47th week of 2013 patent applcation highlights part 67 |
Patent application number | Title | Published |
20130312038 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2013-11-21 |
20130312039 | METHOD FOR VIRTUAL CHANNEL MANAGEMENT, METHOD FOR RETRIEVING DIGITAL CONTENTS, AND NETWORK-BASED MULTIMEDIA REPRODUCTION SYSTEM WITH VIRTUAL CHANNELS - A method for virtual channel management is provided. The method includes the following steps. In response to a command, a control unit of a network-based multimedia reproduction system determines whether the command is associated with virtual channel switching. When the command is associated with virtual channel switching, the control unit checks whether a channel value corresponding to the command exists in an application virtual channel table. When the channel value exists in the application virtual channel table, the control unit determines an application corresponding to the channel number from the application virtual channel table, and executes the application. According to a first operation parameter set corresponding to the application, the control unit sets the executed application to retrieve digital contents through a network unit of the network-based multimedia reproduction system. | 2013-11-21 |
20130312040 | ELECTRONIC DEVICE AND METHOD FOR INFORMATION ABOUT SERVICE PROVIDER - The method of providing information about service providers according to the present invention for achieving the technical goals includes setting regional information of the electronic device based on regional information received through a user interface unit or location information obtained by a location information module, transmitting the set regional information to a server, receiving information about a service provider related to the transmitted regional information from the server, and displaying the received information about the service provider. | 2013-11-21 |
20130312041 | SYSTEM AND METHOD FOR REAL-TIME COMPOSITE BROADCAST WITH MODERATION MECHANISM FOR MULTIPLE MEDIA FEEDS - A method of operation of a composite broadcast system includes: receiving a client AV stream from a user station and a user profile associated with the client AV stream; receiving a user interaction from the user station; approving the client AV stream for airing based on the user interaction and the user profile; receiving a program AV stream; generating a visualization based on the user interaction and the user profile; and mixing the client AV stream, the program AV stream, and the visualization for broadcasting to multiple devices. | 2013-11-21 |
20130312042 | APPARATUS AND METHOD FOR PROVIDING MEDIA CONTENT - A system that incorporates teachings of the subject disclosure may include, for example, receiving video content at a mobile device, utilizing the mobile device for adjusting dimensions of an area of attention in an image of the video content based on a desired display resolution, utilizing the mobile device for adjusting dimensions of a peripheral portion that surrounds the area of attention, and replacing the image with the adjusted image during presentation of the video content. Other embodiments are disclosed. | 2013-11-21 |
20130312043 | SYSTEM AND METHOD FOR SECURITY DATA ACQUISITION AND AGGREGATION ON MOBILE PLATFORMS - A system and method for security data acquisition and aggregation on mobile platforms are disclosed. A particular embodiment includes: providing an edge device data aggregator in a mobile venue; using the edge device data aggregator to receive security data from a plurality of sensors and video sources deployed in the mobile venue; performing at least one processing operation on the security data; and causing the transfer of the processed security data in real time to a real time wireless data integrator positioned outside of the mobile venue. | 2013-11-21 |
20130312044 | NETWORK TERMINAL SYSTEM AND WIRELESS TERMINAL - A network terminal system connects a wireless terminal and a display device with a network. The wireless terminal obtains contents, an identifier that contains information indicating a server for supplying the contents and information for identifying the contents, and session information for uniquely identifying a user of the wireless terminal, from an external network. The obtained identifier and the session information are transmitted to the display device. The display device obtains the contents and the session information correlated with the contents from the server indicated by the identifier transmitted from the wireless terminal, and displays the obtained contents on the display unit. | 2013-11-21 |
20130312045 | VIDEO-ON-DEMAND SYSTEM - A video-on-demand system including a video server storing video-on-demand content and for streaming video-on-demand through a first layer of an internet page having a first layer and a second layer; and a controller for causing there to be formed in the second layer a plurality of selectable overlay images such that a user at a location in communication with the internet remote from the video server and the controller can display streamed video-on-demand of the first layer in combination with the overlay images of the second layer and can select one of the overlay images; wherein the overlay images correspond to respective control functions for the video-on-demand stream; and the controller is responsive to selection of an overlay image to change the video-on-demand stream in accordance with the corresponding respective control function. | 2013-11-21 |
20130312046 | SMART STREAM DELIVERY SERVER, SYSTEM AND METHODS FOR ASSEMBLING A MIX OF SERVICES TO BE DELIVERED TO A SUBSCRIBER'S PREMISES - A smart stream delivery server, a system, and methods are described herein for assembling a mix of services (e.g., linear channels, video on demand, broadcast television, and recordings) which are to be delivered over one or more networks to a premises (e.g., home, business) of a subscriber. In one embodiment, the system includes a smart stream delivery server that assembles the mix of services which are to be delivered over the at least one network to the home of the subscriber based at least on a subscriber policy which is provided by the subscriber. The subscriber policy includes equipment priorities for a list of devices which consume the services, and service priorities for a plurality of services which are available for consumption by the devices. | 2013-11-21 |
20130312047 | Transmitting Timing Information for Content in a Data Stream - The invention provides a method and apparatus that addresses and resolves the issues currently affecting the ability to offer Enhanced TV, in particular, those issues concerning timing and synchronization, interaction with other modules in the STB, and distribution. | 2013-11-21 |
20130312048 | ARRAY OF TRANSCODER INSTANCES WITH INTERNET PROTOCOL (IP) PROCESSING CAPABILITIES - In one embodiment, a method processes video in a system including a host computer processing unit (CPU) and a plurality of transcoder instances. The method receives, by a transcoder instance in the plurality of transcoder instances, first Internet Protocol (IP) packets from a host router coupled to the host CPU. The transcoder instance decapsulates the first IP packets to determine video from a payload of each of the first IP packets and generates a transport stream of video from the video from the payload. The transport stream is in a format in which the transcoder instance can perform a transcoding operation. The transport stream of video is processed by performing the transcoding operation on the transport stream of video. The transcoder instance then encapsulates the processed video from the transport stream of video in second IP packets and sends the second IP packets to a destination. | 2013-11-21 |
20130312049 | AUTHORING, ARCHIVING, AND DELIVERING TIME-BASED INTERACTIVE TV CONTENT - A social television system provides for the authoring, archiving, and delivering of interactive social television content. A social television service provider receives the identity of a television show that is being watched on a first display screen. The social television service provider delivers corresponding social television content to a second display screen. The social television content is to be displayed on the second display screen at certain timeframes during the playback of the television show on the first display screen. Various entities may author social television content. The authoring process may be facilitated by obtaining data from web-based data sources. The authoring process may take place via a website hosted by the social television service provider. The authoring process may also take place via a third-party website that is connected to the social television service provider via a software development kit. | 2013-11-21 |
20130312050 | DEVICE, SYSTEM AND METHOD TO PROVISION, CONFIGURE AND OPERATE VIDEO GENERATION EQUIPMENT - A video generation device, system and method. The device, system and method may perform the configuration of the video generation device, and thus may include a configuration file and a file format. The device, system and method may include at least one processing unit communicative with at least one cable modem, at least one application specific output generated from the processing unit, and a plurality of inputs to at least one processing unit for receiving at least a video input, a management input, and a configuration input, wherein the configuration input may include configuration information for processing the other received inputs. In embodiments, the video input, the management input, and the configuration information may be processed by at least one processing unit to at least one application specific output. | 2013-11-21 |
20130312051 | FAULT TOLERANT SYSTEM WITH EQUIVALENCE PROCESSING DRIVING FAULT DETECTION AND BACKUP ACTIVATION - A system includes a primary functionality and a backup functionality for the primary functionality. A measurement circuit measures operational parameter values of the primary functionality. A fault detection circuit determines a level of equivalence between the operation of the primary functionality and a reference functionality based on a weighted comparison of the measured operational parameter values of the primary functionality to corresponding reference operational parameter values for the reference functionality If the equivalence determination fails to find equivalence, the fault detection circuit signals a fault in the primary functionality and activates the backup functionality. | 2013-11-21 |
20130312052 | VIDEO CONTENT PRESENTATION OVERRIDE CONTROL SYSTEMS, METHODS AND DEVICES - A video content presentation terminal includes a video content receiver that is configured to receive video content and presentation override controls for the video content. The presentation override controls define presentation restrictions for the video content. The video content presentation terminal also includes an applications processor that is configured to execute applications on the video content presentation terminal. The applications include presentation format requests. The video content presentation terminal also includes a controller that is responsive to the video content receiver and the applications processor. The controller is configured to format the content that was received for presentation on a content presentation device according to the presentation override controls that were received, while preventing implementation of the presentation format requests that are made by the applications that are inconsistent with the presentation override controls. Related systems, methods and devices are described. | 2013-11-21 |
20130312053 | METHOD AND SYSTEM FOR MULTIPLEXED TRANSPORT INTERFACE BETWEEN DEMODULATORS (DEMODS) AND SET-TOP BOX (STB) SYSTEM-ON-CHIPS (SOCS) - A multiplexed transport interface (MTSIF) may be utilized during communication between a demodulation module and a video processing system-on-chip (SoC). The MTSIF may enable concurrent demodulation of a plurality of input modulated video streams, via a plurality of demodulator chips within the demodulation module, by multiplexing data generated by the demodulator chips via the MTSIF during communication between the demodulator module and the video processing SoC. The MTSIF may also be utilized for communicating control signals, which may be used in controlling and/or managing operations of the demodulation module, the video processing SoC, and/or the MTSIF. Communication via the MTSIF may be synchronized. Packets communicated via the MTSIF may be timestamped. Timestamp counters may be used in the demodulation module and the video processing SoC to generate and/or track timestamps in communicated packets. The timestamp counter may be synchronized, using control signals communicated via the MTSIF. | 2013-11-21 |
20130312054 | Transport Layer Security Traffic Control Using Service Name Identification - Traffic control techniques are provided for intercepting an initial message in a handshaking procedure for a secure communication between a first device and a second device at a proxy device. Identification information associated with the second device is extracted from the initial message. A policy is applied to communications between the first device and second device based on the identification information. | 2013-11-21 |
20130312055 | SECURITY MANAGEMENT DEVICE AND METHOD - In a case where a master virtual machine, which is constructed on the basis of master information for configuring either part or all of a virtual machine, and an individual virtual machine, which is constructed on the basis of individual information that is configured partially or entirely in accordance with the master information, exist as the types of virtual machines that a physical client provides to a user terminal, a security check of a plurality of virtual machines is selectively executed, with respect to each check item, for a virtual machine of the type corresponding to the contents of the check item. | 2013-11-21 |
20130312056 | Zone-Based Firewall Policy Model for a Virtualized Data Center - Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security management zone for a virtual firewall policy comprising one or more common attributes of applications associated with the security zone. Information representing a firewall rule for the security zone is defined and comprises first conditions for matching common attributes of applications associated with the security zone and an action to be performed on application traffic. Parameters associated with the application traffic are received that are associated with properly provisioned virtual machines. A determination is made whether the application traffic parameters satisfy the conditions of the firewall rule and in response to determining that the conditions are satisfied, the action is performed. | 2013-11-21 |
20130312057 | Functionality Management via Application Modification - Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed. | 2013-11-21 |
20130312058 | SYSTEMS AND METHODS FOR ENHANCING MOBILE SECURITY VIA ASPECT ORIENTED PROGRAMMING - Methods and systems described herein relate to enhancing security on a mobile device. A method for enhancing mobile device security includes applying a security policy to process code by an aspect-oriented program. | 2013-11-21 |
20130312059 | RECEIVING DEVICE, TRANSMITTING DEVICE, BROADCASTING SYSTEM, RECEIVING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A receiving device includes: an output unit configured to output content broadcast from a transmitting device; an application execution unit configured to execute an application; a security policy acquiring unit configured to acquire security policy level data sent from the transmitting device with respect to the application, the security policy level data indicating a sorted level of the application; a policy level acquiring unit configured to acquire policy level data sent from the transmitting device with respect to currently broadcast content, the policy level data indicating a sorted level of the currently broadcast content; a determining unit configured to determine whether or not the application is an application to be controlled, based on the policy level data acquired by the policy level acquiring unit and the security policy data of the application acquired by the security policy acquiring unit; and an application control unit configured to instruct the application execution unit to control the application determined to be the application to be controlled. | 2013-11-21 |
20130312060 | Creating an Access Control Policy Based on Consumer Privacy Preferences - A system for generating an access control policy comprises a user interface ( | 2013-11-21 |
20130312061 | COMPUTER READABLE STORAGE MEDIA FOR MULTI-FACTOR AUTHENTICATION AND METHODS AND SYSTEMS UTILIZING SAME - Systems and methods for providing multi-factor authentication are discloses herein. A method for multi-factor authentication may include a step for receiving an authentication window request from an electronic device. The authentication window request may be configured to identify a user. The method may further include enabling an authentication window responsive, at least in part, to receipt of the authentication window request. The method may further include receiving a login verification request from an application server. The method may further include providing a response to the application server responsive, at least in part, to receiving the login verification request. The response may indicate whether the user may be selectively authenticated. | 2013-11-21 |
20130312062 | COMMUNICATION DEVICE, COMMUNICATION METHOD, COMPUTER PROGRAM, AND COMMUNICATION SYSTEM - There is provided a communication device including a communication unit configured to include different communication modes, and an information exchange unit configured to exchange, before the communication unit transmits information to a transmission destination device, an available communication mode and authentication information in advance with the transmission destination device using a communication mode included in the communication unit, the authentication information being used when communication is performed using the communication mode. | 2013-11-21 |
20130312063 | SECURE NETWORK CONNECTION - The invention provides for a method for use in a mobile radio communications network connection procedure and including the step of rejecting at a mobile radio communications device a handover request from a network responsive to determination of support of the security algorithm associated with the handover, and for a mobile radio communications device arranged to determine support of security algorithms as proposed by the network, preferably at AS level, within a handover command, and to provide notification to the network of rejection of the connection due to non-support of the algorithm. | 2013-11-21 |
20130312064 | PROGRAM EXECUTION DEVICE - A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program. | 2013-11-21 |
20130312065 | METHOD, SYSTEM AND APPARATUS FOR A COMMUNICATIONS CLIENT PROGRAM AND AN ASSOCIATED TRANSFER SERVER FOR ONYMOUS AND SECURE COMMUNICATIONS - The present invention provides a communications client program and an associated transfer server for onymous and secure communications over the interne. The communications client program is used for electronically sending and receiving mail items and for conducting realtime audio and video communications in a secure manner. A mail item is any item of correspondence that bears an addressee's street address (i.e. number, street, suburb, state and post code) or an advertising item that does not necessarily bear an addressee, but includes nominations for preferred destinations. | 2013-11-21 |
20130312066 | MOBILE DEVICE ACCESS FOR MEDICAL DEVICES - Methods for controlling a medical device using a software application on a mobile device are provided. In one aspect, a method includes receiving a request from the software application on the mobile device to open a communications channel for at least one of audio communication or text-based communication, and sending from the server an instruction to the medical device based on the request. The method also includes providing to the software application on the mobile device for display a result of the instruction. Systems, graphical user interfaces, and machine-readable media are also provided. | 2013-11-21 |
20130312067 | DEVICE, METHOD, AND RECORDING MEDIUM - A device includes a memory which stores a program, and a processor which executes, based on the program, a procedure comprising establishing a session with a request source when a request for a service, made to a second providing source, has been received from the request source, the second providing source providing the service based on data stored in a first providing source; and when an inquiry about whether to transmit the data to the second providing source has been received from the first providing source, notifying, so as to encrypt a mask range of the data, the first providing source of session information indicating the session established with the request source and notifying the request source of the session information so as to decrypt the encrypted mask range of data based on the session information. | 2013-11-21 |
20130312068 | SYSTEMS AND METHODS FOR ADMINISTRATING ACCESS IN AN ON-DEMAND COMPUTING ENVIRONMENT - A system is provided for managing protected data resources. The system includes a resource server configured to store the protected data resources and an authorization module coupled to the resource server and configured to store access protocols. The authorization module further is configured to receive a service request from a user via a client module, evaluate the service request based on the access protocols, and send an access token to the client module if the user satisfies the access protocols. | 2013-11-21 |
20130312069 | MULTIPLE AUTHENTICATION SUPPORT IN A SHARED ENVIRONMENT - An authentication configurator may define a LDAP security group for LDAP authentication, wherein the LDAP security group is associated with rights. It may define a native security group for native authentication users, wherein the native authentication group has at least one right not present in the LDAP security group, and define customer-specified LDAP chains. It may configure an LDAP authentication web application and a native authentication web application, wherein the LDAP authentication web application and the native authentication web application each connect to a service management database, and the LDAP authentication web application uses the customer-specified LDAP chains. A first Uniform Resource Locator (URL) for LDAP authentication to access the LDAP authentication web application and a second URL for native authentication to access the native authentication web application may also be configured. It may assess the authentication requirements of a customer and create a user identifier, responsive to assessing. | 2013-11-21 |
20130312070 | METHOD AND APPARATUS FOR A MULTI-PARTY CAPTCHA - In accordance with an example embodiment of the present invention, a method comprising: receiving at least one request for generating a challenge from at least one device; generating the challenge with at least two components; transmitting component of the challenge to the at least one device; causing presentation of at least part of the challenge to at least two users; causing communication between said at least two users; and receiving at least two responses to the challenge from the at least one device. Related apparatus and computer program product are also described. | 2013-11-21 |
20130312071 | METHOD AND SYSTEM FOR INITIATING SECURE TRANSACTIONS WITHIN A DEFINED GEOGRAPHIC REGION - An approach for enabling contextual categories to be associated and scored in connection with a defined geographic region is described. A transient services platform establishes, based on biometric authentication of a user, a limited session for completing a transaction. The transient services platform then determines, based on a defined geographic region, a context to associate with the transaction. Credentials associated with the user are transferred to the transaction agent based on the authentication and the determined context. | 2013-11-21 |
20130312072 | METHOD FOR ESTABLISHING SECURE COMMUNICATION BETWEEN NODES IN A NETWORK, NETWORK NODE, KEY MANAGER, INSTALLATION DEVICE AND COMPUTER PROGRAM PRODUCT - According to an aspect of the invention, a method for establishing secure communication between nodes in a network is conceived, wherein the network comprises a key manager which accommodates a key-manager-specific public key and a corresponding key-manager-specific private key; wherein a copy of the key-manager-specific public key is stored in an installation device; wherein the installation device provides a new node with the copy of the key-manager-specific public key; and wherein said new node is registered with the key manager by providing a node-specific public key and an identifier of said new node to the key manager, such that other nodes in the network may setup end-to-end secure connections with said new node by requesting the node-specific public key of said new node from the key manager. | 2013-11-21 |
20130312073 | METHODS AND SYSTEMS FOR AUTHENTICATION OF MULTIPLE SIGN-IN ACCOUNTS - Provided are systems and methods for authentication multiple sign-in accounts using physical authentication information submitted by user devices to authentication servers for accessing these accounts. A user device may be equipped with or coupled to a reader capable of collecting physical authentication information available on a magnetic strip, near field communication tag, and other devices. This information may be requested by an authentication server or application server. The physical authentication information may be combined with knowledge based information, such as a password, and transmitted to the authentication server for validation. The same authentication information may be used for signing-in to different application servers. The authentication server then validates this information based on user information previously provided to the server and stored in its database. The validation result is provided to the application server, which determines whether to provide access to the user device based on the validation result. | 2013-11-21 |
20130312074 | ESTABLISHING VIRTUAL PRIVATE NETWORK SESSION USING ROAMING CREDENTIALS - Providing virtual private network (VPN) sessions or other types of secure or private access to data when a client authorized to access the data travels or otherwise roams from a home network to a partner network is contemplated. The VPN session may be established as part of or as a result of an authentication process undertaken by the client when gaining access to the partner network, such as but not necessarily limited to a home network authentication process undertaken at the partner network to authenticate the client to access partner network services. | 2013-11-21 |
20130312075 | WEB BASED SYSTEM THAT ALLOWS USERS TO LOG INTO WEBSITES WITHOUT ENTERING USERNAME AND PASSWORD INFORMATION - Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising a master username and password. An access component can enable the user to access a plurality of password protected websites from a web browser or non-browser software application resident on the user's computing device when the user logs into the master account by entering the valid master username and password. A selection component can log the user into a website of the plurality of password protected websites when the user selects a hyperlink associated with the website, selects a linked image associated with the website, or selects the website from a pulldown list contained in a toolbar of a web browser. A display component can open a web browser or tab associated with the website. | 2013-11-21 |
20130312076 | DEVICE AND METHOD FOR PROVIDING AUTHENTICATED ACCESS TO INTERNET BASED SERVICES AND APPLICATIONS - Device for providing an authenticated access to the Internet based services, which is remarkable in that it comprises a unified identity management system ( | 2013-11-21 |
20130312077 | USER AUTHENTICATION - A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing system enables a security manager software application and connects the specified software application to a computing apparatus. The computing system executes first security functions associated with the computing apparatus. The computing system executes second security functions associated with additional computing apparatuses. The computing system determines if the user may access the specified functions executed by the specified software application based on results of executing the first security functions and the second security functions. The computing system generates and stores a report indicating the results. | 2013-11-21 |
20130312078 | SYSTEM AND METHOD FOR EMBEDDED AUTHENTICATION - Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface. | 2013-11-21 |
20130312079 | WEB-CENTRIC AUTHENTICATION PROTOCOL - Systems and methods are disclosed for providing a Web-centric authentication protocol. In one implementation, a processing device receives a user request to access a protected resource and determines that a digital certificate for accessing the protected resource is not stored locally. A processing device requests a first digital certificate from an authentication service. A processing device receives the first certificate from the authentication service. A processing device receives a certificate request from the authentication service. A processing device provides the first digital certificate to the authentication service in response to the certificate request. A processing device receives a second digital certificate from the authentication service. A processing device accesses the protected resource using the second digital certificate. | 2013-11-21 |
20130312080 | System and Method for Providing a Secure Network on Another Secure Network - The present invention provides a system and method for providing a closed or secure network on another closed or secure network. The system enables linking at least one acquirer network operating a closed network to at least one operator by a central server. The acquirer network includes one or more terminals and optionally an acquirer server. The central server is linked to the acquirer network and to the operator. The central server is configurable to communicate with at least a subset of the one or more terminals, and also with the operator, and to establish one or more serve; communication links between the operator and the one or more terminals. The central server acts as a trusted intermediary between the acquirer network and the operator for enabling the operator to communicate with the one or more terminals via the closed acquirer network. | 2013-11-21 |
20130312081 | MALICIOUS CODE BLOCKING SYSTEM - Disclosed is a malicious code blocking system including: a fake website detector that repeatedly accesses a website to be monitored to detect an attack, stores a detection log of the attacked site, and provides a URL address of the attacked site or server; a malicious URL storage that temporarily stores a URL address of the attacked site or server and stores a status flag indicating whether or not a malicious URL list containing information on malicious URLs changes; and a URL filter associated with a user terminal to monitor a network packet transmitted or received by the user terminal, check whether or not the status flag changes in a case where DNS query request for visiting a specific site is generated, and update a malicious URL list containing information on a malicious URL based on information stored in the malicious URL storage if the status flag changes. | 2013-11-21 |
20130312082 | COMMUNICATION METHOD, NODE, AND NETWORK SYSTEM - A communication method executed by a node in an ad hoc network having multiple nodes, includes receiving from a neighboring node of the node in the ad hoc network, a first packet that includes a sender address of the neighboring node and a first packet transmission count of packet transmissions from the neighboring node; extracting the first packet transmission count from the first packet; receiving from the neighboring node and after reception of the first packet, a second packet that includes the sender address of the neighboring node and a second packet transmission count of packet transmissions from the neighboring node; extracting the second packet transmission count from the second packet; determining whether the second packet is an invalid packet, based on the first packet transmission count and the second packet transmission count; and discarding the second packet upon determining the second packet to be an invalid packet. | 2013-11-21 |
20130312083 | LOCKABLE WIDGETS ON A MOBILE DEVICE - A software widget running on a user device may be designed to operate in a locked or an unlocked mode. In unlocked mode, the user has full interactivity with the widget. In locked mode, however, at least some of the interactivity with the widget is restricted, despite the fact that the widget still operates normally otherwise while in the locked mode. While in locked mode, user input may be compared against a predefined unlocking sequence to determine if the widget should be unlocked. | 2013-11-21 |
20130312084 | METHOD AND SYSTEM FOR ASSESSING CUMULATIVE ACCESS ENTITLEMENTS OF AN ENTITY IN A SYSTEM - A method and system is provided for assessing the cumulative set of access entitlements to which an entity, of an information system, may be implicitly or explicitly authorized, by virtue of the universe of authorization intent specifications that exist across that information system, or a specified subset thereof, that specify access for that entity or for any entity collectives with which that entity may be directly or transitively affiliated. The effective system-level access granted to the user based upon operating system rules or according to access check methodologies is determined and mapped to administrative tasks to arrive at the cumulative set of access entitlements authorized for the user. | 2013-11-21 |
20130312085 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, there is provided is an information processing apparatus including: a storage unit that stores therein information, which is set for a screen to be displayed on an information display unit, as to whether or not to permit an external input device to enter data to the information processing apparatus, and information as to whether or not to permit data entered from an external input device; an external-input-unit control unit that controls data entry to the screen from an external input device by utilizing information about a type of the external input unit and the information as to whether or not to permit the external input unit to enter data; and an input-key control unit that controls the data entry permitted by the external-input-unit control unit by consulting the information as to whether or not to permit data entered from the external input unit. | 2013-11-21 |
20130312086 | IDENTITY VERIFICATION IN VIRTUAL WORLDS USING ENCODED DATA - An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted. | 2013-11-21 |
20130312087 | PERSONAL AUTHENTICATIONS ON COMPUTING DEVICES - A computer device receives a personal authentication statement from a user seeking to access concealed computer objects or applications on the computer device. A parser syntactically parses the personal authentication statement to extract a user-authentication token and a computer objects-authentication token. The computer objects-authentication token can identify one or more concealed computer objects on the computer device. The computer device reveals the one or more concealed computer objects to the user upon authentication of the user and verification that the authenticated user is authorized to access the concealed computer objects. | 2013-11-21 |
20130312088 | ELECTRONIC DEVICE AND METHOD FOR MANAGING ACCOUNTS AND PASSWORDS OF APPLICATION SYSTEMS - In a method for managing accounts and passwords of an application system using an electronic device, the method controls a fingerprint recognizing unit of the electronic device to capture a second fingerprint if a first fingerprint is stored in a storage device of the electronic device, and displays a login interface of the application system on a display screen of the computing device if the second fingerprint is the same with the first fingerprint. The method obtains the account and password of the application system from the storage device if the account and password of the application system is stored in the storage device, and inputs the account and password into two inputting boxes of the login interface of the application system. | 2013-11-21 |
20130312089 | APPARATUS FOR WAKING UP A SYSTEM AND THE COMPUTER SYSTEM USING THE SAME - An apparatus for waking up a computer system is disclosed. The apparatus is electrically coupled to a south bridge, or a Platform Controller Hub (PCH), having a first USB host interface. The apparatus comprises: a second USB host interface; a switch element, for electrically coupling a USB keyboard to either the first USB host interface or the second USB host interface; a control element, electrically coupled to the second USB host interface and the switch element; and a wake-up element, electrically coupled to the control element, wherein when the computer system enters a suspend-to-ram mode, a suspend-to-disk mode or a shutdown mode, the control element controls the switch element to electrically couple the USB keyboard to the second USB host interface; wherein when a user inputs a password, the second USB host interface receives the password and transfers it to the control element, and if the password matches the predetermined password, the control element wakes up the computer system and controls the switch element to electrically couple the USB keyboard to the first USB host interface. | 2013-11-21 |
20130312090 | METHODS AND SYSTEMS OF AUTHENTICATION - A method of authentication is provided that includes capturing palm biometric data from an individual, transmitting the biometric data to an authentication system, and generating an authentication biometric template from the captured biometric data with the authentication system. Moreover, the method includes conducting a plurality of verification matching transactions between the authentication biometric template and enrollment biometric templates stored in the authentication system, and between the authentication biometric template and imposter biometric templates stored in the authentication system. Furthermore, the method includes updating a genuine matching score distribution with at least one genuine matching score, updating an imposter matching score distribution with at least one imposter matching score, and calculating a maximum genuine matching score and a minimum imposter matching score. Additionally, the method includes confirming an identity of the individual when the minimum imposter matching score is greater than the maximum genuine matching score. | 2013-11-21 |
20130312091 | System for Authenticating a User to a Portable Electronic Device Using an Authentication Token Transmitted to a Smart Card Reader - A system includes a mobile unit and a smart card reader. The mobile unit includes a security application that prevents access to functionalities and data stored thereon and further includes an authentication application that securely stores an authentication token. The smart card reader communicatively connects to a smart card. The smart card includes authentication data. The authentication application transmits the authentication token to the smart card reader to verify the smart card. The authentication application shares the authentication token with the security application when the verification is successful. The authentication token indicates to the security application to grant access to the functionalities and the data. | 2013-11-21 |
20130312092 | SYSTEM AND METHOD FOR FORENSIC CYBER ADVERSARY PROFILING, ATTRIBUTION AND ATTACK IDENTIFICATION - A system and method is provided for identifying and analyzing cyber-attacks and profiling adversaries responsible for such attacks. The system and method allows for the quantitative measurement of adversary attack behavior. The system and method is able to extract quantitative data from raw attack data and compare the quantitative data to a database of quantifiable metrics associated with known adversaries. This allows for the possible linking of a cyber-attack to a known adversary or known adversary behavior. | 2013-11-21 |
20130312093 | Foiling a Document Exploit Attack - A method of foiling a document exploit type attack on a computer, where the attack attempts to extract malware code from within a document stored on the computer. The method includes monitoring the computer in order to detect repeated function calls made by a given process in respect of the same function but different file descriptors; and in the event that such repeated function calls are detected or the number of such repeated function calls exceeds some threshold, terminating the process that initiated the function calls. | 2013-11-21 |
20130312094 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MEASURING DETECTION ACCURACY OF A SECURITY DEVICE USING BENIGN TRAFFIC - Methods, systems, and computer readable media for measuring detection accuracy of a security device using benign traffic are disclosed. According to one method, the method occurs at an Internet protocol (IP) traffic simulator having a first communications interface and a second communications interface. The method includes sending, by the first communications interface, a plurality of benign data packets to a security device, wherein the plurality of benign data packets is engineered to be similar to one or more malicious data packets. The method also includes receiving, by the second communications interface, zero or more of the plurality of benign data packets via the security device. The method further includes determining, using statistics associated with the plurality of benign data packets, a detection accuracy metric associated with the security device. | 2013-11-21 |
20130312095 | IDENTIFYING ROOTKITS BASED ON ACCESS PERMISSIONS - A method for monitoring for malware includes, during a boot process on an electronic device, determining a portion of memory, determining that the portion of memory is reserved for exclusive access by an entity on the electronic device, and, based on the determination that a portion of memory is reserved for exclusive access during the boot process, determining that the reservation is indicative of malware. | 2013-11-21 |
20130312096 | ON-DEMAND DATA SCAN IN A VIRTUAL MACHINE - A system is provided to facilitate on-demand data scan operation in a guest virtual machine. During operation, the system generates an on-demand scan request at a scanning virtual machine, wherein the request specifies a scope for the on-demand scan. The system communicates the on-demand scan request to the guest virtual machine and receives data from the guest virtual machine in response to the request. The system identifies the data as candidate for on-demand scanning and scans the data in furtherance of a security or data integrity objective. | 2013-11-21 |
20130312097 | DETECTING MALICIOUS RESOURCES IN A NETWORK BASED UPON ACTIVE CLIENT REPUTATION MONITORING - Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one embodiment, a method is performed for client reputation monitoring. A monitoring unit within a network observes activities relating to multiple monitored devices within the network. For each observed activity, the monitoring unit assigns a score to the observed activity based upon a policy of multiple polices established within the monitoring unit. For each of the monitored devices, the monitoring unit maintains a current reputation score for the monitored device based upon the score and a historical score associated with the monitored device. The monitoring unit classifies one of the monitored devices as potentially being a malicious resource based upon its current reputation score. | 2013-11-21 |
20130312098 | NEGATIVE LIGHT-WEIGHT RULES - A method for securing an electronic device includes, at a level below all of the operating systems of an electronic device, trapping a first attempt and second attempt to access sensitive system resources of the electronic device. The method also includes identifying the first attempt and second attempt as representing a potential malware attack, comparing the sequence of the first attempt and second attempt against a first anti-malware rule, and, based on the comparison of the sequence of the first attempt and second attempt against the first anti-malware rule, allowing the second attempt. The first attempt and second attempt originate from code of the same operating entity. The first anti-malware rule includes a requirement of a sequence of attempts including the first attempt followed by the second attempt. | 2013-11-21 |
20130312099 | Realtime Kernel Object Table and Type Protection - A method for detecting malware includes determining one or more object-oriented components of an electronic device, trapping at a level below all of the operating systems of the electronic device an attempt to access an object-oriented component of the electronic device, determining an entity causing the attempt, accessing one or more security rules, and, based on the security rules, the entity causing the attempt, and the object-oriented component, determining whether the attempted access is indicative of malware. | 2013-11-21 |
20130312100 | ELECTRONIC DEVICE WITH VIRUS PREVENTION FUNCTION AND VIRUS PREVENTION METHOD THEREOF - In a virus prevention method of an electronic device, executable files that are being installed in the electronic device are compared with the virus characteristics in virus database of the electronic device. The electronic device communicates with a server through a network, and a virus database and a suspected virus database of the server are accessed when one or more suspected files are determined. The one or more suspected files are compared with virus characteristics of virus samples in the virus database and non-viral characteristic of non-virus samples in the suspected virus database of the server, so as to determine whether the one or more suspected files are virus files. The determined one or more virus files intruded in the executed files are deleted. | 2013-11-21 |
20130312101 | Method for simulation aided security event management - A method for simulation aided security event management, the method comprises: generating attack simulation information that comprises multiple simulation data items of at least one data item type out of vulnerability instances data items, attack step data items and attack simulation scope data items; wherein the generating of attack simulation information is responsive to a network model, at least one attack starting point and attack action information; identifying security events in response to a correlation between simulation data items and event data; and prioritizing identified security events. | 2013-11-21 |
20130312102 | VERIFYING APPLICATION SECURITY VULNERABILITIES - Verifying application security vulnerabilities includes receiving a source code to analyze, performing a static analysis using the received source code and generating a vulnerability call trace for the received source code. Responsive to a determination that all static analysis results are not validated, mock objects are generated using the vulnerability call trace and a unit test is created using the generated mock objects. The unit test is executed using the generated mock objects and responsive to a determination that an identified vulnerability was validated; a next static analysis result is selected. Responsive to a determination that all static analysis results are validated, results and computed unit tests are reported. | 2013-11-21 |
20130312103 | DETECTING EXPLOITABLE BUGS IN BINARY CODE - Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level. | 2013-11-21 |
20130312104 | METHODS AND APPARATUS PROVIDING AUTOMATIC SIGNATURE GENERATION AND ENFORCEMENT - A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack. | 2013-11-21 |
20130312105 | CLASSIFICATION OF AN ELECTRONIC DOCUMENT - A computer receives an electronic document that includes a group of terms. The computer sends the electronic document to an information extraction program that extracts specific terms from the group of terms. Each of the specific terms that match to a certain extent with one of the attribute values in an electronic dictionary is identified. A value associated with the electronic document is generated based on the specific terms that match, and on an end-user that is attempting to access the electronic document. | 2013-11-21 |
20130312106 | Selective Remote Wipe - Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one or more rules to create a hierarchical virtualization of the several data storage devices. The virtualization may then be provided to the user as a single, hierarchical file system. Further, a monitoring system may monitor the file system to determine if any new applications have been installed or if applications are currently being executed. If a connection is made to a secure network, the system may provide the information derived from the monitoring to the secure network. The secure network can then analyze the information to determine if any of the applications should be uninstalled from the device or should be stopped while the device is connected to the network. | 2013-11-21 |
20130312107 | CLASSIFICATION OF AN ELECTRONIC DOCUMENT - A computer receives an electronic document that includes a group of terms. The computer sends the electronic document to an information extraction program that extracts specific terms from the group of terms. Each of the specific terms that match to a certain extent with one of the attribute values in an electronic dictionary is identified. A value associated with the electronic document is generated based on the specific terms that match, and on an end-user that is attempting to access the electronic document. | 2013-11-21 |
20130312108 | ANONYMOUS PERSONALIZED RECOMMENDATION METHOD - A computer-implemented method for an anonymous personalized recommendation is provided. The method includes receiving select server fingerprints selected from server fingerprints based on predetermined metrics. The server fingerprints correspond to a plurality of public entities and each server fingerprint includes encoded information about a corresponding public entity. The method also includes generating a user fingerprint based on user information associated with a user, the user fingerprint comprising encoded user information. The method further includes comparing the user fingerprint with the select server fingerprints to select a server fingerprint for recommendation, generating a recommendation of a public entity corresponding to the server fingerprint for recommendation, and displaying the recommendation. Systems and machine-readable media are also provided. | 2013-11-21 |
20130312109 | SECURING SENSITIVE DATA FOR CLOUD COMPUTING - A method and associated system for securing sensitive data in a cloud computing environment. A system has proprietary data as a record stored in a database. The system associates a hashing directive with the record prior to sending the data out to a cloud for computing services. The hashing directive classifies each data field of the record into sensitive and transactional. The hashing directive controls a mode of hashing, either one-way hashing or two-way hashing for each sensitive data field associated with the hashing directive. A cloud receives the record secured according to the hashing directive and process the record to generate a result value for a cloud process result field of the record. The system reconstitutes the record the record according to the mode of hashing indicated in the hashing directive. | 2013-11-21 |
20130312110 | PROTECTION OF APPLETS AGAINST HIDDEN-CHANNEL ANALYSES - The invention relates in particular to an electronic device equipped with a virtual machine for executing an applet. The virtual machine is arranged so as to recognize the instructions of the applet and to execute a code corresponding to each instruction. The virtual machine comprises an association module arranged so as to associate several distinct but operationally identical codes with one and the same instruction, and a selection module arranged so as to select the code to be executed for said instruction in a random manner. The invention also relates to a method of securing a counter-electronic device against hidden-channel attacks. | 2013-11-21 |
20130312111 | EMBEDDING SUPPLEMENTAL CONSUMER DATA - Embodiments of the invention broadly described, introduce systems and methods for combining multiple field values into a normalized value, generating codes using the normalized value, and using the codes as activation codes. One embodiment of the invention discloses a computer-implemented method for generating a code. The method comprises receiving a plurality of field values associated with a set of fields, each of the fields being associated with a field radix, converting the field values into numeric field values, combining, by a processor, numeric field values, each associated with a field, each of the fields associated with a field radix, to generate a normalized value, and generating, by the processor, a code representative of the plurality of field values using the normalized value. | 2013-11-21 |
20130312112 | LICENSING PROTECTED WORKS WITHIN ELECTRONIC INFORMATION NETWORKS - License information, including a license identifier (if present) is associated with a protected work that is published within an electronic information network. The license information indicates a purported license to publish the protected work. The license information may be audited by or on behalf of a licensing entity to determine whether the purported license is a valid license. The protected work may take the form of a protected audio work included within an audio component of a composite media content item that further includes a video component. Publication of a protected work may be granted or denied, access to the protected work may be enabled or blocked, and/or a beneficiary of revenue generated from publication of the protected work may be redirected based on a result of the audit. | 2013-11-21 |
20130312113 | Region-Based Sharing of Pictures - An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting. | 2013-11-21 |
20130312114 | Region-Based Sharing of Pictures - An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting. | 2013-11-21 |
20130312115 | HUMAN-AUTHORIZED TRUST SERVICE - A method for authorizing access to data within a system is disclosed herein. The method includes authenticating a first trusted user identity corresponding to a first individual and granting that first trusted user identity a trust assertion privilege. The method then calls for transmitting an invitation to a second individual, the invitation including a trust assertion from said first user, and receiving and authenticating a second trusted user identity corresponding to said second individual. The trust assertion is dependent on a subjective decision by the first user to trust the second user. Next, a trust relationship between said first and second trusted user identities is recorded. | 2013-11-21 |
20130312116 | SOCIAL NETWORK SYSTEM FOR RESOURCE SHARING, AND METHOD FOR THE ESTABLISHMENT AND MAINTENANCE OF SAME - A social network system for resource sharing, and a method for the establishment and maintenance of same are provided. According to the present invention, the social network system for resource sharing includes: a plurality of entities constituting a social network; a sharing resource owned by at least one entity of the plurality of entities; a trust strength for representing the degree of trust in a relationship, which is formed in a unilateral or bilateral way between each of the entities in order to share the resource; and a communication protocol for sharing the resource among the plurality of entities. The trust strength is classified into a plurality of classes. Each of the entities grants a different access right to another entity according to each of the classes. | 2013-11-21 |
20130312117 | Systems and Methods for Providing and Managing Distributed Enclaves - A method for operating a distributed data management and control enclave comprises providing a policy that identifies a set of data to be managed and controlled. The policy further identifies devices upon which the data may be transferred and the conditions under which that data may be transferred to the identified devices. A first data management and control system to be used on a first device is then defined in the policy. A second management and control system to be used on a second device is then defined in the policy. The second data management and control system can be distinct from the first data management and control system. The specified data management and control system is then instantiated on a device. The specified data management and control system is then used to manage and control data on the device in accordance with the policy. | 2013-11-21 |
20130312118 | DEVICE MANAGING APPARATUS, DEVICE MANAGING SYSTEM, AND RECORDING MEDIUM STORING A SOFTWARE MANAGEMENT PROGRAM - A device managing apparatus for managing software installed in at least one device includes a determination unit configured to determine whether a software item to be installed in the device requires license validation; a validation unit configured to perform a license validation operation on the software item for which the determination unit determines that license validation is required, depending on an available license for the software item; and a setting unit configured to set a license issued by the validation unit in the device in which the software item is installed. | 2013-11-21 |
20130312119 | METHOD TO DETECT CLONED SOFTWARE - Method to detect a cloned software to be used on a client user unit communicating with a server for requesting a service by sending a request from the user unit to the server, the latter being connected to a database comprising client records, each of these records comprising at least a tag value (t | 2013-11-21 |
20130312120 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED RECORDING OF MEDIA CONTENT ON AN APPLE OPERATING SYSTEM - A method for preventing unauthorized recording of media content on an Apple operating system (OS). The present method registers a compliance mechanism on a client system having the Apple OS operating thereon. The compliance mechanism comprises a framework for validating the compliance mechanism on the client system, and a multimedia component opened by the framework. The present method uses the multimedia component for decrypting the media content on the client system. The present method also prevents decryption of the media content on the client system having the Apple OS operating thereon if a portion of the compliance mechanism is invalidated. | 2013-11-21 |
20130312121 | NON-AUTHENTIC DISC DEACTIVATION METHOD - An optical disc undergoes authentication by reading a designated area on the optical disc containing authentication data. Following authentication, the designated area undergoes irradiation by the laser beam that reads the optical disc to erase recordable sectors in the designated area when the optical disc comprises a recordable disc to render unreadable data contained in the designated area for disc authentication. | 2013-11-21 |
20130312122 | TAMPER DETECTOR FOR SECURE MODULE - A tamper detector has input and output pins for connection to ends of a tamper detection circuit, and a corresponding set of linear feedback shift registers (LFSRs) timed by clock signals for generating pseudo-random coded detection signals as a function of seed values and of a generator polynomial defined by feedback taps. A comparator compares signals received from the detection circuit with the coded detection signals. A multiplexer provides the coded detection signal selectively from the LFSRs to the output pin and the comparator. A controller varies the seed values for different cycles of values of the pseudo-random coded detection signals. The controller also controls the generator polynomial and a frequency of the clock signals for different cycles of values of the pseudo-random coded detection signals. | 2013-11-21 |
20130312123 | EMBEDDED MULTIMEDIACARD AND ELECTRONIC DEVICE USING THE SAME, AND ENERGINING BOARD FOR EMBEDDED MULTIMEDIACARD - An embedded MultiMediaCard (eMMC), an electronic device equipped with an eMMC and an eMMC engineering board are disclosed. The eMMC includes an eMMC substrate plate, a plurality of solder balls and an eMMC chip. The solder balls are soldered to the eMMC substrate plate, and, one of the solder balls is designed as a security protection enable/disable solder ball. The eMMC chip is bound to the eMMC substrate plate, and, the eMMC chip has a security protection enable/disable pin electrically connected to the security protection enable/disable solder ball. The security protection enable/disable pin is internally pulled high by the eMMC chip when the security protection enable/disable solder ball is floating. When the security protection enable/disable solder ball is coupled to ground, the eMMC is protected from software-based attacks. | 2013-11-21 |
20130312124 | CONTROL AND MONITORING MODULE OF SAFE DEVICES - The invention provides a Control and Monitoring Module internal or external to a Safe Equipment such as: Point of Sale (POS) Terminals, PINPAD Terminals and Encrypted Keyboards, designed and implemented in order to detect current consumption variations of the equipment, thus indicating the presence of undesired circuit inserted in parallel in the original circuit of the Safe Equipment. The Control Module uses electrical current consumption sensors in microprocessor circuits capable of identifying variations in consumption. | 2013-11-21 |
20130312125 | METHOD AND APPARATUS FOR SECURE TRUSTED TIME TECHNIQUES - A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be graded by the frequency and accuracy with which a reliable external time source is available for correction and/or reset, and how trustworthy this external source is in a commercial scenario. The techniques also take into account that the number of different paths and number of hops between the device and the trusted external time source may vary. A local clock related value which is protected by a TPM securely bound to an external clock. A system of Accuracy Statements (AS) is added to introduce time references to the audit data provided by other maybe cheaper sources than the time source providing the initial time. | 2013-11-21 |
20130312126 | Methods and Compositions for RNAi Mediated Inhibition of Gene Expression in Mammals - Methods and compositions are provided for modulating, e.g., reducing, coding sequence expression in mammals. In the subject methods, an effective amount of an RNAi agent, e.g., an interfering ribonucleic acid (such as an siRNA or shRNA) or a transcription template thereof, e.g., a DNA encoding an shRNA, is administered to a non-embryonic mammal, e.g., via a hydrodynamic administration protocol. Also provided are RNAi agent pharmaceutical preparations for use in the subject methods. The subject methods and compositions find use in a variety of different applications, including academic and therapeutic applications. | 2013-11-21 |
20130312127 | EFFICIENT STERILIZATION OF FISH BY DISRUPTION OF GERM CELL DEVELOPMENT - Methods of disrupting germ cell migration and development in a fish embryo by inducing targeted expression of Sdf-1 a or Lif and disruption of the Sdf-1 a gradient or a Lif signaling pathway in the fish embryo have been developed. Plasmid constructs containing a gene encoding Sdf-1 a or Lif and a gene encoding a signaling sequence for targeted expression of Sdf-1 a or Lif have been generated. The plasmids will be administered to a fish or a population of fish to reproductively sterilize the population with efficacy of up to 100%. Transgenic fish of this invention are reproductively incompetent of genetically contaminating a wild fish population. | 2013-11-21 |
20130312128 | PROMOTER-REGULATED DIFFERENTIATION-DEPENDENT SELF-DELETING CASSETTE - Targeting constructs and methods of using them are provided for differentiation-dependent modification of nucleic acid sequences in cells and in non-human animals. Targeting constructs comprising a promoter operably linked to a recombinase are provided, wherein the promoter drives transcription of the recombinase in an differentiated cell but not an undifferentiated cell. Promoters include Blimp1, Prm1, Gata6, Gata4, Igf2, Lhx2, Lhx5, and Pax3. Targeting constructs with a cassette flanked on both sides by recombinase sites can be removed using a recombinase gene operably linked to a 3′-UTR that comprises a recognition site for an miRNA that is transcribed in undifferentiated cells but not in differentiated cells. The constructs may be included in targeting vectors, and can be used to automatically modify or excise a selection cassette from an ES cell, a non-human embryo, or a non-human animal. | 2013-11-21 |
20130312129 | PROMOTER-REGULATED DIFFERENTIATION-DEPENDENT SELF-DELETING CASSETTE - Targeting constructs and methods of using them are provided for differentiation-dependent modification of nucleic acid sequences in cells and in non-human animals. Targeting constructs comprising a promoter operably linked to a recombinase are provided, wherein the promoter drives transcription of the recombinase in an differentiated cell but not an undifferentiated cell. Promoters include Blimp1, Prm1, Gata6, Gata4, Igf2, Lhx2, Lhx5, and Pax3. Targeting constructs with a cassette flanked on both sides by recombinase sites can be removed using a recombinase gene operably linked to a 3′-UTR that comprises a recognition site for an miRNA that is transcribed in undifferentiated cells but not in differentiated cells. The constructs may be included in targeting vectors, and can be used to automatically modify or excise a selection cassette from an ES cell, a non-human embryo, or a non-human animal. | 2013-11-21 |
20130312130 | SOMATIC CELL-DERIVED PLURIPOTENT CELLS AND METHODS OF USE THEREFOR - Provided are methods for producing a reprogrammed fibroblast or epithelial cell. The methods include growing a plurality of fibroblasts or epithelial cells in monolayer culture to confluency; and disrupting the monolayer culture to place at least a fraction of the plurality of fibroblasts or epithelial cells into suspension culture under conditions sufficient to form one or more embryoid body-like spheres, wherein the one or more embryoid body-like spheres comprise one or more reprogrammed fibroblasts or epithelial cells that express one or more markers not expressed prior to the disrupting step. Also provided are reprogrammed fibroblasts or epithelial cells produced by the disclosed methods, formulations that include reprogrammed fibroblasts or epithelial cells, methods for using the reprogrammed fibroblasts or epithelial cells, methods for producing chimeric non-human mammals that include one or more sphere-induced Pluripotent Cells (siPS), and chimeric non-human mammals produced thereby. | 2013-11-21 |
20130312131 | TOMATO HYBRID PX 02490003 AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid PX 02490003 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02490003 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-11-21 |
20130312132 | PEPPER HYBRID DRP 1630 - The invention provides seed and plants of pepper hybrid DRP 1630 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid DRP 1630 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-11-21 |
20130312133 | PEPPER HYBRID PS 16375253 - The invention provides seed and plants of pepper hybrid PS 16375253 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PS 16375253 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-11-21 |
20130312134 | WHITE HONEYDEW MELON - The invention relates to the field of | 2013-11-21 |
20130312135 | SQUASH HYBRID ZGNEHH6009 AND PARENTS THEREOF - The invention provides seed and plants of squash hybrid ZGNEHH6009 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of squash hybrid ZGNEHH6009 and the parent lines thereof, and to methods for producing a squash plant produced by crossing such plants with themselves or with another squash plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-11-21 |
20130312136 | Methods and Compositions for Modulating Gene Expression in Plants - The invention provides nucleotide sequences that can be used in operable association with a promoter to express a polynucleotide of interest in a plant, plant part or plant cell. Also provided are methods of increasing or decreasing the expression of a nucleotide sequence of interest in a plant, plant part or plant cell in response to nitrate, drought and/or rehydration. | 2013-11-21 |
20130312137 | INDUCIBLE PROMOTER SEQUENCES FOR REGULATED EXPRESSION AND METHODS OF USE - The plant promoter of a CBSU-Anther_Subtraction library (CAS1) gene encoding a mannitol dehydrogenase, and fragments thereof, and their use in promoting the expression of one or more heterologous nucleic acid fragments in an inducible manner in plants are described. These promoter fragments are also useful in creating recombinant DNA constructs comprising nucleic acid sequences encoding a desired gene product operably linked to such promoter fragments which can be utilized to transform plants and bring the expression of the gene product under external chemical and/or heat control in monocotyledonous and dicotyledonous plants. | 2013-11-21 |