51st week of 2011 patent applcation highlights part 66 |
Patent application number | Title | Published |
20110314501 | USER-INTERACTIVE DISPLAYS INCLUDING DYNAMIC VIDEO MOSAIC ELEMENTS WITH VIRTUAL ZOOM - The present invention teaches a method of creating and presenting a user interface comprising a Dynamic Mosaic Extended Electronic Programming Guide (DMXEPG) using video, audio, special applications, and service dynamic metadata. The system enables television or digital radio service subscribers to select and display of various programs including video, interactive TV applications, or any combination of audio or visual components grouped and presented in accordance with the dynamic program/show metadata, business rules and objectives of service providers, broadcasters, and/or personal subscriber choices, collectively referred to as mosaic element presentation criteria. | 2011-12-22 |
20110314502 | METHOD OF PROVIDING USER-TAILORED ENTERTAINMENT EXPERIENCE AT HOSPITALITY LOCATION AND HOSPITALITY MEDIA SYSTEM THEREOF - A hospitality media system includes a plurality of entertainment devices installed at a hospitality location and a content selector. The content selector is configured to retrieve a plurality of user profiles corresponding to current users of the hospitality location, and automatically adjust content made available on each of the entertainment devices at the hospitality location according to information stored in the user profiles. | 2011-12-22 |
20110314503 | RESOURCE DATA CONFIGURATION FOR MEDIA CONTENT ACCESS SYSTEMS AND METHODS - In one of many possible implementations, a system includes a content delivery subsystem providing online resource data and programming data associated with media content. The system further includes a content processing subsystem configured to communicate with the content delivery subsystem via a network. The content processing subsystem is configured to receive the programming data and to generate a program guide user interface including at least a subset of the programming data. The content processing subsystem is configured to access and utilize the online resource data to generate the program guide user interface when the online resource data is accessible via the network. The content processing subsystem is further configured to maintain and utilize offline resource data instead of the online resource data to generate the program guide user interface when the online resource data is inaccessible via the network. | 2011-12-22 |
20110314504 | RETRIEVING SERVICE PROVIDER INFORMATION AND CHANNEL MAP VIA INTERNET PROTOCOL CONNECTIONS - A digital television (DTV) receiver retrieves, from a memory, a standardized hostname and a standardized filename for a web-based service for providing a channel map associated with service providers. The DTV receiver adds, to the standardized hostname, a name for a particular service provider and sends, to a data server, a request for channel map information, where the request is based on the standardized hostname, the name for the particular service provider, and the standardized filename. The DTV receiver receivers, from the data server, a channel map file based on the standardized filename and extracts information from the channel map file to present to a user. | 2011-12-22 |
20110314505 | SERVER FOR PROVIDING SHARED VOD BROADCASTING SERVICE IN MOBILE NETWORK, RECEPTION TERMINAL, BASE STATION, AND METHOD THEREOF - The present invention relates to a method and apparatus of providing a shared Video on Demand (VoD) broadcasting service using a mobile communication network. The method and apparatus may concurrently provide, to a plurality of terminals requesting a first content, requested content from among broadcasting requested contents selected from a broadcasting content list, thereby effectively using radio resources. | 2011-12-22 |
20110314506 | Point to multi-point wireless video delivery - Point to multi-point wireless video delivery. Among a group of receiver wireless communication devices (RXs), one is designated (e.g., as acknowledgment (ACK) leader). Media delivery operational parameters are selected based on the designated RX or based on all or a subset of the RXs. For simultaneous media delivery to multiple RXs, characteristics associated with the designated RX [or all, or a subset or RXs] govern the manner by which communications are made. Different respective RXs may be designated to serve in this role at different times. Wireless delivery of media (e.g., video signaling, audio signaling, etc.) to a group of RXs is effectuated in accordance with modified multicast signaling with a designated leader (e.g., ACK leader). Among a group of devices, a least successful receiving device that still receives media at an acceptable level may be chosen as the designated leader (e.g., ACK leader). | 2011-12-22 |
20110314507 | REGISTRATION OF A PERSONAL ELECTRONIC DEVICE (PED) WITH AN AIRCRAFT IFE SYSTEM USING AIRCRAFT GENERATED REGISTRATION TOKEN IMAGES AND ASSOCIATED METHODS - A communications system for an aircraft includes an aircraft in-flight entertainment (IFE) system, and at least one personal electronic device (PED) carried by an aircraft passenger. The aircraft IFE system includes an IFE video entertainment source, IFE passenger seat displays, an IFE wireless transceiver, and an IFE controller. The IFE controller is for selectively displaying video from the IFE entertainment source on the IFE passenger seat displays, and for generating a respective registration token image on each IFE passenger seat display. The PED includes a PED optical sensor, a PED wireless transceiver, and a PED controller. The PED controller is for communicating with the IFE wireless transceiver via the PED wireless transceiver based upon the PED optical sensor sensing the registration token image. | 2011-12-22 |
20110314508 | Passive Video Caching for Edge Aggregation Devices - Techniques for delivering video on demand channel content via streaming from a first edge aggregation device are provided. A processor is provided that is coupled to a memory. The processor can be operable to receive a request from a requesting device for video on demand channel content, search an index to locate the video on demand channel content, identify a location of the requesting device with respect to a first edge aggregation device and instruct the first edge aggregation device to forward the video on demand channel content to the location of the requesting device. Other embodiments are described. | 2011-12-22 |
20110314509 | CABLE MODEM AND DOWNSTREAM CHANNEL LOCKING METHOD - A cable modem locks one of downstream channels and receives a plurality of frequency plan descriptors from a cable modem terminal system (CMTS) over the locked downstream channel. Each frequency plan descriptor includes a fragment quantity field, a fragment sequence number field, and a frequency information field. The cable modem determines if the plurality of frequency plan descriptors transmitted by the CMTS are all received according to the fragment quantity field and the fragment sequence number field of one currently received frequency plan descriptor. The cable modem obtains frequency plan of the cable modem configured by the CMTS according to the frequency information fields if the plurality of frequency plan descriptors are all received, and then locks other downstream channels according to the obtained frequency plan. | 2011-12-22 |
20110314510 | SET-TOP BOX AND ENTERTAINMENT SYSTEM USING THE SAME - An entertainment system includes a television and a set-top box. The set-top box is configured to receive television signals, convert the television signals to signals which can be reproduced on the television, and output the converted signals to the television. The set-top box includes a storage unit storing at least one game application and a processing unit configured to run the at least one game application to generate game video/audio signals which are displayed on the television. A related set-top box is also provided. | 2011-12-22 |
20110314511 | Provision of Marked Data Content to User Devices of a Communications Network - The invention refers to a method to be used in a telecommunication network for providing individually marked digital signals (S | 2011-12-22 |
20110314512 | METHODS FOR SECURITY AND MONITORING WITHIN A WORLDWIDE INTEROPERABILITY FOR MICROWAVE ACCESS (WIMAX) NETWORK - A method for security and monitoring within a worldwide interoperability for microwave access (WiMAX) network includes monitoring, by one or more sensors, communications activity on one or more channels; analyzing, by either one or more sensors directly or a server provided with reports of the monitored communication activity for detection of one or more system incidents; and triggering, in response to detection of one or more incidents, an incident notification. | 2011-12-22 |
20110314513 | ROLE POLICY MANAGEMENT - In various embodiments, techniques for role management systems/services are provided. According to an embodiment, a method is provided to allow a role management system to be configured, modified, and restricted. Specific roles assignments may be decorated to be meaningful to an application but which are not generally applicable to an original role specification. A Policy Enforcement Point (PEP) role request response may be modified by an augmentation service, which evaluates a resource association to identify an appropriate resource profile. Resource decorations are identified by the selected profile and are applied to the role request response. | 2011-12-22 |
20110314514 | METHOD AND APPARATUS FOR PROVIDING SCAN CHAIN SECURITY - A scan chain security capability is provided herein. The scan chain security capability enables secure control over normal use of a scan chain of a system, e.g., for purposes such as testing prior to deployment or sale of the system, in-field testing after deployment or sale of the system, in-field modification of the system, and the like. The scan chain security capability enables secure control over normal use of a scan chain by enabling control over interruption of a scan chain and re-establishment of an interrupted scan chain. A scan chain security component is configured for removing an open-circuit condition from the scan chain in response to a control signal. The control signal may be generated in response to validation of a security key, in response to successful completion of a challenge-based authentication process, or in response to any other suitable validation or authentication. The scan chain security component also may be configured for creating an open-circuit condition in the scan chain in response to a second control signal. The second control signal may be a scan register value received via the scan chain. | 2011-12-22 |
20110314515 | INTEGRATED PHYSICAL AND LOGICAL SECURITY MANAGEMENT VIA A PORTABLE DEVICE - Integrated physical and logical security management is extended to a mobile device, such as a portable wireless device or radio The Mobile-IMPACT solution extends the reach of authonzed users to hand-held devices for momtoπng, managing and/or controlling of IT/network and physical security Allowing authorized users to view and control access events while not in their office and logged into their console, mobility within and outside of a facility or campus organization no longer requires a laptop computer With new handheld technologies more widely accessiable and dropping in mice while still gaining additional functionality, a chief security officer and their security staff can now monitor access to their building/doors/control zones, look-up user and card information, trigger queries/reports, set new alarm conditions and monitor sensors or a perimeter from a handheld device anywhere in the world using an electronic communication medium. | 2011-12-22 |
20110314516 | TECHNIQUES TO SHARE BINARY CONTENT - Techniques to share binary content are described. An apparatus may comprise a first related client having a message platform with a file share feature and an object store, the file share feature operative to retrieve a data object for a publishing client having a defined relationship with the first related client and a second related client, the first related client to send the data object to the second related client on behalf of the publishing client, and the object store operative to store and manage the data object using a unique name identifier received with the data object. Other embodiments are described and claimed. | 2011-12-22 |
20110314517 | Communication system, authentication device, control server, communication method, and program - A configuration that can perform access control for each user/client, without arranging an Authenticator or an EAPoL pass switch at each location. A forwarding node processes a packet between a supplicant and a prescribed authentication device, in accordance with a processing rule that has been set. The authentication device performs a prescribed authentication procedure with the supplicant and notifies a result thereof to a control server. In a case where an authentication procedure with the authentication device succeeds, the control server creates a first forwarding path between the supplicant and a destination node, and transmits a processing rule for a packet received or transmitted between the supplicant and a destination node, following the first forwarding path, in at least one forwarding node in the first forwarding path. | 2011-12-22 |
20110314518 | PREVENTING MULTIPLE BACKEND CALLS AT BROWSER LAUNCH DURING MOBILE BROADBAND PROVISIONING - To reduce or avoid multiple calls for authentication, during mobile device provisioning for broadband connectivity which might otherwise be caused by add-ons associated with a browser, a provisioning gateway or server system maintains a database of records of source addresses and associated mobile numbers. The records may also indicate time of last request from each address. In response to a new request, the system determines if there is a record for the source address. If there is a record, and in our example, if the record indicates that time since the last prior request is less than a threshold value, then the system continues provisioning processing for the device but without any communication with an authentication system. However, if there is no record or if the last request from a source address is older than the threshold, then the system communicates with the authentication system to obtain the directory number for the mobile device. | 2011-12-22 |
20110314519 | APPARATUS, SYSTEMS AND METHODS FOR MEDIA CONTENT DELIVERY - A media content delivery system and method is operable to communicate an authorized single media content stream generated by a local programming provider (LPP) in a domestic market area (DMA) to a client facility, wherein the authorized single media content stream is multiplexed into a multi-media content stream with a plurality of other single media content streams generated by a plurality of other LPPS in the DMA. An exemplary embodiment identifies an authorized single media content stream of interest to a client; accesses the multi-media content stream communicated from a communication network at the client facility, unbundles the authorized single media content stream from the received multi-media content stream, and communicates the authorized single media content stream to a program content generation system operated by the client. | 2011-12-22 |
20110314520 | ONLINE SERVICE ACCESS CONTROLS USING SCALE OUT DIRECTORY FEATURES - Embodiments provide application and/or resource access control features of an online computing environment, but are not so limited. In an embodiment, a computer-implemented method provides access control features for an online application environment based in part on the use of a number of directory service instances isolated from direct customer access and deployed in a defined datacenter architecture. In one embodiment, a computing environment uses web-based access control features and a number of directory service instances having organizational units and corresponding mappings to maintain a support infrastructure as part of providing features of online application services to customers. Other embodiments are included and available. | 2011-12-22 |
20110314521 | COMPUTER READABLE MEDIUM STORING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A computer readable medium storing a program causing a computer to execute a process is provided. The process includes obtaining note content information representing note content included in a note if the note has been input to registered information; obtaining user specification information for specifying a user who has input the note; causing the note content information and the user specification information to be stored in a memory in association with the registered information; and outputting at least one of the registered information, and the note content information and the user specification information stored in the memory to a user as a request source, and not outputting at least the user specification information if the user as the request source is different from the user who has input the note, in response to a request for outputting information from the user as the request source. | 2011-12-22 |
20110314522 | Method and apparatus for relay node management and authorization - Methods and apparatuses are provided for deploying relay nodes in a communication network. A relay node can initially be wirelessly authenticated to a network entity using initial security credentials. In response to a successful authentication, the relay node is authorized to wirelessly communicate with the communication network for a limited purpose of configuring the relay node for relay device operations. The relay node can receive new security credentials from the communication network, and is subsequently re-authenticated to the network entity using the new security credentials. In response to a successful re-authentication, the relay node is authorized by the network to operate as a relay device for conveying traffic between one or more access terminals and the communication network. | 2011-12-22 |
20110314523 | Out-of-band Tokens for Rights Access - Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right. | 2011-12-22 |
20110314524 | Authentication system and method - An authentication system includes one or more terminals in communication with a server on a network. The server is operable to receive user login information; and generate an authentication data set having: a plurality of decoy data; an anchor data, wherein the anchor data is based on information from a user profile; and target data in a predetermined relationship relative to the anchor data. The server is also operable to generate a decoy data set having: a plurality of second decoy data; and at least one anchor data. The server may then display the authentication data set and decoy data set and determine an authentication result by performing a predetermined manipulation of the target data. The server may receive a user response to an authentication prompt; and authenticate the user if the authentication result and user response are the same. | 2011-12-22 |
20110314525 | Method and System for Exchanging Setup Configuration Protocol Information in Beacon Frames in a WLAN - Certain aspects of a method for enabling exchange of information in a secure communication system may comprise configuring at least one 802.11 client station via authentication enablement information comprising data that specifies a time period during which configuration is allowed. The data that specifies a time period during which configuration is allowed may comprise a configuration window open field, which indicates a period when a configuration setup window is open. At least one client station may be configured via the authentication enablement information comprising recently configured data, which indicates whether at least one configurator has configured at least one other client station within the time period during which the configuration is allowed. | 2011-12-22 |
20110314526 | SYSTEM AND METHOD FOR HANDLING PERSONAL IDENTIFICATION INFORMATION - A system, method, and client registration and verification device for handling personal identification information. The client device collects from an individual, a sufficient amount of biometric information to uniquely identify the individual, as well as historical mobility information providing a history of locations where the individual has lived. A caching manager stores the collected biometric information at a selected cache node in a hierarchical database having a plurality of cache nodes at multiple levels of the database. The caching manager selects the cache node based on the historical mobility information collected from the individual. The client device sends subsequent requests to verify the identity of the individual to a local cache node where newly input biometric information is compared with the cached information. When the individual's biometric information is not stored in the local cache node, the request is forwarded upward in the database until the cached information is found and compared. | 2011-12-22 |
20110314527 | INTERNET PROTOCOL-BASED FILTERING DEVICE AND METHOD, AND LEGITIMATE USER IDENTIFYING DEVICE AND METHOD - Provided are an Internet Protocol (IP)-based filtering device and method and a legitimate user identifying device and method. The IP-based filtering method includes receiving packets from terminals, determining whether the packets are transmitted based on legitimate user IPs, transmitting the packets to a web server when it is determined that the packets are transmitted based on the legitimate user IPs, and determining whether a capacity capable of processing the packets exists in the web server when it is determined that the received packets are not the packets transmitted based on the legitimate user IPs, and transmitting the packets to the web server when it is determined that the capacity exists in the web server, and blocking the packets when the capacity does not exist. | 2011-12-22 |
20110314528 | TECHNIQUES TO MODIFY AND SHARE BINARY CONTENT WHEN DISCONNECTED FROM A NETWORK - Techniques to modify and share binary objects when disconnected from a network are described. An apparatus may comprise a processor and a memory. The memory may be operative to store a media annotation component and a media publishing component. The media annotation component, when executed by the processor, may be operative to receive a list of related members having a defined relationship with a publishing member from a user account of the publishing member of a media sharing service when in an online mode, and generate metadata for a media object using the list of related members when in an offline mode to form an annotated media object. The media publishing component, when executed by the processor, may be operative to define at least one instruction to distribute the annotated media object to a related member when in the online mode. Other embodiments are described and claimed. | 2011-12-22 |
20110314529 | ADAPTIVE POLICIES AND PROTECTIONS FOR SECURING FINANCIAL TRANSACTION DATA AT REST - A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a service. A plurality of objects is presented to a user via a display. A plurality of codes is received over the communication network, each of the plurality of codes corresponding to one of the plurality of objects. The plurality of codes are matched to a plurality of alphanumeric characters according to a predetermined table. An alphanumeric string is generated from the plurality of alphanumeric characters and the alphanumeric string is compared to a user identifier stored in a database. Based on the comparing, a determination is made as to whether to grant the user access to the service. | 2011-12-22 |
20110314530 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO NETWORK SERVICES USING BIOMETRIC AUTHENTICATION - A system, apparatus, or method for controlling access to a network and to the associated network resources or services. The invention may be used to provide a user authentication or authorization process for a computer network, a telecommunications network, or other suitable system, apparatus, device, process, operation, etc. In some embodiments, the present invention uses a combination of device identification data (such as a device identifier or other form of token) and user-specific biometric data (such as a physical characteristic associated with the user or data generated as a result of a signal being altered by a physical characteristic of a user) to identify a user and permit the user to access the network or network resources or services. | 2011-12-22 |
20110314531 | METHOD FOR USER TERMINAL AUTHENTICATION OF INTERFACE SERVER AND INTERFACE SERVER AND USER TERMINAL THEREOF - Provided are a method for authenticating a user terminal in an interface server, and an interface server and a user terminal using the same. The method includes receiving authentication request information from an application service providing server in order to request the interface server to authenticate the user terminal receiving an application service provided from the application service providing server, authenticating the user terminal according to the authenticating request information using an authentication method selected by the interface server or a user of the user terminal, and transmitting authentication response information including an authentication result of performing the authentication method to the application service providing server. The interface server provides an interface for a network to the application service providing server. | 2011-12-22 |
20110314532 | IDENTITY PROVIDER SERVER CONFIGURED TO VALIDATE AUTHENTICATION REQUESTS FROM IDENTITY BROKER - Techniques are disclosed for an identity broker to authenticate users to a network device, system, or hosted application that uses certain legacy protocols for user authentication. For example, the identity broker may be configured to respond to a user authentication request from a network device formatted as a RADIUS or LDAP message. The identity broker may operate in conjunction with an identity provider to authenticate a user requesting access to a computing resource (e.g., to the network device, system, or hosted application). | 2011-12-22 |
20110314533 | IDENTITY BROKER CONFIGURED TO AUTHENTICATE USERS TO HOST SERVICES - Techniques are disclosed for an identity broker to authenticate users to a network device, system, or hosted application that uses certain legacy protocols for user authentication. For example, the identity broker may be configured to respond to a user authentication request from a network device formatted as a RADIUS or LDAP message. The identity broker may operate in conjunction with an identity provider to authenticate a user requesting access to a computing resource (e.g., to the network device, system, or hosted application). | 2011-12-22 |
20110314534 | Secured Execution Environments and Methods - A secured portable execution environment device could be provided by a business as a fee-based service, where a user selects applications that he wishes to license and methods of securing and backing up the execution environment. The device could be provided as a portable flash drive, which could then be plugged into any computer with any operating system to access the execution environment saved on the drive. When the user executes an application launcher on the flash drive and authenticates his identity, the application launcher allows the user to access secure applications saved on the flash drive and secure data saved in the application launcher environment. | 2011-12-22 |
20110314535 | NULL-PACKET TRANSMISSION FROM INSIDE A FIREWALL TO OPEN A COMMUNICATION WINDOW FOR AN OUTSIDE TRANSMITTER - A high-bandwidth direct communication path between two clients is used for voice or video calls over the Internet. An opening or a window in a firewall is made for the direct path by sending a null packet out from inside the firewall. The null packet can be a UDP packet directed to a UDP port of the other client. Initially, each client makes a TCP connection to port | 2011-12-22 |
20110314536 | System and Method for Testing Functionality of a Firewall - Described are computer-based methods and apparatuses, including computer program products, for testing functionality of a firewall. The testing the functionality of the firewall can include a method. The method can include selecting a plurality of valid message types, generating a percentage of valid and invalid messages from the plurality of valid message types, transmitting the plurality of valid and invalid messages to the firewall, receiving an indication of the firewall's handling of valid and invalid messages based on the transmitted message, and determining the functionality of the firewall from the received indication. | 2011-12-22 |
20110314537 | AUTOMATIC CONSTRUCTION OF HUMAN INTERACTION PROOF ENGINES - Human Interaction Proofs (“HIPs”, sometimes referred to as “captchas”), may be generated automatically. An captcha specification language may be defined, which allows a captcha scheme to be defined in terms of how symbols are to be chosen and drawn, and how those symbols are obscured. The language may provide mechanisms to specify the various ways in which to obscure symbols. New captcha schemes may be generated from existing specifications, by using genetic algorithms that combine features from existing captcha schemes that have been successful. Moreover, the likelihood that a captcha scheme has been broken by attackers may be estimated by collecting data on the time that it takes existing captcha schemes to be broken, and using regression to estimate the time to breakage as a function of either the captcha's features or its measured quality. | 2011-12-22 |
20110314538 | Computing System Providing Normal Security and High Security Services - A computing system and method providing normal security services and high security services are disclosed. The computing system includes hardware resources, a processor core and an access right checker. The hardware resources are grouped into resource security levels. The processor, switching between a normal security and a high security state, assigns a user access right to a request. In comparison with the normal security state, user access right assigned in the high security state further allows the request to use the hardware resources of a higher resource security level. According to the assigned user access right and the resource security levels of required hardware resources of the request, the access right checker determines whether the request has the authority to use the hardware resources, and thereby, the access right checker executes the request or responds the issued request with an exception. | 2011-12-22 |
20110314539 | Proximity Based Device Security - Devices, systems and methods are disclosed for additional security, functionality, and convenience in the operation of a wireless communication device with the use of a separate proximity security token in communication with the wireless communication device. In exemplary embodiments, the token is carried by the user while device logic is installed on the user's wireless communication device. The device logic along with transceivers allows the device to sense proximity of the token through wireless communication. Given a certain range of the proximity security token, as determined by the wireless signal strength, the device logic determines whether the device is in a locked or unlocked state. If the proximity security token is outside the range, then the device is locked. The proximity security token uses ultra low power communications for optimal battery life. | 2011-12-22 |
20110314540 | PREVENTING ABUSE OF SERVICES THROUGH INFRASTRUCTURE INCOMPATIBILITY - Spammers, and other abusers of web services, may be deterred in their attempts to sign up for these services at large scale by making changes to the service registration procedure, where the changes are designed to break the spammer's infrastructure. In one example, a procedure to register for a web service involves presenting a Human Interaction Proof (HIP, or “captcha”) to the user, and gating access to the service upon receipt of a correct solution. If spammers use botnets and/or image capture techniques to initiate registration processes and to transport the HIPs to human or automated solvers, then the registration procedure can be changed in a way that is incompatible with capturing these images, or in a way that is incompatible with receiving HIP solutions from someplace other than the location at which registration was initiated. | 2011-12-22 |
20110314541 | Integrated Circuit, Method and Electronic Apparatus - An integrated circuit having a first security operation state arranged for utility operation, and a second security operation state arranged for test operation is disclosed. In the second security operation state, a first set and a second set of objects are available, while a third set of objects are unavailable. In the first security operation state, the third set of objects is available with authorization by a security mechanism of the first security operation state. The third set of objects is made unavailable by logic circuitry of the integrated circuit, when operating in the second security operation state, by the logic circuitry being arranged to control limited operation of parts of the integrated circuit comprising the third set of objects when operating in the second security operation state such that bypassing of the security mechanism of the first security operation state is disabled. An electronic apparatus utilising such an integrated circuit, and a method are also disclosed. | 2011-12-22 |
20110314542 | TREATMENT OF MALICIOUS DEVICES IN A MOBILE-COMMUNICATIONS NETWORK - A method of remotely treating malicious mobile terminals connected to a mobile communications network. In one embodiment, when a malicious mobile terminal is detected by the intrusion-detection services of the network, the network changes the subscriber profile associated with the mobile terminal to operate the latter in a quarantine mode. The packet-switched subsystem of the network then links the quarantined mobile terminal to a remediation manager. The remediation manager remotely treats the mobile terminal, e.g., to repair or reinstall any corrupted software, terminate any active malicious processes, delete or quarantine any malware, and restore the operating system, configuration, and/or memory of the mobile terminal to a clean operational state. After the treatment, the network reverts the subscriber profile back to the initial state and removes the mobile terminal from the quarantine. | 2011-12-22 |
20110314543 | SYSTEM STATE BASED DIAGNOSTIC SCAN - In some embodiments, a local agent on a target system may evaluate current and/or historical system state information from a store (either local or remote) and dynamically adjust the level of diagnosis performed during the scan based on the evaluated state information. Individual diagnostic scans may, for example, be enabled and disabled based on the context in the store, and each scan may update the context for further evaluation. By employing such an approach, systems with a low risk profile and lacking symptoms of a problem may be scanned quickly while systems that show signs of a problem or have a high risk profile may receive a more thorough evaluation. | 2011-12-22 |
20110314544 | EVALUATING SHELL CODE FINDINGS - Concepts and technologies are described herein for evaluating shellcode findings. In accordance with the concepts and technologies disclosed herein, shellcode findings can be evaluated to determine if the shellcode findings are legitimate, or if the shellcode findings are false positive shellcode findings. Legitimate shellcode findings can be determined based not simply upon patterns associated with the suspected shellcode itself, but also based upon a pattern of bit-level entropy in the memory around the suspected shellcode. Mathematical models of the memory can be generated and analyzed to determine if the shellcode finding is legitimate. | 2011-12-22 |
20110314545 | METHOD AND SYSTEM FOR AUTOMATIC INVARIANT BYTE SEQUENCE DISCOVERY FOR GENERIC DETECTION - A method for creating a set of genericized signatures for detection of byte sequences in computer code includes accessing a first set of sample signatures, determining a maximum number of wildcards that a wildcarded signature may comprise, determining a first wildcarded signature corresponding to the first set of sample signatures, evaluating the first wildcarded signature, and repeating the steps of evaluating for any second wildcarded signatures. Each of the signatures corresponds to an instance of malware. The evaluation further includes if the number of wildcards in the first wildcarded signature exceeds the maximum number of wildcards, determining a plurality of second wildcarded signatures corresponding to a plurality of subsets of the set of sample signatures. The evaluation further includes if the number of wildcards in the first wildcarded signature is less than or equal to the maximum number of wildcards, adding the first wildcarded signature to a set of genericized signatures. | 2011-12-22 |
20110314546 | Electronic Message Analysis for Malware Detection - An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in the electronic message itself. The present technology may analyze an electronic message and attachments to electronic messages to detect a uniform resource location (URL), identify whether the URL is suspicious, and analyze all suspicious URLs to determine if they are malware. The analysis may include re-playing the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message. If the re-played URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system. | 2011-12-22 |
20110314547 | ANTI-MALWARE SYSTEM AND OPERATING METHOD THEREOF - An anti-malware device and an operating method thereof are provided. The operating method includes: filtering by a first logic unit of the processor, input data based on a rule; and scanning by a second logic unit of the processor, for malware in the data, the filtering and the scanning being performed at the same time. Accordingly, the security of the packet data is tightened. | 2011-12-22 |
20110314548 | ANTI-MALWARE DEVICE, SERVER, AND METHOD OF MATCHING MALWARE PATTERNS - An efficient virus detection, malware detection, and packet filtering system in a mobile device by providing optimized hash functions from a server to a mobile device that reduce hash collisions during the virus detection, malware detection, and packet filtering in a system-on-chip configuration. | 2011-12-22 |
20110314549 | METHOD AND APPARATUS FOR PERIODIC CONTEXT-AWARE AUTHENTICATION - A method for authenticating access to an electronic document. The method includes identifying a context event associated with a user seeking access to the electronic document, receiving from the user a plurality of context data, and analyzing the plurality of context data to generate a one or more derived context data. The method may also include receiving from an authentication module a context request, and in response to the context request, generating a context report, wherein the context report includes at least the one or more derived context data, and is configured to enable the authentication module to authenticate the user's access to the electronic document using a first authentication mechanism. The method may also include communicating the context report to the authentication module, monitoring the user to identify an occurrence of the context event, and upon identifying the occurrence of the context event, generating a context event flag, the context event flag configured to inform the authentication module to reauthenticate the user's access to the electronic document. | 2011-12-22 |
20110314550 | WATERMARK TO IDENTIFY LEAK SOURCE - Watermarks may be used to deter certain types of information leaks. In one example, leaks occur in the form of posting, in public forums, screen shots of private pages. To deter this example kind of leak, private web pages within an organization may be watermarked with an experience identifier that identifies the session in which the screen shot is captured. Other information may also be included in the watermark. The watermark may be designed to survive image compression, so that it can be recovered from either a compressed or uncompressed image of the web page. By using an experience identifier recovered from the watermark, and logs that describe activity associated with that experience identifier, it may be possible to identify the source of the information leak. | 2011-12-22 |
20110314551 | System or method to assist and automate an information security classification and marking process for government and non-government organizations for information of an electronic document - A software engine runs in a compatible mode with offthe-shelf word processors, e-mail programs and presentation development software and other document development software. The software engine is used for the security classification of sensitive or national security classified information in electronic and resultant hard copy document formats. The software engine ensures that the individual considers all informational portions of a document, that appropriate document marks are employed, that document marks in their electronic format are persistent and that all necessary information, such as classification guides, standards and security regulations, provided by the organization to classify information is at hand and immediately available. In addition to the document sensitivity or classification determination and marking support, the software engine tracks and controls documents and the electronic media storing documents. It also provides warnings and alarms, ad hoc document security analysis and reporting capability to system security administrators with respect to document or network events or captured information that may be indicative of risk to the information requiring protection. The software also provides the ability for an organization to centrally establish and control a security classification or sensitivity marking hierarchy for automated security classification support. | 2011-12-22 |
20110314552 | Remote Display Tamper Detection Using Data Integrity Operations - Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data integrity operation on display data to be displayed on the remote display at a secure module. The display data is transmitted from the secure module to the remote display security module. The remote display security module receives the display data. A second data integrity result is generated by performing the first data integrity operation on the display data received at the remote display security module. A determination is made as to whether the remote display has been tampered with at the secure module if the first data integrity result does not match the second data integrity result. | 2011-12-22 |
20110314553 | LOCATION ENABLED BOOKMARK AND PROFILE - Location based profiles are used to modify the configuration of a computing device based on a detected location. The location based profiles allow features such as cameras to be enabled and disabled. Physical and logical data storage partitions can also be mounted and unmounted, and the home screen displayed by a device can be modified. Location bookmarks can be used to further customize the appearance and function of a computing device. | 2011-12-22 |
20110314554 | MANAGING LICENSES OF MEDIA FILES ON PLAYBACK DEVICES - Embodiments are described herein for managing licenses of media files on playback devices in a media system. In some embodiments, each media file is purchased based on a number of licenses, each license granting permission to store the media file on a single playback device. Each media file may have an associated number of one or more licenses that specifies the maximum number of playback devices on which the media file may be stored at the same time (concurrently). The media system may comprise a home central licensing (HCL) device, a primary storage device, and playback devices coupled via a network. The primary storage device may be used to initially store newly purchased media files. The HCL device may allow or prohibit distribution of the media files on the primary storage device to playback devices by using a license manager data structure storing licensing information for each media file. | 2011-12-22 |
20110314555 | ABSTRACTIONS AND AUTOMATION FOR ENHANCED SHARING AND COLLABORATION - The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the specification and automation of policies for sharing information between users with a “need-to-know.” An instance of the present invention can also provide these users information based on a “time-to-know.” By providing access to information based on group affiliation and properties of the content of the information, the present invention maintains optimal information privacy while minimizing encumbrances to sharing data with appropriate users and even at appropriate times. The present invention can be integrated with other communication technologies to facilitate access to information in a time appropriate manner. Other instances of the present invention employ automated and semi-automated, mixed-initiative techniques, to make information-sharing decisions. Additional instances of the present invention include the employment of machine-learning techniques to facilitate construction of access policies from the actions or profile of a single user or a community of users, including the construction of automated sharing agents that work in an automated or mixed-initiative manner to respond to real-time requests for information. | 2011-12-22 |
20110314556 | TIME-SLICING METHOD AND SYSTEM FOR DIGITAL BOOKS - A method is provided in which time slicing data, including an indication of available time blocks for loaning an e-book from an e-book lending library, are provided to a user in response to the user requesting to borrow an e-book that is not currently available for being loaned. When the user selects an available time block via an electronic device, the e-book lending library provides to an electronic device that is associated with the user, via the communications network, a lending license for the e-book that is valid only during the selected available time block. The e-book lending library enables access to the first e-book via the electronic device, during the selected time block, using the provided lending license. | 2011-12-22 |
20110314557 | Click Fraud Control Method and System - The disclosed subject matter relates to methods, systems, and computer-usable storage mediums for detecting and reducing the occurrence of fraud in obtaining virtual currency from advertisers for use in network-based virtual persistent worlds. | 2011-12-22 |
20110314558 | METHOD AND APPARATUS FOR CONTEXT-AWARE AUTHENTICATION - A method for authenticating access to an electronic document. The method includes receiving an authentication request from a user, receiving an aggregate risk score, selecting an authentication mechanism based at least on the aggregate risk score, and applying the authentication mechanism to decide the authentication request from the user. The aggregate risk score may be based at least on a comparison of the user's past behavior with a plurality of context data associated with the user. | 2011-12-22 |
20110314559 | SYSTEM ACCESS DETERMINATION BASED ON CLASSIFICATION OF STIMULI - An authentication system is disclosed. Information associated with at least one of a user's use of a resource and demographic information associated with the user is collected. The collected information is processed to determine one or more stimuli to be presented to the user. The collected information is processed to determine one or more stimuli to be presented to the user. Classification data provided by the user is stored. Classification data associated with the user is received. The received classification data is compared to the stored classification data. A determination of whether to authorize an action based at least in part on the comparison is determined. | 2011-12-22 |
20110314560 | SHARING AND LENDING OF DIGITAL CONTENT - An individual may wish to make a gift of digital media to a designated recipient. The digital media may be previously purchased by the individual or may be new, unused digital media purchased specifically as a gift for the recipient. The sender of the gift sends a gift notification. The sender is then verified to ensure that the sender is authorized to make the gift by matching an identifier of the digital media with an identifier associated with the sender. The digital media may be associated with a set of rights and privileges. Further rights and privileges associated with the digital media may be offered to the recipient. | 2011-12-22 |
20110314561 | Server implemented method and system for securing data - A server implemented method for securing data is provided. The method includes generating a context container for storing data objects transferred to the server during a session with a client, creating, from the data objects in the context container, a plurality of protected zones of data objects, wherein each protected zone includes data objects of a different class of security and creating a reference for each protected zone. Further, the method includes providing the client access to that protected zone via the reference, wherein the reference is non-persistently stored in the server. | 2011-12-22 |
20110314562 | Insect Infection Method for Production of Proteins - The present invention provides an insect infection method for use in the production of a protein with a baculovirus expression vector in the insect, the method comprising the steps of:
| 2011-12-22 |
20110314563 | ANTIBODY PRODUCTION - A non-human mammal containing an endogenous lambda light chain gene locus, an endogenous kappa light chain gene locus and an endogenous heavy chain gene locus, each of which can re-arrange so that immunoglobulin heavy and light chain genes are formed and expressed in B-cells following antigen challenge but said loci have been mutated so that the ability to form functional immunoglobulin tetramers comprising re-arranged heavy and light chains produced from said mutated loci has been substantially reduced or eliminated. | 2011-12-22 |
20110314564 | ENZYMES AND METHODS FOR HYDROLYSING PHENYLUREAS, CARBAMATES AND ORGANOPHOSPHATES - The present invention relates to enzymes which are able to hydrolyse phenylureas, carbamates, and/or organophosphates, as well as polynucleotides encoding these enzymes. The present invention also relates to methods of hydrolysing phenylureas, carbamates, and/or organophosphates. | 2011-12-22 |
20110314565 | Method for Isolating Cell-Type Specific mRNAS - The invention provides methods for isolating cell-type specific mRNAs by selectively isolating ribosomes or proteins that bind mRNA in a cell type specific manner, and, thereby, the mRNA hound to the ribosomes or proteins that bind mRNA. Ribosomes, which are riboprotein complexes, bind mRNA that is being actively translated in cells. According to the methods of the invention, cells are engineered to express a molecularly tagged ribosomal protein or protein that binds mRNA by introducing into the cell a nucleic acid comprising a nucleotide sequence encoding a ribosomal protein or protein that binds mRNA fused to a nucleotide sequence encoding a peptide tag. The tagged ribosome or mRNA binding protein can then be isolated, along with the mRNA bound to the tagged ribosome or mRNA binding protein, and the mRNA isolated and further used for gene expression analysis. The methods of the invention facilitate the analysis and quantification of gene expression in the selected cell type present within a heterogeneous cell mixture, without the need to isolate the cells of that cell type as a preliminary step. | 2011-12-22 |
20110314566 | Soybean Cultivar S090086 - A soybean cultivar designated S090086 is disclosed. The invention relates to the seeds of soybean cultivar S090086, to the plants of soybean S090086, to plant parts of soybean cultivar S090086, and to methods for producing a soybean plant produced by crossing soybean cultivar S090086 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090086, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090086, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090086 with another soybean cultivar. | 2011-12-22 |
20110314567 | Soybean Cultivar S090057 - A soybean cultivar designated S090057 is disclosed. The invention relates to the seeds of soybean cultivar S090057, to the plants of soybean S090057, to plant parts of soybean cultivar S090057, and to methods for producing a soybean plant produced by crossing soybean cultivar S090057 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090057, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090057, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090057 with another soybean cultivar. | 2011-12-22 |
20110314568 | Soybean Cultivar S090069 - A soybean cultivar designated S090069 is disclosed. The invention relates to the seeds of soybean cultivar S090069, to the plants of soybean S090069, to plant parts of soybean cultivar S090069, and to methods for producing a soybean plant produced by crossing soybean cultivar S090069 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090069, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090069, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090069 with another soybean cultivar. | 2011-12-22 |
20110314569 | Combination of Two Genetic Elements for Controlling the Floral Development of a Dicotyledonous Plant, and Use in Detection and Selection Methods - The present invention relates to a combination of two genetic elements for controlling the development of the floral type of a dicotyledonous plant, said combination comprising, respectively:
| 2011-12-22 |
20110314570 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING ZINC-FINGER (C3HC4-TYPE RING FINGER) FAMILY POLYPEPTIDES - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a Zinc-Finger (C3HC4-type RING finger) family polypeptide. | 2011-12-22 |
20110314571 | METHOD TO TRIGGER RNA INTERFERENCE - A method to generate siRNAs in vivo is described, as are constructs and compositions useful in the method. The method does not depend on the use of DNA or synthetic constructs that contain inverted duplications or dual promoters so as to form perfect or largely double-stranded RNA. Rather, the method depends on constructs that yield single-stranded RNA transcripts, and exploits endogenous or in vivo-produced miRNAs or siRNAs to initiate production of siRNAs. The miRNAs or siRNAs guide cleavage of the transcript and set the register for production of siRNAs (usually 21 nucleotides in length) encoded adjacent to the initiation cleavage site within the construct. The method results in specific formation of siRNAs of predictable size and register (phase) relative to the initiation cleavage site. The method can be used to produce specific siRNAs in vivo for inactivation or suppression of one or more target genes or other entities, such as pathogens. | 2011-12-22 |
20110314572 | COTTON PLANT WITH SEED-SPECIFIC REDUCTION IN GOSSYPOL - A method is disclosed for reducing the level of gossypol in cottonseed. The method generally includes selectively inducing RNA gene silencing in the seed of a transgenic cotton plant, to interfere with expression of the δ-cadinene synthase gene or the δ-cadinene-8-hydroxylase gene in the seed of the cotton plant without substantially affecting expression of that gene in the foliage, floral parts, and roots of the plant. The transgenic cotton plant comprises at least one of a δ-cadinene synthase gene trigger sequence and/or a δ-cadinene-8-hydroxylase gene trigger sequence operably linked to one or more a seed-specific promoter gene sequences, and the trigger sequence(s) is/are able to induce RNA gene silencing when expressed in cottonseed of the plant. Also disclosed are expression cassettes, vectors, cells, seeds, and plants containing at least one of a δ-cadinene synthase gene trigger sequence and/or a δ-cadinene-8-hydroxylase gene trigger sequence operably linked to one ore more a seed-specific promoter DNA sequences. | 2011-12-22 |
20110314573 | SCREENING METHOD FOR IDENTIFYING GENES INVOLVED IN PLANT CELL CYCLE - The present invention relates to a method for screening proteins related to and/or involved in plant cell cycle. It further relates to proteins isolated with the method and the use of those proteins and/or the genes encoding those proteins for modulating plant yield and plant growth. | 2011-12-22 |
20110314574 | Compositions and Methods for the Regulation of Carbohydrate Metabolism and Flowering in Plants - Compositions and methods for modulating flowering, sugar metabolism and stress response in plants are provided. | 2011-12-22 |
20110314575 | Plasmodium Vaccines, Antigens, Compositions and Methods - The present invention relates to the intersection of the fields of immunology and protein engineering, and particularly to antigens and vaccines useful in prevention of infection by | 2011-12-22 |
20110314576 | NON-LINEARITY DETERMINATION OF POSITIONING SCANNER OF MEASUREMENT TOOL - Determination of non-linearity of a positioning scanner of a measurement tool is disclosed. In one embodiment, a method may include providing a probe of a measurement tool coupled to a positioning scanner; scanning a surface of a first sample with the surface at a first angle relative to the probe to attain a first profile; scanning the surface of the first sample with the surface at a second angle relative to the probe that is different than the first angle to attain a second profile; repeating the scannings to attain a plurality of first profiles and a plurality of second profiles; and determining a non-linearity of the positioning scanner using the different scanning angles to cancel out measurements corresponding to imperfections due to the surface of the sample. The non-linearity may be used to calibrate the positioning scanner. | 2011-12-22 |
20110314577 | METHOD FOR AUTOMATIC ADJUSTMENT OF THE APPLIED FORCE AND CONTROL OF THE FORCE DRIFT IN AN ATOMIC FORCE MICROSCOPE DURING CONTACT MODE IMAGING - A method, apparatus and computer program are provided for automatically compensating a drift of a force applied by an Atomic Force Microscope during contact mode. The method makes it possible to automatically control and correct force drift in contact mode Atomic Force Microscopy. In a preferred embodiment, the present method includes steps measuring independently lateral and vertical vibration signals, analyzing theses signals and finally comparing theses signals to reference vibration signals. In a second embodiment, the vibration signals may be combined by means of an index, called force index. | 2011-12-22 |
20110314578 | Blueberry plant named 'Southern Splendour' - A new and distinct cultivar of Southern highbush blueberry, ‘Southern Splendour’, is provided. ‘Southern Splendour’ is a | 2011-12-22 |
20110314579 | NECTARINE TREE NAMED 'SPRING FIRE' - A new and distinct variety of nectarine tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Nemaguard’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features:
| 2011-12-22 |