17th week of 2010 patent applcation highlights part 63 |
Patent application number | Title | Published |
20100107205 | METHODS AND SYSTEMS FOR RESUMING, TRANSFERRING OR COPYING A MULTIMEDIA SESSION - Methods and systems for resuming, transferring or copying an IMS session associated with a first terminal or user at a second terminal in e.g., a same household are described. If a session is to be transferred, resource reservations associated with establishing a second IMS session for the transfer can be bypassed by informing the IMS system, either explicitly or implicitly, of the relationship between the terminals involved in the transfer. A controller can select a content server to support the resumed session and coordinate session identities associated with the selection. | 2010-04-29 |
20100107206 | COMBINED BROADCAST AND BACKCHANNEL DELIVERY OF STREAMING CONTENT - Streaming content may be delivered through a combination of broadcast and a backchannel. Related apparatus and methods for receiving and distributing streaming content are described. A receiving device may receive a packet of information in the form of a broadcast signal from a broadcast source. The packet of information may contain one or more streamlets and a table of contents associated with the streamlets. A desired streamlet may be selected from the packet of information and presented with a display. A remainder of a data stream associated with the streamlet may be requested and received from via a backchannel while the desired streamlet is being presented. The remaining data stream may then be presented with the display. | 2010-04-29 |
20100107207 | DEVICE FOR BROADCASTING AUDIO AND VIDEO DATA - The invention relates to a device for delivering audio and video data. In such a device, the audio/video data travel together and are compressed along with the signaling data for the delivery of these audio/video data. Under current compression standards, these data are being increasingly compressed. This maximum compression proportionally complexifies the encoding and decoding of audio/video data. The appearance of network cables comprising six twisted pairs of wires makes it possible to produce networks having higher speed capacities. The object of the invention is not to increase speeds by using additional twisted pairs but to simplify the data traveling through the network. | 2010-04-29 |
20100107208 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - Disclosed is a photo album that allows viewing of photos on a television receiver through a network. In a screen where both of a reception screen of a television and multiple application programs are displayed, if a predetermined application is selected, an access is made to a photo album, and photos can be viewed in a slide show manner. If there is a favorite photo from among the photos being viewed, a point can be given to the favorite photo. The applications are loaded from an external network. | 2010-04-29 |
20100107209 | System for simultaneous delivery of digital television and interactive broadband service - A method and apparatus is provided for the delivery of digital television and interactive broadband service in a manner that maximizes the usage of the digital broadcast spectrum. A digital television signal is transmitted to a given broadcast area in a relatively small part (for example, a 1 MHz band) of one or more licensed portions of the digital broadcast spectrum. Interactive broadband service is delivered within at least a portion of the same broadcast area covered by the broadcast digital television signal, in the remainder (for example, a 5 MHz band) of an unused part of the same licensed portion of the digital broadcast spectrum as is occupied by the digital television signal, or within an unlicensed (unused) portion of the digital broadcast spectrum. The broadcasting of the digital television and delivery the interactive broadband service occur simultaneously. In one embodiment, digital television and broadband service are delivered by the same equipment within the same bandwidth. | 2010-04-29 |
20100107210 | System for simultaneous delivery of digital television and interactive broadband service - A method and apparatus is provided for the delivery of digital television and interactive broadband service in a manner that maximizes the usage of the digital broadcast spectrum. A digital television signal is transmitted to a given broadcast area in a relatively small part (for example, a 1 MHz band) of one or more licensed portions of the digital broadcast spectrum. Interactive broadband service is delivered within at least a portion of the same broadcast area covered by the broadcast digital television signal, in the remainder (for example, a 5 MHz band) of an unused part of the same licensed portion of the digital broadcast spectrum as is occupied by the digital television signal, or within an unlicensed (unused) portion of the digital broadcast spectrum. The broadcasting of the digital television and delivery the interactive broadband service occur simultaneously. In one embodiment, digital television and broadband service are delivered by the same equipment within the same bandwidth. | 2010-04-29 |
20100107211 | CABLE TELEVISION OPTICAL FIBER COMMUNICATION SYSTEM - A Cable Television optical fiber communication system is disclosed, comprises a provider end, plural optical signal transmission devices and plural user ends, each optical signal transmission device is provided between the provider end and the user ends and has an light splitting element, a RF receive module, and a RF return module. The light splitting element is connected to the provider end via an optical transmission wire and is served to bi-directionally transfer a laser beam having a signal between the provider end and the user ends. The RF receive module is served to transfer a first signal of the provider end to the user ends. The RF return module emits a laser beam having a second signal to the provider end only when an analog return signal is emitted from the user end. | 2010-04-29 |
20100107212 | APPARATUS FOR SWAPPING HIGH-SPEED MULTIMEDIA SIGNALS - An apparatus for swapping output high-speed multimedia signals. In one embodiment the apparatus comprises a plurality of inputs coupled to a multimedia transmitter; a plurality of outputs coupled to a plurality of pins of a multimedia interface connector; and a controller for generating a control signal for configuring an order in which the plurality of inputs are routed to the plurality of outputs, wherein the order in which the plurality of inputs are routed to the plurality of outputs is set to enable un-crossing of one or more conducting wires coupling the plurality of inputs to the multimedia transmitter and to enable un-crossing of one or more conducting wires coupling the plurality of outputs and the plurality of pins of the multimedia interface connector. | 2010-04-29 |
20100107213 | Access Control State Determination Based on Security Policy and Secondary Access Control State - In accordance with one or more aspects, a current security policy for accessing a device or volume of a computing device is identified. A secondary access control state for the device or volume is also identified. An access state for the device is determined based on both the current security policy and the secondary access control state. | 2010-04-29 |
20100107214 | TEMPORARY USER ACCOUNT FOR A VIRTUAL WORLD WEBSITE - A computer system and method are provided that facilitate permitting temporary access to a website or other computer application in which temporary access is given to a generic virtual character and its corresponding user. Temporary access is made available through a temporary user account that is set up by the user. The temporary user account is active for a limited time and allows the user to learn about the website, for instance, via the generic virtual character. The generic virtual character has limited access to the website and in particular to various activities or areas on the website. Unlike temporary user account holders, users who have purchased a real world item and have created premium user accounts have full access to the website via their corresponding premium virtual characters. In addition, the system and method prevent at least some interaction between the generic virtual characters and the premium virtual characters. | 2010-04-29 |
20100107215 | SCALABLE FIREWALL POLICY MANAGEMENT PLATFORM - Securing large networks having heterogeneous computing resources including provision of multiple services both to clients within and outside of the network, multiple sites, security zones, and other characteristics is provided using access control functionality implemented at hosts within the network. The access control functionality includes respective access control policies for indicating to each host from which other computers it can accept connections. Content of the access control policies can be determined based on application data flow needs, and can draw information from databases including DNS and security zone information for hosts to which the access control policies will be applied. Access control policies can be formatted automatically for different host with different characteristics from the same base logical rule set. Other aspects include using more permissive and/or access control rules provided on network equipment to block known bad data, while providing host-based access control focused on application data flow. | 2010-04-29 |
20100107216 | INFORMATION PROCESSING DEVICE AND MEMORY MANAGEMENT METHOD - It is an object of the present invention to provide an information processing device and a memory management method that enable execution of memory management processing for simultaneously starting up two types of applications. During execution of an application in the form of a Java application, the application starts up another an application in the form of Flash data, and then a native software in the form of a Flash Player causes a memory management unit to secures a prescribed memory area from a memory area for the native software. A native software then starts up the other application using the secured memory area. | 2010-04-29 |
20100107217 | CONTENT CONTROL METHOD AND DEVICE - A content control method and device are provided. A method is as follows. A monitoring device sends a first acquisition request message carrying identification information to a content identity manager (CIM) to request attribute metadata and a registered fingerprint corresponding to the identification information when a first cumulative transmission amount of a content whose identification information is acquirable detected by the monitoring device in a first preset time period reaches a first preset threshold. The monitoring device acquires the attribute metadata and the registered fingerprint corresponding to the identification information returned by the CIM. Thus, at multiple concurrent accesses of the same content in any time periods, the monitoring device does not need to request the related policy control attribute metadata from the CIM each time, so that interactive processing for the repeated content with a high concurrent rate between the monitoring device and the CIM is reduced, thereby reducing resource loss of a network and the CIM. | 2010-04-29 |
20100107218 | SECURED COMPARTMENT FOR TRANSACTIONS - Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment. | 2010-04-29 |
20100107219 | AUTHENTICATION - CIRCLES OF TRUST - Within a surface computing environment users are provided a seamless and intuitive manner of modifying security levels associated with information. If a modification is to be made the user can perceive the modifications and the result of such modifications, such as on a display. When information is rendered within the surface computing environment and a condition changes, the user can quickly have that information concealed in order to mitigate unauthorized access to the information. | 2010-04-29 |
20100107220 | SECURE CONSULTATION SYSTEM - A secure consultation system is disclosed that enables an owner entity to securely store its most secure and private data such that designated entities of the owner entity and a consultant entity can execute application programs on that data and thus, to consult on the operation and correctness of the application programs and the data. | 2010-04-29 |
20100107221 | Network Service Provision Method, Network Device, Network Server and Network - Disclosed is a method of providing a service to a network device from a group of network devices, some but not all of the network devices being subscribed to said service, the method comprising determining which network devices of the group are not subscribed to said service in response to a service request from one of the network devices of said group; querying at least the network devices of the group that are subscribed to said service for permission to at least temporarily share the service with an unsubscribed network device; and at least temporarily providing the service to at least some of the unsubscribed network devices in response to a positive response to said query from at least one of the subscribed network devices. A network, network device and network server that can implement various aspects of this method are also disclosed. | 2010-04-29 |
20100107222 | METHOD AND APPARATUS FOR IMPLEMENTING SECURE AND ADAPTIVE PROXIES - Methods and apparatus for implementing common authentication and security policies across applications served over a data transmission network, such as the internet, http or https, are disclosed. The common authentication and security policies are implemented without mandating specific changes to be applied to the applications themselves. An authentication process can be dynamically performed based on different needed security levels. Applications can be graphical (e.g., web) or voice in nature and can use any applicable and available security method. | 2010-04-29 |
20100107223 | Network Access Method, System, and Apparatus - A network access method is disclosed. The method includes: by an access authenticator, receiving a Discover message sent by a client, returning a response message, and obtaining first configuration information used by the client during authentication, where the Discover message is used to discover the access authenticator; authenticating the client or interacting with an authentication server (AS) to authenticate the client remotely as an agent of the client; and sending a configuration request message to a configuration server to request second configuration information used by the client during a session after the authentication succeeds. A network access system, an access authentication apparatus and a broadband access device are also disclosed. The present invention can assure the stability of authentication. | 2010-04-29 |
20100107224 | Techniques for authenticated posture reporting and associated enforcement of network access - Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform to enforce policies even when the host operating system is compromised. The PEP may be used to open access control and/or remediation channels on the host platform. The firmware agent may also act as a local policy decision point (PDP) on the host platform in accordance with an authorized enterprise PDP entity by providing policies if a host trust agent is non-responsive and may function as a passive agent when the host trust agent is functional. | 2010-04-29 |
20100107225 | REMOTE SERVICE ACCESS SYSTEM AND METHOD - A wireless service access system and method are disclosed. One aspect of the disclosed system provides a remote device wireless access to one or more services over a communication network, the system comprising a network access module adapted for communicating wirelessly with the remote device and for receiving therefrom identifying data; and a service access module, communicatively linked to the network access module, for authenticating the remote device based on the identifying data and authorizing access to the one or more services thereto via the network access module. | 2010-04-29 |
20100107226 | System and Methods for Providing Presence Services In IP Network - A system and methods are shown for providing presence state services in an Internet Protocol network. One exemplary system includes a central presence element configured to track and provide user presence state information, and a local presence element in communication with the central presence element and further in communication with a signaling entity. According to one embodiment, the local presence element is configured to create and manage local presence state authorization data generated based on user presence state information being received from the central presence element. Further, the local presence element is configured to authorize a user service request using the local presence authorization data before providing access to a service requested by the user in the user service request. | 2010-04-29 |
20100107227 | SEGREGATING ANONYMOUS ACCESS TO DYNAMIC CONTENT ON A WEB SERVER, WITH CACHED LOGONS - A system and method are provided for segregating access to dynamic content on multiple websites hosted by a web server. When a request is received for dynamic content from a website, a UserRetriever module identifies a path to the content and retrieves a username and password corresponding to the website, from a database that is separate from the web server and used for other purposes (e.g., billing). A UserImpersonator module requests a logon handle for that username from a logon cache manager. The logon handle is used to associate the request with the impersonated user account instead of the default anonymous user account with which the request was initially associated. The dynamic content is retrieved and served under the context of the restricted impersonated user account session, after which the applied logon handle is stripped off and the request is re-associated with the default anonymous user account. | 2010-04-29 |
20100107228 | IP ADDRESS SECURE MULTI-CHANNEL AUTHENTICATION FOR ONLINE TRANSACTIONS - A method for multi-factor authenticating of a user using an application server and an authentication server is disclosed. The method includes receiving from the application server a first source IP address associated with a request for authenticating from the user browser program to the application server. The method also includes receiving from the user browser program a request to perform additional authentication between the user browser program and the authentication server using a separate communication channel. The method additionally includes comparing the first source IP address with a second source IP address associated with the request to perform the additional authentication and failing, if the first source IP address does not match the second source IP address, authentication of the user. | 2010-04-29 |
20100107229 | Method and Apparatus for Mobile Time-Based UI for VIP - A method and apparatus for time-based one-time password generation using a wireless communications device for two-factor authentication are described. The computer-implemented method comprising detecting launch of a security code generation application on a wireless communications device, generating a first unique security code upon launching the application, displaying the first security code on the wireless communications device, determining based on time whether to generate a new unique security code, and displaying the new unique security code. | 2010-04-29 |
20100107230 | SYSTEM, METHOD AND APPARATUS FOR AUTHENTICATING AND PROTECTING AN IP USER-END DEVICE - A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node. | 2010-04-29 |
20100107231 | FAILURE INDICATION - Methods and network node in a network for receiving a network access request related to a subscriber via at least one external network interface and treating the network access request by using at least a first function and second function. A failure indication related to the subscriber is obtained from at least one of the first function or the second function. The network access request is thereafter denied by sending an access result via the external network interface. The access result comprises a cause of failure indicating the at least one of the first function or the second function as a source for the failure. The first and second functions may be, for instance, an AAA function and a DHCP function. | 2010-04-29 |
20100107232 | COMMUNICATION PROTOCOL SYSTEM AND METHOD FOR A DISTRIBUTED-ARCHITECTURE HEATING, VENTILATION AND AIR CONDITIONING NETWORK - The disclosure provides an HVAC data processing and communication network and a method of manufacturing the same. In an embodiment, the network includes a user interface and a system device. The user interface is configured to publish a privilege request message to a data bus. The system device is configured to receive messages via the data bus and to store configuration data in nonvolatile memory. The system device is further configured to enable a privileged operating mode not normally available to a user of the network in response to the privilege request message. | 2010-04-29 |
20100107233 | METHOD, SYSTEM, AND APPARATUS FOR IDENTIFICATION NUMBER AUTHENTICATION - A computer based method of authentication including the steps of displaying a field operatively arranged for entry of data representative of a mathematical function of digits in a person's Social Security Number and displaying instructions to the person indicating a specific mathematical function to be performed by the person to arrive at the representative data, performing the specific mathematical function of digits in the person's Social Security Number, and comparing a result of the performing the specific mathematical function of digits in the person's Social Security Number with the received data representative of the mathematical function of digits in the person's Social Security Number to authenticate the person's identity. | 2010-04-29 |
20100107234 | METHODS FOR PROTECTING AGAINST COOKIE-POISONING ATTACKS IN NETWORKED-COMMUNICATION APPLICATIONS - The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods include the steps of: creating a protected gateway cookie, generated by a gateway, for a server cookie, generated by a server, wherein the server cookie is received by the gateway in an HTTP response message; and validating, by the gateway, that a client cookie from a client request has a corresponding gateway cookie with expected field values. Preferably, the field values include at least one field value selected from the group consisting of: a name, a hash value computed over the server cookie, a hash-function index, a timestamp, a nonce, a hash value computed over newly-generated values, a path, a domain, an expiration, and an HTTP-only value. Preferably, the gateway cookie is signed with a secret key. Most preferably, the secret key is generated by a secret seed. | 2010-04-29 |
20100107235 | METHOD AND COMMUNICATION SYSTEM FOR ACCESSING A WIRELESS COMMUNICATION NETWORK - A method for accessing a wireless communication network is described, comprising collocating a Proxy Agent apparatus with an Access apparatus and determining in a Mobile Gateway apparatus an address of the Access apparatus. The Proxy Agent apparatus comprises information about a Master apparatus, the Master apparatus being adapted for executing a master function. The method further comprises indicating a message, to be handled by the master function, as a master function message and sending the master function message to the address of the Access apparatus. Furthermore, the method comprises diverting in the Access apparatus the master function message to the Proxy Agent apparatus and forwarding the master function message to a Proxy Relay apparatus for relaying the master function message to the Master apparatus. | 2010-04-29 |
20100107236 | NETWORK SYSTEM, COMMUNICATION METHOD, COMMUNICATION TERMINAL, AND COMMUNICATION PROGRAM - Provided is a network system which attains effective prevention of information leakage without having a user recognize existence of spy ware or the like operating on a user terminal. | 2010-04-29 |
20100107237 | COMMUNICATION SYSTEM, RELIABLE COMMUNICATION MECHANISM, AND COMMUNICATION METHOD USED FOR THE SAME - Provided is a communication system capable of fundamentally preventing an attack from an unspecified counterpart and resolve problem even when a problem occurs in a user terminal or client and a server. A mediation server ( | 2010-04-29 |
20100107238 | SECURITY MODULE AND METHOD WITHIN AN INFORMATION HANDLING SYSTEM - A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to resources of a host processing system. The processing module can also include a security module configured to enable use of the resources of the host processing system using a security metric. According to an aspect, the security module can be further configured to detect the security metric, and enable access to a resource of the host processing system in response to the security metric. The security module can further be configured to disable access to another resource of the host processing system in response to the security metric. | 2010-04-29 |
20100107239 | METHOD AND NETWORK DEVICE FOR DEFENDING AGAINST ATTACKS OF INVALID PACKETS - The present invention discloses a method and network device for defending against attacks of invalid packets, pertaining to the communication field. The method includes: receiving, by a network processor, a service feature state table from a service processing layer; receiving, by the network processor, a packet, searching the service feature state table for matching information of the packet and judging whether the packet is valid according to a search result, and if the packet is invalid, discarding the packet. The network device includes a network processor and a service processing module. With the present invention, the network processor judges whether a packet is valid according to a service feature state table and discards invalid packets early according to the judgment so as to avoid the waste of device bandwidths on the invalid packets and increase the anti-attack performance and security performance of the device. | 2010-04-29 |
20100107240 | NETWORK LOCATION DETERMINATION FOR DIRECT ACCESS NETWORKS - A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller. | 2010-04-29 |
20100107241 | SECURE CACHING OF SERVER CREDENTIALS - A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot. | 2010-04-29 |
20100107242 | IMAGING SYSTEM AND AUTHENTICATION METHOD - An imaging system is disclosed that performs authentication of a user. The system includes one or more manipulation detecting parts that detect one or more manipulations by the user related to an imaging process, one or more biometric information acquiring parts that acquire biometric information of the user when the manipulation detecting parts detect the manipulations by the user, and an authentication determining part that determines an authentication result of the authentication based on the biometric information acquired by the biometric information acquiring parts. | 2010-04-29 |
20100107243 | PERMISSIONS CHECKING FOR DATA PROCESSING INSTRUCTIONS - A data processing system having a processor and a target device processes decorated instructions (i.e. an instruction having a decoration value). A device of the data processing system such as the processor sends transactions to the target device over a system interconnect. The transactions include an indication of an instruction operation, an address associated with the instruction operation, a decoration value (i.e. a command to the target device to perform a function in addition to a primary function of the executed instruction), and access permissions associated with the address. The target device (e.g. a memory with functionality in addition to storage functionality) determines whether a decoration operation specified by the decoration value is permissible based on the received access permissions. The target device performs the decoration operation if appropriate permissions exist. | 2010-04-29 |
20100107244 | Trust Event Notification and Actions Based on Thresholds and Associated Trust Metadata Scores - An approach is provided for selecting one or more trust factors from trust factors included in a trust index repository. Thresholds are identified corresponding to one or more of the selected trust factors. Actions are identified to perform when the selected trust factors reach the corresponding threshold values. The identified thresholds, identified actions, and selected trust factors are stored in a data store. The selected trust factors are monitored by comparing one or more trust metadata scores with the stored identified thresholds. The stored identified actions that correspond to the selected trust factors are performed when one or more of the trust metadata scores reach the identified thresholds. At least one of the actions includes an event notification that is provided to a trust data consumer. | 2010-04-29 |
20100107245 | TAMPER-TOLERANT PROGRAMS - Tamper-tolerant programs enable correct and continued execution despite attacks. Programs can be transformed into tamper-tolerant versions that correct effects of tampering in response to detection thereof Tamper-tolerant programs can execute alone or in conjunction with tamper resistance/prevention mechanisms such as obfuscation and encryption/decryption, among other things. In fact, the same and/or similar mechanisms can be employed to protect tamper tolerance functionality. | 2010-04-29 |
20100107246 | TERMINAL DEVICE AND METHOD FOR CHECKING A SOFTWARE PROGRAM - A terminal device according to the present invention includes: a first domain configured to execute multiple software programs; and a second domain configured to operate independently of the first domain and to check whether or not the software programs are safe. The second domain includes: an execution sequence storage unit configured to store execution priority of the multiple software programs to be executed by the first domain; a software program checking unit configured to check whether or not the multiple software programs are safe, according to the execution sequence storage unit; and an execution restricting unit configured to restrict the first domain from executing a software program included in the multiple software programs and having a check result indicating that the software program is unsafe, before checking of all the multiple, software programs is completed. | 2010-04-29 |
20100107247 | SYSTEM AND METHOD FOR IDENTIFICATION, PREVENTION AND MANAGEMENT OF WEB-SITES DEFACEMENT ATTACKS - A system and method for identifying websites' defacement attacks by identifying of unauthorized network content pages or parts of pages that are defined as defaced-pages. The application may enable identifying defacing parts of a network content page by comparing the source code of the network content page with the source code of reference defaced-pages, which may be network content pages that were already identified as unauthorized defaced-pages and their source codes have already been stored in at least one database. Once a defacing-page is identified, the system may enable removing of the defacing-page and replacing it with the last corresponding network content page that has preceded the defacing one. | 2010-04-29 |
20100107248 | REAL-TIME DATA PROTECTION METHOD AND DATA PROTECTION DEVICE FOR IMPLEMENTING THE SAME - A real-time data protection method includes: receiving input data from an input device; storing the input data; sending the input data to a computing device, thereby permitting the computing device to generate result data based on the input data; receiving the result data from the computing device; generating test data that correspond to the result data; comparing the test data to the input data; and when it is determined that the test data are not identical to the input data, indicating that the result data have been modified. A data protection device that implements the real-time data protection method is also disclosed. | 2010-04-29 |
20100107249 | Method, Apparatus, and Device for Protecting Against Programming Attacks and/or Data Corruption - The method and accompanying apparatus and device protects against programming attacks and/or data corruption by computer viruses, malicious code, or other types of corruption. In one example, signature verification policy information that identifies a plurality of policies associated with a plurality of target memory segments is programmed during a secure boot process. The programmed signature verification policy information associated with each of the plurality of target memory segments is then evaluated during run-time. Signature verification is then repeatedly performed, during run-time, on each of the plurality of target memory segments based on the programmed signature verification policy information associated with each target memory segment. | 2010-04-29 |
20100107250 | METHOD AND APPARATUS FOR DEFENDING AGAINST ARP SPOOFING ATTACKS - A method and an apparatus for defending against Address Resolution Protocol (ARP) spoofing attacks are disclosed. The method includes: when an ARP entry is updatable, judging whether the MAC address of a received ARP message is the same as the MAC address in the ARP entry, where the ARP message has the same Internet Protocol (IP) address as the ARP entry; if the MAC addresses are different, determining the received ARP message as an ambiguous ARP message and starting an ARP verification process, or else starting no ARP verification. In this way, when no address spoofing attacks occur, no verification messages are generated, and thus reducing signaling interactions and saving network resources; besides, spooling attacks possibly happening at any time are avoided, which effectively prevents address spoofing attacks via random scanning and protects the normal application of the real host. | 2010-04-29 |
20100107251 | MIME Handling Security Enforcement - A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine. | 2010-04-29 |
20100107252 | COGNIZANT ENGINES: SYSTEMS AND METHODS FOR ENABLING PROGRAM OBSERVABILITY AND CONTROLABILITY AT INSTRUCTION LEVEL GRANULARITY - The present invention is directed to system for and methods of real time observing, monitoring, and detecting anomalies in programs' behavior at instruction level. The hardware assist design in this invention provides fine grained observability, and controllability. Fine grained observability provides unprecedented opportunity for detecting anomaly. Controllability provides a powerful tool for stopping anomaly, repairing the kernel and restoring the state of processing. The performance improvement over pure software approach is estimated to be many orders of magnitudes. This invention is also effective and efficient in detecting mutating computer viruses, where normal, signature based, virus detection is under performing. | 2010-04-29 |
20100107253 | MDL COMPRESS SYSTEM AND METHOD FOR SIGNATURE INFERENCE AND MASQUERADE INTRUSION DETECTION - An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic. | 2010-04-29 |
20100107254 | NETWORK INTRUSION DETECTION USING MDL COMPRESS FOR DEEP PACKET INSPECTION - A network intrusion detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine an attack based on closeness of fit to one or more compression models. The network intrusion detection system and method can determine zero day attacks. | 2010-04-29 |
20100107255 | Intrusion Detection Using MDL Compression - An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic. | 2010-04-29 |
20100107256 | Methods for Software Virus Protection in a Digital Display Device - This invention relates to methods for identifying potentially infected files downloaded to a digital display device (“DDD”) and for managing those potentially infected files. These methods may include the steps of: connecting the DDD to a device; downloading one or more files to the DDD; disconnecting the DDD from the device; verifying and repairing the boot sector of the DDD; removing the one or more downloaded files that are not supported for playback on the DDD; and scanning the one or more downloaded files that are supported for playback on the DDD. | 2010-04-29 |
20100107257 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR DETECTING PRESENCE OF MALICIOUS SOFTWARE RUNNING ON A COMPUTER SYSTEM - A system, method and program product for detecting presence of malicious software running on a computer system. The method includes locally querying the system to enumerate a local inventory of tasks and network services running on the system for detecting presence of malicious software running on the system and remotely querying the system from a remote system via a network to enumerate a remote inventory of tasks and network services running on the system for detecting presence of malicious software running on the system, where the local inventory enumerates ports in use on the system and where the remote inventory enumerates ports in use on the system. Further, the method includes collecting the local inventory and the remote inventory and comparing the local inventory with the remote inventory to identify any discrepancies between the local and the remote inventories for detecting presence of malicious software running on the system. | 2010-04-29 |
20100107258 | METHOD AND APPARATUS FOR MANAGING CONTENTS IN MOBILE DEVICE - A method and an apparatus which permits intuitive management of a variety of digital contents stored in a mobile device. In a method for managing the contents, the mobile device determines a type of the content when a play of the content is ended. If the content is digital rights management (DRM) content, the mobile device checks a license count for authorized access to the DRM content and then determines whether or the license has expired or will expire shortly. If the license has expired, the mobile device removes the license-expired DRM content, or alternatively transfers the license-expired DRM content to a specified folder. | 2010-04-29 |
20100107259 | Authentication of HTTP Applications - An apparatus such as an HTTP proxy server compares information of a request by HTTP client logic with a known pattern of information for the client logic. When the information of the request matches the known pattern, the HTTP proxy server causes content and/or software to be communicated to the client in response to the request. Depending upon the results of the comparison, the HTTP proxy may also validate or invalidate the request before communicating it to the server. | 2010-04-29 |
20100107260 | DEVICE FOR RECEIVING DIGITAL BROADCASTS - A device comprising a receiver for receiving a broadcast; a processor for processing said broadcast to extract at least one data channel or service from said broadcast means for connecting said device to user equipment, said connecting means being arranged to establish a connection with said user equipment whereby said extracted data channel or service can be transferred securely to said user equipment. | 2010-04-29 |
20100107261 | COMMUNICATION MANAGEMENT SYSTEM AND COMMUNICATION MANAGEMENT METHOD - In a communication management system, a communication control apparatus includes: a normal signature list which stores a list of signatures of normal communication; a search circuit which acquires communication data and searches the normal signature list storing signatures of normal communication to check if the signature of the communication data appears in the list; and a process execution circuit functioning as a warning unit which issues a warning when there is detected communication data of which the signature does not match any signature of normal communication stored in the normal signature list. An operator terminal includes: a determination result acquisition unit which acquires a determination result indicating whether or not communication data against which a warning has been issued is normal; and a normal signature list update unit which, when the determination result acquisition unit acquires a determination result that communication data against which a warning has been issued is found to be normal, adds the signature of the communication data to a normal signature list. | 2010-04-29 |
20100107262 | DIGITAL RIGHTS MANAGEMENT METHOD FOR CONTENTS BASED ON STREAMING SERVICE AND SYSTEM FOR EXECUTING THE METHOD - A digital rights management (DRM) method for a content based on a streaming service and a system for executing the method are provided. The DRM method includes the steps of: generating and maintaining content information about a content; and updating a number of plays of the content information when play information is received from a service page displaying the content, wherein the content and a cloned identical content are classified using different identifiers. | 2010-04-29 |
20100107263 | C-REACTIVE PROTEIN (CRP) KNOCKOUT MOUSE - The instant invention relates to a transgenic, non-human animal that carries a mutation in the gene encoding C-reactive protein (CRP). Preferably, the invention relates to an animal comprising a homozygous CRP-deficient mouse and techniques for producing such animals. The invention also relates to organs, tissues, cells, cell lines and sub-cellular fractions derived from such animals. Techniques for generating total or tissue-specific CRP knockout animals are also described. The invention further relates to the use of such knockout animals for the study of the role of CRP proteins in vivo or ex vivo, particularly in relation to its role in inflammatory pathway and in the etiology human diseases. | 2010-04-29 |
20100107264 | DEVELOPMENT OF INFLUENZA A ANTIVIRALS - The present invention includes compositions, methods and systems to isolate and characterize novel antiviral agents by contacting the antiviral agent with the F2F3 zinc fingers of a CPSF30 protein and an Influenza A NS1A protein; and determining whether the binding between the CPSF30 protein and the Influenza A NS1A protein is reduced. | 2010-04-29 |
20100107265 | Double-muscling in mammals - The invention relates to a gene (cDNA) encoding a bovine myostatin protein. The nucleic acid coding sequence is identified as SEQ ID NO:1 and the protein sequence is identified as SEQ ID NO:2. A mutant gene (SEQ ID NO:3) in which the coding sequence lacks an 11-base pair consecutive sequence (SEQ ID NO:11) of the sequence encoding bovine protein having myostatin has been sequenced. It has been shown that cattle of the Belgian Blue breed homozygous for the mutant gene lacking myostatin activity are double-muscled. A method for determining the presence of muscular hyperplasia in a mammal is described. The method includes obtaining a sample of material containing DNA from the mammal and ascertaining whether a sequence of the DNA encoding (a) a protein having the biological activity of myostatin, is present and whether a sequence of the DNA encoding (b) an allelic protein lacking the activity of (a), is present. The absence of (a) and the presence of (b) indicates the presence of muscular hyperplasia in the mammal. The invention provides a transgenic non-human male mammal exhibiting muscular hypertrophy, in particular, a transgenic bovine. Methods for preparing these transgenic animals is also described. | 2010-04-29 |
20100107266 | Echinacea purpurea G0052Y - The present invention relates to an | 2010-04-29 |
20100107267 | COTTON VARIETY MCS0701B2RF - The invention relates to the novel cotton variety designated MCS0701B2RF. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety MCS0701B2RF. Also provided by the invention are tissue cultures of the cotton variety MCS0701B2RF and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety MCS0701B2RF with itself or another cotton variety and plants produced by such methods. | 2010-04-29 |
20100107268 | COTTON VARIETY MCS0702B2RF - The invention relates to the novel cotton variety designated MCS0702B2RF. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety MCS0702B2RF. Also provided by the invention are tissue cultures of the cotton variety MCS0702B2RF and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety MCS0702B2RF with itself or another cotton variety and plants produced by such methods. | 2010-04-29 |
20100107269 | COTTON VARIETY MCS0711B2RF - The invention relates to the novel cotton variety designated MCS0711B2RF. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety MCS0711B2RF. Also provided by the invention are tissue cultures of the cotton variety MCS0711B2RF and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety MCS0711B2RF with itself or another cotton variety and plants produced by such methods. | 2010-04-29 |
20100107270 | COTTON VARIETY MX0622B2RF - The invention relates to the novel cotton variety designated MX0622B2RF. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety MX0622B2RF. Also provided by the invention are tissue cultures of the cotton variety MX0622B2RF and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety MX0622B2RF with itself or another cotton variety and plants produced by such methods. | 2010-04-29 |
20100107271 | COTTON VARIETY MX0623B2RF - The invention relates to the novel cotton variety designated MX0623B2RF. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety MX0623B2RF. Also provided by the invention are tissue cultures of the cotton variety MX0623B2RF and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety MX0623B2RF with itself or another cotton variety and plants produced by such methods. | 2010-04-29 |
20100107272 | COTTON VARIETY MCS0747B2RF - The invention relates to the novel cotton variety designated MCS0747B2RF. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety MCS0747B2RF. Also provided by the invention are tissue cultures of the cotton variety MCS0747B2RF and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety MCS0747B2RF with itself or another cotton variety and plants produced by such methods. | 2010-04-29 |
20100107273 | COTTON VARIETY ST 5458B2RF - The cotton variety ST 5458B2RF is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety ST 5458B2RF with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of ST 5458B2RF and to plants of ST 5458B2RF reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from ST 5458B2RF. | 2010-04-29 |
20100107274 | COTTON VARIETY ST 4498B2RF - The cotton variety ST 4498B2RF is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety ST 4498B2RF with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of ST 4498B2RF and to plants of ST 4498B2RF reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from ST 4498B2RF. | 2010-04-29 |
20100107275 | BROADLY EXPRESSING REGULATORY REGIONS - Regulatory regions suitable for directing expression of a heterologous polynucleotide in plant tissues, e.g., flower and silique tissues, are described, as well as nucleic acid constructs that include these regulatory regions. Also disclosed are transgenic plants that contain such constructs and methods of producing such transgenic plants. | 2010-04-29 |
20100107276 | Compositions and Methods Using RNA Interference Targeting MTHFR-Like Genes for Control of Nematodes - The present invention concerns double stranded RNA compositions and transgenic plants capable of inhibiting expression of genes essential to establishing or maintaining nematode infestation in a plant, and methods associated therewith. Specifically, the invention relates to the use of RNA interference to inhibit expression of a target plant gene, which is an MTHFR-like gene, and relates to the generation of plants that have increased resistance to parasitic nematodes. | 2010-04-29 |
20100107277 | FLAVONOID 3',5' HYDROXYLASE GENE SEQUENCES AND USES THEREFOR - The present invention relates generally to a genetic sequence encoding a polypeptide having flavonoid 3′,5′-hydroxylase (F3′5′H) activity and to the use of the genetic sequence and/or its corresponding polypeptide thereof inter alia to manipulate color in flowers or parts thereof or in other plant tissue. More particularly, the F3′5′H has the ability to modulate dihydrokaempferol (DHK) metabolism as well as the metabolism of other substrates such as dihydroquercetin (DHQ), naringenin and eriodictyol. Even more particularly, the present invention provides a genetic sequence encoding a polypeptide having F3′5′H activity when expressed in rose or gerbera or botanically related plants. The instant invention further relates to antisense and sense molecules or RNAi-inducing molecules corresponding to all or part of the subject genetic sequence or a transcript thereof. The present invention further relates to promoters which operate efficiently in plants such as rose, gerbera or botanically related plants. | 2010-04-29 |
20100107278 | Expression Cassettes For Root-Preferential Expression In Plants - The present invention relates to expression cassettes comprising transcription regulating sequences with root-preferential or root-specific expression profiles in plants obtainable from | 2010-04-29 |
20100107279 | YIELD-RELATED POLYNUCLEOTIDES AND POLYPEPTIDES IN PLANTS - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties compared to a reference plant. Sequence information related to these polynucleotides and polypeptides can also be used in bioinformatic search methods and is also disclosed. | 2010-04-29 |
20100107280 | KERNEL PRODUCTIVITY OF PLANTS THROUGH THE MODULATION OF GLUTAMINE SYNTHETASE ACTIVITY - The invention relates to a method for improving the kernel productivity of a maize plant, wherein said method comprises overexpressing in said plant at least one glutamine synthetase isoenzyme, in order to increase the number and/or the size of kernels. | 2010-04-29 |
20100107281 | PESTICIDAL COMBINATIONS - A method of controlling or preventing nematode and/or pathogenic damage in a plant propagation material, a plant, and/or plant organs that grow at a later point in time, which comprises applying on the plant, part of the plant, or the surrounding area thereof, a pesticidal combination comprising, for example, at least two active ingredient components optionally together with one or more customary formulation auxiliaries, wherein component (I) is one or more nematicide(s) and component (II) is one or more plant activator(s), in any desired sequence or simultaneously. Furthermore, the invention relates to a method of controlling or preventing nematode and/or pathogenic damage in a plant propagation material, a plant, and/or plant organs that grow at a later point in time, which comprises applying on the plant, part of the plant, or the surrounding area thereof, a pesticidal combination comprising two or more nematicides optionally together with one or more customary formulation auxiliaries, in any desired sequence or simultaneously. | 2010-04-29 |
20100107282 | THERMOSTABLE CELLULASE AND METHODS OF USE | 2010-04-29 |
20100107283 | Chimeric Regulatory Elements for Gene Expression in Leaf Mesophyll and Bundle Sheath Cells - The present invention provides chimeric regulatory elements constructed from gene regulatory element polynucleotide molecules isolated from the | 2010-04-29 |
20100107284 | Cantilever, cantilever system, scanning probe microscope, mass sensor apparatus, viscoelasticity measuring instrument, manipulation apparatus, displacement determination method of cantilever, vibration method of cantilever and deformation method of cantilever - Provided is a cantilever that is capable of bending and deforming in an active manner by itself. The cantilever includes: a lever portion having a proximal end that is supported by a main body part; and a resistor member that is formed in the cantilever and generates heat when a voltage is applied, to thereby deform the lever portion by thermal expansion due to the heat. | 2010-04-29 |
20100107285 | TUNABLE BIO-FUNCTIONALIZED NANOELECTROMECHANICAL SYSTEMS HAVING SUPERHYDROPHOBIC SURFACES FOR USE IN FLUIDS - Tunable, bio-functionalized, nanoelectromechanical systems (Bio-NEMS), micromechanical resonators (MRs), nanomechanical resonators (NRs), surface acoustic wave resonators, and bulk acoustic wave resonators having superhydrophobic surfaces for use in aqueous biochemical solutions. The MRs, NRs or Bio-NEMS include a system resonator that can vibrate or oscillate at a relatively high frequency and to which an analyte molecule(s) contained in the solution ○ can attach or upon which small molecular-scale forces can act; a device for adjusting a relaxation time of the solution, to increase the quality (Q-factor) of the resonator inside the solution, to reduce energy dissipation into the solution; and a device for detecting a frequency shift in the resonator due to the analyte molecule(s) or applied molecular-scale forces. The resonator can include roughness elements that provide superhydrophobicity and, more particularly, gaps between adjacent asperities for repelling the aqueous solution from the surface of the device. | 2010-04-29 |
20100107286 | Almond tree named 'Zohar' - A new and distinct almond variety of | 2010-04-29 |
20100107287 | Almond tree named 'Matan' - A new and distinct almond variety of | 2010-04-29 |
20100107288 | AVOCADO TREE NAMED 'MALUMA' - ‘Maluma’ avocado ( | 2010-04-29 |
20100107289 | Poinsettia plant named 'NPCW08153' - A new poinsettia plant particularly distinguished by a medium early flowering season, medium vigor, with medium to large bracts, thick and upright v-shaped stems and a brilliant bract color is disclosed. | 2010-04-29 |
20100107290 | NEW GUINEA IMPATIENS PLANT NAMED 'SAKIMP008' - A New Guinea | 2010-04-29 |