18th week of 2012 patent applcation highlights part 81 |
Patent application number | Title | Published |
20120110624 | Method and system for improving playing quality of handset television - The present invention provides a method and system for improving playing quality of a mobile TV to address the technical problem that the playing quality of a mobile TV is influenced by network coverage discrepancies of a mobile TV. In the present invention, a terminal detects the network signal intensity of a mobile TV, performs a match determination between the network signal intensity and the data rate of the mobile TV, and requests a mobile TV service platform to dynamically adjust the program data rate of the mobile TV according to the result of the match determination. In this way, the present invention improves the playing quality of the programs of the mobile TV, and enables the user to enjoy programs of the mobile TV satisfactorily in different mobile TV network environments. | 2012-05-03 |
20120110625 | MOBILE TERMINAL, DISPLAY DEVICE AND CONTROLLING METHOD THEREOF - A device and method for playing desired multimedia content when a mobile terminal (DMC) gives a command for a display device (DMR) to play a desired multimedia content in a home network service, in case that the display device is already playing a different multimedia content. The method includes searching for one or more multimedia contents, selecting one of the found multimedia contents via a user input unit, searching for at least one or more external display devices via a wireless communication unit, selecting a first display device from the found external display devices via the user input unit, and determining whether the selected multimedia content is to be played by the first display device in accordance with an ongoing or reserved job schedule of the first display device. | 2012-05-03 |
20120110626 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR MANAGING MEMORY USAGE ON A COMPUTING DEVICE - Systems and methods of managing memory usage on a computing device include obtaining a data file having a first quality and a first file size. A modified quality data file is automatically generated from the obtained data file responsive to obtaining the data file. The modified quality data file has a second quality and a second file size, the second file size being less than the first file size. The modified quality data file is automatically stored on a memory of the computing device and the obtained data file is automatically transferred to a storage device remote from the computing device. | 2012-05-03 |
20120110627 | TIME-ADAPTED CONTENT DELIVERY SYSTEM AND METHOD - A system for coordinated playback of time-shifted content with time-adapted complimentary content is provided. The time-shifted content may be played back from storage media, both local and remote. Time-shifting may occur by independent playback such as from optical discs and other memory devices, as well as from user manipulation of features in a playback system based upon real-time or near real-time content distribution. The content is identified, along with timing information identifying where in the content the playback is occurring. Time-adapted complimentary content may then be selected and transmitted to the playback system. Such time-adapted content may include advertisement, product and service offerings, complimentary information, audio and/or video content, and so forth. | 2012-05-03 |
20120110628 | Storage of Adaptive Streamed Content - A method consistent with certain implementations involves receiving adaptively streamed data representing the A/V content from a source. The stream contains a high resolution representation of a first portion of the content and a lower resolution representation of a second portion; storing the stream of data to an electronic storage device; determining that the stored stream of data includes the lower resolution representation of the second portion of the content; changing the lower resolution representation of the second portion of the content to a high resolution representation of the second portion of the content; and producing a high resolution output stream of data representing the A/V content by combining the high resolution representation from the storage device with the high resolution representation of the second portion of the content. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2012-05-03 |
20120110629 | METHOD AND DEVICE FOR ENSURING RELIABILITY DURING TRANSMISSION OF TELEVISION DATA IN A TELEVISION SYSTEM BASED ON INTERNET PROTOCOL - A coding/transmitter device ( | 2012-05-03 |
20120110630 | DEVICE AND METHOD FOR PROVIDING SERVICES TO A USER OF A TV SET - A communication device is provided for enabling a TV viewer to transmit signals towards a service provider. The communication device comprises: a user interface adapted to receive input signal from the TV viewer; a transceiver adapted to communicate wirelessly with a service provider via a remote server; and a TV interface adapted to allow forwarding of signals received from a TV source and of signals received from a service provider, towards a TV device of the TV viewer. Preferably the signals received from both sources are displayed simultaneously within different viewing windows at the screen of the TV device. | 2012-05-03 |
20120110631 | HFC CABLE SYSTEM WITH WIDEBAND COMMUNICATIONS PATHWAY AND COAX DOMAIN NODES - System and method to extend the data carrying capacity of a hybrid fiber cable (HFC) network by adding wideband RF signal capability above 1 GHz, and replacing at least some CATV active devices such as amplifiers with a new type of Coax Domain Node (CDN) device that acts to segment the CATV cable portion of the HFC network into a series of smaller domains. The CDN generally filter RF signals from 5-865 MHz, while amplifying and passing RF signals over 1 GHz. Upstream capability is enhanced because the CDN intercept 5-42 MHz upstream signals from each domain and convert to 1 GHz+ signals. Downstream capability is also enhanced because the CDN can take efficiently encoded 1 GHz+ digital data, QAM modulate it, and locally inject into each domain without crosstalk between domains. The system pushes data management and downstream from the head end to the CDN, creating more throughput. | 2012-05-03 |
20120110632 | METHOD AND APPARATUS FOR PROVIDING DISTRIBUTED POLICY MANAGEMENT - An approach is provided for distributed policy management and enforcement. A policy manager determines one or more domains of an information system. The one or more domains are associated at least in part with respective subsets of one or more resources of the information system. The policy manager also determines one or more respective access policies local to the one or more domains. The one or more respective access policies configured to enable a determination at least in part of access to the respective subsets, the one or more resources, or a combination thereof. At least one of the one or more respective access policies is configured to operate independently of other ones of the one or more respective schemas. | 2012-05-03 |
20120110633 | APPARATUS FOR SHARING SECURITY INFORMATION AMONG NETWORK DOMAINS AND METHOD THEREOF - Provided are a security information sharing apparatus capable of sharing security information among network domains and a method thereof. The security information sharing apparatus includes a primitive security information storage unit configured to store primitive security information to be shared with other network domains, an information sharing policy storage unit configured to store an information sharing policy for information to be shared, an information masking policy storage unit configured to store an information masking policy for information not to be opened to the other network domain, a domain selector configured to select the other network domain to receive the shared security information, a shared security information generator configured to generate shared security information for the selected other network domain by applying the information sharing policy to the primitive security information, an information masking unit configured to mask information not to be opened in the generated security information according to the information masking policy, a protocol message generator configured to generate a protocol message for the shared security information subjected to the information masking, to be transmitted, and a protocol message transmitter configured to transmit the protocol message to the selected other network domain. | 2012-05-03 |
20120110634 | AUTOMATIC PIN CREATION USING PASSWORD - A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password. | 2012-05-03 |
20120110635 | METHOD AND SYSTEM FOR DETECTING CHARACTERISTICS OF A WIRELESS NETWORK - Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point. | 2012-05-03 |
20120110636 | Defining an Authorizer in a Virtual Computing Infrastructure - An authorizing entity is allowed to grant permission to a subject to perform an action on an object in a cloud computing environment. An authorizer is defined as the entity having granting authority to delegate a predetermined permission. A subject is defined as a group to whom the permission is being delegated. An object is defined upon which an action is authorized within the cloud computing environment. The action being authorized in the cloud computing environment is defined. Members of the subject group are authorized to perform the permitted action on the object. | 2012-05-03 |
20120110637 | Systems, Methods, and Apparatuses for Facilitating Authorization of a Roaming Mobile Terminal - Systems, methods, and apparatuses are provided for facilitating authorization of a roaming mobile terminal. A method may include receiving a request for security key related policy information for a user equipment device. The request may be sent by a service providing node on a visited network. The method may further include causing a service authorization information request including a user security settings package to be sent to a policy decisioning server. The method may also include receiving, in response to the service authorization information request, a service authorization information answer including a modified user security settings package including the authorization policy information for the user equipment device. The method may additionally include causing the requested security key related policy information to be sent to the service providing node. Corresponding systems and apparatuses are also provided. | 2012-05-03 |
20120110638 | POLICY-BASED CROSS-DOMAIN ACCESS CONTROL FOR SSL VPN - A method may include generating a request that includes a host domain associated with a multiple-domain-to-one domain mapping, capturing the request before transmission of the request, rewriting the host domain, and transmitting the request. | 2012-05-03 |
20120110639 | STORAGE DEVICE, AND AUTHENTICATION METHOD AND AUTHENTICATION DEVICE OF STORAGE DEVICE - An authentication method of a storage device includes requesting an EID (Encoded IDentifer) to the storage device by an authentication device for authenticating the storage device, receiving the EID by the authentication device, restoring original ID information by decoding the received EID, and verifying individual ID information corresponding to use of the storage device included in ID information by using ID authentication information received from the storage device, wherein the ID information includes multiple pieces of individual ID information corresponding to the use of the storage device. | 2012-05-03 |
20120110640 | METHOD, APPARATUS AND SYSTEM FOR WIRELESS NETWORK AUTHENTICATION THROUGH SOCIAL NETWORKING - One exemplary embodiment includes a method for authenticating a terminal to an access point including: (i) receiving, at a server, network configuration information for an access point associated with a first user from a first terminal; (ii) receiving, at the server, a request for the network configuration information for the access point from a second terminal associated with a second user; (iii) sending a query from the server to a social network requesting information regarding whether the first user and the second user have a virtual trust relationship on the social network; (iv) receiving, from the social network, an indication that the first user and the second user have the virtual trust relationship; and (v) sending the network configuration information from the server to the second terminal. | 2012-05-03 |
20120110641 | TRAFFIC STEERING SYSTEM - A method including receiving a session request to establish a network connection with a network; sending a session response to establish the network connection with the network; obtaining, by a traffic steering system, user profile information associated with a user sending the session request; and routing the network connection to a requested user destination via the traffic steering system based on the user profile information, wherein the user profile information includes user-specific preferences. | 2012-05-03 |
20120110642 | METHOD AND APPARATUS FOR GRANTING RIGHTS FOR CONTENT ON A NETWORK SERVICE - Techniques for granting rights for content on a social network to multiple users include determining first data. It is also determined to associate a first user identifier and at least a second user identifier with the first data. It is further determined to grant a right for the first data to a first user identified by the first user identifier and at least a second user identified by the second user identifier. | 2012-05-03 |
20120110643 | SYSTEM AND METHOD FOR TRANSPARENTLY PROVIDING ACCESS TO SECURE NETWORKS - Network access for a secure network is transparently provided to a wireless device using a social networking type of framework. An operator of a secure wireless network may register the network and access credentials for the network with a network access management system. The operator also may configure network access settings, such as designating a sharing level, that permits wireless devices meeting access criteria for the sharing level to use the network. Electronic devices belonging to social media contacts, such as family members and friends, may be associated with the registered network. When the associated devices or other qualifying devices are within communication range of the network, a client function in the device may coordinate with the network access management system to provide network access to the devices. The coordination may take place through a network different than the secure network, such as a cellular network to which the electronic device has subscription access. The network access may be established in a manner that is transparent to the user of the electronic device. | 2012-05-03 |
20120110644 | GLOBALLY VALID MEASURED OPERATING SYSTEM LAUNCH WITH HIBERNATION SUPPORT - An event log can comprise, not only entries associated with components instantiated since a most recent power on of a computing device, but also entries of components instantiated prior to that power on, such as components that were instantiated, and represent, a state of the computing device prior to hibernation that has now been resumed. Upon hibernation, the current values of the Platform Configuration Registers (PCRs) of a Trusted Platform Module (trusted execution environment), as well as a quote of those current values, and a current value of a monotonic counter of the trusted execution environment can be logged. The monotonic counter can be incremented at each power on to track successive generations of the computing device and to guard against an intervening, not-logged generation. A subsequent parsing of the event log can verify the prior generational entries with reference to the PCR values in the log that are associated with those generations. | 2012-05-03 |
20120110645 | Server System and Method for Providing at Least One Service - The invention relates to a server system for providing at least one service. Said system having an interface for connecting a server to a user's computer, authentication means that are designed and provided for request personal identification data of a user who logs onto the server via the user computer and to permit the user computer access if authentication is successful, and a server protection system. The server protection system is designed and provides to compare additional user's computer specific identification data with identification data stored in advance on the server, after successful authentication by the authentication means, and to grant authorization to the user's computer to access the service or services depending on the comparison of the user's computer specific identification data. The invention also relates to a method for providing at least one service and the method for executing an application program. | 2012-05-03 |
20120110646 | ACCESS AUTHORIZING APPARATUS - An access authorizing apparatus includes a receiving unit, a first transmitting/receiving unit, a token issuer and a transmitting unit. A receiving unit receives first approval information indicating that access to the resource in the device has been approved by an access approver, from the first application via the network. A first transmitting/receiving unit transmits an access approval request including the first approval information to the access approving apparatus, and receives access enable/disable information indicating whether the access to the resource by the first application is permitted, from the access approving apparatus. A token issuer, when the access enable/disable information indicates that the access to the resource is permitted, issues token information that gives authority to access the resource to the first application. A transmitting unit transmits the token information issued by the token issuer, to the first application. | 2012-05-03 |
20120110647 | MANAGING UNIQUELY TAGGED ITEMS USING THE INTERNET - The invention teaches managing an item in the Internet of Things, wherein the system comprises: an item registration module, configured to receive at least one registration information of the item, wherein the registration information of the item includes the item's unique number marked by an information sensing device and a tag of an external data source where related information of the item is located, the at least one registration information is from at least one external data source, the unique number is the same in the at least one registration information; a storage module, configured to store the item's registration information; and a query processing module, configured to receive a query to the related information of the item, and obtain the related information of the item from the external data source which corresponds to the external data source tag included in the stored registration information of the item. | 2012-05-03 |
20120110648 | USER AUTHENTICATION SYSTEM AND PLANT CONTROL SYSTEM HAVING USER AUTHENTICATION SYSTEM - A plant control system may include a manipulation monitoring terminal that includes a local user authentication unit configured to authenticate a user who logs in the manipulation monitoring terminal and a domain controller that includes a domain user authentication unit and communicates with the manipulation monitoring terminal. The manipulation monitoring terminal may include a user authentication alarm unit configured to generate a security alarm when the local user authentication unit performs user authentication on the user in a state in which the domain controller is in normal operation. | 2012-05-03 |
20120110649 | METHODS FOR INTERNET SECURITY VIA MULTIPLE USER AUTHORIZATION IN VIRTUAL SOFTWARE - A method for providing internet security via multiple user authorization in virtual software. Each of two users are provided with a non-transitory tangible storage medium. The first user inputs the storage medium into a local computer. If the first user is granted authorization by a second user, the first user can download at least one additional non-browser based application module into virtual memory of his local computer. | 2012-05-03 |
20120110650 | Organizing Permission Associated with a Cloud Customer in a Virtual Computing Infrastructure - Organizing permissions to authorize a subject to perform an action on an object in a cloud computing environment is described. A plurality of permissions associated with a cloud customer is created. A first set of permissions from the plurality of permissions is associated with one or more objects. Each of the first set of permissions describes an action performed on an object. A second set of permissions from the plurality of permissions is associated with one or more users. Each of the second set of permissions describes an action to be performed by one or more users. | 2012-05-03 |
20120110651 | Granting Access to a Cloud Computing Environment Using Names in a Virtual Computing Infrastructure - Access to resources in a cloud computing environment having a plurality of computing nodes is described. A group of users is defined within the cloud computing environment. A first name is assigned to the group. At least one subgroup of users is defined from within the group. A second name is assigned to the at least one subgroup. The second name follows a hierarchical naming structure of the form/group/subgroup. | 2012-05-03 |
20120110652 | DYNAMIC QUERY SERVICES AND METHODS - A system has a network and a data source communicatively coupled to the network. Further, the system has logic configured to discover the data source available on the network and store metadata indicative of the discovered data source in memory, the logic further configured to generate a release parcel, in response to a user input, for performing operations on the data source, the logic further configured to deploy the release parcel to a dynamic query service computing device wherein operations on the data source can be performed through the release parcel. | 2012-05-03 |
20120110653 | MEASUREMENT DEVICE AND METHOD FOR LOGGING USE OF THE MEASUREMENT DEVICE - In a method for managing use information of a measurement device, an operating interface of the device is locked before the device is operated. When a user starts to use the device, the method provides a login interface to verify whether the user is authorized to login the operating interface. If the user is authorized to login the operating interface, the operating interface is unlocked and the method records first information of starting to operate the device. After finishing the operation or when an elapsed time of the device not in use is greater than a predetermined time, the method controls the user to log out the operating interface, records second information of finishing the operation, and the operating interface is locked. The first information and the second information are saved in a text file. | 2012-05-03 |
20120110654 | SECURE CONNECTION SYSTEMS AND METHODS FOR VEHICLES - A communication system of a vehicle includes a mode determination module and a connection control module. The mode determination module sets a mode of operation to one of a first mode and a second mode based on a comparison of a common name (CN) of a root certificate with first and second predetermined CNs associated with operation in the first and second modes, respectively. The connection control module selectively transmits a request to one of a first server and a second server to establish a secure wireless connection between the connection control module and the one of the first and second servers. The first and second servers are different, and the first and second predetermined CNs are different. | 2012-05-03 |
20120110655 | DATA TRANSMISSION MANAGEMENT SERVER AND METHOD - A data transmission management server for managing a terminal device to access a network resource providing server by a source gateway in a virtual private network (VPN) obtains current resource information of a plurality of gateways in the VPN periodically. The data transmission management server selects one from the gateways as a destination gateway according to the resource information, transmits an internet protocol address of the destination gateway to the source gateway to make the source gateway establish a secure communication tunnel to the selected destination gateway and access the network resource providing server over the secure communication tunnel. | 2012-05-03 |
20120110656 | SELECTIVE INVALIDATION OF PACKET FILTERING RESULTS - Example embodiments relate to selective invalidation of packet filtering cache results based on rule priority. In example embodiments, a network node determines whether a rule identifier included in a cache entry of a cache of results of a packet filtering rule set is of a higher priority than a highest priority rule corresponding to a rule set version identifier included in the cache entry. If so, the network node may apply an action included in the cache entry. | 2012-05-03 |
20120110657 | APPARATUS AND METHOD FOR HOST-BASED NETWORK SEPARATION - The invention relates to an apparatus for host-based network separation, comprising: a network separation switch which, when a process is being executed on a host computer, checks whether the network allocated to the process is an internal network or an external network in accordance with the network access authority allocated to the process, and separates the process by IPs allocated to each network; and a packet processor which blocks the access of packet data when the packet data of the process separated by IPs by the network separation switch access a network other than the network to which the relevant IP is allocated. | 2012-05-03 |
20120110658 | AUTHENTICATION SERVER AND METHOD FOR CONTROLLING MOBILE COMMUNICATION TERMINAL ACCESS TO VIRTUAL PRIVATE NETWORK - The present invention discloses an authentication server and a method for controlling a mobile communication terminal access to a virtual private network (VPN). The authentication server comprises a first store module configured to store a first characteristic information of the mobile communication terminal allowed to access; a receiving module configured to receive a VPN access requesting message from the terminal to access; a judgment module configured to judge the type of the terminal to access and obtain a judgment result; a information acquisition module configured to obtain a second characteristic information of the terminal to access when the judgment result indicates that the terminal to access is a mobile communication terminal; a first comparison module configured to compare the second characteristic information with the first characteristic information and obtain a first comparison result; a first execution module configured to allow the terminal to access to continuatively perform the access process when the first comparison result indicates that the second characteristic information is identical with one piece of characteristic information in the first characteristic information, otherwise refuse the terminal to access to continuatively perform the access process. The present invention can effectively ensure the security of the mobile VPN. | 2012-05-03 |
20120110659 | LESS-SECURE PROCESSORS, INTEGRATED CIRCUITS, WIRELESS COMMUNICATIONS APPARATUS, METHODS AND PROCESSES OF MAKING - An integrated circuit ( | 2012-05-03 |
20120110660 | TIME-DOMAIN REFLECTOMETRY USED TO PROVIDE BIOMETRIC AUTHENTICATION - An electronic device includes one or more Time-Domain Reflectometor (TDR) channels and a security block embedded at a silicon or software level to measure human electrical impedance and characteristics for biometric identification and provide biometric authentication. | 2012-05-03 |
20120110661 | TWO-WAY AUTHENTICATION - A method for activating a physiologic sensor ( | 2012-05-03 |
20120110662 | User Indentification with Capacitive Touchscreen - Disclosed herein are various embodiments of means and methods for verifying or authorizing one or more verified or authorized users to operate or use an electronic device containing a capacitive or other type of touchscreen or touch panel. Images are acquired from the touchscreen or touch panel and processed to determine first characteristics corresponding to fingers, hands or hand portions placed thereon. If the first characteristics match stored second characteristics with a sufficient degree of similarity, the user is identified as an authorized or verified user and then permitted to operate or use the electronic device. | 2012-05-03 |
20120110663 | APPARATUS AND METHOD FOR INPUTTING USER PASSWORD - An apparatus for inputting a user password, includes an interface receiving a command. Further, the apparatus for inputting the user password includes a control unit setting a target based on the command from the interface, receiving and storing a password character, and determining that authentication is successes only when the set target and the password character are positioned at a same coordinate on a skin image. Furthermore, the apparatus for inputting the user password includes a display unit connected to the interface to display the skin image of the interface that is transmitted from the control unit. | 2012-05-03 |
20120110664 | METHOD AND APPARATUS FOR AVOIDING DENIAL OF SERVICE IN WEB-SERVICE BASED SYSTEMS - The disclosure relates to a method for identifying and preventing propagation of a DOS attack on a WS-Notification NotificationBroker by inspecting the subscription request. If the address of the NotificationConsumer identified by the subscription request is equivalent to that of the NotificationBroker then the subscription request is rejected. | 2012-05-03 |
20120110665 | Intrusion Detection Within a Distributed Processing System - A computer implemented method monitors activity within a device driver layer of a computer. An arrival rate is identified within a device driver for the node. The arrival rate is a rate at which packets arrive at a network adapter of the node from all other nodes within a network. If the arrival rate exceeds at least one threshold, the node undergoes a state change. The at least one threshold delineates between a plurality of states for the node. | 2012-05-03 |
20120110666 | DETECTING SURREPTITIOUS SPYWARE - Tools and techniques are provided for detecting a particular type of spyware. Network activities and user update activities are monitored automatically, and the results are analyzed to identify related processes which perform network transmissions without performing substantive user updates. These processes are identified to a user and/or an administrator as potential spyware, and are then quarantined or otherwise handled based on instructions received from the user or administrator. In some cases, the monitoring and analysis begins with selection of a group of processes to monitor, while in other cases it begins with monitoring of network and/or user update activities in order to narrow the group of suspect processes. Devices, configured media, and method products are also described. | 2012-05-03 |
20120110667 | System and Method for Server-Based Antivirus Scan of Data Downloaded From a Network - Aspect of the invention are directed to antivirus scanning, by a proxy server, of data downloaded from the network onto a PC workstation. The antivirus scanning is optimized for each scan by selecting an algorithm for that scan based on a determined overall likelihood that the downloaded data contains malicious code. Determination of the overall likelihood is augmented by the strength, or confidence, of statistical data relating to malware screening of results of previous downloads having similar parameters to the instant download. | 2012-05-03 |
20120110668 | Use of Popularity Information to Reduce Risk Posed by Guessing Attacks - A popularity determination module (PDM) is described which reduces the effectiveness of statistical guessing attacks. The PDM operates by receiving a password (or other secret information item) from a user. The PDM uses a model to determine whether the password is popular among a group of users. If so, the PDM may ask the user to select another password. In one implementation, the model corresponds to a probabilistic model, such a count-min sketch model. The probabilistic model provides an upper-bound assessment of a number of times that a password has been encountered. Further, the probabilistic model provides false positives (in which passwords are falsely assessed as popular) at a rate that exceeds a prescribed minimum rate. The false positives are leveraged to reduce the effectiveness of statistical guessing attacks by malicious entities. | 2012-05-03 |
20120110669 | METHOD AND SYSTEM FOR ANALYZING AN ENVIRONMENT - A system for analyzing an environment to identify a security risk, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters. | 2012-05-03 |
20120110670 | SYSTEM AND METHOD FOR ANALYZING A PROCESS - A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and including components representing a process for provisioning and de-provisioning of access credentials for an individual in the environment and a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters, and to use a results plan to provide data for identifying the security risk using the multiple instances. | 2012-05-03 |
20120110671 | METHOD AND SYSTEM FOR ANALYZING AN ENVIRONMENT - A system for analyzing an environment to identify a security risk in a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and including components representing a patching process for the environment, a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters, and to use a results plan to provide data for identifying a security risk in the patching process using the multiple instances. | 2012-05-03 |
20120110672 | SYSTEMS AND METHODS FOR CLASSIFICATION OF MESSAGING ENTITIES - Methods and systems for operation upon one or more data processors for biasing a reputation score. A communication having data that identifies a plurality of biasing characteristics related to a messaging entity associated with the communication is received. The identified plurality of biasing characteristics related to the messaging entity associated with the communication based upon a plurality of criteria are analyzed, and a reputation score associated with the messaging entity is biased based upon the analysis of the identified plurality of biasing characteristics related to the messaging entity associated with the communication. | 2012-05-03 |
20120110673 | Inoculator and antibody for computer security - In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data object in the area, so that the data object is an antibody that provides security to the computer and immunity against the undesired program. Another embodiment of the invention also provides an apparatus (or system) that can be configured to perform at least some of the above functionalities. | 2012-05-03 |
20120110674 | METHODS AND SYSTEMS FOR RATING PRIVACY RISK OF APPLICATIONS FOR SMART PHONES AND OTHER MOBILE PLATFORMS - Methods and systems for evaluating and rating privacy risks posed by applications intended for deployment on mobile platforms. Validating the “intent” of a mobile platform application vis-à-vis its impact on user privacy, as viewed from an end-user's perspective allows those end-users to make better-informed decisions concerning the downloading, installation and/or operation of mobile platform applications. In making such assessments user preferences can be taken into account. Privacy scores are provided through sales channels for the applications, thereby affording potential users the opportunity to assess whether they wish to incur the associated privacy risk, before purchasing a subject application. | 2012-05-03 |
20120110675 | RESTRICTIONS TO DATA TRANSMISSION - Data received at, or created on, a device may be tagged as corporate dependent upon a service over which the data is received or an application in which the data is created. When a user attempts to insert tagged data into a data item that is to be transmitted by the device, the insertion may be prevented. Similarly, the transmission of tagged data may be restricted to only occur on a secure service. | 2012-05-03 |
20120110676 | PROTECTION OF SECRET VALUE USING HARDWARE INSTABILITY - A method for data security, comprising providing an electronic circuit, which has a first, stable operating mode under a first operating condition and a second, unstable operating mode under a second operating condition, different from the first operating condition, and which is configured to output a secret value in the first operating mode; maintaining the electronic circuit initially in the second operating condition; transferring the electronic circuit to the first operating condition and, while in the first operating condition, reading out the secret value; and returning the electronic circuit to the second operating condition after reading out the secret value. | 2012-05-03 |
20120110677 | SYSTEM FOR PROTECTING PERSONAL DATA - A method of providing data in response to a search request comprises the steps of a social networking website receiving the search request to provide a pseudonym associated with the real name; the social networking website determining that the search request is for a pseudonym which, within its database, is not associated with the real name; the social networking website referring the search request to a identity management server which contains an association between the pseudonym and the real name; the identity management server determining the pseudonym which is associated with the real name; and the identity management server providing an information item which is related to the pseudonym. | 2012-05-03 |
20120110678 | Digital Rights Management (DRM) Domain Recommendation and Selection Based on a User's Social Graphs - A network server implements Digital Rights Management (DRM) techniques to limit or inhibit unauthorized access or usage of protected multimedia content, such as a video or a song. However, the server also allows a user who has purchased protected multimedia content to share that content with one or more other people based on the strength of the user's relationships with those people. | 2012-05-03 |
20120110679 | SERVICE PROVIDING SYSTEM, SERVICE PROVIDING METHOD, PORTABLE COMMUNICATION TERMINAL AND SERVER - A service providing system includes a portable communication terminal operated by a user; a service providing apparatus providing a service to the user, and a server managing the service providing apparatus, wherein the service providing apparatus calculates a response using a challenge, and the portable communication terminal transmits a challenge generated by the server to the service providing apparatus subjected to a legitimacy check of the service providing apparatus and presents a result of the legitimacy check based on a response calculated by the service providing apparatus subjected to the legitimacy check using the transmitted challenge. | 2012-05-03 |
20120110680 | METHOD AND APPARATUS FOR APPLYING PRIVACY POLICIES TO STRUCTURED DATA - An approach is provided for applying privacy policies to structured data. A privacy policy management infrastructure receives a request for an exchange of structured data among a plurality of devices. The privacy policy management infrastructure determines one or more elements of the structured data. The privacy policy management infrastructure also determines one or more privacy policies corresponding to the structured data, respective ones of the one or more elements, or a combination thereof. The privacy policy management infrastructure further determines to apply the one or more privacy policies to the structured data, respective ones of the one or more elements, or a combination thereof when initiating the exchange. | 2012-05-03 |
20120110681 | SYSTEMS FOR EMAIL COMMUNICATIONS - Systems and methods are provided for email communications between senders and receivers. In accordance with one implementation, a computerized method is provided that allows composing an email by a sender in Send Location of Send City at Send Time through the sender's mobile device. In the implementation, in composing the email, the sender's company may monitor the sender's Send Location, without awareness of the sender. In addition, when composing the email, the GPS receiver included in the sender's mobile device may be configured to locate the Send Location. Moreever, to prevent the sender's realization that the sender is being monitored, the Send location may be included only as header information of the composing email of the composing email. | 2012-05-03 |
20120110682 | Animal Model for Toxicology and Dose Prediction - The invention relates to the use of fetal tissues to generate a tissue model in a non-human animal. The tissue model comprises target tissues allowed to progress through development in vivo in a non-human host in order to obtain tissues having a mature phenotype that can be used to assess toxicity and/or efficacy of an agent. | 2012-05-03 |
20120110683 | NON-HUMAN ANIMAL MODEL OF MYOCARDIAL INFARCTION AND METHOD FOR CREATING THE SAME - The present invention provides a non-human animal model of myocardial infarction, which can be created by a less invasive method, shows an extremely low mortality during and after surgical induction of myocardial infarction, ensures the blood reflow after necrosis of cardiac muscles caused by blocking blood flow, and therefore, is usable in topical therapy for myocardial infarction and studies on regenerative medicine. The present invention also provides a method for creating the non-human animal model comprising administering a temporary embolic agent to a branch blood vessel of a heart coronary artery to block blood flow in the branch blood vessel; and after a definite period of time after said vascular branch blockage, administering a temporary embolic agent to the target coronary artery which is intended to induce myocardial infarction to block blood flow in the target coronary artery. | 2012-05-03 |
20120110684 | Method for Diagnosing or Predicting a Non Syndromic Autosomal Recessive Optic Atrophy, or a Risk of a Non Syndromic Autosomal Recessive Optic Atrophy - The present invention relates to a method for diagnosing or predicting a non syndromic autosomal recessive optic atrophy, or a risk of a non syndromic autosomal recessive optic atrophy. | 2012-05-03 |
20120110685 | MODULAR DNA-BINDING DOMAINS AND METHODS OF USE - The present invention refers to methods for selectively recognizing a base pair in a DNA sequence by a polypeptide, to modified polypeptides which specifically recognize one or more base pairs in a DNA sequence and, to DNA which is modified so that it can be specifically recognized by a polypeptide and to uses of the polypeptide and DNA in specific DNA targeting as well as to methods of modulating expression of target genes in a cell. | 2012-05-03 |
20120110686 | Cand45 tRNA-Derived Expression System for Gene Modulation - The present invention relates to systems and methods for modulating gene expression and applications thereof. Provided is a novel expression system to generate RNaseZ and RNA polymerase III dependent RNAs to regulate genes and control the timing and the location of the regulation by supplying synthetic or expressed oligonucleotide antisense to a small RNA. | 2012-05-03 |
20120110687 | PEPPER HYBRID PS 16351609 - The invention provides seed and plants of pepper hybrid PS 16351609 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PS 16351609 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-05-03 |
20120110688 | AAD-12 EVENT 1606 AND RELATED TRANSGENIC SOYBEAN LINES - This invention relates to soybean event pDAB4472-1606 (Event 1606). This invention includes a novel aad-12 transformation event in soybean plants comprising a polynucleotide sequence, as described herein, inserted into a specific site within the genome of a soybean cell. This invention also relates in part to plant breeding and herbicide tolerant plants. In some embodiments, said event/polynucleotide sequence can be “stacked” with other traits, including, for example, other herbicide tolerance gene(s) and/or insect-inhibitory proteins. | 2012-05-03 |
20120110689 | COTTON VARIETY P07X.8213.RF - A cotton variety, designated P07X.8213.RF, the plants and seeds of the cotton variety P07X.8213.RF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety P07X.8213.RF with itself or with another cotton plant, and hybrid cotton seeds and plants produced by crossing the variety P07X.8213.RF with another cotton variety or plant and to methods for producing a cotton plant containing in its genetic material one or more transgenes and to the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety P07X.8213.RF, to methods for producing other cotton varieties derived from cotton variety P07X.8213.RF and to the varieties derived by the use of those methods. | 2012-05-03 |
20120110690 | COTTON VARIETY P07X.8212.RF - A cotton variety, designated P07X.8212.RF, the plants and seeds of the cotton variety P07X.8212.RF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety P07X.8212.RF with itself or with another cotton plant, and hybrid cotton seeds and plants produced by crossing the variety P07X.8212.RF with another cotton variety or plant and to methods for producing a cotton plant containing in its genetic material one or more transgenes and to the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety P07X.8212.RF, to methods for producing other cotton varieties derived from cotton variety P07X.8212.RF, and to the varieties derived by the use of those methods. | 2012-05-03 |
20120110691 | COTTON VARIETY P07X.8244.RF - A cotton variety, designated P07X.8244.RF, the plants and seeds of the cotton variety P07X.8244.RF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety P07X.8244.RF with itself or with another cotton plant, and hybrid cotton seeds and plants produced by crossing the variety P07X.8244.RF with another cotton variety or plant and to methods for producing a cotton plant containing in its genetic material one or more transgenes and to the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety P07X.8244.RF, to methods for producing other cotton varieties derived from cotton variety P07X.8244.RF and to the varieties derived by the use of those methods. | 2012-05-03 |
20120110692 | COTTON VARIETY 99M-548 - A cotton variety, designated 99M-548, the plants and seeds of the cotton variety 99M-548, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety 99M-548 with itself or with another cotton plant, and hybrid cotton seeds and plants produced by crossing the variety 99M-548 with another cotton variety or plant and to methods for producing a cotton plant containing in its genetic material one or more transgenes and to the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety 99M-548 including variety 548WRF-CB2-B, to methods for producing other cotton varieties derived from cotton variety 99M-548 and to the varieties derived by the use of those methods. | 2012-05-03 |
20120110693 | TARGETING NUCLEIC ACIDS IN MITOCHONDRIA - The present invention relates to a shuttle system with which nucleic acids of interest may be imported into a mitochondrion. This system is based on the use of a fusion protein between a mitochondrial targeting sequence and a protein binding a nucleic acid of interest. This shuttle system is for example useful in agronomics, in the field of gene therapy, and within the scope of research products aiming at characterizing the function of mitochondrial genes. | 2012-05-03 |
20120110694 | PLANT MYB TRANSCRIPTION FACTOR HOMOLOGS - This invention relates to an isolated nucleic acid fragment encoding a Myb-related transcription factor. The invention also relates to the construction of a chimeric gene encoding all or a portion of the Myb-related transcription factor, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the Myb-related transcription factor in a transformed host cell. | 2012-05-03 |
20120110695 | PLANT YIELD IMPROVEMENT BY STE20-LIKE GENE EXPRESSION - The present invention concerns a method for increasing plant yield by modulating expression in a plant of a nucleic acid encoding a Ste20-like polypeptide or a homologue thereof. One such method comprises introducing into a plant a Ste20-like nucleic acid or variant thereof. The invention also relates to transgenic plants having introduced therein a Ste20-like nucleic acid or variant thereof, which plants have increased yield relative to control plants. The present invention also concerns constructs useful in the methods of the invention. | 2012-05-03 |
20120110696 | LysM Receptor-Like Kinases To Improve Plant Defense Response Against Fungal Pathogens - Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens. | 2012-05-03 |
20120110697 | METHOD OF CONSTRUCTING NOVEL HIGHER PLANT AND METHOD OF PROMOTING THE GROWTH OF HIGHER PLANT - The present invention provides a method of producing a higher plant having cytochrome c | 2012-05-03 |
20120110698 | Expression of Transcription Regulators that Provide Heat Tolerance - The invention relates to methods of producing a desired phenotype in a plant by manipulation of gene expression within the plant. The method relates to means to increase expression level of a bHLH subgroup 1b gene expression or activity, wherein a desired phenotype such as increased heat tolerance relative to a wild type control plant following heat stress results in reduced flower abortion and increased yield. Included are plants produced by said methods. The invention also relates to nucleic acid sequences and constructs useful such methods and methods of generating and isolating plants having increased expression of a bHLH subgroup 1b expression or activity. | 2012-05-03 |
20120110699 | METHOD FOR PROMOTING THE FORMATION OF SECONDARY CELL WALL OF PLANT - Provided is a method for increasing the thickness of the secondary cell wall of a plant. A method for increasing the thickness of the secondary cell wall of a plant by using a tracheary element differentiation (TED)-associated protein or a C-terminal fragment of the same, which comprises constructing a transgenic (Tg) plant containing, in an expressible manner, a DNA encoding protein(s) selected from the group consisting of a combination of TED6 with TED7, a C-terminal fragment of TED6, a C-terminal fragment of TED7, and a combination of a C-terminal fragment of TED6 with a C-terminal fragment of TED7, and expressing said DNA in said plant; the Tg plant; and a progeny, a cell, a tissue or a seed of the same. | 2012-05-03 |
20120110700 | PLANTS WITH ALTERED ROOT ARCHITECTURE, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING LEUCINE RICH REPEAT KINASE (LLRK) POLYPEPTIDES AND HOMOLOGS THEREOF - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering root structure of plants, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes a polypeptide useful for altering plant root architecture. | 2012-05-03 |
20120110701 | PESTICIDAL COMPOSITIONS AND PROCESSES RELATED THERETO - This document discloses molecules having the following formula (Formula One) | 2012-05-03 |
20120110702 | Pesticidal Compositions and Processes Related Thereto - This document discloses molecules having the following formula (“Formula One”): | 2012-05-03 |
20120110703 | PROTEIN HAVING NOVEL PRENYLTRANSFERASE ACTIVITY AND GENE ENCODING THE SAME - This invention provides DNAs of a prenyltransferase derived from a hop ( | 2012-05-03 |
20120110704 | Pyridazine Compounds for Controlling Invertebrate Pests - The present invention relates to pyridazine compounds of formulae I or II and the salts and N-oxides thereof, | 2012-05-03 |
20120110705 | Pyridazine Compounds for Controlling Invertebrate Pests - The present invention relates to pyridazine compounds of formulae I or II and the salts and N-oxides thereof, | 2012-05-03 |
20120110706 | MODIFIED BACILLUS THURINGIENSIS CRY21 PROTEINS FOR NEMATODE CONTROL - The subject invention concerns plants protected from nematode feeding damage and improved versions of Cry proteins. The subject invention also concerns improved versions of Cry21A proteins. Synthetic genes encoding these modified proteins are also part of the subject invention. Another embodiment of the subject invention includes plants transformed with the genes of the subject invention. In yet another embodiment the subject invention concerns Bt proteins for in-plant protection against crop damage by root knot nematode (RKN; | 2012-05-03 |
20120110707 | Metrology Probe and Method of Configuring a Metrology Probe - A metrology probe capable of measurements of a broad range of physical properties of individual samples of nano- or sub-nanometer dimensions is provided. The probe comprises a probe body, a substrate connected to the probe body, and a tip proximate the substrate. The probe further comprises a coarse piezoelectric actuator having an electrical input. The coarse piezo is configured to cause the tip and/or the substrate to move relative to each other when a first electrical signal is provided to the electrical input. The probe further comprises a low-pass filter in electrical communication with the electrical input of the coarse piezo. The probe further comprises a fine piezoelectric actuator having an electrical input configured to cause the tip and/or the substrate to move relative to each other when a second electrical signal is provided to the electrical input. | 2012-05-03 |
20120110708 | Olea europaea tree named 'HIDshurtleff' - A variety of olive tree, named ‘HIDshurtleff’. The ‘HIDshurtleff’ is an ornamental olive tree having a bright green leaf with a smooth texture and increased width and length, a very long weeping characteristic, extremely low leaf/material drop, and very hardy wind, animal and drought characteristics. | 2012-05-03 |
20120110709 | Nectarine tree named 'Sauzee Prince' - A new and distinct variety of nectarine tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Nemaguard’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features:
| 2012-05-03 |
20120110710 | PUNICA GRANATUM PLANT NAMED 'ORANGE BLOSSOM SPECIAL' - A new and distinct cultivar of | 2012-05-03 |
20120110711 | Poinsettia plant named 'NPCW10184' - A new poinsettia plant named ‘NPCW10184’ particularly distinguished by its upright growth habit and intensive marbling color pattern is disclosed. | 2012-05-03 |
20120110712 | Poinsettia Plant Named 'NPCW10187' - A new poinsettia plant named ‘NPCW10187’ particularly distinguished by its compact growth, medium sized bracts, and a brilliant bright red color, is disclosed. | 2012-05-03 |