application when the third quantity of the resources is greater than the second quantity of the resources; and transmit another notification indicating that a condition is not associated with the application when the third quantity of the resources is not greater than the second quantity of the resources.2013-04-25
20130104179SUPPLEMENTAL SYNCHRONIZATION TO TIME-BASED MEDIA - A variety of enhancements are described for synchronizing delivery of content to media that includes a mix of live television, re-broadcast television, recorded television, and pre-recorded multi-media.2013-04-25
20130104180METHOD AND SYSTEM FOR DELIVERING INTERACTIVE CONTENT - A system for delivering content to a user is disclosed. The system includes information with the content and an interactive application that is accessed by interacting with the information. The information includes at least one instruction for allowing a user to access the interactive application. The interactive application enables further user interaction with the system.2013-04-25
20130104181INTERFACE FOR USE WITH A VIDEO COMPRESSION SYSTEM AND METHOD USING DIFFERENCING AND CLUSTERING - The disclosure relates to a system and method having a common interface to manage and integrate secure information traversing a network with disparate domains. The system and method are capable of rapidly taking external data sources (for example, systems, databases, streams, repositories, websites, etc.) and fusing them under a mediated meta-data layer that allows for data mining, manual and automated analysis and various visualization capabilities in a single application. The system allow for the capability of using data sources, and making secure and appropriate visualization and interoperability functions available in a single portal or interface.2013-04-25
20130104182Method and Apparatus for Fast Data Delivery on a Digital Pixel Cable - The present invention relates to delivery of non-image data frames via a high-speed digital pixel cable using a main pixel channel of the cable to carry non-image data frames and using a side channel of the cable to indicate that particular data frames sent on the main pixel channel are to be treated as non-image data instead of pixel data. The non-image data may, for instance be edge blending, warping or color balance data. Alternatively, it could be a firmware update. The high-speed digital pixel cable could be a DVI, HDMI or DisplayPort-compatible cable. The side channel could be a DDC, CEC or custom channel. Further aspects of the technology disclosed are described in the accompanying specification, claims and figures.2013-04-25
20130104183ELECTRONIC APPARATUS, METHOD FOR CONTROLLING, AND RECORDING MEDIUM - An electronic apparatus includes a first communication unit that includes a first connector, a second communication unit that includes a second connector, and a control unit that controls not to set the second communication unit to one of a first mode and a second mode based on a predetermined device connected to the first connector, wherein the first mode is used for transmitting video data, and the second mode is different from the first mode.2013-04-25
20130104184SYSTEM AND METHOD FOR ENABLEMENT OF DESKTOP SOFTWARE FUNCTIONALITY BASED ON IT POLICY - A method, device and system for enablement of desktop software functionality based on IT policy comprising determining if IT policy settings are associated with a mobile device connected to the desktop software and restricting functionality of the desktop software based on the IT policy settings for the connected mobile device.2013-04-25
20130104185Policy Enforcement in a Secure Data File Delivery System - A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server applies a policy established by a policy authority of the sender to the package. Since the server both forms the package through interaction with the sender and applies the policy, violations of the policy by the package can be brought to the sender's attention during an interactive session with the sender and before encryption of all or part of the package. As a result, the sender is educated regarding the policy of the sender's policy authority, and the sender can modify the package immediately to comport with the policy. The server delivers the package to intended recipients by sending notification to each recipient and including package identification data, e.g., a URL by which the package can be retrieved.2013-04-25
20130104186SYSTEM AND METHOD FOR PREVENTING AN ATTACK ON A NETWORKED VEHICLE - A system for preventing an attack on a networked vehicle via a wireless communication device including a wireless data traffic network, a security status determination unit for controlling access to the wireless network depending on a security status based on evaluation of a configuration and/or on log data of the vehicle and/or on time that has passed since a software update, and a communication device and an access control device. A method for preventing an attack on a networked vehicle via a wireless communication device, where a security status is determined based on an evaluation of a current configuration of the vehicle and/or on log data of the vehicle and/or on time that has passed since an update of relevant software a network access rule set is determined and actuated for the access to the data traffic network based on the determined security status.2013-04-25
20130104187CONTEXT-DEPENDENT AUTHENTICATION - An electronic device is secured by determining, by a processor, that an electronic device is in a first secured state associated with a first security level. Based on the first security level, a first context-dependent authentication policy is assigned to the electronic device. A transition rule is determined to have been satisfied, and responsively the electronic device transitions into a second secured state, wherein the second secured state comprises a different security level than the first secured state. The first context-dependent authentication policy is modified to yield a second context-dependent authentication policy, and the device is changed from the second secured state upon the device receiving an authentication that satisfies the second context-dependent authentication policy.2013-04-25
20130104188SECURE OPTION ROM CONTROL - A mechanism for controlling the execution of Option ROM code on a Unified Extensible Firmware Interface (UEFI)-compliant computing device is discussed. A security policy enforced by the firmware may be configured by the computing platform designer/IT administrator to take different actions for different types of detected expansion cards or other devices due to the security characteristics of Option ROM drivers associated with the expansion card or device. The security policy may specify whether authorized signed UEFI Option ROM drivers, unauthorized but signed UEFI Option ROM drivers, unsigned UEFI Option ROM drivers and legacy Option ROM drivers are allowed to execute on the UEFI-compliant computing device.2013-04-25
20130104189Controlling Transmission of Unauthorized Unobservable Content in Email Using Policy - A system, method, and apparatus is disclosed to control mail server in handling encrypted messages according to a policy.2013-04-25
20130104190SYSTEM AND METHOD FOR DOCUMENT POLICY ENFORCEMENT - A system and method is disclosed for document policy enforcement. The method discloses: scanning document parts for a set of policy-eliciting terms 2013-04-25
20130104191METHOD AND SYSTEM FOR MANAGING CONFIDENTIAL INFORMATION - A method and a system for information management and control is presented, based on modular and abstract description of the information. Identifiers are used to identify features of interest in the information and information use policies are assigned directly or indirectly on the basis of the identifiers, allowing for flexible and efficient policy management and enforcement, in that a policy can be defined with a direct relationship to the actual information content of digital data items. The information content can be of various kinds: e.g., textual documents, numerical spreadsheets, audio and video files, pictures and images, drawings etc. The system can provide protection against information policy breaches such as information misuse, unauthorized distribution and leakage, and for information tracking.2013-04-25
20130104192SYSTEM AND METHOD FOR INTELLIGENCE BASED SECURITY - Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.2013-04-25
20130104193DYNAMIC CONFIGURATION OF A GAMING SYSTEM - A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files and certified support software components are activated in accordance with a predetermined schedule or automatically in response to the observed gaming activity. The method may include allocating an individual PKI certificate to each executable software component and each of its versions, binding the PKI certificate to the executable software, associating a distinctive policy for each certificate and then enforcing the software execution policies in accordance with the desired authorized game configuration and schedule. The PKI certificate's “Subject Name” (or “Issued to” field or “CommonName” field) may be a concatenation of the software component identification, its version number and optionally other identification characters. The method applies equally to other network connected gaming subsystems. The method enables a fine-grained and secure control of the authorized software components and thus the flexibility to securely configure the gaming system in accordance with a schedule or in a close-loop fashion in order to meet business objectives. In addition, a method to enable the certification authority to bind the certificates to the tested code is described.2013-04-25
20130104194METHOD AND SYSTEM FOR GRANT MANAGEMENT AND DEVELOPMENT CYCLE OPTIMIZATION - An apparatus, method, and system for federating grant management, project management, and funding in a web-based environment are disclosed. The apparatus, method, and system may include a module for receiving an electronic submissions of at least one grant proposal, a module for pestablishing a permission structure governing access to the at least one grant proposal, a module for providing a virtual collaboration space for the review process of the at least one grant proposal, a module for tracking a funding amount for the at least one grant proposal, a module for measuring statistical information based on parameters associated with the at least one grant proposal, and a module for generating reports based on the measured statistical information.2013-04-25
20130104195Method and System to Optimize Efficiency when Managing Lists of Untrusted Network Sites - A computer readable storage medium including a set of instructions executable by a processor, the set of instructions operable to determine if a network location included in a request to connect to the network location, is included in a first list of untrusted network locations stored on the client computer and send a request to determine if the network location is included in a second list of untrusted network locations stored remotely from the client computer when it is determined that the network location is not included in the first list.2013-04-25
20130104196RESTRICTING ACCESS TO HARDWARE FOR WHICH A DRIVER IS INSTALLED ON A COMPUTER - Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices.2013-04-25
20130104197AUTHENTICATION SYSTEM - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access to the secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester.2013-04-25
20130104198TWO-FACTOR AUTHENTICATION SYSTEMS AND METHODS - Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an authenticating service to perform an action on behalf of a user. The authentication service then sends a permission request to a mobile device associated with the user, asking the user whether or not the action should be allowed. The user sends a permission response via the mobile device to the authentication service, granting or denying the action. The user may automate future similar responses so long as at least one automation criterion is met (e.g., the physical location of the mobile device), eliminating the need to manually provide a response to future permission requests. Information necessary to determine whether the automation criterion is met is stored locally on the mobile device.2013-04-25
20130104199Object and Resource Security System - According to the invention, a method for securing a plaintext object within a content receiver is disclosed. In one step, a secure portion of a secure object and a plaintext remainder of the secure object are received. Which portion of the secure object is the secure portion is determined. The secure portion is decrypted to provide a plaintext portion. The plaintext object that comprises the plaintext portion and the plaintext remainder is formed. The plaintext object is stored including authentication and authorization.2013-04-25
20130104200APPARATUS AND METHOD FOR CONTROLLING ACCESS TO MULTIPLE SERVICES - An apparatus and a method are provided for controlling access to a plurality of services. An authentication request is received for requesting authentication about the plurality of services. Service authentication is performed for the plurality of services based on authentication information for the plurality of services provided from a service provider unit according to the authentication request. An access right to the plurality of services is acquired from the service provider unit.2013-04-25
20130104201AUTHENTICATION SYSTEM AND RELATED METHOD - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for determining a key string adapted to provide a basis for authenticating the identity of the requester; a means for receiving an authentication credential associated with the request for access; and a means for evaluating the authentication credential to authenticate the identity of the requester.2013-04-25
20130104202SYSTEMS AND METHODS FOR AUTHORIZING THIRD-PARTY AUTHENTICATION TO A SERVICE - Systems and method for authorizing third-party authentication to a service are disclosed herein. As exemplary method includes an online service provider subsystem, which is configured to provide a service, 1) receiving a request from a user to use a third-party authentication service to authenticate the user to the service, 2) directing, in response to the request, the user to authenticate to the third-party authentication service, 3) receiving, from a third-party subsystem that provides the third-party authentication service, a third-party user identifier for the user, 4) requiring the user to verify an identity of the user, and 5) authorizing, based on the verified identity of the user, use of the third-party user identifier to authenticate the user to the service. Corresponding methods and systems are also disclosed.2013-04-25
20130104203BEHAVIORAL FINGERPRINT BASED AUTHENTICATION - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. In addition to the foregoing, other example aspects are described in the claims, drawings, and written description forming a part of the present disclosure.2013-04-25
20130104204MOBILE HOST USING A VIRTUAL SINGLE ACCOUNT CLIENT AND SERVER SYSTEM FOR NETWORK ACCESS AND MANAGEMENT - A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.2013-04-25
20130104205ACCOUNT CREATING AND AUTHENTICATING METHOD - An account creating and authenticating method is provided. Firstly, an account is created according to a face image included in a photo. A password corresponding to the face image is also generated by a service system. During an account authenticating method, an image pickup device is used to shoot a face of a login person on the spot. If the service system judges that the shot face image of the login person on the spot complies with a predetermined face image corresponding to an existing account, the login person is allowed to login into the service system and the password is displayed. In a case that the image pickup device is provided, the service system may be authenticated by inputting the password. The method of the present can simplify the process of creating and authenticating the account.2013-04-25
20130104206System and Method for Providing User Lifecycle Management and Service Orchestration of Multiple Media Services Across Multiple Display Screens - A system and method are provided for enabling personalization and service coordination of media services across multiple devices. The method comprises providing a first module to interface with information technology infrastructure and media services provided by an operator or third parties; and providing, using the first module, service orchestration and user lifecycle management components to enable authorized and personalized access to multiple network operator services across multiple devices and services.2013-04-25
20130104207Method of Connecting a Mobile Station to a Communcations Network - A method of connecting a mobile station to a communications network is provided, and includes performing an authentication of the mobile station at the network. A secure identifier, generated at the mobile station, is received at a gateway node and at an access node from an authentication node of the network if it is determined by the authentication that the mobile station is a subscriber to the network. A first secure communications tunnel is established from the access node to the mobile station using a value of the secure identifier and a second secure communications tunnel is established from the access node to the gateway node of the network using the value of the secure identifier. The first and second communications tunnels are bound together to form a communications path between the mobile station and the network.2013-04-25
20130104208TRIPLE AUTHENTICATION: MOBILE HARDWARE, MOBILE USER, AND USER ACCOUNT - Enhanced network security is provided by requiring three types of information to be authenticated: user information identifying a user, security information that the user has entered into a network data communication device, and device information identifying the network data communication device. Systems and databases are described for processing and authenticating this information.2013-04-25
20130104209AUTHENTICATION SYSTEM - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester.2013-04-25
20130104210AUTHENTICATION SYSTEM AND RELATED METHOD - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for generating and communicating to the purported authorized user a key string adapted to provide a basis for authenticating the identity of the requester; a means for receiving an authentication credential associated with the request for access; and a means for evaluating the authentication credential to authenticate the identity of the requester.2013-04-25
20130104211AUTHENTICATION METHOD - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester.2013-04-25
20130104212AUTHENTICATION METHOD - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a service client a request for access to a secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving from the service client a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester. The secured resource has a common identifier by which it may be generally identified outside of the authentication system, but the request for access lacks sufficient information content for the service client to be able to determine the common identifier.2013-04-25
20130104213AUTHENTICATION METHOD - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a service client (such as a retail store, service station, on-line service provider or merchandiser, healthcare provider, medical insurer, information consumer or the like) a request for access to a secured resource, where the request for access was previously submitted to the service client by a requester purporting to be an authorized user of said secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving from the service client a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester.2013-04-25
20130104214TOKEN BASED TWO FACTOR AUTHENTICATION AND VIRTUAL PRIVATE NETWORKING SYSTEM FOR NETWORK MANAGEMENT AND SECURITY AND ONLINE THIRD PARTY MULTIPLE NETWORK MANAGEMENT METHOD - A two-factor network authentication system uses “something you know” in the form of a password/Pin and “something you have” in the form of a key token. The password is encrypted in a secure area of the USB device and is protected from brute force attacks. The key token includes authentication credentials. Users cannot authenticate without the key token. Four distinct authentication elements that the must be present. The first element is a global unique identifier that is unique to each key. The second is a private credential generated from the online service provider that is stored in a secure area of the USB device. The third element is a connection profile that is generated from the online service provider. The fourth element is a credential that is securely stored with the online service provider. The first two elements create a unique user identity. The second two elements create mutual authentication.2013-04-25
20130104215SYSTEM AND METHOD FOR MANAGING NETWORK DEVICES - A system and a method for managing network devices are provided. The method includes the following steps. A central server is connected to a plurality of authenticated network devices via a network interface. The MAC (Media Access Control) address and the corresponding Internet Protocol (IP) address are stored in a database of the central server. The central server uses the MAC address to identify each authenticated network device. The central server periodically detects whether the IP address of each authenticated network device is changed. If the IP address of one or more of the authenticated network devices is changed, the central server updates the IP address corresponding to the MAC address stored in the database according to the changed IP address.2013-04-25
20130104216SYSTEM AND METHOD FOR ENHANCED PROTECTION AND CONTROL OVER THE USE OF IDENTITY - A method of protecting use of an entity's identity is provided. The method comprises setting a status of the identity to a first state, the first state defining a scope of permitted use of the identity, changing, in advance of an intended use of the identity, the status to a second state defining a scope of permitted use of the identity that is different from the first state, requesting use of the identity after the changing; and returning, after the requesting, the state back to the first state.2013-04-25
20130104217MASK BASED CHALLENGE RESPONSE TEST - Providing a challenge response test associated with a computer resource includes generating a challenge response test image including providing a first substantially well-formed image, including a first masked image having a visible portion entirely composed of portions of a first well-formed image, and a first plurality of image elements; and providing at least one ill-formed image, each at least one ill-formed image including a second masked image having at least one first ill-formed portion.2013-04-25
20130104218METHOD AND SYSTEM FOR SECURELY ACCESSING TO PROTECTED RESOURCE - The invention provides a method for securely accessing to protected resource and a system thereof, which belongs to information security field. A first terminal sends a request for accessing to the protected resource to a second terminal, and sends a user name and first data to the second terminal; the second terminal generates second data, and searches for a secret on a third terminal; the second terminal processes the first data, the second data, and the secret, so as to obtain a first characteristic value; the third terminal processes the first data, the second data, and the secret so as to obtain a second characteristic value, and upon receiving a confirmation message, processes the first data, the second data, and a secret pre-stored at/on the third terminal so as to obtain a third characteristic value; the first terminal sends the third characteristic value to the second terminal; the second terminal processes the first data, the second data, and the secret to generate a fourth characteristic value, and determines whether the fourth characteristic value is identical to the third characteristic value by comparison, if they are identical, accessing is permitted; otherwise, accessing is refused.2013-04-25
20130104219CENTRALIZED AUTHENTICATION FOR MULTIPLE APPLICATIONS - Network applications can provide network security without containing any security code or otherwise verifying the authenticity of each request that they receive for service. Instead, a single, centralized network authentication system can be placed between the network applications and all devices requesting for services from them. The authenticity of each request for service can then be verified by the centralized network authentication system before the request is passed to the network application to which it is directed. Responses from the network applications may also be channeled back to the systems that made the requests through the centralized network authentication system.2013-04-25
20130104220System and method for implementing a secure USB application device - Systems and methods for implementing a secure USB token are described. In one aspect, the system for implementing a secure USB token, the system comprising: (1) a secure USB token including: a processor; a memory coupled to said processor; a communication port coupled to said processor, a secure element coupled to said processor, said secure element storing data for implementing a secure environment; one or more applications stored on said memory adapted to run on said memory and processor; and (2) a host device including: a processor; a memory coupled to said processor; a communication port coupled to said processor; and an agent displayed on the host device; wherein the agent launches one or more of the applications stored on the USB token, and wherein the agent prevents the host device from accessing the USB token's memory.2013-04-25
20130104221Group Formation Using Anonymous Broadcast Information - A number of devices co-located at a geographic location can broadcast and receive tokens. Tokens can be exchanged using a communication link having limited communication range. Tokens that are received by a device can be stored locally on the device and/or transmitted to a trusted service operating remotely on a network. In some implementations, the tokens can be stored with corresponding timestamps to assist a trusted service in matching or otherwise correlating the tokens with other tokens provided by other devices. The trusted service can perform an analysis on the tokens and timestamps to identify devices that were co-located at the geographic location at or around a contact time which can be defined by the timestamps. A group can be created based on results of the analysis. Users can be identified as members of the group and invited to join the group.2013-04-25
20130104222NETWORK RESOURCE CONTROL SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.2013-04-25
20130104223NETWORK RESOURCE COMMUNICATION SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.2013-04-25
20130104224NETWORK RESOURCE COMMUNICATION SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.2013-04-25
20130104225SECURE NETWORK RESOURCE ACCESS SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.2013-04-25
20130104226METHOD AND SYSTEM FOR SECURING A THIRD PARTY COMMUNICATION WITH A HOSTING WEB PAGE - A method and system for securing hosting web pages from malicious third party modules. The method includes uploading a third party module to a hosting web page; validating a proxy API call received from the third party module, wherein the proxy API call includes at least a payload parameter provided by the third party module; generating an engine API call including at least the payload parameter; validating the engine API call; and executing the payload parameter if the engine API call is validated.2013-04-25
20130104227ADVANCED AUTHENTICATION TECHNOLOGY FOR COMPUTING DEVICES - Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern.2013-04-25
20130104228STEALTH NETWORK NODE - A method, a network node, and a set of instructions are disclosed. A network interface 2013-04-25
20130104229Private Domain Name Registration - A service for protecting the privacy of domain name registrants while preserving the registrant's ability to directly change the registration information or transfer the registration. A whois record is created that reflects the registrant's actual identity but contains contact information that is entirely associated with a privacy service.2013-04-25
20130104230System and Method for Detection of Denial of Service Attacks - Systems and methods for detecting a denial of service attack are disclosed. These may include receiving a plurality of web log traces from one of a plurality of web servers; extracting a first set of features from the plurality of web log traces; applying a first machine learning technique to the first set of features; producing a first plurality of user classifications for communication to the web server; extracting a second set of features from the plurality of web log traces; applying a second machine learning technique to the second set of features; producing a second plurality of user classification for communication to the web server; communicating the first plurality of user classifications to the web server based at least on the plurality of web log traces; and communicating the second plurality of user classifications to the web server based at least on the plurality of web log traces.2013-04-25
20130104231CYBER SECURITY IN AN AUTOMOTIVE NETWORK - Preventing spoofing in an automotive network includes monitoring, by electronic control unit, data packets on a bus in the automotive network. Upon determining, in response to the monitoring, that a data packet is from a source other than the electronic control unit, the preventing spoofing in the automotive network includes generating and transmitting a diagnostic message to at least one module in the automotive network over the bus, the diagnostic message instructing the at least one module to take no action on the data packet.2013-04-25
20130104232APPLIQUE PROVIDING A SECURE DEPLOYMENT ENVIRONMENT (SDE) FOR A WIRELESS COMMUNICATIONS DEVICE - A security appliqué provides a secure deployment environment (SDE) for a wireless communications device. The Security appliqué isolates the security features, requirements, and information security boundaries such that no hardware modifications are required to a wireless communications device. Rather, a security module thin client is provided to the wireless communications device to provide the Secure Deployment Environment (SDE). The wireless communications device is coupled to the security appliqué via the standard connection interface. Through the standard connection interface, the security appliqué provides the SDE for the wireless communications device without implementing modifications to the wireless communications device.2013-04-25
20130104233NETWORK DATA CONTROL DEVICE AND NETWORK DATA CONTROL METHOD FOR CONTROLING NETWORK DATA THAT GENERATES MALICIOUS CODE IN MOBILE EQUIPMENT - Provided are a device and a method of controlling network data induced by a malicious code of a mobile apparatus. Information input by a user through an input unit of a mobile apparatus is analyzed to determine whether or not the network data generated in the mobile apparatus are network data which are generated in accordance with user's intention, the network data generated in accordance with user's intention are transmitted to an external communication network, the network data which are generated irrespective of user's intention is consider to be network data which causes extrusion of personal information of the user which is induced by the malicious code residing in the mobile apparatus or an external attacker or network data which attack the external communication network, so that transmission of the network data to the external communication network is blocked.2013-04-25
20130104234Defensive Techniques to Increase Computer Security - Among other disclosed subject matter, a computer-implemented method includes initializing a first descriptor table and a second descriptor table. The first descriptor table is associated with a first permission level and the second descriptor table is associated with a second permission level that is different from the first permission level. The first descriptor table and the second descriptor table are associated with a hardware processor and initialized by an operating system kernel. The method also includes providing a memory address associated with the first descriptor table, in response to a descriptor table address request. The descriptor table address request is provided by a software process. The method also includes updating the second descriptor table, in response to an update request.2013-04-25
20130104235DETECTION OF UNDESIRED COMPUTER FILES IN ARCHIVES - Systems and methods for content filtering are provided. According to one embodiment, a type and structure of an archive file are determined. The archive file includes identification bytes that identify the type of archive file and header information both in unencrypted and uncompressed form and a file data portion containing contents of files in encrypted form, compressed form or both. The determination is based solely on the identification bytes and/or the header information. Based thereon, descriptive information, describing characteristics of the files, is extracted from the header information for each file. The descriptive information includes a checksum of the file in uncompressed form, a size of the file in uncompressed form and/or a size of the file in compressed form. A file is identified as being potentially malicious or undesired when a comparison of the descriptive information to detection signatures of known malicious or undesired files results in a match.2013-04-25
20130104236PERVASIVE, DOMAIN AND SITUATIONAL-AWARE, ADAPTIVE, AUTOMATED, AND COORDINATED ANALYSIS AND CONTROL OF ENTERPRISE-WIDE COMPUTERS, NETWORKS, AND APPLICATIONS FOR MITIGATION OF BUSINESS AND OPERATIONAL RISKS AND ENHANCEMENT OF CYBER SECURITY - Real time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security and operational blueprint, policies, processes, and rules governing the enterprise security and business risk management process, dynamically evolve and adapt to domain, context, and situational awareness, as well as the controls implemented across the operational and information systems that are controlled. Embodiments of the invention are systematized and pervasively applied across interconnected, interdependent, and diverse operational, information, and security systems to mitigate system-wide business risk, to improve efficiency and effectiveness of business processes and to enhance security control which conventional perimeter, network, or host based control and protection schemes cannot successfully perform.2013-04-25
20130104237Managing Risk Associated With Various Transactions - Systems, methods and consumer-readable media for managing risk associated with various transactions are provided. Such methods may include identifying a consumer-based software application for analysis and classifying the consumer-based software application into a plurality of consumer-facing transactions. Each consumer-facing transaction may be rated according to at least one category or criteria. Further, each rating may be converted into a numeric value. Another aspect of the invention may relate to receiving an identification of a list of threats to each of the consumer-facing transactions. These threats may be categorized into threat categories. The impact of each of the threats may be forecasted. The overall impact of the threats as forecasted may be calculated. Yet another aspect of the invention may relate to receiving an identification of a plurality of threat controls that control at least a portion of the plurality of threats.2013-04-25
20130104238METHOD AND APPARATUS FOR VERIFYING PROOF OF PRESENCE - An approach is provided for facilitating a verification of proof of presence of a user device that can be unspoofable and/or encrypted. A tag verification platform processes information associated with one or more memory tags, one or more vendors, one or more service providers and one or more user device, or a combination thereof related to a verification of proof of presence wherein the verification can be utilized by one or more vendors and/or service providers to provide one or more products and/or one or more services to one or more users.2013-04-25
20130104239SYSTEM AND METHOD FOR OBFUSCATING DATA USING INSTRUCTIONS AS A SOURCE OF PSEUDORANDOM VALUES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating data using instructions as a source of pseudorandom values. Obfuscation is performed by receiving instructions and data and compiling the instructions and the data into an executable file having a text section and a data section. The text section can include instructions and the data section can include data segments. The system obfuscates the data section iteratively by generating a hash of an address for a respective data segment, and based on the hash, identifying a corresponding address in the text section that includes at least one instruction. The system retrieves a mask key from the corresponding address and applies the mask key to the respective data segment, yielding a masked data segment. In one embodiment, integrity verification of obfuscated data is performed without exposing the data in an unprotected state by utilizing multiple mask keys.2013-04-25
20130104240CENTRALIZED ADMINISTRATION-BASED LICENSING SYSTEM - Methods and systems for providing a centralized management system with an integrated license server and pluggable license features are provided. More particularly, the administration of application instances or other assets through the centralized management system results in the initiation of a license validation process by the central management system in cooperation with a license server. The system management application providing centralized asset management and the license server performing license validation are co-resident on a central management server. The availability of assets requiring a license is implemented through asset administration data maintained by the central management server, to indicate the existence of a required license, where the license server indicates that the required license is available. Access to an asset is denied where the license server indicates the absence of a required license to the system management server.2013-04-25
20130104241Devices for Controlling Rendering Protected Content and Related Methods - Devices for providing flexible control of rendering of protected media comprising first and second content objects are provided. An instruction database combines with traditional use of digital rights objects for determining, at rights parsing and instruction handler, conditions for rendering of first content object. Conditions may force the user to render second content objects or to input requested data and may adapt to environmental conditions exemplary relating to user profile, location, or time of day. A set of second content objects may be pre-determined and specified in provided instructions. User selection, from a list of second content objects, of a specified number of second content objects, provides for generation of a key enabling successful rendering of first content object.2013-04-25
20130104242METHOD AND SYSTEM FOR FORENSIC MARKING OF DIGITAL CONTENTS - Disclosed are a forensic marking method and a forensic marking system capable of inserting in real-time a forensic mark for user information in digital contents provided online. The forensic marking method of the digital content according to an exemplary embodiment of the present disclosure includes generating a first content created by inserting a first forensic mark in an original content and a second content created by inserting a second forensic mark in the original content by a content server; transmitting the first and second contents to a client terminal by the content server; and combining fragments of the first and second contents in a combination order corresponding to user information to generate a third content by the client terminal2013-04-25
20130104243PROTECTING PRIVACY WHEN COMMUNICATING WITH A WEB SERVER - Protecting privacy when communicating with a web server via a communication network, includes receiving by a first privacy agent a request from an application program of a client system for a connection to a web server having a target web server address, sending the request together with a first identification from the first privacy agent to the second privacy agent, forwarding the request together with a second identification from the second privacy agent to the third privacy agent. Further processing is performed responsive to determining that the target web server address matches a defined web server address which is accessible by the third privacy agent.2013-04-25
20130104244INTEROPERABILITY BETWEEN A PLURALITY OF DATA PROTECTION SYSTEMS - A system is disclosed for providing interoperability between a plurality of data protection systems. The system includes an ontology (2013-04-25
20130104245AUTHENTICATION SYSTEM - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a service client a request for access to a secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving from the service client a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester. The secured resource has a common identifier by which it may be generally identified outside of the authentication system, but the request for access lacks sufficient information content for the service client to be able to determine the common identifier.2013-04-25
20130104246E-MAIL, TEXT, AND MESSAGE MONITORING SYSTEM AND METHOD - The present invention relates to a system and method for safe electronic communication for children. According to one exemplary embodiment, the present invention provides a method of monitoring e-mails, text messages, and other forms of electronic communication. In one embodiment, a software system monitors electronic messages for inappropriate content such as inappropriate words and excess skin flesh that would indicate that sexually explicit images are present in the message. If inappropriate content is detected, the message is first sent to a third party, usually a parent or guardian, for review and if acceptable to the third party, the message can be sent to the child. In another exemplary embodiment, the system and method of the present invention provides a calendaring system and points redemption system wherein points can be earned by children and redeemed for awards or merchandise.2013-04-25
20130104247Verification Of Content Possession By An Announcing Peer In A Peer-To-Peer Content Distribution System - A tracker node verifies content possession by a peer node in a peer-to-peer content distribution system. Upon receiving an announcement that a peer node claims to possess a content item, the tracker node in one embodiment obtains the content item, selects a random portion of the content item; formulates a challenge based on the random portion of the content item and determines an expected challenge response. The challenge may comprise, for example, a request for a hash of the random portion (or alternatively, a hash of the random portion and a random seed value). The tracker node issues the challenge to the announcing node and verifies the announcing node's possession of the content item if the challenge response from the announcing node matches the expected challenge response.2013-04-25
20130104248Distributing Licensed Content Across Multiple Devices - Distributing licensed content across multiple devices, including: identifying, by a mobile device, licensed content being presented by a local presentation device; determining, by the mobile device, whether the mobile device is eligible to receive the licensed content; requesting, by the mobile device, a license for the licensed content being presented by the local presentation device; receiving, by the mobile device, the license for the licensed content being presented by the local presentation device; receiving, by the mobile device, licensed content for mobile device presentation; and presenting, by the mobile device, the licensed content for mobile device presentation.2013-04-25
20130104249Verification Of Integrity Of Peer-Received Content In A Peer-To-Peer Content Distribution System - Structures and methods are disclosed for verifying integrity of peer-supplied content in a peer-to-peer content distribution system, for example, to verify that content supplied from a sending peer node to a receiving peer node corresponds to the content that was requested by the receiving node.2013-04-25
20130104250ELECTRONIC DEVICE FOR PROTECTING DATA - An electronic device generates an access signal according to user input. The electronic device includes a processor, a key circuit to generate a key signal according to press of the user, a storage unit to store data, a clock generator circuit to generate a clock signal, and a protection circuit. The protection circuit generates an enable signal or a disable signal according to the key signal and the clock signal to control the storage unit to unlock or lock, and transmits the access signal to the storage unit to access the data.2013-04-25
20130104251SECURITY SYSTEMS AND METHODS FOR USE WITH STRUCTURED AND UNSTRUCTURED DATA - Disclosed herein are systems and methods including hardware, software and electronic service components and systems to provide large-scale, reliable, and secure foundations for distributed databases and content management systems combining unstructured and structured data, and allowing post-input reorganization to achieve a high degree of flexibility.2013-04-25
20130104252TAMPER DETECTION COUNTERMEASURES TO DETER PHYSICAL ATTACK ON A SECURITY ASIC - Various embodiments of the present invention relates generally to an integrated circuit, and more particularly, to systems, devices and methods of incorporating a tamper detection countermeasure into a security ASIC to deter physical attacks. The tamper detection countermeasure architects an active mesh to cover a sensitive area in the security ASIC. A plurality of time-varying random numbers is generated by a random number generator (RNG), and the active mesh is driven and configured according to these random numbers. During tamper detection cycles, the active mesh is monitored with respect to the plurality of random numbers that is directly provided by the RNG. Upon a tampering attempt, a flag signal is generated and used to initialize subsequent anti-tampering actions. The active mesh may be controlled and monitored based on time-varying codes, and therefore, an adversary may not easily bypass the active mesh and attack the sensitive area.2013-04-25
20130104253CYTOPLASMIC TRANSFER TO DE-DIFFERENTIATE RECIPIENT CELLS - Methods for de-differentiating or altering the life-span of desired “recipient” cells, e.g., human somatic cells, by the introduction of cytoplasm from a more primitive, less differentiated cell type, e.g., oocyte or blastomere are provided. These methods can be used to produce embryonic stem cells and to increase the efficiency of gene therapy by allowing for desired cells to be subjected to multiple genetic modifications without becoming senescent. Such cytoplasm may be fractionated and/or subjected to subtractive hybridization and the active materials (sufficient for de-differentiation) identified and produced by recombinant methods.2013-04-25
20130104254PLANTS AND SEEDS OF COMMON WHEAT CULTIVAR SJ907-229 - A wheat cultivar, designated SJ907-229, is disclosed. The invention relates to the seeds, plants, and hybrids of wheat cultivar SJ907-229, and to methods for producing a wheat plant produced by crossing plants from wheat cultivar SJ907-229 with themselves or with plants from another wheat variety. The invention also relates to methods for producing a wheat plant containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to wheat varieties or breeding varieties and plant parts derived from wheat cultivar SJ907-229, to methods for producing other wheat varieties, lines or plant parts derived from wheat cultivar SJ907-229, and to the wheat plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid wheat seeds and plants produced by crossing wheat cultivar SJ907-229 with another wheat cultivar.2013-04-25
20130104255Proteins Associated with Abiotic Stress Response and Homologs - This invention relates generally to nucleic acid sequences encoding proteins and homologs that are associated with abiotic stress responses and abiotic stress tolerance in plants. In particular, this invention relates to nucleic acid sequences encoding proteins that confer drought, heat, cold, and/or salt tolerance to plants.2013-04-25
20130104256Isolated eIF-5A and Polynucleotides Encoding Same - The present invention relates to unique isoforms of eukaryotic initiation Factor 5A (“eIF-5A”): senescence-induced eIF-5A; wounding-induced eIF-5A; and growth eIF-5A, as well as polynucleotides that encode these three factors. The present invention also relates to methods involving modulating the expression of these factors. The present invention also relates to deoxyhypusine synthase (“DHS”), polynucleotides that encode DHS, and methods involving modulating the expression of DHS.2013-04-25
20130104257CONSTRUCT AND METHOD FOR EXPRESSING TRANSGENES USING A BRASSICA BIDIRECTIONAL CONSTITUTIVE PROMOTER - Provided are constructs and methods for expressing multiple genes in plant cells and/or plant tissues using a disclosed bidirectional promoter from 2013-04-25
20130104258METHYLTRANSFERASE NUCLEIC ACIDS AND POLYPEPTIDES - This disclosure relates to the isolation and sequencing of nucleic acid molecules that encode methyltransferase polypeptides from a 2013-04-25