43rd week of 2012 patent applcation highlights part 60 |
Patent application number | Title | Published |
20120272260 | IPTV Follow Me Content System and Method - Tools are provided for distributing access-restricted content in an internet protocol television (“IPTV”) environment based on portable entitlement keys. Such tools can include a decoder, an encoder, and a network entitlement handler. The decoder may be configured to receive a key associated with entitlement information, and transmit the entitlement information over a network. The encoder may be configured to receive content from content providers, and to encode the content to create IP-compatible content, with access restrictions based on entitlement. The network entitlement handler may be configured to receive a request for requested content from the decoder; receive the access-restricted content including (including the requested content) from the encoder; and transmit the requested content over the network to the decoder using IP, when the decoder is entitled to receive the requested content. | 2012-10-25 |
20120272261 | LOCATION BASED USER AWARE VIDEO ON DEMAND SESSIONS - A cable backend and a method are described herein for enabling a user with a location-aware mobile device to have at least partial control of a closest cable device (e.g., set top box, cable application) associated with a closest television. The closest cable device does not need to be associated with the user's home television but instead can be any cable device that is associated with a television located for instance at a stranger's house, an airport, a bar, or wherever. | 2012-10-25 |
20120272262 | TRANSPORTING MEDIA PROGRAMS, ADVERTISEMENT METADATA, AND ADVERTISEMENT SELECTION CODE THROUGH DATA TRANSPORT CONTAINERS FOR USE BY AN ADVERTISEMENT INSERTION NODE - A data transport container is used to transport information from a content provider network node to an advertisement insertion network node. The data transport container encloses a media program, program metadata, advertisement metadata, and advertisement selection code. The advertisement insertion network node selects among a plurality of advertisements, which may also be received through the data transport container, in response to at least the advertisement selection code and the advertisement metadata. The selected advertisements are combined with the media program in response to the program metadata to generate a combined media program. The combined media program is communicated to a subscriber equipment unit. The data transport container may contain Material eXchange Format (MXF) encoded content. Accordingly, the advertisement insertion network node may be configured to decode MXF encoded content of the data transport container to extract the media program, the program metadata, the advertisement metadata, and the advertisement selection code into separate files. | 2012-10-25 |
20120272263 | METHOD AND APPARATUS FOR PROVIDING AN INTERACTIVE APPLICATION WITHIN A MEDIA STREAM - An approach provides interactive application and advertisement within media streams. A program map table of a media stream is retrieved, wherein the program map table includes a plurality of private descriptor fields that permit user specified tag values. One of the descriptor fields is configured to indicate whether the media stream is associated with an interactive application or advertisement information. | 2012-10-25 |
20120272264 | VIDEO SERVER AND STANDBY METHOD - According to one embodiment, a video server includes a first storage area, a second storage area, and a controller. The controller is configured to control to execute a first standby operation for reading the first content item from the first storage area in accordance with a standby instruction from a host apparatus, to execute a second standby operation for reading the second content item from the second storage area in advance when the first content item is deleted to change the first content item in a state of the first standby operation, to delete the first content item when the second standby operation is complete, and to skip deletion of the first content item when the second standby operation is not complete. | 2012-10-25 |
20120272265 | PRIORI SCHEDULING OF MULTIPLE ASSETS WITHIN A COLLECTION OF ASSET DELIVERY OPPORTUNITIES - Embodiments of the invention provide systems and methods for constructing a schedule well before the time of an asset delivery opportunity that associates a collection of one or more assets, potentially from multiple advertisers or asset providers, that are planned to play in each asset delivery opportunity. Specific rules for each device also determine which asset each will play, thereby ensuring that campaigns of total asset delivery and asset delivery pacing are approximately fulfilled. This scheduling can be accomplished using marketing data associated with each user device and can be prepared in a practicable period of time using reasonable processing resources. | 2012-10-25 |
20120272266 | MEDIA PLAYBACK METHOD AND SYSTEM, CONTENT DELIVERY NETWORK DEVICE, AND ADVERTISING SERVER - The present invention discloses a media playback method and system, a CDN device, and an advertising server. The method includes: receiving, by a CDN device, a program playback request sent by a user terminal; if the program playback request carries a user identifier of a user in the CDN device, querying, by the CDN device, a corresponding relation between the user identifier and personalized information according to the user identifier to obtain the personalized information of the user; obtaining, by the CDN device, a link of advertisement content that corresponds to the user from an advertising server, wherein the link of the advertisement content is obtained by the advertising server according to the personalized information of the user and a preset advertisement configuration policy; and sending, by the CDN device or the advertising server, advertisement content corresponding to the link of the advertisement content to the user terminal. | 2012-10-25 |
20120272267 | SYSTEM AND METHOD OF DELIVERING EVENT NOTIFICATIONS - A method of delivering event notifications includes receiving data from a network-based calendar system at a notification system. The data indicates that a notification related to a calendar-based event is to be sent to a subscriber. The method also includes receiving presence information related to the subscriber from a presence system. The presence information indicates whether the subscriber is present at one or more of a plurality of subscriber devices. The plurality of subscriber devices includes a set-top box device. Further, the method includes sending an event notification related to the calendar-based event to the set-top box device when the presence information indicates that the subscriber is present at the set-top box device. | 2012-10-25 |
20120272268 | APPARATUS, SYSTEMS AND METHODS FOR FACILITATING SHOPPING FOR ITEMS SHOWN IN MEDIA CONTENT EVENTS - Techniques for facilitating shopping for items shown in media content events are described. Some embodiments provide a shopping facilitator as part of a media device, such as a set-top box. As the media device presents a media content event showing multiple items, the shopping facilitator is configured to receive an indication that a viewer is interested in purchasing one of the multiple items. The shopping facilitator then identifies the item of interest, and at a later time provides a shopping facility that can be can be used by the viewer or some other user to purchase the item. In some embodiments, the media content event is presented without any indication that items shown in the media content event are for sale. Furthermore, the shopping facilitator may perform its functions without interrupting or otherwise disrupting the viewing of the media content event. | 2012-10-25 |
20120272269 | MANAGEMENT AND DELIVERY OF AUDIOVISUAL CONTENT ITEMS THAT CORRESPOND TO SCHEDULED PROGRAMS - A method is provided to designate visual content that is accessible from a computer readable storage device and that correspond to programs distributed according to a predetermined schedule comprising: comparing attribute information of a respective program metadata record with respective attribute information of multiple respective content metadata records to measure similarity between corresponding attributes; determining respective program-content attribute match scores for each of the compared content metadata records as a function of the measure of similarity between the program attributes of the respective compared program metadata record and corresponding visual content attributes of respective content metadata records and of relative weighting of respective attribute comparisons; and selecting a respective visual content based upon the determined program-content attribute match score. | 2012-10-25 |
20120272270 | INTERNET TELEVISION PROGRAM GUIDE SYSTEM - An Internet television program guide system is provided that allows a user at a multimedia system to access information related to television programs over an Internet communications link. The user can view television program guide listings and related video stills and video clips. The user can perform database searches on the program guide listings (e.g., to search for a particular type of television program). If desired, the user can select an option that directs the multimedia system to tune directly to a television channel for a selected program or to a related television program guide or movie guide service on a television channel. The user can order pay-per-view events using the system. | 2012-10-25 |
20120272271 | Information Processing Apparatus, Tuner, And Information Processing Method - An information processing apparatus includes: a program guide displaying unit configured to display a program guide on a predetermined display, the program guide being such that program information is arranged in an area having a time axis and a channel axis; an indicator acquisition unit configured to acquire an indicator indicative of the number of viewers viewing each of a plurality of programs listed in the program guide in a similar time zone; and a popularity determination unit configured to determine the popularity of the program in accordance with the indicator. The program guide displaying unit displays at least some of the plurality of programs in a mode indicating the popularity of the program. | 2012-10-25 |
20120272272 | METHODS AND APPARATUS FOR AUTOMATICALLY OBTAINING AND SYNCHRONIZING CONTEXTUAL CONTENT AND APPLICATIONS - Methods and systems to present data to a viewer, where the data is specific to the viewer and his viewing experience and is stored locally. This data may be, for example, supplemental content or an application, such as a widget. In an embodiment, supplemental content, such as advertising, may be presented to the viewer where this content is aimed at the particular viewer in light of his or her viewer profile. In an alternative embodiment, a widget or other application may be presented to the viewer where the widget is specific to the current programming and thus tailored to the viewer's current viewing experience. In both situations, the data is stored locally and made available with minimal delay. | 2012-10-25 |
20120272273 | Digital Video Recorder (DVR) Scheduling - Provided are a method and a system for recording a video broadcast using a video recording device. A scheduling update is obtained for the video broadcast over a network. A recording schedule is updated for the video broadcast in response to the obtained scheduling update. The video broadcast is recorded according to the updated recording schedule. | 2012-10-25 |
20120272274 | METHOD AND APPARATUS FOR DOWNLOADING FILES - A method and apparatus are provided for downloading a file which are applied in a mobile multimedia broadcast system. The method includes: a client displaying broadcast information to a user for the user selecting a file to be downloaded; the client receiving a selection of the user to the file to be downloaded, reading the broadcast information of the file to be downloaded which is selected by the user, and downloading the file to be downloaded locally when a broadcast start time included in the broadcast information of the file to be downloaded arrives. The method and apparatus can make a user complete the file downloading without manual intervention when using a mobile multimedia broadcast service, thereby saving a mass of manual operations of the user and improving service experience of the user. | 2012-10-25 |
20120272275 | INFORMATION PROCESSING SYSTEM, PORTABLE INFORMATION TERMINAL APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM INFORMATION PROVIDING APPARATUS, PROGRAM INFORMATION PROVIDING METHOD, RECORDING/REPRODUCING APPARATUS, RECORDING/REPRODUCING METHOD, COMPUTER-PROGRAM STORAGE MEDIUM, AND COMPUTER-PROGRAM - An object of the present invention is to provide a system that allows a user to preset a desired TV program for unattended recording by use of a PDA. A PDA acquires from a TV program information service provider TV program information by which to preset a desired TV program to be recorded unattended. When the user selects relevant TV information about the desired program, the PDA sends to a personal computer the information for presetting the TV program of interest for subsequent unattended recording. Based on the preset information sent from the PDA, the personal computer presets the specified TV program to be recorded unattended. | 2012-10-25 |
20120272276 | SYSTEM AND METHOD FOR PROVIDING VIDEO ON DEMAND OVER A QUADRATURE AMPLITUDE MODULATION NETWORK - A system for providing video on demand over a quadrature amplitude modulation network (QAMN) having a television set (TV) connected thereon, comprising a client component associated with the TV, the client component being configured to be connected between the TV and the QAMN to receive input from a user of the TV and transmit the user input over the QAMN, a controller being configured to be connected to the QAMN to receive the user input transmitted over the QAMN by the client component, a management server being configured to be connected to the controller, decode the user input and provide a new interactive user session state to a rendering server, the rendering server being configured to encode a graphical representation of the new interactive user session state in a video format and transmit the encoded graphical representation on the QAMN. | 2012-10-25 |
20120272277 | MULTIMEDIA CHANNEL SHARING ACROSS ACCESS NETWORK BOUNDARIES - An initiating viewer identifies a multimedia channel and submits a request to share the multimedia channel with at least one recipient viewer at another viewer premises. This request is processed by the multimedia receiver of the initiating viewer so as to generate a channel change request for submission to a service provider. In response to the channel share request, the service provider queries the recipient viewer to determine whether the recipient viewer accepts or rejects the offered multimedia channel. If the recipient viewer accepts the multimedia channel, the multimedia channel can be provided to the multimedia receiver of the recipient viewer either for storage for later playback or for immediate playback concurrent with the provision of the multimedia channel to the initiating viewer. Billing for costs associated with the shared multimedia channel is conducted based on billing feedback provided by the initiating viewer. | 2012-10-25 |
20120272278 | TOOLBAR FOR DISPLAYING VIDEO CONTENT - Methods and systems for distributing content and displaying content are disclosed. A toolbar configured to be docked to a browser is provided over a network to a user terminal. The toolbar is configured to occupy a first portion of a browser window while leaving room in the browser window for the browser to display a web page in a second portion of the browser window. A plurality of items of content or representations thereof are provided and presented via the toolbar while the web page is displayed in the second portion of browser window. A user selection of a first of the plurality of items of content is received, and video content corresponding to the first item of content is streamed for display on the toolbar while the web page is displayed in the second portion of browser window. | 2012-10-25 |
20120272279 | APPARATUS FOR PROVIDING INTERNET PROTOCOL TELEVISION BROADCASTING CONTENTS, USER TERMINAL AND METHOD FOR PROVIDING INTERNET PROTOCOL TELEVISION BROADCASTING CONTENTS INFORMATION - An apparatus and method for providing IPTV broadcasting contents information is provided. The apparatus and method is capable of easily providing a user terminal with related information that is associated with IPTV broadcasting content contents. The apparatus includes a content generator configured to generate an IPTV broadcasting content by use of a broadcasting content and a Quick Response (QR) code including related information that is associated with the broadcasting content, and a transmitter configured to transmit the IPTV broadcasting content. | 2012-10-25 |
20120272280 | VIDEO PROCESSOR AND VIDEO PROCESSING METHOD - According to one embodiment, a video processor includes: a server function module configured to function as a server to provide data through a network; a renderer function module configured to function as a renderer to control displaying of data provided by another server in the network; a memory configured to store therein data that can be provided to the renderer function module; a receiver configured to receive, from an external device, identification information used to identify a server providing corresponding data; a determination module configured to determine whether the server identified by using the identification information is the server of the video processor; and a display controller configured to control displaying of the data stored in the memory if it is determined that the server identified by using the identification information is the server of the video processor. | 2012-10-25 |
20120272281 | METHOD AND APPARATUS FOR TRANSMITTING MEDIA DATA, AND METHOD AND APPARATUS FOR RECEVING MEDIA DATA - An information file pertaining to media data includes reproduction rating information for each of a plurality of segments. The information file is used by a client to determine what segment or segments to request from a server. The server responds to the request by sending the segment or segments to the client. Since the reproduction rating information may be provided for each of the segments, the selection of the segment or segments by the client can take into account a reproduction rating threshold. | 2012-10-25 |
20120272282 | TRACKER IN P2 P SYSTEMS WITH DVD FUNCTIONALITIES - “A method of optimizing the design of a Tracker in P2P applications to support DVD features, the method including determining for each peer and video operation the time T and jump point P | 2012-10-25 |
20120272283 | APPARATUS, SYSTEMS AND METHODS FOR REMOTE STORAGE OF MEDIA CONTENT EVENTS - Techniques for facilitating recording of media content events by media devices on remote storage devices are described. Some embodiments provide a remote storage manager as part of a media device, such as a set-top box. In one embodiment, the remote storage manager causes a media content event to be recorded on a remote persistent storage device by receiving the media content event from a program distributor, and then transmitting the media content event to the remote persistent storage device. In another embodiment, the remote storage manager instructs the remote persistent storage device to obtain the media content event from the program distributor, so that the remote persistent storage device can record the media content event without the media content event first being received by the remote storage manager. | 2012-10-25 |
20120272284 | METHOD, SYSTEM, AND COMPUTER-READABLE MEDIUM FOR EMPLOYING A FIRST DEVICE TO DIRECT A NETWORKED AUDIO DEVICE TO RENDER A PLAYLIST - A method for playing music includes displaying a list of playlists names, selecting one of the displayed playlists names, sending at least one attribute of a playlist corresponding to the selected playlist name to a playlist server, receiving a playlist from the playlist server wherein the received playlist corresponds to the attribute(s), selecting at least one song from the received playlist, sending information representative of the selected song to a content server, receiving the selected song from the content server, and playing the selected song(s). Requesting a playlist on the first device based on attributes, sending the same attributes to a second device having the second device request the playlist and start playing. | 2012-10-25 |
20120272285 | METHODS AND APPARATUS FOR FORMAT SELECTION FOR NETWORK OPTIMIZATION - Method and apparatus for optimizing network bandwidth utilization by delivering to users only the minimum number of programs required by service provider policies. In one embodiment, the method comprises switching some users from lower quality versions of programs to higher quality versions of the same programs, and removing those lower quality versions of programs from a given service group. In another embodiment, some users are switched from higher quality versions of programs to lower quality versions of those same programs, and the higher quality versions of programs removed from a given service group. | 2012-10-25 |
20120272286 | SPLICING OF CONTENT - A Headend system including a video codec to encode a video sequence yielding an encoded video sequence having video packets, a multiplexer, a signal generator to receive a notification of a splice point, analyze at least some of the encoded video packets based on the notification in order to find a random- access-point-packet, the random-access-point being a point from which to start decoding the encoded video sequence by the rendering device so that the video sequence may be rendered for output from the splice point, create a timing signal estimating a location of the random-access-point-packet in the encoded video sequence, and output the timing signal to the multiplexer or transmission equipment. Related apparatus and methods are also described. | 2012-10-25 |
20120272287 | LOCATION BASED CONTENT FILTERING AND DYNAMIC POLICY - In one implementation, a social media device receives social interaction data including an identity of neighboring mobile devices that have been within a physical proximity of an object mobile device. The social media device hosts a social network service and provides content to a user associated with the object mobile device according to the identity of more neighboring mobile devices. The user of the object mobile device may opt to receive content only from those users that are identified in the social interaction data. The user of the object mobile device may opt to permit only those users that are identified in the social interaction data to receive content generated by the user of the object mobile device. The user may opt to alter the status policy seen by other users so that only users that are identified in the social interaction data see the user as available or online. | 2012-10-25 |
20120272288 | METHODS AND APPARATUSES FOR DETERMINING STRENGTH OF A RHYTHM-BASED PASSWORD - Methods, apparatus, and computer program products are provided for determining the strength of a rhythm-based password to facilitate selection by a user of an appropriately secure rhythm-based password. A method may include receiving input defining a rhythm-based password and determining, by a processor, at least one property of the rhythm-based password. The method may also determine a strength value of the rhythm-based password based at least in part on the at least one property of the rhythm-based password. Corresponding apparatus and computer program products may also be provided. | 2012-10-25 |
20120272289 | DEVICES, SYSTEMS, AND METHODS FOR PROVIDING INCREASED SECURITY WHEN MULTIPLEXING ONE OR MORE SERVICES AT A CUSTOMER PREMISES - Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and devices may include one or more virtual machines that support a service, a service operating system, protocol functions, and protocol security functions including system, devices, and methods for, analyzing protocol data and generating protocol security data. In addition, the system, devices, and methods provide an administration function for each virtual machine that allows monitoring the protocol security data and provides a protocol alerting mechanism that reports protocol security trigger events. Moreover, the system, devices, and methods have a common layer providing a common operating system and common security functions. The protocol security functions and common security function utilize conventional and fuzzy logic rules to generate protocol security data and common security data. | 2012-10-25 |
20120272290 | System and Method for Reducing Security Risk in Computer Network - Disclosed are systems, methods and computer program products for reducing security risk in a computer network. The system includes an administration server that collect information about one or more computers in the network, including the following information: computer user's external drive usage history, software installation history, and Web browsing history. The server calculates based on the collected information a security rating of the computer user. The server then adjust a security rating of the computer user based on the security rating of at least one other user of another computer connected to the same computer network. The server then selects security policy of the security software based on the adjusted security rating of the computer user. Different security policies provide different network security settings and prohibitions on launching of executable files from external drives. | 2012-10-25 |
20120272291 | Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element can be Trusted - A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element. | 2012-10-25 |
20120272292 | METHOD AND APPARATUS FOR PROTECTING AGAINST ATTACKS FROM OUTSIDE CONTENT - A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session for the user with the second domain is searched for. If no active session is found, then an active session with a related first domain is searched for. If an active session is found with the first domain, then a session is established with the second domain based on the active session with the first domain. The requested content is then provided to the user based on the established session with the second domain. | 2012-10-25 |
20120272293 | COLLABORATIVE GATEWAY - A method and a system for monitoring and controlling remote devices are described. The system has a gateway, a web server, and a client device. The gateway is coupled to a security device. The web server has a management application configured to communicate with the gateway. The management application has a service manager module to enable additional services from the gateway and the security device. The client device communicates with the gateway identified by the web server. The gateway aggregates monitoring data from the security device and from other security devices respectively coupled to other gateways correlated with the gateway. The client device receives the aggregated monitoring data, controls the security device coupled to the respective gateway from a web-based user interface at the client device. | 2012-10-25 |
20120272294 | ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD - A system for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the system including functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority, and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over the given SAC. | 2012-10-25 |
20120272295 | METHOD AND SYSTEM FOR ENABLING AND CONTROLLING COMMUNICATION TOPOLOGY, ACCESS TO RESOURCES, AND DOCUMENT FLOW IN A DISTRIBUTED NETWORKING ENVIRONMENT - Described are a system and method for use by a computing device to transmit information over a communication medium. The computing device communicates over the medium according to a protocol stack having a plurality of protocol layers. Information having an identifier is received at a first protocol layer from a higher protocol layer in the protocol stack. The computing device determines whether to present the information to the network communication medium based on at least one term of a contract associated with the identifier. Upon determining to present the information to the communication medium, the computing device incorporates the identifier in the information before placing the information on the network communication medium. | 2012-10-25 |
20120272296 | METHOD AND SYSTEM FOR PROTECTING AGAINST THE EXECUTION OF UNAUTHORIZED SOFTWARE - In accordance with an embodiment of the present invention, a client device is protected against the execution of unauthorized software. The client includes a code authentication process that verifies the integrity of executable code, by generating and comparing a first hash value of the executable code with a known hash value of the original code. Furthermore, during boot-up, the client initializes a CPU exception vector table with one or more vector table entries. One or more, or all, of the vector table entries direct the CPU to execute the code authentication process prior to executing an event handler when an exception event occurs. Consequently, the code authentication process is virtually guaranteed to execute, thereby protecting against the execution of unauthorized code. | 2012-10-25 |
20120272297 | CROSS-TRANSPORT AUTHENTICATION - An authentication controller coupled to a first communication port of a portable media device is allowed to provide authentication on behalf of an accessory device coupled to a second communication port of the portable media device. In one embodiment, a cross transport connector includes a connector configured to couple with an accessory and a connector configured to couple with a portable media device such that the accessory can be coupled to the second communication port of the portable media device. The cross-transport connector also includes an authentication controller. The authentication controller may request authentication from the media device over the first communication port of the portable media device. The request may also include an identifier of the second port, to which authenticated permissions obtained via the first port may be transferred. | 2012-10-25 |
20120272298 | METHOD TO PROVIDE CHIP BASED SECURITY FOR I/O PACKETS IN AN ARRAY USING DYNAMIC TOPOLOGY - An apparatus comprising a controller circuit and an array. The controller circuit may be configured to read/write data in response to one or more input/output requests. The array may be configured to present/receive data to/from the controller circuit in response to the input/output requests. The data may be only transmitted to/from the array after a successful authentication between (i) a first code embedded within each of the input/output requests and (ii) a second code stored on a non-volatile memory within the controller circuit. | 2012-10-25 |
20120272299 | INFORMATION PROCESSING SYSTEM, IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR AND COMPUTER-READABLE STORAGE MEDIUM - There are provided an information processing system for providing a user with an authentication screen suitable for an authentication apparatus connected to an image processing apparatus, an image processing apparatus, an information processing apparatus, a control method therefor, and a program. When a user requests a login operation, the image processing apparatus generates a login request containing authentication apparatus information indicating an authentication apparatus for authenticating the user, which is connected to the image processing apparatus, and notifies the information processing apparatus of the login request. On the other hand, when the login request is sent, the information processing apparatus generates screen information of an authentication screen for executing authentication using the authentication apparatus indicated by the authentication apparatus information, and notifies the image processing apparatus of the generated screen information. | 2012-10-25 |
20120272300 | METHOD AND SYSTEM FOR CONFIGURING LOCAL AND REMOTE RESOURCES TO ACCOMPLISH RENDERING OF MULTIMEDIA CONTENT ON DISSIMILAR FORMAT DEVICES BASED ON USER BIOMETRIC DATA - A system and method is provided for communication of information in a mobile communication device (WMCD) configured to network connection may include discovering via a wireless mobile communication device, available communication resources based on acquired biometric data for a user of the WMCD, and communicating multimedia information between the WMCD and one or more of the discovered available resources. The acquired biometric data may include physical and behavioral biometric data to be authenticated and validated by a pattern recognition database. A connection between the WMCD and one or more discovered available resources may be established through linking the acquired biometric data to resources in available local or remote network. The established connection may enable the WMCD to consume or redirect media from the available resources and may be dynamically adjusted and updated based on dynamic sensing of the acquired biometric data in the available network or available resources. | 2012-10-25 |
20120272301 | CONTROLLED USER ACCOUNT ACCESS WITH AUTOMATICALLY REVOCABLE TEMPORARY PASSWORD - Systems and computer-implemented methods are disclosed for providing controller access to a normally single-user account. In an example system, a primary user is provided with a primary password to the user account. A secondary user may be temporarily authorized by generating a temporary password selected independently of the primary password. The user account may be accessed by entering either the primary password or the temporary password. The temporary password is automatically revoked in response to granting access with the primary password. The secondary user is thereby provided with temporary access to the user account that is revocable by the primary user at any time without having to share the primary password with the secondary user and without having to change the primary password. | 2012-10-25 |
20120272302 | Human User Verification - Techniques for generating a human user test for online applications or services may include splitting the visual objects in an image into multiple partial images, and forming one or more alignment positions. At each of the alignment positions, some of the visual objects appear recognizable while some bogus visual objects also appear to prevent robots from recognizing the alignment positions. A user is requested to find the multiple alignment positions to return recognizable visual objects. A system determines that the user is a human user if the recognizable visual objects input by the user match the visual objects in the image. | 2012-10-25 |
20120272303 | METHOD AND DEVICE FOR ENHANCING SECURITY OF USER SECURITY MODEL - The disclosure discloses a method and system for enhancing the security of a user security model. In the solution of the disclosure, after a Simple Network Managing Protocol (SNMP) server acquires a multi-byte original password of a user, detects whether the original password is composed of a specific byte string repeated multiple times; and if so, the user is prompted to reconfigure a password. In accordance with the solution provided by the disclosure, the disclosure greatly enhances the security of version V3 for the SNMP server side, solves the problem that the vulnerability exists in the security defined in version V3 in the prior art, and avoids the security hidden danger caused by the fact that illegal users can use the password different from the password of the authorized user to log on the SNMP server. | 2012-10-25 |
20120272304 | CRAWLING SECURE DATA SOURCES - It is desirable to provide a secure search mechanism to provide for searching over any and all content, such as across an enterprise. A secure search, however, requires access to the secure content repositories holding the data to be searched. In some cases the credentials required to crawl a repository may be extremely sensitive, or the user may be reluctant or unwilling to store user identification information in memory or on disk for any longer than is absolutely necessary. An approach is provided that allows a user or an administrator to provide security credentials to be stored and used only during a crawl, and to erase the credentials from the system when the crawl is complete. | 2012-10-25 |
20120272305 | CREATING TESTS TO IDENTIFY FRAUDULENT USERS - Member profile information for a control set of one or more control members and for a fraudulent set of one or more fraudulent members are obtained. Each member in the control set is at least believed to be legitimate and each member in the fraudulent set is at least suspected of being fraudulent. A test associated with identifying fraudulent members is generated using the member profile information for the control set and for the fraudulent set; the test inputs one or more pieces of member profile information for a member being tested. | 2012-10-25 |
20120272306 | AUTHENTICATION TICKET VALIDATION - An authentication ticket is validated to ensure authenticated communications between a client and an online service provider. In an embodiment an authentication request is received from a user agent associated with the client and the authentication request includes a set of identification information and a set of authentication information. Additionally, it is determined that the set of identification information and the set of authentication information are associated with a user and an authentication ticket is created including a user identification and an authentication, indicating to the online service provider that the user is authenticated to access one or more online services. Further, a validation token is embedded into the authentication ticket that provides enhanced verification that the access provided by the online service provider is authenticated. | 2012-10-25 |
20120272307 | Multi-Factor Authentication Using A Smartcard - Methods and systems are provided for non-cryptographic capabilities of a token such as a smartcard to be used as an additional authentication factor when multi-factor authentication is required. Smartcards are configured to generate a transaction code each time a transaction is attempted by the smartcard. The transaction code is dynamic, changing with each transaction, and therefore is used as a one-time password. When a user attempts to access a service or application requiring at least two authentication factors, a secure processor is used to read transaction code from the smartcard. The secure processor establishes a secure communication with the remote computer hosting the service or application. The transaction code can then be encrypted prior to transmission over the public Internet, providing an additional layer of security. | 2012-10-25 |
20120272308 | MANAGEMENT SYSTEM, MANAGEMENT METHOD AND MANAGEMENT PROGRAM FOR MANAGING INDUSTRIAL CONTROL SYSTEM - A system and method of an appropriate countermeasure at the time of anomaly. The management system for an industrial control system includes a control apparatus, a control network connected to the control apparatus, and multiple devices controlled by the control apparatus via the control network, the management system includes multiple firewall modules provided for each of control zones each controlling one part of the industrial control system, the firewall modules relaying communication between devices in the control zones and the control network; an event analyzing module collecting events from each of the multiple firewall modules and analyzing the events to detect an anomaly of each of the control zones, and a communication managing module changing a communication operation performed via the firewall module provided for the control zone where an anomaly has been detected. | 2012-10-25 |
20120272309 | Method and Apparatus for Fast Check and Update of Anti-Replay Window Without Bit-Shifting in Internet Protocol Security - An apparatus comprising a processor configured to implement an anti-replay check for a plurality of received packets and a plurality of corresponding sequence numbers; and a circular buffer coupled to the processor and comprising a bitmap, wherein the bitmap is slided in a circular manner by updating a low index that points to a first sequence number for a first received packet and a high index that points to a last sequence number for a last received packet without bit-shifting, and wherein, when the update results in the new value of one of the low index and the high index exceeding the end of the circular buffer, the one of the low index and the high index wraps around from the beginning of the circular buffer. | 2012-10-25 |
20120272310 | SYSTEMS AND METHODS FOR SECURE COMMUNICATION OVER A WIRELESS NETWORK - A method of secure communication between a wireless device and a target network is presented, comprising receiving a communication addressed to a target network, the communication comprising a data payload and originating from a wireless device on a trusted wireless network, establishing a virtual private network (VPN) session with the target network and sending the communication to the target network over the secure channel. The method can further comprise negotiating secure channel parameters with the target network, encrypting the data payload, adding data integrity protection to the communication, encapsulating the communication according to a VPN protocol, authenticating the wireless device as an authorized user of the private network and granting access to a target network resource. | 2012-10-25 |
20120272311 | METHOD FOR AUTHENTICATING A USER ON A COMPUTING UNIT - The invention relates to a method for authenticating a user on at least one computing unit, in particular a data processing and/or communication device, comprising a graphical user interface unit having a graphical user interface and at least one input device, wherein the at least one graphical user interface comprises at least one symbol storage area having a plurality of graphical symbols and at least one symbol positioning area having a plurality of defined positions. | 2012-10-25 |
20120272312 | UPPER-ORDER COMPUTER, LOWER-ORDER COMPUTER, MONITORING SYSTEM AND MONITORING METHOD - The present disclosure discloses an upper-order computer, a lower-order computer, a monitoring system and a monitoring method, so as to eliminate the disadvantages of low standardization level and small scale in manually setting and adjusting performance parameters. The upper-order computer includes a central control module and an information interacting module, the information interacting module including a human-computer interacting unit, and the central control module including a processing unit, a display control unit and a parameter configuring unit, wherein the processing unit is adapted for controlling a lower-order computer by sending control commands; the display control unit is adapted for processing effective operating data acquired from the lower-order computer, and is adapted for instructing the human-computer interacting unit to perform presenting; and the parameter configuring unit is adapted for configuring parameters of the lower-order computer by sending parameter configuring commands. It can be seen that the upper-order computer is capable of presenting the processed effective operating data and configuring parameters. Compared with directly setting and adjusting the controller by human, the technical solution of the present disclosure has the advantages of high standardization level and large scale. | 2012-10-25 |
20120272313 | CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE - Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality. | 2012-10-25 |
20120272314 | DATA COLLECTION SYSTEM - A data collection system for generating alerts is disclosed. In some embodiments, information is gathered from a plurality of internet facilities that are used for malicious purposes. In response to detecting in the gathered information data that satisfies an alert condition associated with malicious activity, an alert to warn a potential target of the malicious activity is generated. | 2012-10-25 |
20120272315 | QUARANTINING PACKETS RECEIVED AT DEVICE IN NETWORK COMMUNICATIONS UTILIZING VIRTUAL NETWORK CONNECTION - A method of engaging in network communications by a device includes spawning a first virtual machine for a network connection that virtualizes network capabilities of a device; receiving a packet communicated from a transmitting device at the first virtual machine of the device; determining that the packet is corrupted, said determination being based on information from an application running on the device; in response to said step of determining that the packet is corrupted, quarantining the packet; spawning a second virtual machine for a network connection that virtualizes network capabilities of the device; and communicating, using the second virtual machine, a message to the transmitting device. | 2012-10-25 |
20120272316 | METHOD FOR DETECTING THE HIJACKING OF COMPUTER RESOURCES - The present invention provides a method for detecting the hijacking of computer resources, located on an internal network implementing security and confidentiality criteria specific to this internal network, connected to an external network with no such security and confidentiality criteria, through a connection managed by a service provider, comprising:
| 2012-10-25 |
20120272317 | SYSTEM AND METHOD FOR DETECTING INFECTIOUS WEB CONTENT - Systems and methods are disclosed herein for detecting a threat to a computing device. The system includes a server and a computing device in communication with the server and configured to browse the Internet. The server receives data indicating a configuration parameter of the computing device and executes an emulation of the computing device that replicates the configuration parameter. The server also receives data relating to the computing device's browsing behavior and replicates the browsing behavior on the emulation. Upon detecting an undesired modification to the emulation of the computing device caused by the replicated browsing behavior, the server automatically generates and outputs an alert related to the undesired modification and related browsing behavior. | 2012-10-25 |
20120272318 | SYSTEM AND METHOD FOR DYNAMIC GENERATION OF ANTI-VIRUS DATABASES - A method for reducing the size of the AV database on a user computer by dynamically generating an AV database according to user parameters is provided. Critical user parameters that affect the content of the AV database required for this user are determined. The AV database for the single user is generated based on the user parameters. When the parameters of the user computer change or when new malware threats are detected, the user AV database is dynamically updated according to the new parameters and the new malware threats. The update procedure becomes more efficient since a need of updating large volumes of data is eliminated. The AV system, working with a small AV database, finds malware objects more efficiently and uses less of computer system resources. | 2012-10-25 |
20120272319 | Apparatus, and system for determining and cautioning users of Internet connected clients of potentially malicious software and method for operating such - A system at a central server and at a plurality of web filters is installed to observe traffic and to protect users from attempting connection to suspicious, malicious, and/or infectious targets. Targets are defined as Uniform Resource Identifiers (URI) and Internet Protocol (IP) addresses. Traffic is collected, analyzed, and reported for further analysis. Behavior is analyzed for each client attempting a connection to an uncategorized target. IP addresses and URIs are evaluated toward placement in either a Trusted target store or an Anomalous target store. The accumulated content of Anomalous target store is provided back to the Network Service Subscriber Clients. Warnings and tools are presented when appropriate. | 2012-10-25 |
20120272320 | METHOD AND SYSTEM FOR PROVIDING MOBILE DEVICE SCANNING - An approach for providing mobile device scanning is described. A file stored within a mobile device is received. A scan of the received file is initiated to determine a status relating to presence of an unauthorized code or to execution of an unauthorized activity. A notification message is generated based on the scan, wherein the notification message specifies information relating to the determined status. | 2012-10-25 |
20120272321 | ANTIVIRUS COMPUTING SYSTEM - An antivirus computing system includes: a storage device having an operating partition that has stored therein a to-be-scanned file, and a hidden partition that has stored therein a virus code; and an antivirus device operatively associated with the storage device, and configured to perform a virus scan on the to-be-scanned file in the operating partition based on the virus code in the hidden partition. | 2012-10-25 |
20120272322 | DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO PRIVILEGE-ESCALATION ATTACKS - Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source. | 2012-10-25 |
20120272323 | ORIGINATION VERIFICATION USING EXECUTION TRANSPARENT MARKER CONTEXT - The use of a marker in a file to assist in the signing and/or verification of the file. The marker is recognized by the signing authority. The marker has a certain execution transparent context that reduces or eliminates the impact of the marker on execution. A signing authority accesses the file, finds the marker within the file, and identifies the execution transparent context system. The signing authority then uses the execution transparent context system to insert a signature with the same execution transparent context. A verification system finds the marker, identifies the execution transparent context of the marker, identify the execution transparent signature, and uses the execution transparent context system to then extract the signature from the execution transparent signature. That signature may then be used to verify that the file has not changed since it was signed. | 2012-10-25 |
20120272324 | ELECTRONIC DEVICE AND COPYRIGHT PROTECTION METHOD OF AUDIO FILE THEREOF - A copyright protection method is applied to an electronic device. The method includes: obtaining digital data of an audio file via Video on Demand (VOD); determining whether or not the audio file is free to use; determining whether or not the accessing of the audio file is legal if the audio file is not free. Upon a condition that the audio file is free, or the accessing of the audio file is legal and not free, decoding the audio file into analog signals. Upon a condition that digital copyright information is not included in the audio file, inserting into the analog signals the digital copyright information; outputting the analog signals of the audio file along with digital copyright information of the audio file. Upon a condition that the audio file is not free and not legally permitted, indicating the accessing of the audio file is illegal. The electronic device is also provided. | 2012-10-25 |
20120272325 | DIGITAL CONTENT MANAGEMENT SYSTEM AND METHODS - Systems and methods for locating network sites using a target digital object in a networked environment are presented. In operation, a request to locate network sites using the target digital object is received. In response to the request, identification information corresponding to the target digital object is obtained. Content of a plurality of network sites on a network is also obtained. For each network site of the obtained plurality of network sites, a determination is made as to whether a digital object on the network site matches the target digital object according to the identification information corresponding to the target digital object. A report indicating the network sites that include a digital object that matches the target digital object is then generated and returned in response to the request. | 2012-10-25 |
20120272326 | TOKENIZATION SYSTEM - A tokenization unit that tokenizes a real name ID to a different tokenized ID according to a user's service usage situation, a service history analyzing unit that analyzes service history data, a tokenized ID checking unit that determines whether different tokenized IDs are the same in analyzing a plurality of items of service history data including the different tokenized IDs, and a tokenization change management unit that manages a service usage situation the same as that of tokenization by the tokenization unit. The service history analyzing unit performs: a predetermined service history analysis if a target is a service usage situation in which the same tokenized ID appears; and a predetermined service history analysis as different tokenized IDs are considered to be the same user by the tokenized ID checking unit if a target is a service usage situation in which a different tokenized ID appears. | 2012-10-25 |
20120272327 | WATERMARKING METHOD AND APPARATUS FOR TRACKING HACKED CONTENT AND METHOD AND APPARATUS FOR BLOCKING HACKING OF CONTENT USING THE SAME - Watermarking method and apparatus for tracking hacking and method and apparatus for blocking hacking of content are provided. The watermarking method includes: obtaining device information from a reception device, with which content is shared, through a determined network channel; generating watermark data based on the obtained device information; and generating watermarked multimedia content by inserting the generated watermark data into content. The method of blocking hacking of content includes: if hacked content is found, detecting watermark data from the hacked content; detecting transmission and reception device information from the detected watermark data; and extracting a progress route of the content based on the detected transmission and reception device information and performing revocation on a hacked device. | 2012-10-25 |
20120272328 | METHOD, SYSTEM AND APPARATUS FOR SECURE DATA EDITING - A system, method, and apparatus for secure data editing is disclosed. A data field receives focus to accept a data entry from a user. The user inputs a data entry into the data field via a user interface. A determination is made of whether a manual lock event, a change focus event, or a time out event has triggered based on the user's action or inaction with the user interface. Upon the triggering of a manual lock event, a change focus event, or a time out event, the data entry in the data field is obscured. The user interface may display a data entry with a validation character which provides a reference point within the data entry while the data entry is displayed and while the data entry is obscured. The system may allow a user to have a specified function set based on his user access level. | 2012-10-25 |
20120272329 | OBFUSCATING SENSITIVE DATA WHILE PRESERVING DATA USABILITY - An approach for obfuscating sensitive data while preserving data usability is presented. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed. | 2012-10-25 |
20120272330 | Anti-Phishing System and Method - Systems and methods for anti-phishing are disclosed. At a computing device: identifying, from a user input data stream, a first set of one or more characters, and a second set of one or more characters. The first set of characters represents a portion of first private information, and the second set of characters represents a portion of second private information. In accordance with a determination that the first set of characters and second set of characters are identified in accordance with a predefined sequential relationship, taking a protective action, prior to transmitting at least a subset of the characters of the first or second private information to a server remotely located from the computing device, to protect the first or second private information. In some implementations, the first private information includes a username, and the second private information includes a password corresponding to the username. | 2012-10-25 |
20120272331 | METHOD AND SYSTEM FOR ABUSE ROUTE AGGREGATION AND DISTRIBUTION - In one exemplary embodiment, a computer-implemented method includes receiving a request to block a host, wherein the host provides a prohibited content via a computer network. A spider program can verify that the host provides the prohibited content. An abuse route list can be generated. The abuse route list can include an internet protocol address of the host. The abuse route list is provided to a network operator with a computer networking protocol. A search engine of a database of infringing hosts can be provided. The database of infringing hosts can include the internet protocol address of the host. Whether the host provides the prohibited content can be reverified with a third-party review. The host from can be removed from the abuse route list if the third-party review determines that the host does not provide prohibited content. | 2012-10-25 |
20120272332 | SYSTEMS AND METHODS FOR DYNAMICALLY GENERATING A PRIVACY SUMMARY - A system and method for is provided. The present invention provides a system and method for dynamically generating a privacy summary. A profile for a user is created. One or more privacy setting selections are received from the user associated with the profile. The profile associated with the user is updated to incorporate the one or more privacy setting selections. A privacy summary is then generated for the profile based on the one or more privacy setting selections. | 2012-10-25 |
20120272333 | METHODS, DATA PROCESSING SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ASSIGNING PRIVACY LEVELS TO DATA ELEMENTS - Methods, data processing systems and computer program products for assessing and assigning privacy levels to data elements are provided. A method of assigning privacy levels to data elements (e.g., text files, web page files, image files, audio files, video files, and portions thereof) includes assigning a predetermined privacy level to a data element; storing the data element with the assigned privacy level; determining if the assigned privacy level for data element is proper; and assigning a different privacy level to the data element in response to determining that a currently assigned privacy level for the data element is not proper. A predetermined privacy level may be assigned to a data element under various conditions, such as when the data element arrives at a device, when the data element is created by a device, and/or when the data element is modified by a device. | 2012-10-25 |
20120272334 | METHOD AND APPARATUS FOR PROCESSING RIGHTS OBJECT - A method for upgrading a Rights Object (RO) includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the RO that requires updating from a Secure Removable Media (SRM) Agent; providing, by the DRM Agent, the RO related information to a Rights Issuer (RI), and obtaining a new RO from the RI; and interacting, by the DRM Agent, with the SRM Agent to upgrade the RO that requires updating on the SRM by means of the new RO. According to the embodiments of the present invention, the DRM Agent acquires RO related information which is stored on the SRM and does not have Move rights, and interacts with the RI to move the RO out from the SRM, so as to move the RO without the Move rights out from the SRM. | 2012-10-25 |
20120272335 | IDENTITY VERIFICATION SYSTEMS AND METHODS - Systems and methods for authenticating the identity of a user prior to giving access to confidential data at a user interface via a network. In an embodiment, a user provides initial data as part of a request to access the confidential data. At least one database having the confidential data stored therein is accessed by the server to retrieve confidential data relating to the user based on the initial data. An exam creation function causes creation of an exam comprising at least one question based at least in part on a portion of the confidential data relating to the user. This function creates the exam based on at least one exam definition. An exam administration function causes transmitting of the exam to the client interface for presentation to the user. The user is granted access to the confidential data subsequent to determination that the user successfully passed the exam. | 2012-10-25 |
20120272336 | Transcoding Content Based On Verification of Ownership of the Content - A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device. | 2012-10-25 |
20120272337 | CONTENT OBJECT ENCAPSULATING CONTENT ITEMS FOR ACCESSING CONTENT AND ACCESS AUTHORIZATION INFORMATION - Provided are a method, system, and computer program product for a content object encapsulating content items for accessing content and access authorization information. User input of content items is received, wherein each content item indicates a network address and content type of content at the network address, content items are added to a content object. User input is received of access authorization information indicating a user having authority to access the content object. The access authorization information is added to the content object. A user request is received for the content object from. The access authorization information is processed to determine whether the user initiating the request has authorization to access the content object. The content object is processed to generate a presentation page to return to the client computer in response to determining that the user of the client computer is authorized to access the content object. | 2012-10-25 |
20120272338 | UNIFIED TRACKING DATA MANAGEMENT - Methods and apparatuses that collect tracking data items into a plurality of data stores for one or more domain in response to resources received from the domains are described. Each tracking data item may be accessible for one of the domains. Relationships of the domains may be identified among the tracking data items across multiple data stores according to the resources received. One or more of the domains may be selected according to the identified relationships to control accessibility of the tracking data items for the domains. The data stores may be updated to prohibit accessing at least a portion of the tracking data items for the selected domains. | 2012-10-25 |
20120272339 | METHOD AND SYSTEM FOR ACCESSING PASSWORD-PROTECTED DATA ON A DEVICE - A password is stored to be associated with a sender sending data for exploitation on a network-connected device associated with a user. Password-protected data is received from the sender via a network connection. The password-protected data is automatically retrieved to access the password-protected data and the accessed data is sent via network connection to a device associated with the user. | 2012-10-25 |
20120272340 | SECURING WAKEUP NETWORK EVENTS - In an embodiment, a method is provided. The method of this embodiment provides receiving a packet having a wake-up pattern, and waking up if the wake-up pattern corresponds to one of a number of dynamically modifiable passwords on a pattern wake list, each of the dynamically modifiable passwords being based, at least in part, on a seed value | 2012-10-25 |
20120272341 | NOVEL GENE DISRUPTIONS, COMPOSITIONS AND METHODS RELATING THERETO - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO226, PRO257, PRO268, PRO290, PRO36006, PRO363, PRO365, PRO382, PRO444, PRO705, PRO1071, PRO1125, PRO1134, PRO1155, PRO1281, PRO1343, PRO1379, PRO1380, PRO1387, PRO1419, PRO1433, PRO1474, PRO1550, PRO1571, PRO1572, PRO1759, PRO1904, PRO35193, PRO4341, PRO4348, PRO4369, PRO4381, PRO4407, PRO4425, PRO4985, PRO4989, PRO5737, PRO5800, PRO5993, PRO6017, PRO7174, PRO9744, PRO9821, PRO9852, PRO9873, PRO10196, PRO34778, PRO20233, PRO21956, PRO57290, PRO38465, PRO38683 or PRO85161 genes. Such in vivo studies and characterizations may provide valuable identification and discovery of therapeutics and/or treatments useful in the prevention, amelioration or correction of diseases or dysfunctions associated with gene disruptions such as neurological disorders; cardiovascular, endothelial or angiogenic disorders; eye abnormalities; immunological disorders; oncological disorders; bone metabolic abnormalities or disorders; lipid metabolic disorders; or developmental abnormalities. | 2012-10-25 |
20120272342 | MOUSE ARTIFICIAL CHROMOSOME VECTOR - Disclosed is a mouse artificial chromosome vector, comprising: a natural centromere derived from a mouse chromosome; a mouse-chromosome-derived long-arm fragment formed by deleting a long-arm distal region at a mouse chromosome long-arm site proximal to the centromere; and a telomere sequence, wherein the vector is stably retained in a cell and/or tissue of a mammal. In addition, disclosed are cells or non-human animals comprising the vector, and use of the cells or non-human animals. | 2012-10-25 |
20120272343 | STROMAL INTERACTING MOLECULE KNOCKOUT MOUSE AND USES THEREOF - This invention relates to knockout mice for the Ca | 2012-10-25 |
20120272344 | TRANSGENIC ANIMALS EXPRESSING CHIMERIC ANTIBODIES FOR USE IN PREPARING HUMAN ANTIBODIES - The invention provides transgene constructs for expressing chimeric antibodies, and transgenic non-human host animals carrying such constructs, wherein the chimeric antibodies comprise human variable regions and constant regions of the non-human transgenic host animal. The presence of immunoglobulin constant regions of the host animal allows for generation of improved antibodies in such transgenic host animals. Subsequently, the chimeric antibodies can be readily converted to fully human antibodies using recombinant DNA techniques. Thus, the invention provides compositions and methods for generating human antibodies in which chimeric antibodies raised in vivo in transgenic mice are used as intermediates and then converted to fully human antibodies in vitro. | 2012-10-25 |
20120272345 | DIAGNOSIS MARKER, DIAGNOSIS METHOD AND THERAPEUTIC AGENT FOR AMYOTROPHIC LATERAL SCLEROSIS, AND ANIMAL MODEL AND CELL MODEL DEVELOPING AMYOTROPHIC LATERAL SCLEROSIS - Provided are a diagnosis marker, a diagnosis method, and a therapeutic agent suitable for diagnosing and treating amyotrophic lateral sclerosis (ALS). Also provided are an animal model and a cell model suitable for developing a therapeutic agent and a treatment method for ALS. The diagnosis method for ALS includes: an isolation step in which a nucleic acid is isolated from a specimen taken from a subject; a detection step in which bases expressed in a human chromosome 10 optineurin (OPTN) gene region are detected from the isolated nucleic acid; and a determination step in which it is determined whether or not the detected bases are mutated. | 2012-10-25 |
20120272346 | IDENTIFICATION OF RNAI TARGETS AND USE OF RNAI FOR RATIONAL THERAPY OF CHEMOTHERAPY-RESISTANT LEUKEMIA AND OTHER CANCERS - Provided is a mosaic mouse model for use in determining the potency of an shRNA in vivo for reducing survival of cancer cells of chemotherapy-resistant leukemia. The syngeneic mouse recipient is transplanted with tet-on competent leukemia cells carrying a bicistronic nucleic acid construct comprising a promoter operably linked to a fusion gene associated with chemotherapy-resistant leukemia, and a sequence encoding a reverse tet-transactivator protein, such that both coding sequences are co-expressed from the promoter. Also provided are methods of treating soft tissue cancers. | 2012-10-25 |
20120272347 | CHITOSAN-ALGINATE SCAFFOLD CELL CULTURE SYSTEM AND RELATED METHODS - Methods for culturing cancer cells in vitro using a three-dimensional scaffold, scaffolds that include the cultured cancer cells, and methods for using the cultured cancer cells and the scaffolds that include the cultured cancer cells in anticancer therapeutic drug development. | 2012-10-25 |
20120272348 | VIRAL VECTORS ENCODING A DNA REPAIR MATRIX AND CONTAINING A VIRION-ASSOCIATED SITE SPECIFIC MEGANUCLEASE FOR GENE TARGETING - The present invention relates to a fusion protein which comprises at least a functional meganuclease and a viral protein and in particular to fusion protein comprising at least a meganuclease, which recognises and cleaves a specific DNA target sequence and a viral peptide selected from the group Vpr and Vpx or a fragment or derivative thereof; wherein said fusion protein is able to associate with Lentivirus vector particles and following transduction into a host cell recognise and cleave said specific DNA target in vivo. The present Patent Application also relates to a viral particle comprising such a fusion protein and to the use of such fusion proteins and viral particles for gene targeting. | 2012-10-25 |
20120272349 | METHOD FOR CONSTRUCTING CHIMERIC RAT USING RAT EMBRYONIC STEM CELLS - The present invention provides a preparation method of a chimeric embryo and a chimeric rat, which is characterized by contacting a rat pluripotent stem cell and a host embryo in the presence of an ES cell differentiation inhibitor. The method includes (a) a step for contacting a fertilized host embryo collected from a female rat and a rat pluripotent stem cell in the presence of an ES cell differentiation suppressant, and (b) a step for culturing the host embryo in contact with the rat pluripotent stem cell to form a chimeric embryo. | 2012-10-25 |
20120272350 | INBRED CORN LINE ML9 - An inbred corn line, designated ML9, is disclosed. The invention relates to the seeds of inbred corn line ML9, to the plants and plant parts of inbred corn line ML9 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line ML9 with itself or another corn line. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line ML9. | 2012-10-25 |
20120272351 | SWEET PEPPER HYBRID 10BR46100 - The present invention relates to the field of plant breeding, particularly to the development of hybrid pepper variety 10BR46100. Pepper plants of the invention may exhibit a combination of traits including red colored blocky fruits, Tobamovirus resistance against Tobamovirus Pathotype 0 (P0) and Tobamovirus Pathotype 1-2 (P1-2), and resistance against | 2012-10-25 |
20120272352 | Genes Conferring Drought and Salt Tolerance and Uses Thereof - Compositions and methods for conferring drought and salt tolerance to plants using tocopherol cyclase (TC) genes, including polynucleotides, polypeptides, vectors, cells and plants. | 2012-10-25 |
20120272353 | METHOD TO INCREASE CROP GRAIN YIELD UTILIZING COMPLEMENTARY PAIRED GROWTH AND YIELD GENES - The present invention provides methods to increase crop yield utilizing transgenic complementary paired genes controlling plant growth and yield. The specific genes increase female reproductive organs and are paired with genes responsible for modifying the growth of non-yield specific plant tissues. Plants, plant progeny, seeds and tissues created by these methods are also described. Polynucleotides encoding the paired sequences are provided for expression in a plant of interest. Expression cassettes, plants, plant cells, plant parts and seeds comprising the sequences of the invention are further provided. In specific embodiments, the polynucleotide is operably linked to a constitutive promoter. | 2012-10-25 |
20120272354 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH481662 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH481662. The invention thus relates to the plants, seeds and tissue cultures of the variety CH481662, and to methods for producing a corn plant produced by crossing a corn plant of variety CH481662 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH481662. | 2012-10-25 |
20120272355 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH825920 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH825920. The invention thus relates to the plants, seeds and tissue cultures of the variety CH825920, and to methods for producing a corn plant produced by crossing a corn plant of variety CH825920 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH825920. | 2012-10-25 |
20120272356 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH154632 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH154632. The invention thus relates to the plants, seeds and tissue cultures of the variety CH154632, and to methods for producing a corn plant produced by crossing a corn plant of variety CH154632 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH154632. | 2012-10-25 |
20120272357 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH315525 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH315525. The invention thus relates to the plants, seeds and tissue cultures of the variety CH315525, and to methods for producing a corn plant produced by crossing a corn plant of variety CH315525 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH315525. | 2012-10-25 |
20120272358 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH324145 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH324145. The invention thus relates to the plants, seeds and tissue cultures of the variety CH324145, and to methods for producing a corn plant produced by crossing a corn plant of variety CH324145 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH324145. | 2012-10-25 |
20120272359 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH158013 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH158013. The invention thus relates to the plants, seeds and tissue cultures of the variety CH158013, and to methods for producing a corn plant produced by crossing a corn plant of variety CH158013 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH158013. | 2012-10-25 |