33rd week of 2011 patent applcation highlights part 57 |
Patent application number | Title | Published |
20110202942 | OPTICAL INFORMATION RECORDING MEDIUM, METHOD OF RECORDING INFORMATION AND PHOTOSENSITIZER - An aspect of the present invention relates to an optical information recording medium comprising a recording layer, wherein the recording layer comprises a cationic dye and a polynuclear azo metal complex dye comprising an azo dye and a metal ion, and a method of recording information comprising recording information on the recording layer comprised in the optical recording medium, and conducting the recording by irradiation of a laser beam having a wavelength of equal to or shorter than 440 nm onto the optical information recording medium. Another aspect of the present invention relates to a photo sensitizer. | 2011-08-18 |
20110202943 | OPTICAL RECORDING MEDIUM, INFORMATION RECORDING METHOD, AND INFORMATION REPRODUCING METHOD - According to one embodiment, an optical recording medium is provided in which interlayer crosstalk is low and in which stable and high-quality recording characteristics can be obtained. To this end, an optical recording medium comprises a first recording part which includes a first recording layer and a first light reflecting layer and which is disposed on a side closer to a light receiving surface, and a second recording part which includes a second recording layer and a second light reflecting layer and which is disposed on a side farther from the light receiving surface, the first recording part and the second recording part being stacked, wherein the thickness of the second light reflecting layer is larger than the thickness of the first light reflecting layer. | 2011-08-18 |
20110202944 | OPTICAL RECORDING MEDIUM, INFORMATION RECORDING METHOD, AND INFORMATION REPRODUCING METHOD - According to one embodiment, an optical recording medium is provided in which interlayer crosstalk is low and in which stable and high-quality recording characteristics can be obtained. To this end, an optical recording medium comprises a first recording part which includes a first recording layer and a first light reflecting layer and which is disposed on a side closer to a light receiving surface, and a second recording part which includes a second recording layer and a second light reflecting layer and which is disposed on a side farther from the light receiving surface, the first recording part and the second recording part being stacked, wherein the thickness of the second light reflecting layer is larger than the thickness of the first light reflecting layer. | 2011-08-18 |
20110202945 | Personalizing TV Content - Storing information associated with content may be provided. First, information associated with available content may be presented to a user via a user device. Next, a user selection for an item of content may be received. In a dedicated memory location for the user, identifying information for the selected item of content may then be stored. | 2011-08-18 |
20110202946 | Interactive Broadcast System - A method of displaying customised media content wherein the viewer can affect the media content displayed by giving answers to a question displayed with the media content is provided. For example, a method of displaying customised media content, comprising receiving video data, including an advertisement, at an output device; displaying the advertisement on the output device; receiving interactive data, including a question, a correct answer to the question and at least one incorrect answer to the question, at the output device; displaying the question, the correct answer and the incorrect answer on the output device; receiving an indication of a user's answer to the question at the output device; and displaying further visual content on the output device based on the answer. | 2011-08-18 |
20110202947 | OPTIMIZED DELIVERY OF INTERACTIVITY EVENT ASSETS IN A MOBILE BROADCAST COMMUNICATION SYSTEM - Systems, apparatus and methods provide an automatic capability for delivering interactivity event applications for execution on receiver devices within a broadcast network based upon interactivity event application data, information and sequence logic. Interactivity event content providers may provide to a broadcast network interactivity event application data, event metadata information and sequence logic a broadcast network. Receiver devices may be configured to receive only real-time interactivity event assets relevant to a currently monitored real-time channel, or channels adjacent to the currently monitored channel. Receiver devices may also be configured to avoid acquiring assets for interactive sequences not related to a currently viewed or adjacent channel. | 2011-08-18 |
20110202948 | METHOD FOR DETECTING POTENTIALLY SUSPICIOUS OPERATION OF AN ELECTRONIC DEVICE AND CORRESPONDING ELECTRONIC DEVICE - A method may be for detecting potentially suspicious operation of an electronic device configured to operate in the course of activity sessions. The method may include within the device, a metering, from an initial instant of the number of activity sessions having a duration below a first threshold, and a comparison of this number with a second threshold. | 2011-08-18 |
20110202949 | IDENTIFYING COMMERCIAL BREAKS IN BROADCAST MEDIA - An audio channel of a time-based media presentation provides a basis for synchronizing to the presentation across a variety of platforms independent of when and where the presentation is being viewed. By pre-processing the media into a series of non-unique hashes, and similarly processing an audio stream of the media captured at a client device, a comparison can be made that yields an accurate time offset within the presentation. The comparison may usefully be performed over a data network using a server that hosts data from the pre-processed media, and a variety of applications may be deployed on the client device based on the resulting synchronization. | 2011-08-18 |
20110202950 | Interactive Multimedia System and Methods - A system, and methods for using that system, are provided that encourage viewers to watch and listen to a variety of multimedia event presentations. The various multimedia event presentations are received by the viewers on a receiving module and are displayed on a display module. Along with the multimedia event presentations (primary in the form of broadcast shows and ancillary in the form of advertisements and commercials), the viewers are provided with one or more interactive presentations (games) and additional browsing features by means of graphics-rich overlays through which they can participate and interact. Interaction is provided for by way of user input (communications) modules connected to the receiving modules and the display modules. | 2011-08-18 |
20110202951 | MULTIMEDIA TERMINAL DEVICE AND OPERATING METHOD THEREOF, AND PERSONAL PORTABLE DEVICE FOR PROVIDING WIRED/WIRELESS RETRANSMISSION SERVICE - A personal portable terminal and an operating method of a multimedia terminal device are provided, and more particularly, a multimedia terminal device, an operating method of the multimedia terminal device, and a personal portable terminal are provided. The multimedia terminal device may receive bidirectional content and additional service information corresponding to the bidirectional content, may classify the received additional service information from the received bidirectional content, and may transmit the classified additional service information to a personal portable terminal that is registered in advance and that is connected wired or wirelessly to the multimedia terminal device. | 2011-08-18 |
20110202952 | NETWORK FRAUD PREVENTION VIA REGISTRATION AND VERIFICATION - An apparatus for controlling fraud in a satellite signal delivery system. An apparatus in accordance with the present invention comprises a receive antenna for receiving at least one satellite signal, and a module, coupled to the receive antenna, for selectively delivering the at least one satellite signal to at least one receiver via an output of the module, wherein the module creates an association between the module and the at least one receiver upon installation of the at least one receiver to the output, such that the module delivers the at least one satellite signal to the at least one receiver only when the association is present. | 2011-08-18 |
20110202953 | System and Method for Providing Sequential Video and Interactive Content - A system and method of providing sequential video and contextual based content to an end user viewing video content in a video player on an end user computing device is provided. In one embodiment, the method comprises storing a plurality of videos in a memory, storing a plurality of advertisements in a memory, receiving a plurality of requests from a plurality of different clients and wherein each request includes information identifying a first video and each of the plurality of clients initiates its request from one of a plurality of web pages and wherein the plurality of web pages form part of a plurality of different web sites. In addition, the plurality of web pages may include program code configured to cause a video to be presented in the video player. The method further comprises for each received request, selecting a plurality of videos based on information of the first video; and selecting a plurality of advertisements, wherein at least one of the plurality of advertisements is selected based on information of the first video and at least one of the plurality of advertisements is selected based on information of a selected video. In addition, the method may comprise for each received request, transmitting the plurality of videos to the requesting client for sequential presentation by the client; and transmitting the plurality of advertisements to the requesting client and wherein at least some of the plurality of advertisements are configured to be presented concurrently with a received video. | 2011-08-18 |
20110202954 | ELECTRONIC DEVICE - According to one embodiment, an electronic device includes an input module and a video output module. The input module is configured to receive video contents data including motion picture data. The video output module is configured to output the motion picture data to a first display device and to output image data of a first screen for command entry for the video contents data to a second display device when video contents are displayable at the first and the second display devices. The video output module is configured to output image data of a second screen for displaying the motion pictures and an image for the command entry to one of the first and second display devices at which the video contents are displayable. | 2011-08-18 |
20110202955 | Identifying Ancillary Information Associated With An Audio/Video Program - A system communicates video information including television content associated with a plurality of channels and ancillary information. Information may be transmitted with the ancillary information that is indicative of the type of content included in the ancillary information. This provides the user, in one embodiment of the present invention, with a visual indication of the type of information that accompanies television content. This helps the user to decide whether the user wishes to view the ancillary information and provides the opportunity to select that enhancement for viewing. | 2011-08-18 |
20110202956 | DISPOSITION OF VIDEO ALERTS AND INTEGRATION OF A MOBILE DEVICE INTO A LOCAL SERVICE DOMAIN - A handset or other end device in a local service domain receives video service notifications. The video service notifications can provide information to a user of the end device about a video service (e.g., a television program or a movie) available within a local network. The video service notification can include a request for a response to the notification, with the request having a corresponding URI or other type of link to cause a desired action (e.g., to commence recording or playing content associated with a particular video service). A mobile device configurable for direct communication in a wide area wireless network can join a local service domain and receive services through a gateway of that local service domain. | 2011-08-18 |
20110202957 | METHOD FOR CONTROLLING VIDEO SYSTEM INCLUDING A PLURALITY OF DISPLAY APPARATUSES - A method for controlling a video system wherein the nearest display apparatus is selected by detecting a distance to each of a plurality of display apparatuses and information regarding the nearest display apparatus is transmitted to another video apparatus allowing a user apparatus to select the nearest display apparatus without additional input. | 2011-08-18 |
20110202958 | SYSTEMS AND METHODS FOR PROVIDING REMOTE ACCESS TO INTERACTIVE MEDIA GUIDANCE APPLICATIONS - Systems and methods for providing remote access to interactive media guidance applications are provided. In particular, the systems and methods for providing remote access to interactive media guidance applications provided herein generally relate to enhancing remote access capabilities by providing algorithms and techniques for managing and correcting disparities that may be found between program listings data used by the interactive media guidance application and the remote access server. | 2011-08-18 |
20110202959 | NAVIGATING PROGRAMMING CONTENT VIA MULTI-DIMENSIONAL SURFACES - A method to separately assign and modify multiple attributes of information and structure to an individual block or to a larger unitary whole comprised of multiple blocks is disclosed. A number of block instances of a block is determined. Each block instance is associated with one or more structure attributes. A number of data elements is determined. Each data element is associated with one or more information attributes. The data elements are mapped to the block instances. The mapped block instances are displayed contiguously. | 2011-08-18 |
20110202960 | USER-INTERACTIVE DISPLAYS INCLUDING THEME-BASED DYNAMIC VIDEO MOSAIC ELEMENTS - The present invention teaches a method of creating and presenting a user interface comprising a Dynamic Mosaic Extended Electronic Programming Guide (DMXEPG) using video, audio, special applications, and service dynamic metadata. The system enables television or digital radio service subscribers to select and display of various programs including video, interactive TV applications, or any combination of audio or visual components grouped and presented in accordance with the dynamic program/show metadata, business rules and objectives of service providers, broadcasters, and/or personal subscriber choices, collectively referred to as mosaic element presentation criteria. | 2011-08-18 |
20110202961 | CONTENT REPRODUCTION APPARATUS, MOBILE APPLIANCE, AND ABNORMALITY DETECTION METHOD - There is provided a content reproduction apparatus including a content reproduction unit for reproducing content, a habit detection unit for detecting a reproduction habit regarding content that uses the content reproduction unit, and an abnormality determination unit for determining there is an abnormality, in a case a reproduction action estimated from the reproduction habit detected by the habit detection unit is not carried out. | 2011-08-18 |
20110202962 | Information processing apparatus, information processing method, and program - A package identifier generating unit generates, for each unique combination of information on specific items included in a package, a package identifier identifying the combination. A first table registering unit extracts information on the specific items from the obtained package, and registers the information on the specific items, a user identifier identifying a user of a program reproducing apparatus being a transfer source of the package, and the generated package identifier in correspondence with each other, in a first table. A second table registering unit extracts a correspondence relation between the user identifier and the package identifier from the first table, and registers the package identifier corresponding to the user identifier, as a program view history for each user, in a second table. A determining unit determines the package identifier being a difference between program view histories similar to each other registered in the second table. | 2011-08-18 |
20110202963 | METHOD AND APPARATUS FOR DISPLAYING BRANDED VIDEO TAGS - A method and apparatus for displaying branded video tags. An advertiser provides additional content associated with broadcast advertising content to a service provider that downloads the additional content to a digital video recorder (DVR). The service provider inserts command tags into the content that are intercepted by the DVR and interpreted as commands that instruct the DVR to perform specific actions when the DVR receives the stream from a broadcaster. The DVR intercepts and translates any tags inserted into the content stream while the DVR is playing the content stream. Tags can cause the DVR to display a branded video tag to the user which is a displayed icon that requests an interaction by the user and has an advertiser's logo(s) displayed in its vicinity. | 2011-08-18 |
20110202964 | TELEVISION BROADCASTING RECEIVER - A television broadcasting receiver includes a function of the Internet connection, and a display signal generating unit. The display signal generating unit generates a display signal for displaying information about content that is provided by a VOD service and is the same as or similar to the television broadcasting program that is being viewed. | 2011-08-18 |
20110202965 | NETWORK DEVICE AND METHOD FOR SETTING UP AN IPTV SESSION - The present invention concerns a network device and a method at the network device. The network device comprises a connector for connecting to a local network, a server for providing, to a set top box located on the local network, information on a content available and an address in the local network where the content is available from and an IPTV proxy module for matching the content to an IPTV content being accessible from an IPTV server located on a second network, the second network begin connected with the first network with a gateway device, wherein a set top box requesting the content at the address receives an IPTV content from the IPTV server. | 2011-08-18 |
20110202966 | SIGNALING MECHANISMS AND SYSTEMS FOR ENABLING, TRANSMITTING AND MAINTAINING INTERACTIVITY FEATURES ON MOBILE DEVICES IN A MOBILE BROADCAST COMMUNICATION SYSTEM - Systems, apparatus and methods provide an automatic capability for generating interactivity event applications for execution on receiver devices within a broadcast network based upon interactivity event application data, information and sequence logic. Interactivity event content providers may provide to a broadcast network interactivity event application data, event metadata information and sequence logic a broadcast network. Interactivity application data for an interactive sequence may be delivered out-of-band, such that the application data is not embedded in an interactivity event. Interactivity sequence application data may be sent out-of-band from the associated interactivity event signaling message. Application data may be sent on a different transport channels in advance of the interactivity event. The system may determine when data should be sent out-of-band and when it should be sent in-band. | 2011-08-18 |
20110202967 | Apparatus and Method to Broadcast Layered Audio and Video Over Live Streaming Activities - Systems and methods for creating customized, personalized broadcasting content, and for broadcasting the created content are disclosed. A computer automated system comprised of a memory coupled to a processing unit includes means to receive audio and video data of an event. The system further includes a server to encode and transcode the received data, and to standardize the received data to internal presets. Timecode is embedded in the received data if it is not already present and a low resolution proxy of the standardized data is streamed to a commentator's computer through which commentary is added. The added commentary is transmitted back from the commentator computer and combined with the commentator audio stream with the audio and video data of the event. The resultant stream is buffered and then broadcast as well as archived. | 2011-08-18 |
20110202968 | METHOD AND APPARATUS FOR PREVENTING UNAUTHORIZED USE OF MEDIA ITEMS - An approach is provided for preventing unauthorized use of media items. One or more features associated with a user are identified in one or more media items. It is determined whether the identified features are registered with a privacy service. One or more privacy rules are applied on the media items based on the determination. | 2011-08-18 |
20110202969 | ANOMALOUS ACTIVITY DETECTION - The disclosure addresses the detection of anomalous activity. Some embodiments are directed towards a system for receiving an indication relating to a plurality of controls, identification information associated with a responsible account, and instructions from a responsible account associated with the monitoring of thresholds of controls being monitored. The plurality of user account may be organized into groups based upon information relating to the user accounts, and instructions may be applied to the groups to create a dynamic security policy. | 2011-08-18 |
20110202970 | Secure Access In A Communication Network - A method of providing secure access to a remote communication network via a local communication network for a terminal device. A gateway node located outside the local communication network allocates an IP address to the terminal device. The gateway node subsequently receives a request to establish a secure tunnel between the gateway node and the terminal device. It identifies the terminal device as the same terminal device to which an IP address is allocated, and allocates the same IP address for use by the terminal device as both an inner IP address and an outer IP address for packets sent via the secure tunnel. This ensures that there are no issues as described above in selecting the IP address for use in the secure tunnel, and reduces the risk of a successful man-in-the-middle attack. | 2011-08-18 |
20110202971 | Server-Based Data Sharing in Computer Applications - A computer-implemented method of sharing data between computer applications is discussed. The method includes receiving, at an application server sub-system of a hosted computer server system and from a first computing device that is remote from the hosted computer server system, commands interacting with an electronic document served by the application server sub-system, and receiving at the hosted computer server system a command to copy content from the electronic document to an electronic clipboard. The method also includes storing, at a clipboard server sub-system of the hosted computer server system, that is separate from the application server sub-system, data that represents the content, receiving a request for the stored data that represents the content, and delivering, from the clipboard server sub-system to a second computing device, the data that represents the content. | 2011-08-18 |
20110202972 | NETWORK AUTHENTICATION METHOD, METHOD FOR CLIENT TO REQUEST AUTHENTICATION, CLIENT, AND DEVICE - A network authentication method, a method for a client to request authentication, a client, and a device are provided. The method includes: receiving synchronize (SYN) data sent by a client, where the SYN data includes a sequence number SEQ | 2011-08-18 |
20110202973 | AUTHENTICATION SERVERS - An authentication server manages traffic data with respect to each connection device, the traffic data representing a traffic amount, with respect to the connection device, that is contained in a charging information notification signal that provides notification of charging information transmitted from the connection device, compares the traffic data with respect to each connection device with a preset threshold, and assigns one of a plurality of connection devices as a connection device that connects a communication terminal and a network based on the compared result. | 2011-08-18 |
20110202974 | METHOD OF ACCESSING MEDICAL DATA AND COMPUTER SYSTEM FOR THE SAME - Some embodiments disclose a method of accessing medical data from two or more data sources. The method can include: receiving a first request for first data about a first patient from a first requestor, the first request for the first data includes a request for information regarding at least one of a bone of the first patient, an organ of the first patient, or a body tissue of the first patient; retrieving first access information about the first patient; retrieving second access information about the first requestor; determining whether to grant access to the first data by the first requestor at least partially based on the first access information and the second access information; retrieving the first data from a first source of the two or more data sources; and if the first requestor is granted access to the first data, transforming the first data into a visual depiction and transmitting the visual depiction of the first data to the first requestor. Other embodiments are disclosed herein. | 2011-08-18 |
20110202975 | METHOD OF MANAGEMENT IN SECURITY EQUIPMENT AND SECURITY ENTITY - Method of managing security entities positioned to cut off an information stream within a network. The method includes designating an entity to act as a sponsor for a new ward wishing to join the network, requesting to connect the ward with the sponsor, said sponsor determining whether or not it accepts the connection. If the sponsor accepts the connection, then connecting the sponsor and disconnecting from the plurality of entities forming the network. At least one of the entities and the sponsor checking a security level of said ward. If at least one of the entities decides to trust said ward, then the sponsor transmits to the ward configuration information to enable the ward to enter into communication with the network. If at least one of the entities decides not to trust the ward, then the ward cannot access the network and an alarm is generated. | 2011-08-18 |
20110202976 | AUTOMATIC WIRELESS SERVICE ACTIVATION IN A PRIVATE LOCAL WIRELESS SERVICE - A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system. An automated private service activation (APSA) port is used for accepting access and communication requests of a wireless device seeking activation, association and authentication in the secondary Ethernet-like wireless communication system. The APSA port provides an access and communication channel for radiating signals at a level exceeding a signal level of the access and communication channel only within limited spatial constraints. In addition the APSA port provides space for receiving the wireless device for activation and communication in the secondary Ethernet-like wireless communication system. | 2011-08-18 |
20110202977 | INFORMATION PROCESSING DEVICE, COMPUTER SYSTEM AND PROGRAM - An information processing device includes: a connection monitoring unit performs determining whether a first external device is connected, and determining whether a receiving unit receives the request from the first or second external device, wherein when the connection monitoring unit determines that the first external device is not connected, a usage permission/prohibition determining unit updates the usage permission/prohibition information stored in a management table so that the usage permission/prohibition information indicates that use of a first virtual computer is prohibited, and wherein when the connection monitoring unit determines that the receiving unit receives the request from the second external device and that the first external device is connected, the usage permission/prohibition determining unit transmits, to the first external device, information that instructs the first external device to prohibit use of a second virtual computer. | 2011-08-18 |
20110202978 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 2011-08-18 |
20110202979 | SYSTEM AND METHOD FOR USING RESOURCES OF A COMPUTER SYSTEM IN CONJUNCTION WITH A THIN MEDIA CLIENT - A computer system including a processor and a memory for retrieving digital media content, storing the digital media content in the memory, and providing the digital media content to a thin media client is provided. | 2011-08-18 |
20110202980 | Lawful Authorities Warrant Management - A method is proposed for managing requests from Law Enforcement Agencies for interception or retention of data relating to a target user. The method detects a request of interception or retention on the target user and verifies whether an electronic warrant is activated with respect to the user. | 2011-08-18 |
20110202981 | CONTENT PRESENTATION-TYPE AUTHENTICATION SYSTEM - It is intended to achieve a user authentication system capable of forcibly presenting a content to a user. Provided is a content presentation-type authentication system designed to allow a client to perform a content presentation-type user authentication in which user authentication is performed in such a manner that a plurality of pattern elements arranged in a given pattern are presented as a presentation pattern to a user who intends to be authenticated, and a one-time password derivation rule is used as a password of the user and applied to certain ones of the pattern elements located at specific positions in the presentation pattern to create a one-time password, and a content is forcibly presented to the user in connection with the user authentication. The content presentation-type authentication system comprises an authentication-service providing server configured to manage respective user IDs and passwords of users, content data indicative of a detail of each of a plurality of contents, and respective content IDs of the plurality of contents, and provide content-added authentication information to each of the users, and a client having a content presentation-type user authentication program and a processor. | 2011-08-18 |
20110202982 | Methods And Systems For Management Of Image-Based Password Accounts - The invention provides methods and systems for management of image-based password accounts. A password management account may be accessed by a user undergoing image-based authentication. The invention may allow a user to manage parameters relating to image-based authentication. The invention may also allow a user to manage authentication at one or more web site. | 2011-08-18 |
20110202983 | REMOTE FUNCTIONALITY SELECTION - A network interface device providing a set of functions in hardware and being operable in first and second modes: in a first mode, the network interface device being configured to operate with a selected configuration of the set of functions; and in a second mode, the network interface device being operable to select a particular configuration of the set of functions in accordance with configuration instructions received at the network interface device; the network interface device being configured to, on receiving a network message having one or more predetermined characteristics and comprising an authentication key and one or more configuration instructions defining a particular configuration of the set of functions: verify the authentication key; and if the authentication key is successfully verified, select the particular configuration of the set of functions defined in the configuration instructions of the network message. | 2011-08-18 |
20110202984 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 2011-08-18 |
20110202985 | AUTHENTICATION SYSTEM, AUTHENTICATION SERVER, AND SUB-AUTHENTICATION SERVER - An authentication server transmits authentication information used to authenticate the transmission origin of an authentication request, to a sub-authentication server, when receiving the authentication request. The authentication server transmits identification information to identify the sub-authentication server to which the authentication information is transmitted, to a terminal. The terminal includes a transmission destination storage unit that stores identification information to identify the transmission destination of the authentication request and transmits the authentication request to the transmission destination identified with the identification information stored by the transmission destination storage unit. The terminal updates the identification information using the identification information, when receiving the identification information. The sub-authentication server includes an authentication information storage unit that stores the authentication information transmitted from the authentication server to the sub-authentication server, and authenticates the transmission origin of the authentication request using the stored authentication information, when receiving the authentication request. | 2011-08-18 |
20110202986 | IDENTITY MANAGEMENT SYSTEM - A system comprising an IMS network ( | 2011-08-18 |
20110202987 | SERVICE ACCESS CONTROL - An arrangement for providing users with access to services is described. Access requests received from users are monitored by a gateway and, where appropriate, user credentials for a service that is being accessed are inserted by the gateway. The gateway monitors packets of data in order to check user credentials. The gateway is also able to modify packets of data to insert user credentials, if necessary. | 2011-08-18 |
20110202988 | METHOD AND APPARATUS FOR PROVIDING AN AUTHENTICATION CONTEXT-BASED SESSION - An approach is provided for providing separation of authentication protocols and/or authentication contexts for client-server and server-server communication in network communication. A proxy server receives a request to initiate a service session. The request includes a first authentication context. The proxy server request verification of the first authentication context from an authentication server and validates the first authentication context based, at least in part, on the verification. The proxy server implements a second authentication context based, at least in part, on the verification of the first authentication context to initiate the service session. | 2011-08-18 |
20110202989 | METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION SESSION SHARING - An approach is provided for providing authentication session sharing between browsers and run time environments in network communication. An interface receives an authentication context associated with a first service. The interface causes, at least in part, storage of the authentication context in a first cache associated with the interface. The interface causes, at least in part, population of the authentication context to a second cache associated with a second service. The second cache is not directly linked to the interface. The authentication context in the second cache authenticates access to the second service. | 2011-08-18 |
20110202990 | COMPUTER INFORMATION SECURITY SYSTEM AND OPERATION METHOD THEREOF - The present invention relates to a computer information security system and method, the system includes a connection device and a sensor. When the connection device plug in to the predetermined computer, the sensor and the connection device are conjoint, a first identification code can be stored to the computer through the connection device, and generated an initialization setting of the second identification code to the sensor through the connection device. Therefore, when the sensor is out of the predetermined range of the connection device, the connection device will control the computer for encoding to prevent unauthorized user to use the computer; when the sensor is located within the range of the predetermined range of the connection device, the connection device will automatically input the first identification code to the computer to enable the user to directly use the computer without inputting the first identification code to avoid the complicated procedure of inputting the first identification code when the user return to work on the computer, thus to reinforce the security to the information in the computer and to make the operation more convenient. | 2011-08-18 |
20110202991 | PRESERVING PRIVACY WITH DIGITAL IDENTITIES - A privacy-preserving identity system is described herein that combines low disclosure tokens with an identity metasystem to allow proof of a user's identity and other claims about the user in a manner that preserves the user's privacy by avoiding disclosing unnecessary information about the user. A low or minimal disclosure token is a security token that encodes claims in such a way that (1) the token can be long-lived, (2) the token can be presented in an unlinkable manner, or (3) the user can minimally disclose the encoded information to respond to an unanticipated Relying Party policy. Using the privacy preserving system within an identity metasystem, users can obtain long-lived, low disclosure tokens from the Identity Provider and later present them to Relying Parties; thus improving both user' privacy and the system's scalability. | 2011-08-18 |
20110202992 | METHOD FOR AUTHENTICATING A TRUSTED PLATFORM BASED ON THE TRI-ELEMENT PEER AUTHENTICATION(TEPA) - A method for authenticating a trusted platform based on the Tri-element Peer Authentication (TePA). The method includes the following steps: A) a second attesting system sends the first message to a first attesting system; B) the first attesting system sends a second message to the second attesting system after receiving the first message; C) the second attesting system sends a third message to a Trusted Third Party (TTP) after receiving the second message; D) the TTP sends a fourth message to the second attesting system after receiving the third message; E) the second attesting system sends a fifth message to the first attesting system after receiving the fourth message; and F) the first attesting system performs an access control after receiving the fifth message. The method for authenticating a trusted platform based on TePA of the present invention adopts the security architecture of TePA, and improves the safety of an evaluation agreement of the trusted platform, realizes the mutual evaluation of the trusted platform between the attesting systems, and extends the application ranges. | 2011-08-18 |
20110202993 | DIGITAL MEDIA COMMUNICATION PROTOCOL - A digital media communication protocol structured to selectively transmit one or more digital media files between a media terminal and a media node via a communication link on an interactive computer network. The communication link is initiated by the media terminal, wherein the media terminal is disposed in an accessible relation to the interactive computer network. The digital media communication protocol, and in particular, the communication link, is further structured to bypass at least one security measure, such as, for example, a password, security key, and/or firewall. | 2011-08-18 |
20110202994 | BIOMETRIC SENSOR FOR HUMAN PRESENCE DETECTION AND ASSOCIATED METHODS - An electronic device may include a communications interface, a user prompting device, a biometric sensor, and a controller. The controller may perform biometric spoof detection with the biometric sensor, and receive a request for human presence verification from a remote device via the communications interface. The controller may also prompt the user for a verification action using the sensor based upon receiving the request, and determine that the user has completed the verification action in response to the prompting and based upon the biometric spoof detection. The controller may further send a response to the remote device via the communications interface and based upon determining that the user has completed the verification action. The controller may send a notification to the remote device that there is a biometric sensor. | 2011-08-18 |
20110202995 | Single hardware platform multiple software redundancy - A process detects an attack on a software system, eradicates the attack, automatically loads software into the software system in response to the attack, and executes one or more of a reboot of the software system or a boot of the loaded software. The loaded software comprises a substantially similar functionality of at least a portion of the software system and a different implementation of the functionality of the portion of the software system. | 2011-08-18 |
20110202996 | Method and apparatus for verifying the integrity of software code during execution and apparatus for generating such software code - Self-modifying software code comprising a number of modules that each may be modified to be in a plurality of states during execution. In order to verify the integrity of such code, the different states of the code are calculated. For each state a checksum, e.g. a hash value, is generated for at least part of the code. During execution the state of the code is changed, modifying a module, and an integrity check is performed using the checksum for the state of the code. The checksum may be stored in a look-up table or it may be embedded in the integrity verification function. A state variable indicating the state of the modules may be used to look-up the checksum in the table. Possible states of a module is encrypted and decrypted. Also provided is an apparatus for generating protected software code. | 2011-08-18 |
20110202997 | METHOD AND SYSTEM FOR DETECTING AND REDUCING BOTNET ACTIVITY - A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared to a threshold value and an alert is generated if the persistence value is greater than the threshold value. Known safe destinations may be entered into a whitelist. | 2011-08-18 |
20110202998 | Method and System for Recognizing Malware - The invention relates to a method for recognizing a piece of malware in a computer memory system, comprising the steps of: providing a master signature comprising a number of byte sequences, producing at least one first signature element, said first signature element comprising a subset of the number of byte sequences in the master signature, and applying the first signature element to data stored in the computer memory system in order to recognize a piece of malware stored in the computer memory system. | 2011-08-18 |
20110202999 | SYSTEM AND METHOD FOR CONTROLLING EVENT ENTRIES - To address situations wherein details and information stored in an electronic device, for example event entries, are sensitive in nature, a system and method are provided wherein such details and information are protected from inadvertent or malicious access and exposure. A flag or option is provided when creating an event entry that flags or marks the entry as sensitive. The details associated with the entry can be suppressed until a specified time before the event occurs and can be deleted or hidden after the event occurs. Access to the details at other times can be permitted through re-authentication of the user, for example using a password. In addition, data storage recovery can be effected by removing old entries irrespective of the sensitivity of the event or its details. | 2011-08-18 |
20110203000 | PREVENTING UNAUTHORIZED FONT LINKING - Methods, computer readable media, and apparatuses for preventing unauthorized font linking are presented. A request for a font file may be received. It may be determined whether the request is valid, and this determination may be based on a security token and/or a referrer string. If the request is determined to be valid, a first watermark may be embedded in the font file, and the first watermark may be based on the security token. The first watermark may include at least one point in at least one glyph contained in the font file. A second watermark may be embedded in the font file, and the second watermark may include at least one table that identifies a customer. The font file then may be served to the requestor. | 2011-08-18 |
20110203001 | NETWORK NODE, INFORMATION PROCESSING SYSTEM, AND METHOD - The consistency between an application output destination and a permitted user for an I/O device section is ensured when a user deploys an application for processing and outputting input data onto an entrance node. The entrance node includes an output destination/user table that manages correspondence between an application output destination and a user. The output destination/user table stores information about the output destination used for each user who uses the entrance node. An application deployment management function of a processing section in the entrance node determines whether application deployment can be accepted from a user. To do this, the application deployment management function specifies a user corresponding to the output destination for the application from the output destination/user table and verifies that the user is consistent with a user permitted for an I/O device in the I/O device section used by the application. | 2011-08-18 |
20110203002 | METHOD FOR PROTECTING PERSONAL INFORMATION IN AUDIENCE MEASUREMENT OF DIGITAL BROADCASTING SYSTEM - A method for protecting personal information in Audience Measurement (AM) of a digital broadcasting system is provided, including inserting an indicator, which notifies whether a consumption pattern of a service or content provided by a service provider can be measured, into a service guide, to which the information of the service or content is provided by a service provider; and determining whether the AM can be executed for the service or content in accordance with the indicator when the AM function is implemented in a terminal. | 2011-08-18 |
20110203003 | VERIFICATION OF PROCESS INTEGRITY - A system implements a secure transaction of data between a server and a remote device. The remote device comprises: processing means adapted to process input data according to a security process; data storage means adapted to store verification information derived from the input data according to an encryption algorithm; and communication means for communicating the input data which has been processed by the security process to the server. The server is adapted to transmit a verification request to the remote device, and to verify the integrity of the security process based on verification information received from the communication means of the remote device in response to the verification request. | 2011-08-18 |
20110203004 | Method and System for Electronic Publishing and Distribution of Printed Sheet Music - Described are methods and systems, including computer program products, for distributing printed sheet music. The method includes storing a set of one or more digital-print files and a set of one or more digital-audio files in a computer-readable storage medium on a back-end server. Each digital-print file includes sheet music information associated with one of the digital-audio files. Each, digital-print file and digital-audio file is associated with one or more audio identifiers. An application programming interface (API) is provided for client systems remote from the back-end server to retrieve a list of the set of one or more digital-print files and to preview the digital-audio and digital-print files. A purchase order is received for the first digital-print file from the remote client system using the API. A digital watermark is inserted into the first digital-print file. The watermarked digital-print file is transmitted to the remote client system. | 2011-08-18 |
20110203005 | SOFTWARE DISTRIBUTION METHOD, INFORMATION PROCESSING APPARATUS, AND SOFTWARE DISTRIBUTION SYSTEM - A distribution server acquires authentication information acquired from an IC card reader of an MFP and authenticated by an authentication server, and generates an installer for software which allows addition of the authentication information to transmission data of a client PC and transmission of the transmission data such that the acquired authentication information and an installer for a device driver of an image formation section of the MFP are included in the installer. Subsequently, the distribution server distributes the generated installer to a user to be authenticated using the authentication information. | 2011-08-18 |
20110203006 | METHOD AND SYSTEM FOR DELIVERING CLOSED-AUDIENCE CONTENT TO A CLOSED MOBILE AUDIENCE - A method and system for delivering closed-audience content to a closed mobile audience is described. In one embodiment, a method for delivering closed-audience content to a closed mobile audience is described. The method for delivering closed-audience content to a closed mobile audience involves obtaining closed-audience content, establishing a closed mobile audience, identifying a mobile user or a mobile device as being part of the closed mobile audience, and delivering the closed-audience content to the mobile user or the mobile device. Other embodiments are also described. | 2011-08-18 |
20110203007 | ASSAYS OF NEURODEGENERATIVE DISORDERS, INCLUDING FRONTOTEMPORAL DEMENTIA AND AMYOTROPHIC LATERAL SCLEROSIS - The invention relates to novel assays for the in vivo analysis of neurodegenerative diseases and the use of such assays to discover therapies capable of modulating such diseases. | 2011-08-18 |
20110203008 | TRANSGENIC MOUSE FOR SCREENING AND FOR STUDIES OF THE PHARMACODYNAMICS AND PHARMACOKINETICS OF LIGANDS ACTING ON THE OESTROGEN RECEPTOR AND ITS INTRACELLULAR RECEPTORS, AND METHOD FOR THE PREPARATION THEREOF - The object of the invention is a method for the production of a non-human transgenic mammal by means of which it is possible to monitor in vivo and in all the tissues the state of activation of any intracellular receptor, utilising a reporter gene inducible by natural or synthetic molecules which modulate the activity of such receptor. The mammal is question is preferably a mouse. | 2011-08-18 |
20110203009 | METHOD FOR PRODUCING GLYCOPROTEIN CHARACTERIZED BY SUGAR CHAIN STRUCTURE BY USING SILKWORM - It is an object of the present invention to investigate what kinds of structures a sugar chain has by performing a sugar chain structural analysis of a glycoprotein produced in a transgenic silkworm. For the sugar chain of the glycoprotein produced in the transgenic silkworm, a glycoprotein having a sugar chain structure in which fucose is not linked to N-acetylglucosamine at a reducing terminal of the sugar chain is obtained. In addition, a glycoprotein having an almost completely humanized sugar chain structure is obtained by further integrating GalT gene into this transgenic silkworm. | 2011-08-18 |
20110203010 | INSECT-DERIVED PROMOTERS FOR FOREIGN PROTEINS EXPRESSION IN INSECT CELLS - Insect-derived promoters for foreign proteins expression in insect cells. Regulatory polynucleotide sequences which drive the expression of major insect proteins (hexamerins) at specific evolution stages of larva have been isolated from insects ( | 2011-08-18 |
20110203011 | METHODS AND COMPOSITIONS FOR PRODUCING ALUMINUM TOLERANT ALFALFA - The invention relates to alfalfa plants and lines having aluminum tolerance. The invention also relates to parts of alfalfa plants from lines having aluminum tolerance, including seeds capable of growing aluminum tolerant alfalfa plants. Methods for the use and breeding of aluminum tolerant alfalfa plants are also provided. | 2011-08-18 |
20110203012 | METHODS AND COMPOSITIONS FOR USE OF DIRECTED RECOMBINATION IN PLANT BREEDING - The invention provides novel uses of sequence-specific or sequence-directed endonucleases for molecular plant breeding. The invention also provides novel plant transformation vectors and expression cassettes, which include novel combinations of an endonuclease with plant expression and transformation elements. Plants and derivatives thereof produced by such methods are also provided. | 2011-08-18 |
20110203013 | DELIVERING COMPOSITIONS OF INTEREST TO PLANT CELLS - Methods and mixtures for providing a composition of interest to a plant cell are provided. Methods using a mixture of particles are provided, wherein the mixture includes at least one nanoparticle associated with a microparticle via a lipid compound. Methods include methods for plant cell transformation, methods to increase transformation frequency, methods to increase gene targeting, and methods for plastid transformation. The nanoparticle comprises at least one composition of interest. Also provided are transformed plant cells, plants, and seeds produced using the methods and mixtures described herein. Further provided are the methods of making and using the mixtures of particles. | 2011-08-18 |
20110203014 | AXMI218, AXMI219, AXMI220, AXMI226, AXMI227, AXMI228, AXMI229, AXMI230, AND AXMI231 DELTA-ENDOTOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a toxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated toxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:13-30, or the nucleotide sequence set forth in SEQ ID NO:1-12, as well as variants and fragments thereof. | 2011-08-18 |
20110203015 | AXMI221z, AXMI222z, AXMI223z, AXMI224z, AND AXMI225z DELTA-ENDOTOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a toxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated toxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:21-32, or the nucleotide sequence set forth in SEQ ID NO:1-20, as well as variants and fragments thereof. | 2011-08-18 |
20110203016 | PROCESS FOR PRODUCING PLANT STORAGE ORGAN WITH HIGH PRODUCTION OF RECOMBINANT PROTEIN AND NOVEL RECOMBINANT PROTEIN - The present invention provides a method for highly producing a recombinant protein in a plant storage organ and a GLP-1 derivative. The plant storage organ in which the recombinant protein is highly produced is obtained by transformation with the use of a vector which comprises a recombinant protein gene, a cytokinin-related gene, a drug-resistant gene and a removable DNA element, in which the cytokinin-related gene and the drug-resistant gene exist in the positions so that they can behave together with the DNA element, while the recombinant protein to be expressed in the plant storage organ exists in the position so that it would not behave together with the DNA element. The GLP-1 is produced by using the method, and a derivative having been stabilized against enzymatic digestion is further provided. | 2011-08-18 |
20110203017 | Novel Herbicide Resistance Genes - The subject invention provides novel plants that are not only resistant to 2,4-D, but also to pyridyloxyacetate herbicides. Heretofore, there was no expectation or suggestion that a plant with both of these advantageous properties could be produced by the introduction of a single gene. The subject invention also includes plants that produce one or more enzymes of the subject invention “stacked” together with one or more other herbicide resistance genes. The subject invention enables novel combinations of herbicides to be used in new ways. Furthermore, the subject invention provides novel methods of preventing the development of, and controlling, strains of weeds that are resistant to one or more herbicides such as glyphosate. The preferred enzyme and gene for use according to the subject invention are referred to herein as AAD-12 (AryloxyAlkanoate Dioxygenase). This highly novel discovery is the basis of significant herbicide tolerant crop trait and selectable marker opportunities. | 2011-08-18 |
20110203018 | Use of Carboxamides on Cultivated Plants - The present invention relates to a method of controlling pests and/or increasing the health of a plant as compared to a corresponding control plant by treating the cultivated plant, parts of a plant, seed, or their locus of growth with a carboxamide compound. | 2011-08-18 |
20110203019 | METHODS OF PRODUCING GABA - The present invention describes an alternative approach to increase GABA production in prokaryotes or eukaryotes, namely by the insertion of the putrescine catabolic pathway in organisms where the pathway does not exist or has not clearly been identified. The invention describes methods for the use of polynucleotides that encode functional putrescine aminotransferase (PAT) and gamma-aminobutyricaldehyde dehydrogenase (GABAlde DeHase) polypeptides in plants to increase GABA production. The preferred embodiment of the invention is in plants but other organisms may be used. Changes in GABA availability will improve growth and increase tolerance to biotic and abiotic stress. | 2011-08-18 |
20110203020 | Atomic force microscopes and methods of measuring specimens using the same - Atomic force microscopes and methods of measuring specimens using the same. An atomic force microscope may precisely measure a 3D shape of a specimen using both a short-stroke scanner and a long-stroke scanner. The atomic force microscope may include a stage to transfer a specimen, at least one cantilever which includes a probe such that a driving displacement and a driving frequency are changed by attractive force and repulsive force in relation to atoms of the specimen, at least one short-stroke scanner which includes the cantilever so as to perform short-stroke scanning of the specimen, at least one long-stroke scanner which includes the short-stroke scanner so as to perform long-stroke scanning of the specimen, and at least one coarse approach system for transferring the short-stroke scanner and the long-stroke scanner to the specimen. | 2011-08-18 |
20110203021 | SPM NANOPROBES AND THE PREPARATION METHOD THEREOF - The present invention relates to SPM nanoprobes and the preparation method thereof, more particularly, to SPM nanoprobes comprising a spheroid deposit capped-nanoneedle bonded to one end of a mother tip, wherein the spheroid deposit is formed by particle beam induced deposition and is characterized in that the ratio of the diameter of the spheroid deposit to that of the nanoneedle is in the range of 1.5 to 8.5. The SPM nanoprobe according to the present invention is capable of imaging or measuring an irregularly curved or complicated surface, pattern and/or a frictional or adhesive force thereof and controlling size of a spheroid deposit formed at the end portion of nanoneedle and the ratio of the diameter of the spheroid deposit to that of the nanoneedle arbitrarily. | 2011-08-18 |
20110203022 | Azalea Plant Named 'MNIHAR010' - A new and distinct variety of Azalea plant with spring and fall blooming, attractive, showy, dark pink single and semi-double flowers, easily propagated by semi-hardwood cuttings in late spring through summer, fast growth rate under normal fertilization and moisture conditions; upright, dense, and compact nature, grows well in containers, thrives in shade or sun and is hardy in Zone 6, is disclosed. | 2011-08-18 |
20110203023 | Gypsophila Plant Named 'Pearl Blossom'' - A new cultivar of | 2011-08-18 |