27th week of 2011 patent applcation highlights part 54 |
Patent application number | Title | Published |
20110167440 | Enhanced Subscriber Authentication Using Location Tracking - Tracking and analysis of the location of user and device access to telecommunications services may be used to validate that a given user or device is part of an authorized subscriber household and is therefore properly accessing those services in accordance with the terms of service. A service provider may determine, based on previously collected data and user information collected while a user accesses a service, whether the user's pattern of access establishes a required pattern of access determined by the service provider, such as access on a minimum periodic basis from the home of an authorized subscriber. | 2011-07-07 |
20110167441 | AN INTERACTIVE IPTV SYSTEM AND A CONTENT PUSHING METHOD THEREOF - The present invention provides an interactive IPTV system and a content pushing method thereof. Wherein, the method includes the following steps: the IPTV Service Control Functions requests to transmit the media content in the IPTV Media Functions to the user equipment; the IPTV Media Functions transmits the media content to the user equipment; and the user equipment stores the media content into its own memory. With the technical solution of the invention, it implements the content pushing service in the Next Generation Network, and makes the user able to select the content stored in the user equipment directly to watch the TV program that the service provider recommends. | 2011-07-07 |
20110167442 | System and Method to Provide a Unified Video Signal for Diverse Receiving Platforms - A system includes a signal-processing engine configured to generate a video data stream including a plurality of data packets based on a received video signal. A first subset of the plurality of data packets is usable to generate a video display of content having a first quality and all of the plurality of data packets are usable to generate a second video display of the content having a second quality. The second quality is higher than the first quality. The signal-processing engine is further configured to distinguish the first subset of the plurality of data packets from other data packets of the plurality of data packets by applying a tag to particular data packets to form tagged data packets. The system also includes a transmitter coupled to the signal-processing engine and configured to transmit the plurality of data packets of the video data stream. | 2011-07-07 |
20110167443 | Method and device for updating regional rating table - A method performed by a digital television receiver associated with a television includes storing in a memory a first rating configuration, including a region identification of the first rating configuration and a version identification of the first rating configuration, for rating a television program in accordance with a rating scheme, and storing in the memory an identification of a first television channel as a default channel for the rating scheme. The method further includes receiving a subset of a group of transport packets via a receiving channel, comparing the region identification and the version identification of the first and the second rating configurations, and if the region identifications are the same, and the version identifications of the first and the second rating configurations indicate that the second configuration is not newer than the first rating configuration, not storing the second configuration. | 2011-07-07 |
20110167444 | AUTHENTICATING AND OFF-LOADING IPTV OPERATIONS FROM MOBILE DEVICES TO FIXED RENDERING VIEWING DEVICES - A mobile IPTV system enables authenticating and off-loading of IPTV operations from a mobile device to an external fixed viewing device. The mobile device performs authentication to an IPTV network to receive decryption key(s) for use in decrypting IPTV content and provides the decryption key to the viewing device. The viewing device uses the decryption key to decrypt and render IPTV content thereon. | 2011-07-07 |
20110167445 | AUDIOVISUAL CONTENT CHANNELIZATION SYSTEM - A system for providing audiovisual data. A run-length audiovisual data system for providing run-length audiovisual content. An advertising content system for providing advertising content. A semantic filter system for processing the run-length audiovisual content and the advertising content and matching the run-length audiovisual content to the advertising content based on semantic filter output matching. | 2011-07-07 |
20110167446 | PROGRAM GUIDE SYSTEM WITH ADVERTISEMENTS - An interactive television program guide is provided in which advertisements may be displayed on program guide screens. Banner advertisements may be displayed above and below program listings. Panel advertisements may be provided adjacent to program listings. The advertisements may contain video. The advertisements may be used to promote television programs and conventional goods and services. When a user selects an advertisement, the program guide provides the user with an opportunity to order products or services, request information, set reminders for upcoming programs, view program descriptions, record programs, or take other such actions. Embedded advertisements may be provided within the program listings region and may be automatically displayed immediately adjacent to related program listings. | 2011-07-07 |
20110167447 | SYSTEMS AND METHODS FOR PROVIDING A CHANNEL SURFING APPLICATION ON A WIRELESS COMMUNICATIONS DEVICE - A wireless communications device provides users with opportunities to access interactive media guidance or other applications and to control user equipment and interactive media guidance applications. In an exemplary embodiment, users can access a surfing guide application which allows browsing of screenshots of programs playing on broadcast channels on the wireless communications device. | 2011-07-07 |
20110167448 | METHOD AND SYSTEM FOR DISPLAYING ADVERTISING, VIDEO, AND PROGRAM SCHEDULE LISTING - A television schedule system and method for displaying television schedule information on a television screen includes a program guide having a schedule information area that depicts the programs that are being presented on each channel at each time during the day. An input device allows the viewer to browse through the schedule information area and/or obtain more information about programs of particular interest. In one aspect, the viewer may watch a program on the currently-tuned channel, while browsing through the other channels on a portion of the television screen. In another aspect, the viewer may watch programs currently being shown on the television, while he or she browses through the program guide. In yet another aspect, the system includes a database, a processor and associated software for automatically customizing the television schedule guide to an individual viewer or a group of viewers, e.g., a family, to facilitate use of the television schedule. | 2011-07-07 |
20110167449 | INFORMATION SYSTEM - A system and method for displaying an electronic program schedule guide is provided. The system has areas for displaying program schedule information. In addition, the system also has areas that may be used for advertising programs, products or services. In another embodiment, the system has areas for displaying messages to the user. | 2011-07-07 |
20110167450 | INTERNET TELEVISION PROGRAM GUIDE SYSTEM WITH EMBEDDED REAL-TIME DATA - An Internet television program guide system is provided that allows a user at a multimedia system to access television program listings containing embedded real-time data over an Internet communications link. The television program listing may be for a sporting event that is currently being broadcast and the real-time data may be the current score of the event, the current weather where the event is taking place, or any other suitable real-time information on the event. The real-time data may be presented in the form of video stills, video clips, textual information, audio clips, or suitable combinations of such media. The user can perform database searches on the program guide listings to search for a desired program. If desired, the user can obtain additional information on a selected program by accessing an associated web page. | 2011-07-07 |
20110167451 | METHOD AND APPARATUS FOR TRANSMITTING, STORING AND PROCESSING ELECTRONIC PROGRAM GUIDE DATA FOR ON-SCREEN DISPLAY - A television viewer uses a PIP format for display of program related information such as television program listings from a program schedule data base in the background and moving, real time images of a program selected from the displayed listings in the PIP window. All the text of the background information lies outside the PIP window. In one embodiment, as the viewer selects a particular program from the display of current television program listings by means of a cursor or a code number, the corresponding program automatically appears in the PIP window. | 2011-07-07 |
20110167452 | INTERACTIVE TELEVISION SYSTEM WITH TEMPLATES FOR MANAGING VENDOR-SPECIFIC VIDEO-ON-DEMAND CONTENT - An interactive television system is provided in which a user can use an interactive television application to access and request media-on-demand programming from one or more specific vendors. The interactive television application may display vendor-specific interface screens that allow the user to access and request content from a particular vendor. The application may generate a vendor-specific interface screen by incorporating vendor-specific interface elements into an interface template. The template may include vendor-invariant interface elements and attributes for the incorporated elements. The generated vendor-specific interface screen may then be displayed on the user equipment. The system may also include a remote server to provide vendor-specific interface elements and templates to the application, and memory on the user equipment where these elements and templates may be stored. | 2011-07-07 |
20110167453 | SYSTEM AND METHOD FOR CONSTRUCTION, DELIVERY AND DISPLAY OF ITV APPLICATIONS THAT BLEND PROGRAMMING INFORMATION OF ON-DEMAND AND BROADCAST SERVICE OFFERINGS - A user interface allows for blending of television program choices from which a viewer may select, the blending representing options for linear and non-linear programming presented together within a single hierarchy of a designated category. The blending may further include managed content relevant to the designated category, where desired. Such designated categories may include television programming categories and/or content categories. The options for linear and non-linear programming may be presented together within a single screen of the user interface. | 2011-07-07 |
20110167454 | Information processing apparatus, information processing method, and program - Provided is an information processing apparatus including: a broadcast signal processing portion to receive and reproduce a program of a channel chosen by a user; a storage portion to store preference information of the user and to store, as a user viewing history, information of channels viewed by the user; a user preference learning portion to learn the user preference information based on information about the reproduced program, and to record information of the channel of the reproduced program in a viewing history list; a feature information generating portion to select, as first channels, channels among the channels on the air based on the viewing history list, and to generate feature information of a program of the selected first channels; and a recommended program determining portion to determine a recommended program based on the feature information of the program of the channels and on the user preference information. | 2011-07-07 |
20110167455 | ADAPTIVE MONITORING METHOD FOR UPDATE DETECTION IN A MOBILE BROADCAST NETWORK - Information included within metadata broadcast within an overhead flow of a mobile broadcast network enables receiver devices to determine when metadata updates will occur. The mobile broadcast network can include within metadata messages information related to a time for the next metadata update. Using this information, receiver devices can determine when the next metadata update will occur and de-energize the receiver until that time. Enabling mobile devices to remain de-energized until the next metadata update improves their power efficiency. Synchronizing mobile devices to access the overhead flow for updated metadata reduces the content delivery latency that the system must accommodate, thereby improving system flexibility and bandwidth efficiency. Specify the time of a next metadata update enables the broadcast system to change the rate and timing at which metadata updates are performed. | 2011-07-07 |
20110167456 | Offering Items Identified in a Media Stream - Disclosed herein are techniques to enable users to purchase or receive information regarding items identified in a stream output by a content output device, regardless of whether the users are previously associated with the content output device or a device that monitors the stream. With these techniques, for instance, a user watching a video stream displayed on a television may see an advertisement for an item offered for purchase. In response, the user may choose to initiate a purchase of the item from an item offering service, to add the item to a shopping cart of the user at the item offering service, or to receive information regarding the item from the item offering service. | 2011-07-07 |
20110167457 | MOTION PICTURE REPRODUCING APPARATUS AND MOTION PICTURE REPRODUCING METHOD - [Object] An object is to provide a motion picture reproducing apparatus allowing a user to easily select a desired motion picture from a large number of motion pictures. | 2011-07-07 |
20110167458 | METHOD AND SYSTEM FOR MEDIATED ACCESS TO A DATA FACADE ON A MOBILE DEVICE - A content delivery system, a mobile subscriber terminal ( | 2011-07-07 |
20110167459 | Broadcast Distribution Apparatus and Method of Use Thereof - Apparatus and method for distributing broadcast data signals comprising broadcast receiving means for receiving satellite data signals, and converting the modulation of the data signals from a first scheme compatible with satellite set-top boxes into a more spectrally efficient second scheme, the data signals then being distributed to one or more satellite set-top boxes, wherein adapter means are provided for at least one satellite set-top box to convert the modulation of the data signals from the second scheme to the first scheme. | 2011-07-07 |
20110167460 | Data Distribution Unit for Vehicle Entertainment System - A data distribution unit for a vehicle includes wireless receiver configured to receive coded data wirelessly via a cellular network, a signal processor configured to decode the coded data into video data and audio data, and a wireless transmitter configured to transmit the video data wirelessly to a display and transmit the audio data wirelessly to a speaker. | 2011-07-07 |
20110167461 | MEDIA REPRODUCTION APPARATUS - A media reproduction apparatus | 2011-07-07 |
20110167462 | SYSTEMS AND METHODS OF SEARCHING FOR AND PRESENTING VIDEO AND AUDIO - The invention relates to systems and methods for providing video segments over a network. In one embodiment, metadata identifying a video segment is received from a first client device and transmitted to a second client device on a platform different than the first client device, via a network. In another embodiment, metadata identifies a key frame of a video file, which may be used to retrieve and/or playback a portion of the video file via the network. In another embodiment, metadata, generated at a plurality of client devices that are linked via the network, are indexed. | 2011-07-07 |
20110167463 | Fast Initialization of Multi-Mode Devices - Systems and methods for initializing a dual mode device can use a network type flag to determine whether a network type is set. The dual mode device can initialize using a network type corresponding to the network type flag. In some implementations, if the network type is incorrect, the dual mode device can update the network type flag and restart the dual mode device. | 2011-07-07 |
20110167464 | APPARATUS AND METHOD FOR BROADCASTING SERVICES IN DIGITAL VIDEO BROADCASTING SYSTEM - An apparatus and method for providing signaling information using inband transmission in a digital video broadcasting system where a frame for transmitting broadcasting data according to a ground-wave broadcasting service and broadcasting data according to a mobile broadcasting service is generated, and the generated frame is transmitted with an additional area for recording recognition information that indicates whether signaling information to be transmitted in the generated frame or the frame to be transmitted next time has been changed is allocated to a signaling information field of the generated frame. | 2011-07-07 |
20110167465 | Device control apparatus, device control method and computer program - There is provided a device control apparatus including a transmission signal input/output unit for receiving a signal including a control signal for controlling an internal state from another device or outputting the signal to the other device, an application acquisition unit for properly accessing an application server over a network and properly acquiring the application, a display control unit for controlling a display based on the application acquired by the application acquisition unit, and an operation control unit for executing the application acquired by the application acquisition unit and controlling an operation of the other device connected to the transmission signal input/output unit. The operation control unit permits the other device to transmit its status upon initiation of the execution of the application acquired by the application acquisition unit, and prohibits the other device from transmitting the status upon termination of the application execution. | 2011-07-07 |
20110167466 | Method and Apparatus for Interface to Layer 2 of an Open Systems Interconnection (OSI) Communication Protocol - A method of communicating with a layer | 2011-07-07 |
20110167467 | DIGITAL BROADCASTING SYSTEM AND DATA PROCESSING METHOD - A digital broadcasting system and a data processing method are disclosed. A time zone identifier is inserted into program table information of a broadcasting signal and the broadcasting signal is transmitted/received. The digital broadcasting system can calculate a local time of a region, in which the digital broadcasting system is located, using the time zone identifier. Accordingly, although the position of the digital broadcasting system is changed, it is possible to process the broadcasting signal related to the local time without an error. | 2011-07-07 |
20110167468 | METHOD OF PROCESSING APPLICATION IN DIGITAL BROADCAST RECEIVER CONNECTED WITH INTERACTIVE NETWORK AND THE DIGITAL BROADCAST RECEIVER - A digital broadcast receiver is disclosed. The method of processing an application in a digital broadcast receiver connected with an interactive network includes receiving, from a broadcast network, broadcast audio/video (A/V) content and application information table (AIT) data, wherein the AIT data includes a linkage descriptor, parsing the linkage descriptor, wherein the linkage descriptor comprises a field identifying a type of at least one secondary device able to process the application, displaying an indicator informing that the application is able to be accessed by using at least one secondary device, searching at least one secondary device connected to the digital broadcast receiver, receiving a request signal for the application, and transmitting the application or an IP address of the application to the secondary device. | 2011-07-07 |
20110167469 | MONITORING FEDERATION FOR CLOUD BASED SERVICES AND APPLICATIONS - Technologies are described herein for cloud monitoring federations that can include cloud monitoring services (CMS) that collect monitoring information from point of presence (POP) agents. The cloud monitoring POPs may be located in the cloud, on client machines, embedded within cloud applications, or wherever they can obtain visibility into managed entities associated with the cloud. Management systems, acting as cloud monitoring clients (CMC), may interface with the CMS to obtain a complete view of services and application used by their enterprise including those that operate outside of the enterprise premises as part of a cloud or outside network. The publishing by POPs and consumption by CMCs of management information across components within the enterprise and out in the cloud may be supported by managing roles, responsibilities, scopes, security boundaries, authenticity of information, service level agreements, and other aspects of cloud monitoring operations. | 2011-07-07 |
20110167470 | MOBILE DATA SECURITY SYSTEM AND METHODS - Policy is provided from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. Policy can also be provided from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. Access to a data server by a mobile device can be controlled, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy. | 2011-07-07 |
20110167471 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING GROUP POLICY CONFIGURATION IN A COMMUNICATIONS NETWORK USING A FAKE USER - Methods, systems, and computer readable media for providing group policy configuration in a communications network using a fake user are disclosed. The method is performed at a policy charging and rules function (PCRF) node. According to one method, first policy profile information associated with a first subscriber identifier is obtained from a policy profile database, where the first subscriber identifier is associated with a first subscriber. Second policy profile information associated with a second subscriber identifier is obtained from the policy profile database, where the second subscriber identifier is associated with a group of subscribers that also includes the first subscriber. At least a portion of the second policy profile information is applied to the first subscriber. | 2011-07-07 |
20110167472 | Endpoint-Hosted Hypervisor Management - A client hypervisor comprises a virtual agent that runs outside of a system OS and that allows device management independent of the OS and user. The virtual agent is tied to a device and not a specific instance of the OS. Such client hypervisors expose new functionality to ease managing systems. Some of these capabilities come from the persistence and privileges outside the OS. In some embodiments of the invention, this new management functionality is exposed to allow device management via new virtualization concepts, such as multiple VMs per system, VM replacement, snapshot/rollback, etc. | 2011-07-07 |
20110167473 | Endpoint-Hosted Hypervisor Management - A client hypervisor comprises a virtual agent that runs outside of a system OS and that allows device management independent of the OS and user. The virtual agent is tied to a device and not a specific instance of the OS. Such client hypervisors expose new functionality to ease managing systems. Some of these capabilities come from the persistence and privileges outside the OS. In some embodiments of the invention, this new management functionality is exposed to allow device management via new virtualization concepts, such as multiple VMs per system, VM replacement, snapshot/rollback, etc. | 2011-07-07 |
20110167474 | SYSTEMS AND METHODS FOR MOBILE APPLICATION SECURITY CLASSIFICATION AND ENFORCEMENT - The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate. | 2011-07-07 |
20110167475 | Secure Access to Remote Resources Over a Network - A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual private network tool collects critical network information for the client computer, and sends this critical network information to an address assignment server in the remote network. The address assignment server compares the critical network information with a pool of available addresses in the remote network, and assigns addresses for use by the client computer that do not conflict with the addresses for local resources. The address assignment server also provides routing information for resources in the remote network to the virtual private network tool. The virtual private network tool will postpone loading this routing information into the routing tables of the client computer until the client computer requests access to a specific resource in the remote network. When the client computer requests access to a specific resource in the remote network, the virtual private network tool will only provide the routing table with the routing information for that specific remote resource. | 2011-07-07 |
20110167476 | MESSAGE DELIVERY SYSTEM AND DELIVERY METHOD - A message delivery system for delivering a message to a user includes: a plurality of delivery systems ( | 2011-07-07 |
20110167477 | METHOD AND APPARATUS FOR PROVIDING CONTROLLED ACCESS TO A COMPUTER SYSTEM/FACILITY RESOURCE FOR REMOTE EQUIPMENT MONITORING AND DIAGNOSTICS - A hardware-software user connectivity control method and apparatus which provides a secure controlled access arrangement that enables only authorized users to obtain access to stored proprietary information and processing tools/applications on a computer-implemented global monitoring system/network (GMS) used to monitor and diagnose steam turbine power generator equipment and plants. An authentication challenging application (ACA) in the GMS sends a challenge sequence of code/numbers via a non-secure communications link/channel to an authentication response application (ARA) resident on a user/customer computer system. The ARA must respond via the same communications link/channel with an expected response code/number sequence to enable the user's access to the GMS otherwise the communications link/session is terminated. The ARA may optionally be stored on a portable flash memory dongle gaining direct access to the GMS locally. Additionally, a proprietary port connector device is needed when making a direct access connection locally via the GMS facility communications port. | 2011-07-07 |
20110167478 | METHOD AND APPARATUS FOR PROVIDING SIMULTANEOUS SUPPORT FOR MULTIPLE MASTER KEYS AT AN ACCESS POINT IN A WIRELESS COMMUNICATION SYSTEM - The described apparatus and methods include a wireless local area network (WLAN) access point having a wireless wide area network (WWAN) backhaul connection to provide a gateway between a LAN and a WAN. In one example, the access point may be a cellular telephone. Here, a processor in the access point is configured to generate a plurality of master keys, such that a plurality of access terminals may each utilize a respective one of the master keys to access the LAN. Further, the processor is configured to enable control of an allocation of resources to at least one of the access terminals. | 2011-07-07 |
20110167479 | ENFORCEMENT OF POLICIES ON CONTEXT-BASED AUTHORIZATION - Embodiments of the invention provide methods and systems for enforcing usage/context-based authorization. The method may include generating an authorization context for access to a resource. The access may include a first set of access parameters. The method may further store the authorization context associated with the resource, and intercept an access request for the resource. The access request may include a second set of access parameters. The method may further check the access request against the authorization context to determine if the second set of access parameters matches the first set of access parameters, and in response to the first set of access parameters matching the second set of access parameters, permit access to the resource in accordance with the second set of access parameters. | 2011-07-07 |
20110167480 | TECHNIQUES FOR SECURE TRANSPARENT SWITCHING BETWEEN MODES OF A VIRTUAL PRIVATE NETWORK (VPN) - Techniques for secure transparent switching between modes of a virtual private network (VPN) are provided. A principal, via a client, establishes a VPN session in a first mode of operation with a server. The principal subsequently requests a second mode of operation during the same VPN session. The VPN session is transparently transitioned to the second mode of operation without any interaction being required on the part of the principal and without terminating the original VPN session. | 2011-07-07 |
20110167481 | SYSTEM AND METHOD FOR TOY ADOPTION AND MARKETING - A method and computer system for providing a virtual world are disclosed. First and second registration codes, which are different and are obtained from purchasing items are used to access different portions of a website. Subsequent to accessing the portions of the website using the registration codes, a first image and a second image are accessed to be viewed, each by using a user identification name and a password without reentering the first and second registration codes. A name is to be selected for each of the images after using the registration codes. After entering the user identification name, the first and second images are to be interacted with to bring about changes to the first and second images, and the changes are based on the interacting. An invitation is to be extended to at least one friend on the website, the at least one friend to view at least one of the first and second images in a virtual room owned by and customizable by the user. | 2011-07-07 |
20110167482 | SECURE AUTHENTICATION ADVERTISEMENT PROTOCOL - A network device for distributing authentication information between authorized nodes for purposes of concurrently “pre-authenticating” a mobile user at a plurality of points throughout a LAN is disclosed. When a client attempts to access the network through the network device, the network device attempts to authenticate the client based on the credentials presented by the user. If authenticated, the client is admitted into the network at the network device and the client's pre-authentication information transmitted to one or more network nodes associated with an authentication group. Upon receipt of the pre-authentication information, the one or more network nodes are authorized to admit the client into the network at those nodes in addition to the network device at which the client was initially authenticated, thereby concurrently pre-authorizing the client at multiple points across the network. | 2011-07-07 |
20110167483 | ROLE-BASED ACCESS CONTROL UTILIZING TOKEN PROFILES HAVING PREDEFINED ROLES - A method and system for managing role-based access control of token data using token profiles having predefined roles is described. | 2011-07-07 |
20110167484 | APPARATUS AND METHOD FOR INTEGRATING AUTHENTICATION PROTOCOLS IN THE ESTABLISHMENT OF CONNECTIONS BETWEEN COMPUTING DEVICES - An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm. | 2011-07-07 |
20110167485 | SYSTEM AND METHOD FOR TOY ADOPTION AND MARKETING - Provided are a method and computer system that provide a virtual world. A server of the computer system includes a storage subsystem that stores two or more items of different personalized information about multiple different users, including different user identifications and passwords associated with the user identifications respectively representing the users. The server computer system is programmed to accept login credentials including a user identification and password and validate the login credentials. The server computer system is also programmed to control formation of a first user account and storage of the first user identification and first password. The storage subsystem stores information about registration codes that have not yet been entered. Further, the server computer system is programmed to accept entry of one or more of the registration codes that have not yet been entered and, based on entry of the registration codes, to associate stored information indicative of the one registration code with the first user identification. | 2011-07-07 |
20110167486 | CLIENT-SIDE AD CACHING FOR LOWER AD SERVING LATENCY - Advertisements are served over the Internet to clients on demand. A client module executing on a client device fetches advertisements over the Internet from an advertisement server. The client module stores these advertisements in a cache on the client device. When an application executing on the client device needs to display an advertisement, instead of contacting the advertisement server directly, the application makes a call to the client module. The client module, instead of contacting the advertisement server immediately, determines whether the cache on the client device contains any advertisements that satisfy criteria specified by the application. If the cache does contain advertisements that satisfy the criteria, then the client module provides those advertisements to the application. Otherwise, then the client module requests criteria-satisfying advertisements from the advertisement server at that time, and provides at least one of those to the application. | 2011-07-07 |
20110167487 | METHOD, SYSTEM AND DEVICE FOR ENABLING USER SIDE TERMINAL TO OBTAIN PASSWORD - In the field of communication technologies, a method, a system and a device for enabling a user terminal to obtain a password are provided. The method includes: receiving, by a user terminal, a notification message delivered from an Optical Line Terminal (OLT), in which the notification message comprises password information delivered from the OLT; obtaining the password information in the notification message, and returning a response message to the OLT; and accomplishing an authentication and registration process with the OLT according to the password information. The system includes an OLT and a user terminal. The device includes a user terminal and an OLT. The present disclosure is capable of realizing the change of a password of an Optical Network Unit (ONU)/Optical Network Terminal (ONT) just by a delivery operation at an OLT side when the password of the ONU/ONT needs to be changed, so that the efficiency of the change work is improved, the workload of the change is reduced, the manpower cost for home service of maintenance personnel is saved, and the maintenance cost of the operator is greatly reduced. | 2011-07-07 |
20110167488 | SYSTEMS AND METHODS FOR LOCATION AWARE ACCESS CONTROL MANAGEMENT - Described herein are systems and methods for access control management, these generally being directed towards location aware access control management. Embodiments of the invention have been particularly developed for providing additional functionalities in access control systems having disconnected devices, and the present disclosure is primarily focused accordingly. For example, embodiments include access control devices configured to operate in conjunction with a GPS receiver or other source of geographical positional information, and methods associated with the use of such devices. | 2011-07-07 |
20110167489 | Apparatus and Method for Securing Data on a Portable Storage Device - A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device under a user password, the microprocessor also operable to exclude access to the secure user data area unless the user password is provided. | 2011-07-07 |
20110167490 | SYSTEM AND METHOD FOR SECURE DISTRIBUTED EXECUTION - This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation. The operation can be transmission of data packets with given parameters of performance that the hidden program contains. The generated security signals thus assure that the correct operation was taken place and can be used to signal various cryptographic parameters as well. | 2011-07-07 |
20110167491 | Computer Security Process Monitor - A computer security process monitor detects security intrusions of a networked computing platform by monitoring execution statistics associated with one or more computer processes executed by the platform in relation to expected (or “valid”) execution parameters. The execution statistics in one example include system process statistics (e.g., process name, peak memory usage, maximum number of threads, peak CPU utilization) and network interface statistics (e.g., IP ports, protocols) associated with the one or more computer processes; and the valid execution parameters define acceptable values or states corresponding to the execution statistics. | 2011-07-07 |
20110167492 | Virtual Browsing Environment - An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark. Yet another embodiment includes monitoring operation of the operating system within the at least one virtual browsing environment, determining when the operation of the operating system includes potential malicious activity, and terminating the virtual browsing environment when the operation includes potential malicious activity. | 2011-07-07 |
20110167493 | SYSTEMS, METHODS, ANE MEDIA FOR DETECTING NETWORK ANOMALIES - Systems, methods, and media for detecting network anomalies are provided. In some embodiments, a training dataset of communication protocol messages having argument strings is received. The content and structure associated with each of the argument strings is determined and a probabilistic model is trained using the determined content and structure of each of the argument strings. A communication protocol message having an argument string that is transmitted from a first processor to a second processor across a computer network is received. The received communication protocol message is compared to the probabilistic model and then it is determined whether the communication protocol message is anomalous. | 2011-07-07 |
20110167494 | METHODS, SYSTEMS, AND MEDIA FOR DETECTING COVERT MALWARE - Methods, systems, and media for detecting covert malware are provided. In accordance with some embodiments, a method for detecting covert malware in a computing environment is provided, the method comprising: generating simulated user activity outside of the computing environment; conveying the simulated user activity to an application inside the computing environment; and determining whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity. | 2011-07-07 |
20110167495 | METHOD AND SYSTEM FOR DETECTING MALWARE - A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector. | 2011-07-07 |
20110167496 | ENHANCED HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT - A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot execute an instruction that is not authorized. A Command Filter Matrix stores entries comprising instructions and associated data memory ranges. A hardware arrangement denies command execution if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in the Command Filter Matrix. The Command Filter Matrix may be implemented in a Field Programmable Gate Array such that the memory cell content is pre-programmed with entrusted code by a separate trusted hardware source. In this way, an operating system may function normally but only execute trusted instructions, commands and memory operations. The Command Filter Matrix also contains external write-only capability to enable external monitoring of performance. | 2011-07-07 |
20110167497 | System and Method for Managing Wireless Devices in an Enterprise - Methods and systems are disclosed for managing wireless devices in an enterprise. A first exemplary method manages the physical access points of a wireless network in an enterprise. A second exemplary method manages the assets of wireless devices in an enterprise. A third exemplary method enables virus detection within wireless devices. A fourth exemplary method manages wireless device data backup. | 2011-07-07 |
20110167498 | Software License Management - A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the program in accordance with the authorization data, executing the program, and causing the modifications to be deleted from the volatile memory. In some embodiments, selection criteria compared with the authorization data does not contain information corresponding to all of the content of the authorization data, thereby denying a software attacker the benefit of identifying and exploiting the selection criteria. | 2011-07-07 |
20110167499 | Policy For Digital Rights Management - This document describes policies for digital rights management that enable distribution of full-function versions of applications that, while fully functional, have functions limited by an associated policy. A policy may be replaced or updated, thereby enabling use of previously limited functions without distribution of another version of the application. | 2011-07-07 |
20110167500 | DOCUMENT MANAGEMENT DEVICE, DOCUMENT MANAGEMENT METHOD AND STORAGE MEDIUM - A document management device, when receiving information on a document registration user who is a requester for document registration and information on a document registration destination, provides a first page (top page) displayed when the document registration user logs into the document management device with a link (button) for accessing a second page for registering a desired document at the document registration destination. When the document registration user performs an operation of registering the desired document on the second page accessed through the link included in the first page, the desired document is registered at the document registration destination. | 2011-07-07 |
20110167501 | Digital rights management method and digital rights management-enabled mobile device - A DRM method and DRM-enabled mobile device are provided, in which determinations are made as to whether a playback request is input for replaying a media file, and, if so, whether the media file is a rights-protected media file on the basis of a file format of the media file. If the media file is a rights-protected media file, at least one sample playback part of the rights-protected media file is verified and replayed; otherwise, the entire rights-protected media file is replayed. | 2011-07-07 |
20110167502 | TIME-BASED DIGITAL CONTENT AUTHORIZATION - Methods and apparatuses for time-based access to digital content are provided. Access to a set of digital content is provided for a predetermined period of time. During the predetermined period of time, a user can access (e.g., download, play) any digital content in the set of digital content. At the end of the predetermined period of time, the user is denied access to the digital content regardless of where the content is stored (e.g., in a digital content library, on a computer system controlled by the user, on a playback device controlled by the user). Simplified access and control of digital content is thereby provided in the form of time-based access. | 2011-07-07 |
20110167503 | TPM-BASED LICENSE ACTIVATION AND VALIDATION - A Trusted Activation License (TAL) can be comprised of a key unique to a Trusted Platform Module (TPM) and identifying information of the software applications bundled with the computing device having that TPM. To activate the software applications, the identifying information in the TAL can be compared against that of the software applications being activated, and the unique TPM key in the TAL can be compared against that of the TPM on the computing device on which the activation is taking place. Subsequent validations can be based on a protected association between the TAL and an Attestation Identity Key (AIK) that can be generated by the TPM as part of the activation step. Optionally, Platform Configuration Registers (PCRs) of the TPM can be periodically changed during validation to protect against useage of one TPM for validations on multiple computing devices. | 2011-07-07 |
20110167504 | Application Rights Enabling - Methods and apparatus, including computer program products, implementing and using techniques for controlling capabilities of a user software application. A user software application is provided, the user software application including a set of disabled operations. Content capable of being operated on by one or more of the disabled operations in the set of disabled operations is received. Application rights information operable to enable an operation in the set of disabled operations to operate on content within a context specified in the application rights information are received and the operation in the set of disabled operations is enabled to operate on the received content. Methods and apparatus for providing content to be operated on by a user software application and methods and apparatus for providing a configurable, context-dependent user software application are also described. | 2011-07-07 |
20110167505 | GFATS As Modifiers of the AXIN Pathway and Methods of Use - Human GFAT genes are identified as modulators of the Axin pathway, and thus are therapeutic targets for disorders associated with defective Axin function. Methods for identifying modulators of Axin, comprising screening for agents that modulate the activity of GFAT are provided. | 2011-07-07 |
20110167506 | METHOD FOR EVALUATION OF DEVELOPMENTAL TOXICITY - The present invention provides a method for assessing embryotoxicity of a chemical comprising: (1) a first step of measuring the expression level of one or more genes selected from among genes each comprising any of the nucleotide sequences of SEQ ID NOs: 1 to 78 and 101 to 230 and orthologous genes thereof in a sample from a non-human mammal or mammalian cell which has come into contact with a test chemical; and (2) a second step of comparing the measured value of the expression level of the gene in the sample obtained in the first step with a control value of the expression level of the gene and based on the difference assessing the level of the embryotoxicity of the test chemical in the sample; and so on. | 2011-07-07 |
20110167507 | Animal Model Having a Chimeric Human Liver and Suceptible to Human Hepatitis C Virus Infection - The present invention features a non-human animal model that is susceptible to infection by human hepatotrophic pathogens, particularly human hepatitis C virus (HCV). The model is based on a non-human, immunocompromised transgenic animal having a human-mouse chimeric liver, where the transgene provides for expression of a urokinase-type plasminogen activator in the liver. The invention also features methods for identifying candidate therapeutic agents, e.g., agents having antiviral activity against HCV infection. The animals of the invention are also useful in assessing toxicity of various agents, as well as the activity of agents in decreasing blood lipids. | 2011-07-07 |
20110167508 | PUFA POLYKETIDE SYNTHASE SYSTEMS AND USES THEREOF - The invention generally relates to polyunsaturated fatty acid (PUFA) polyketide synthase (PKS) systems, to homologues thereof, to isolated nucleic acid molecules and recombinant nucleic acid molecules encoding biologically active domains of such a PUFA PKS system, to genetically modified organisms comprising PUFA PKS systems, to methods of making and using such systems for the production of bioactive molecules of interest, and to novel methods for identifying new bacterial and non-bacterial microorganisms having such a PUFA PKS system. | 2011-07-07 |
20110167509 | Cytoplasmic Male Sterile Leek Plants, Methods for the Preparation and Use Thereof, and a Cytoplasmic Male Sterile Garlic Plant - The present invention relates to cytoplasmic male sterile leek ( | 2011-07-07 |
20110167510 | Lettuce Cultivar FX1308 - A lettuce cultivar, designated FX1308, is disclosed. The invention relates to the seeds of lettuce cultivar FX1308, to the plants of lettuce cultivar FX1308 and to methods for producing a lettuce plant by crossing the cultivar FX1308 with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar FX1308, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar FX1308 and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar FX1308 with another lettuce cultivar. | 2011-07-07 |
20110167511 | Garden Bean Cultivar H26107 - A novel garden bean cultivar, designated H26107, is disclosed. The invention relates to the seeds of garden bean cultivar H26107, to the plants of garden bean line H26107 and to methods for producing a bean plant by crossing the cultivar H26107 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar H26107. | 2011-07-07 |
20110167512 | HYBRID ARTICHOKE VARIETY NUN 4006 AR - The invention provides a new and distinct hybrid variety of globe artichoke, NUN 4006 AR or Symphony F1, which is characterized by producing high quality, green heads for the fresh market and/or the processing industry. | 2011-07-07 |
20110167513 | PROCESS OF PRODUCING MALE STERILE MONOCOTYLEDONOUS PLANTS - The present invention relates to a process of producing male sterile monocotyledonous plants by introducing into said plants fragments of a nucleotide sequence coding for a protein which provides for male sterility and reconstituting the complete protein which provides for male sterility by intein-mediated trans-splicing. | 2011-07-07 |
20110167514 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING MODULATED PLANT CHARACTERISTICS - The present invention relates to isolated nucleic acid molecules and their corresponding encoded polypeptides. The present invention further relates to the uses of these nucleic acid molecules and polypeptides. For example, the nucleic acid molecules and polypeptides could be used in making enzymes or used to make plants, plant cells, plant materials or seeds of a plant having such modulated growth or phenotype characteristics that are altered with respect to wild type plants grown under similar conditions. | 2011-07-07 |
20110167515 | PLANT SNF1-RELATED PROTEIN KINASE GENE - The present invention relates to the isolation, purification, characterization and use of the plant Snf1-related protein kinase (SnRK) gene and genetic products. The invention includes isolated and purified SnRK DNA and relates to methods of regulating water loss and plant drought tolerance, sucrose content, starch content, seed oil content, fatty acid synthesis, seed oil acyl composition, seed size/weight, resistance/tolerance to biotic stresses, increased root biomass, and/or carbon flux into other seed components, plant, using the gene, and to tissues and plants transformed with the gene. The invention also relates to transgenic plants, plant tissues and plant seeds having a genome containing an introduced DNA sequence of the invention, and a method of producing such plants and plant seeds. | 2011-07-07 |
20110167516 | METHODS AND COMPOSITIONS FOR THE INTRODUCTION AND REGULATED EXPRESSION OF GENES IN PLANTS - Compositions and methods are provided for the introduction and the regulated expression of genes in plants. Compositions include promoter constructs that provide a level of activity useful for the regulated expression of site-specific recombinases, while avoiding premature excision. Further provided are isolated polynucleotides encoding novel babyboom polypeptides, expression cassettes, and plants comprising the same. Methods for the introduction of genes into plants are provided, including methods for plastid transformation and methods for the transformation of tissues from mature seeds and leaves. | 2011-07-07 |
20110167517 | IDENTIFICATION OF DIURNAL RHYTHMS IN PHOTOSYNTHETIC AND NON-PHOTSYNTHETIC TISSUES FROM ZEA MAYS AND USE IN IMPROVING CROP PLANTS - The present disclosure provides polynucleotide sequences relating to the diurnal cycling in maize leaf and ear tissues. The disclosure provides polynucleotide sequences and the use of encoded polypeptides associated with the oscillation. The disclosed sequences are responsible for controlling plant growth, source-sink relationships and yield in crop plants. | 2011-07-07 |
20110167518 | ZEA MAYS SARK PROMOTER AND USES THEREOF - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a Zea maize SARK promoter isolated from maize. A method for expressing a heterologous nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a heterologous nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2011-07-07 |
20110167519 | HEAT STABLE VARIANTS OF PLANT ADENOSINE DIPHOSPHATE GLUCOSE PYROPHOSPHORYLASE SMALL SUBUNIT - The subject invention concerns polynucleotides encoding a small subunit of plant AGP having one or more mutations in the amino acid sequence wherein the mutation confers increased heat stability to the expressed AGP enzyme. Mutations in the N-terminus of the small subunit of heat labile plant AGP results in AGP enzymes that are significantly more heat stable compared to wild type AGP in that the mutant AGP retains significant levels of enzymatic activity following exposure to heat treatment. In one embodiment, the polynucleotide encodes a mutant small subunit of maize AGP. The subject invention also concerns methods for providing a plant with increased resistance to heat conditions. Plants with heat labile AGP can be transformed with a polynucleotide of the present invention. The subject invention also concerns these transformed plants and transgenic progeny thereof. The subject invention also concerns mutant polypeptides encoded by polynucleotides of the present invention. | 2011-07-07 |
20110167520 | Xenorhabdus sp. genome sequences and uses thereof - The present invention relates to nucleic acid sequences from | 2011-07-07 |
20110167521 | Engineered zinc finger proteins targeting plant genes involved in fatty acid biosynthesis - The present disclosure relates to engineered zinc finger proteins that target genes in plants involved in fatty acid biosynthesis. Methods of using such zinc finger proteins in modulating gene expression, gene inactivation, and targeted gene modification are also provided. | 2011-07-07 |
20110167522 | CYCLIN D POLYNUCLEOTIDES, POLYPEPTIDES AND USES THEREOF - The invention provides isolated polynucleotides, specifically Cyclin D polynucleotides, and their encoded proteins that are involved in cell cycle regulation. The invention further provides recombinant expression cassettes, host cells, transgenic plants, and antibody compositions. The present invention provides methods and compositions relating to altering cell cycle protein content and/or composition of plants for the purpose of increasing transformation efficiency. | 2011-07-07 |
20110167523 | MATERIALS AND METHODS FOR THE PRODUCTION OF BIODIESEL - The subject invention provides novel microorganisms comprising polynucleotides and polypeptides encoding a methyltransferase. The subject invention provides novel methods for the production of biodiesel. | 2011-07-07 |
20110167524 | METHOD AND APPARATUS OF OPERATING A SCANNING PROBE MICROSCOPE - An improved mode of AFM imaging (Peak Force Tapping (PFT) Mode) uses force as the feedback variable to reduce tip-sample interaction forces while maintaining scan speeds achievable by all existing AFM operating modes. Sample imaging and mechanical property mapping are achieved with improved resolution and high sample throughput, with the mode being workable across varying environments, including gaseous, fluidic and vacuum. Ease of use is facilitated by eliminating the need for an expert user to monitor imaging. | 2011-07-07 |
20110167525 | PROBE DETECTION SYSTEM - A probe detection system ( | 2011-07-07 |
20110167526 | Microsprings Having Nanowire Tip Structures - A stress-engineered microspring is formed generally in the plane of a substrate. A nanowire (or equivalently, a nanotube) is formed at the tip thereof, also in the plane of the substrate. Once formed, the length of the nanowire may be defined, for example photolithographically. A sacrificial layer underlying the microspring may then be removed, allowing the engineered stresses in the microspring to cause the structure to bend out of plane, elevating the nanowire off the substrate and out of plane. Use of the nanowire as a contact is thereby provided. The nanowire may be clamped at the tip of the microspring for added robustness. The nanowire may be coated during the formation process to provide additional functionality of the final device. | 2011-07-07 |
20110167527 | Apple tree named 'B3F45' - A new and distinct | 2011-07-07 |
20110167528 | Apple tree named 'B3F44' - A new and distinct | 2011-07-07 |