28th week of 2012 patent applcation highlights part 59 |
Patent application number | Title | Published |
20120180086 | TERRESTRIAL/ SATELLITE SET-TOP-BOX SYSTEM WITH DOCKING STATION - A terrestrial/satellite set-top-box (STB) system is provided. The system includes a handheld device and an STB. The handheld device has a built-in interactive application program. The STB includes a docking station and a playing circuit. The docking station carries the handheld device. The handheld device can be used for setting or remotely controlling the STB. The STB is linked to a wireless network via the handheld device so as to play movies and news programs from the network. The invention can solve the disadvantage of failing wirelessly to link network in the prior art. | 2012-07-12 |
20120180087 | METHOD OF PROCESSING NON-REAL TIME SERVICE AND BROADCAST RECEIVER - A method of receiving and processing a broadcast signal including a Non-Real Time (NRT) service and a broadcast receiver are disclosed herein. A method of processing a Non-Real Time (NRT) service in a broadcast receiver, the method comprises receiving and processing a signaling information table including access information of the NRT service, receiving data of the NRT service based on the signaling information table in non-real time and storing the received data of the NRT service in a storage medium, extracting service information including service type of the NRT service and detail information of the NRT service from the signaling information table, and controlling processes of the NRT service based on the extracted service information. | 2012-07-12 |
20120180088 | SYSTEM AND METHOD FOR EFFECTIVELY IMPLEMENTING A PERSONAL CHANNEL FOR INTERACTIVE TELEVISION - A system and method for effectively implementing a personal channel for interactive television comprises a personal channel manager that may include a configuration module, a search module, and a content packaging module. A system user may utilize the configuration module to perform a personal channel configuration procedure to specify personal channel configuration data for performing a content record search procedure. The search module may manage the content record search procedure according to one or more search parameters that may be defined during the personal channel configuration procedure. The search module finds content records from content databases during the foregoing content record search procedure. The content packaging module coordinates a content record sorting procedure according to user-specified sorting criteria. | 2012-07-12 |
20120180089 | METHODS AND APPARATUS FOR PROVIDING MEDIA ON MOBILE DEVICES - Techniques and mechanisms are provided for sending targeted content and data to mobile devices. Location information associated with a device is determined. In some instances, the location information is manually entered. In other instances, the location information is determined automatically from characteristics associated with the device. Location information can be obtained from global positioning system (GPS) data, cell-site triangulation, Internet Protocol (IP) address detection, etc. Content and advertising can be provided in a location relevant manner to the mobile device. | 2012-07-12 |
20120180090 | METHOD FOR DISPLAYING VIDEO AND BROADCAST RECEIVING APPARATUS APPLYING THE SAME - A method for displaying video and a broadcast receiving apparatus applying the same. The broadcast receiving apparatus includes an output unit which outputs a user interface window containing a plurality of groups having at least one broadcast channel, an input unit which receives a zapping command, a receiving unit which is tuned to a broadcast channel and receives a broadcast signal, and a control unit which controls the receiving unit, if one from among the plurality of groups categorized according to at least one criterion of categorization is selected and the zapping command is inputted, so that the receiving unit is tuned to the broadcast channels belonging to the selected group in sequence. | 2012-07-12 |
20120180091 | METHOD FOR PROCESSING TARGETING DESCRIPTOR IN NON-REAL-TIME RECEIVER - A method of receiving a broadcast signal including a Non-Real-Time (NRT) Receiver Targeting service is disclosed herein. A method of receiving a broadcast signal including a Non-Real-Time (NRT) Receiver Targeting service, the method comprises receiving broadcast signal including first signaling information and second signaling information, identifying an NRT service based on the first signaling information, parsing a Receiver Targeting Descriptor from the second signaling information, determining validity of the NRT service or an NRT content based on a targeting_criterion_type_code included in the Receiver Targeting Descriptor, and downloading the NRT service or the NRT content when a receiver determines the NRT service or the NRT content to be valid. | 2012-07-12 |
20120180092 | METHOD AND SYSTEM FOR ELECTRONIC COMMUNICATION TO TELEVISION - A system and method of displaying messages at a television is described. The method of displaying messages at a television includes: establishing communication over the Internet between a television and a server. A user-generated communication is received at the television from the server. A notification is displayed on the television that the user-generated communication has been received. The user-generated communication is displayed on the television. | 2012-07-12 |
20120180093 | HOME THEATER SYSTEM, AUDIO/VIDEO PLAYBACK DEVICE, AUDIO OUTPUT CONTROL DEVICE, AND VOLUME CONTROL METHOD - A CPU in a home theater device transmits current sound volume control status data to a digital television receiving device when a theater mode is set. A CPU in the digital television receiving device updates, when the sound volume control status data has been received from the home theater device, sound volume control status data stored in a memory with the received sound volume control status data. A CPU in the digital television receiving device determines sound volume setting value data after an operation based on sound volume operation information fed from a remote control device and the sound volume control status data stored in the memory, and transmits a CEC command including the determined sound volume setting value data to the home theater device while displaying a ratio of the current sound volume to a maximum value in a sound volume adjustable range of the home theater device on a display. | 2012-07-12 |
20120180094 | INTRA-PREMISES WIRELESS BROADBAND SERVICE USING LUMPED AND DISTRIBUTED WIRELESS RADIATION FROM CABLE SOURCE INPUT - A system that incorporates teachings of the present disclosure may include, for example, includes a broadband signal access point, which may be located internally or externally to the premises, in combination with the existing cabling is used with radiation device(s) to provide distribution of services, including broadband services, within the premises. Additional embodiments are disclosed. | 2012-07-12 |
20120180095 | TRANSMITTER AND TRANSMISSION METHOD - Ease of use for the user is provided when a client copies or moves a content in a server by considering copying or moving of management information associated with the content. The present invention is so configured to show that it has a chapter information sharing means as extension information of equipment information of the server, and to allow a client to obtain chapter information from the server when the content is copied or moved. | 2012-07-12 |
20120180096 | RECEIVER SET, INFORMATION APPARATUS AND RECEIVING SYSTEM - An information apparatus connectable with plural external apparatuses including an audio visual data outputting portion, a command input portion which inputs a command from an external apparatus for requesting audio visual data, an information managing portion which manages a number of external apparatuses to audio visual data can be distributed to be simultaneously viewed or recorded and a controller portion which controls distribution of the data to the external apparatus which sent the command depending upon a distributing condition. The controller portion makes a decision on whether the number of external apparatuses to which data can be distributed is equal to or smaller than a limited number, and controls the distribution of data to the external apparatus based on a result of the decision. | 2012-07-12 |
20120180097 | SYSTEMS AND METHODS FOR DISTRIBUTING SOFTWARE FOR A HOST DEVICE IN A CABLE SYSTEM - Flexible systems and methods are disclosed that may be used for provisioning, configuring, and controlling a host embodied in a cable set top box or other digital device attached to a digital communication network, such as cable distribution network. An enhanced services system maintains various host files for various types of hosts that a cable subscriber may purchase and connect to the cable network. The Enhanced Services Server interacts with the host using the host files. The host files may be downloaded from the host manufacturer into a database that distributes the modules as required to the various enhanced services systems. The host may be purchased by the cable subscriber and provisioning may be initiated by the retailer at the time of purchase using a provisioning network interacting with the appropriate cable system serving the subscriber. This abstract is not intended to limit or construe the scope of the claims. | 2012-07-12 |
20120180098 | IPTV RECEIVER AND CONTENT-DOWNLOADING METHOD FOR SAME - Disclosed are an IPTV, and a content-downloading method for the IPTV. The content-downloading method of the IPTV, according to one embodiment of the present invention, comprises the steps of: accessing an IPTV network and receiving Service Discovery and Selection (SD&S) information containing Open Internet Content Delivery (OICD) service information; parsing the OICD service information to obtain location information of an OICD provider; and accessing the OICD provider via the location information of the OICD provider, wherein said OICD service information contains the location information of the OICD provider which provides network information for downloading content using a peer-to-peer scheme. | 2012-07-12 |
20120180099 | Monitoring Presentation Timestamps - Techniques to monitor presentation timestamps for content are described, which may be used to render content at a client. In an implementation, content is received having timestamps that define expected timing for output of the content at a client. The timestamps may then be monitored and compared to a client clock to determine if the content rendered matches the content expected to be rendered. When a discrepancy is detected, one or more corrective actions may be undertaken to restore output of the content to the timing defined by the timestamps. | 2012-07-12 |
20120180100 | Method and Apparatus for Archiving Media Content - The present invention is directed to a method and apparatus for archiving media content, and more particularly to archiving television and radio broadcasts for later delivery, on-demand, via the Internet. A capture server is used to receive and gather a plurality of media sources for archiving and subsequent delivery to client users. The capture server is capable of receiving numerous digital or analog media signals from a variety of media sources, including transmission through traditional broadcast, coaxial cable, the Internet, personal and public camera systems and the like, and converting these media signals into addressable blocks of media content. Furthermore, the capture server is capable of encoding received media signals, particularly analog media signals, applying an application programming interface and preparing the media signals for implementation by the system in an identifiable form or architecture. | 2012-07-12 |
20120180101 | QUALITY FEEDBACK MECHANISM FOR BANDWIDTH ALLOCATION IN A SWITCHED DIGITAL VIDEO SYSTEM - A method is provided which is suitable for implementation in a switched digital video content-based network, wherein a head end obtains a first group of program streams and sends to a client only a subset of the program streams selected by subscribers in a neighborhood of the client. At least one of imminence and presence of a condition of inadequate bandwidth is determined. Responsive to the determining of the at least one of imminence and presence of the condition of inadequate bandwidth, a bit rate of at least one of the subset of the program streams selected by the subscribers in the neighborhood of the client is dynamically decreased by adjusting encoding thereof, while maintaining adequate quality for the at least one of the subset of the program streams selected by the subscribers in the neighborhood of the client, based on an objective quality measure, in order to address the at least one of imminence and presence of the condition of inadequate bandwidth. | 2012-07-12 |
20120180102 | REALIZATION METHOD, DEVICE, AND SYSTEM FOR BROADCAST SERVICE GROUPING - A method, device and system for broadcast service grouping are provided. The method includes: receiving, by a terminal, at least one virtual channel table delivered by a network side, where the virtual channel table includes a first checksum and a data object that are generated by the network side, and the data object includes channel information; using a preset broadcast service group identifier and the data object of the virtual channel table to acquire a second checksum of the preset broadcast service group identifier and the data object of the virtual channel table; and acquiring a virtual channel table that passes check from the at least one virtual channel table delivered by the network side, when the first checksum matches the second checksum. | 2012-07-12 |
20120180103 | Garage management system - A garage management and monitoring system defines and manages each operational event in a parking facility. Access events, management events, equipment operation events, equipment malfunction events, security events and defined anomaly events are labeled and parsed into a relational database, which is used for generating reports, creating logs, making management decisions, reconstructing accidents, and so on. The equipment includes a computer terminal, a reader, an identifying item or code capable of being read by the reader to control access to the facility, an IP camera, and a garage door or vehicle gate with safety sensors. Each defined event can be codified on the server and/or local controller to create an event library that is downloaded to the controller. | 2012-07-12 |
20120180104 | METHOD OF GENERATING SECURITY RULE-SET AND SYSTEM THEREOF - There are provided a method of automated generation of a security rule-set and a system thereof. The method comprises: obtaining a group of log records of communication events resulting from traffic related to the security gateway; generating a preliminary rule-set of permissive rules, said set covering the obtained group of log records; generating, with the help of mapping the generated preliminary rule-set to the obtained group of log records, a rule-set of non-overlapping rules covering the group of log records; and generating an operational rule-set by processing the generated rule-set of non-overlapping rules, said processing including mapping the generated rule-set of non-overlapping rule to the obtained group of log records. | 2012-07-12 |
20120180105 | SYSTEMS, METHODS, AND APPARATUS FOR FACILITATING CLIENT-SIDE DIGITAL RIGHTS COMPLIANCE - According to one aspect there is provided a method and an apparatus for facilitating intellectual property rights compliance that is compliant with a same-origin security policy that prohibits the application from executing application-specific instructions from the first domain that access application-specific instructions from the second domain. The method includes receiving a structured document from a first domain, the structured document having at least one content object, a reference to at least one digital rights compliance (DRC) object located on a second domain and associated with the at least one content object, and application-specific instructions being executable by the application. The at least one DRC object is defined in a non-executable format and contains information indicative of rights associated with the at least one content. | 2012-07-12 |
20120180106 | TRUSTED QUERY NETWORK SYSTEMS AND METHODS - Systems and methods are disclosed with which queries can be sent to various clients of a trusted query network in a trusted query network message. In one embodiment, each registered client receives the message and determines whether or not it will participate in the query. If so, the client adds to the message in a first data round a true response to the query and obfuscation data, and then forwards the message on to the next client (or back to the client that initiated the query if each client has added its data to the message). In a second round, the message is again sent to each participating client, which this time removes its obfuscation data. Once each client has removed its obfuscation data, a final result is obtained that can be sent to each of the clients. | 2012-07-12 |
20120180107 | GROUP-ASSOCIATED CONTENT RECOMMENDATION - A method of generating content recommendations to groups of users is provided. The method includes establishing a group, determining group-associated characteristics, where such characteristics include preferences independent of any merging, intersection or other combination of individual preferences of the group members, and providing content recommendations to the group based on the group-associated characteristics. | 2012-07-12 |
20120180108 | METHODS AND SYSTEMS FOR PROVIDING A DISCUSSION THREAD TO KEY PERFORMANCE INDICATOR INFORMATION - Systems and methods for providing a discussion thread to key performance indicator information displayed on a dashboard are disclosed. The system may include a renderer for rendering a dashboard displaying a key performance indicator value corresponding to at least one business value. The system may also include a comment module that is configured to: receive a comment corresponding to the displayed key performance indicator value, and generate a discussion thread including the received comment. The generated dashboard can then be rendered by the renderer in association with the displayed key performance indicator value. In some cases, the discussion thread can include a plurality of related comments. | 2012-07-12 |
20120180109 | Object Model for Domain-Based Content Mobility - In embodiments of an object model for domain-based content mobility, a client object model architecture ( | 2012-07-12 |
20120180110 | Data Communication Authentication System and Method - A data communication authentication system ( | 2012-07-12 |
20120180111 | CONTENT OBJECT ENCAPSULATING CONTENT ITEMS FOR ACCESSING CONTENT AND ACCESS AUTHORIZATION INFORMATION - Provided are a method, system, and computer program product for a content object encapsulating content items for accessing content and access authorization information. User input of content items is received, wherein each content item indicates a network address and content type of content at the network address. The content items are added to a content object in a computer readable storage. User input is received of access authorization information indicating a user having authority to access the content object. The access authorization information is added to the content object. A user request is received for the content object from a client computer over a network. The access authorization information is processed to determine whether the user at the client computer initiating the request has authorization to access the content object. The content object is processed to generate a presentation page to return to the client computer in response to determining that the user of the client computer is authorized to access the content object. | 2012-07-12 |
20120180112 | Lifecycle Management of Privilege Sharing Using an Identity Management Systen - A method, system and computer-usable medium are disclosed for managing the lifecycle of a shared privileged account. A proxy service is implemented with an Identity Management (IdM) system that defines and manages a plurality of identity services, which in turn manage a plurality of privileged accounts used to access a plurality of managed targets. Each of the identity services is mapped to a privilege group of the proxy service and an ID pool manager is implemented to manage sharing of the privileged accounts. A request is generated to access a managed target with a privileged account. A shared privileges module generates a shared ID authorization account and associates it with the requestor. The shared ID authorization account is populated with sign out information for a shared privileged account, which the requestor uses to access the corresponding managed target. | 2012-07-12 |
20120180113 | SYSTEM AND METHOD FOR PEER-TO-PEER HYBRID COMMUNICATIONS - An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables two endpoints to directly establish and maintain a communication session after authenticating with an access server. | 2012-07-12 |
20120180114 | Method and System for Subscriber to Log in Internet Content Provider (ICP) Website in Identity/Location Separation Network and Login Device Thereof - The present invention provides a method and system for a user to log in an Internet Content Provider (ICP) website in an identification location separation network and a login device thereof. The method includes: after receiving an access data packet of a user, the ICP website obtaining an identification code of the user therein, and transmitting the identification code of the user to an Internet Service Provider (ISP) authentication center; the ISP authentication center authenticating the user based on the identification code of the user, and if the authentication is passed, the ISP authentication center returning an authentication passed message, which contains the identification code of the user, to the ICP website; after receiving the authentication passed message, the ICP website obtaining personal information of the user according to the identification code of the user, and then the user logging in the ICP website. | 2012-07-12 |
20120180115 | METHOD AND SYSTEM FOR VERIFYING A USER FOR AN ONLINE SERVICE - A system and method for verifying a user of an online or web service. According to an embodiment, a web page is provided to user for capturing an image of the user together with an embedded verification code. The captured image is provided to a verifier agent and the embedded verification code is compared to an original verification code associated with the user. If there is a match, the user is verified and an account can be created for the user. If there is no match, then the user can be rejected or the verification can be escalated to review by a supervisory agent. According to an embodiment, the embedded verification code comprises a visual representation of the code on a substrate that has been mechanically manipulated. | 2012-07-12 |
20120180116 | SYSTEMS AND METHODS FOR PROVIDING SECURE ELECTRONIC DOCUMENT STORAGE, RETRIEVAL AND USE WITH ELECTRONIC USER IDENTITY VERIFICATION - Systems and methods for efficient and timely electronic new user authentication in a digital mailbox system using a sliding scale approach to include one or more identity authentication systems as appropriate for system security needs are provided. The system first obtains new user name and address data. Because the address is an important data point, the system first verifies the address before expending the resources of an identity data search. If the address is valid, the system calls an identity verification system and provides an identity quiz to the user based upon additional identity verification data. If the user passes the quiz, then a new account is setup and any other systems users having an account at that address are notified. | 2012-07-12 |
20120180117 | Method for Realizing End-to-End Call, End-to-End Call Terminal and System - A method for implementing an end-to-end call, an end-to-end call terminal and a system are provided in the present invention, wherein, the end-to-end call service server is not involved, and the end-to-end communication is employed between users, therefore the reliability risk of single-point failure in the registration server in the existing system is avoided. An end-to-end service is initiated without servers so that trade secrets will not be leaked by the operator, and thus the present invention effectively avoids number stealing in end-to-end calls, and has high reliability and security. In addition, after a terminal logs in the new network and initiates the end-to-end call function, the terminal can directly use the end-to-end call service with no need of entering a username and a password to log in the end-to-end call system, and thus it is more convenient to use. | 2012-07-12 |
20120180118 | Method and System for Transmitting Authentication Context Information - A system of the present invention uses an identity provider to provide the authentication services for multiple service providers. An identity provider communicates with one or more service providers. A user that wishes to gain access to a service provider is authenticated through the use of the identity provider. A user desiring to access a service provider is first authenticated by the identity provider. The identity provider determines if the user meets the desired class level and provides various information related to the authentication. When the user attempts to access a second service provider that is associated with the same identity provider, the second service provider accesses the identity provider and determines that the user was recently authenticated. The identity provider then transmits the relevant information regarding the authentication process to the second service provider, which can then allow or deny the user access to the second service provider. | 2012-07-12 |
20120180119 | Session Initiation Protocol (SIP) Firewall For IP Multimedia Subsystem (IMS) Core - A SIP firewall defends an IMS network against SIP registration-based DoS/DDoS attacks by issuing fake authentication challenges when suspiciously high registration traffic is present. The fake authentication challenges include a predictive nonce that is to be used in the challenge response, thus forcing users to be state-aware and to issue the SIP registration requests from valid IP address in order to successfully respond to the fake authentication challenges. Upon confirming an association between the challenge response and the fake authentication challenges, the firewall opens a registration window to a protected node of the core network. In such manner, the firewall opens a registration window to (unauthenticated) legitimate users while stopping DDoS mode of registrations (or at least making them extremely difficult and costly) without impacting or involving the protected node. | 2012-07-12 |
20120180120 | SYSTEM FOR DATA LEAK PREVENTION FROM NETWORKS USING CONTEXT SENSITIVE FIREWALL - Method and system of preventing data leak in a network that allows for context based access of network resources by network users is provided. Where the communication network can be an open network like the internet or a closed network like a company's Local Area Network (LAN). The network resource may be any application, website, program, communication means etc. available by accessing the network. A request is sent to a network firewall to access a web application, where the web application is identified. A context template is created for the web application, and compared with the request to create a request context map. The request context map is compared to a request context rule on the network firewall. Access is provided to the web application when the request context map matches the request context rule. | 2012-07-12 |
20120180121 | PROVISIONING/CONFIGURATION SYSTEMS FOR VPN TO VPN BRIDGING FOR IP VIDEO CONFERENCING - Internet Protocol (IP) video conferencing bridging provisioning/configuration systems receive a service order associated with a customer, where the service order requests enrollment of the customer in a Virtual Private Network (VPN) to VPN bridging network service for IP video conferencing. The provisioning/configuration systems orchestrate, based on the service order, configuration of multiple network nodes in a network that provides the VPN to VPN bridging network service for IP video conferencing to the customer to enable IP video conferencing calls to be made from the customer via the network to another customer on a different VPN. | 2012-07-12 |
20120180122 | IMPLEMENTATION METHOD AND SYSTEM OF VIRTUAL PRIVATE NETWORK - An implementation method and system of a virtual private network (VPN) are provided in the invention, wherein, the VPN dedicated mapping table of the VPN is stored in the mapping plane in the identity and location separation network, and it is determined whether to achieve the communication between the VPN end host users in the VPN or not according to the VPN dedicated mapping table, thereby the VPN is efficiently achieved in the identity and location separation network, meeting the user requirements for the VPN, eliminating the influence of the identity and location separation technical solution on the traditional VPN service, and reducing the changes on the existing devices and software tools due to the implementation of VPN. | 2012-07-12 |
20120180123 | TRUSTED VENDOR ACCESS - A system is provided and facilitates management of a device by a first entity and management of a third entity by a second entity, wherein by way of the system access rights permitting access otherwise prevented by the device are assignable by the first entity to the second entity, the access rights are able to be administrated by the second entity to the third entity, and the access is obtainable by the third entity using a combination of the access rights and personal identification information to affect the device. | 2012-07-12 |
20120180124 | AUTHENTICATION RISK EVALUATION - A computer is configured to receive an authentication request that identifies one or more authentication form factors, and for each form factor identified, further identifies at least one parameter. The computer is further configured to generate a risk score for the authentication request using the parameter, the risk score being based at least in part on a complexity associated with each of the one or more authentication form factors. The computer is further configured to provide the risk score to a requester. | 2012-07-12 |
20120180125 | METHOD AND SYSTEM FOR PREVENTING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS - A method for preventing domain name system cache poisoning attacks comprises steps of inputting a domain name by an internet application program of an Internet communication device, determining in which area the Internet communication device is located, randomly selecting at least two domain name system resolvers of the area, retrieving at least one Internet protocol address from the domain name system resolvers and evaluating the Internet protocol addresses to generate at least one security score, selecting a trustworthy Internet protocol address based on the security scores, comparing the security score of the selected Internet protocol address with a predetermined security score threshold, and sending the trustworthy Internet protocol address to the Internet application program of the Internet communication device when the security score is greater than the security score threshold. A system for preventing domain name system cache poisoning attacks comprises an Internet communication device and an optional proxy server. | 2012-07-12 |
20120180126 | Probable Computing Attack Detector - A probable computing attack detector monitors electrical power consumption of a computing device. Task data may be acquired for at least one task operating on the computing device. A predicted electrical power consumption may be calculated for the computing device employing a user-centric power model and the task data. A probable attack may be detected when the electrical power consumption disagrees with the predicted electrical power consumption by a determined margin. | 2012-07-12 |
20120180127 | SYSTEM AND METHOD FOR IMPLEMENTING A HIDDEN SERVER - A technology for preventing network attacks. A service request is intercepted at an unaddressed port of a hidden device from a second device. The service request intended for a visible device is processed by the hidden device. A response may be provided based on the processing and sent to the second device. | 2012-07-12 |
20120180128 | Preventing Cross-Site Request Forgery Attacks on a Server - Preventing Cross-Site Request Forgery security attacks on a server in a client-server environment. In one aspect, this comprises embedding a nonce and a script in all responses from the server to the client wherein, when executed, the script adds the nonce to each request from the client to the server; sending the response with the nonce and the script to the client; and verifying that each request from the client includes the nonce sent by the server to the client. The script preferably modifies all objects, including dynamically generated objects, in a server response that may generate future requests to the server to add the nonce to the requests. The server verifies the nonce value in a request and optionally confirms the request with the client if the value differs from the value previously sent. Server-side aspects might be embodied in the server or a proxy. | 2012-07-12 |
20120180129 | SYSTEM AND METHOD FOR PREVENTING WEB FRAUDS COMMITTED USING CLIENT-SCRIPTING ATTACKS - A method for detecting and blocking Javascript hijacking attacks, comprising checking if an incoming request belongs to a valid session established between a client and a trusted server. When said incoming request does belong to a valid session, it is checked if a Referer header of said incoming request includes a valid domain name. The incoming request is marked as suspicious, when said incoming request does not include a valid domain name. It is checked if a respective response of said suspicious incoming request includes a script code. A preventive action responsive to a user input is taken when said respective response includes a script code. | 2012-07-12 |
20120180130 | METHOD FOR DEFENDING AGAINST DENIAL-OF-SERVICE ATTACK ON THE IPV6 NEIGHBOR CACHE - A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries currently stored in the neighbor cache and then determining whether the number of entries exceeds a neighbor cache threshold that is less than a neighbor cache limit defining a maximum capacity of the neighbor cache. When the number of entries in the neighbor cache exceeds the neighbor cache threshold, stateless neighbor resolution is triggered. Stateless neighbor resolution entails sending a neighbor solicitation to resolve an address for an incoming packet without logging a corresponding entry in the neighbor cache. Additional techniques that complement the above method involve purging of neighbor cache entries designated as incomplete, prioritization of the entries based on trustworthiness, shortening the incomplete-status timer to less than 3 seconds, and curtailing the number of retransmissions of the neighbor solicitations. | 2012-07-12 |
20120180131 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING UNWANTED ACTIVITY UTILIZING A HONEYPOT DEVICE ACCESSIBLE VIA VLAN TRUNKING - A system, method, and computer program product are provided for identifying unwanted activity utilizing a honeypot accessible via virtual local area network (VLAN) trunking. In use, a honeypot device is allowed to be accessed via VLAN trunking. Furthermore, unwanted data is identified, utilizing the honeypot device. | 2012-07-12 |
20120180132 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR OPTIMIZING EMULATION OF A SUSPECTED MALWARE - A method, system and program product for optimizing emulation of a suspected malware. The method includes identifying, using an emulation optimizer tool, whether an instruction in a suspected malware being emulated by an emulation engine in a virtual environment signifies a long loop and, if so, generating a first hash for the loop. Further, the method includes ascertaining whether the first hash generated matches any long loop entries in a storage and, if so calculating a second hash for the long loop. Furthermore, the method includes inspecting any long loop entries ascertained to find an entry having a respective second hash matching the second hash calculated. If an entry matching the second hash calculated is found, the method further includes updating one or more states of the emulation engine, such that, execution of the long loop of the suspected malware is skipped, which optimizes emulation of the suspected malware. | 2012-07-12 |
20120180133 | Systems, Program Product and Methods For Performing a Risk Assessment Workflow Process For Plant Networks and Systems - Systems, methods, and program product to perform a cyber security risk assessment on a plurality of process control networks and systems comprising a plurality of primary network assets at an industrial process facility, are provided. An example of a system and program product can include an industrial and process control systems scanning module configured to identify networks and systems topology and to execute system and network security, vulnerability, virus, link congestion, node congestion analysis to thereby detect susceptibility to know threats to define potential vulnerabilities; a threats to vulnerabilities likelihood and consequences data repository module configured to determine a likelihood of each of a plurality of known threats exploiting identified vulnerabilities and to identify consequences of the exploitation to individual impacted systems and to overall plant operation; and a risk level evaluator module configured to determine a risk level rating for any identified vulnerabilities and provide recommended corrective actions. | 2012-07-12 |
20120180134 | Personal Information Guard - A user equipment (UE) having a processor configured to scan a message content for personal information and indicate any detected personal information before sending the message from the UE. Also disclosed is a method implemented on a UE comprising scanning a message content for personal information, and indicating any detected personal information before sending the message from the UE. | 2012-07-12 |
20120180135 | SYSTEM AND METHOD FOR IMPROVED DETECTION AND MONITORING OF ONLINE ACCOUNTS - A computer-implemented monitoring and reporting method is provided. Identifying information is received corresponding to a user of a social networking application enabled by a social networking system. The social networking system is queried via a network for information corresponding to the user. The queried information is compared with predetermined criteria to determine a content category corresponding to the identifying information, and a report is provided including an indication of the determined content category. | 2012-07-12 |
20120180136 | CONTENT MANAGEMENT METHOD AND APPARATUS OF MOBILE TERMINAL - A contents management method and apparatus of a mobile terminal provides improved security of private contents. A contents management method of a mobile terminal includes establishing a connection to at least one external terminal. The method also includes segmenting a content stored in the mobile terminal into segments and sharing the content by distributing the segments to the terminals. The method further includes integrating the segments distributed to the terminals into the content when a content execution command is input. The method still further includes storing the integrated content and deleting the integrated content in the mobile terminal when at least one of the terminals is disconnected. | 2012-07-12 |
20120180137 | SYSTEM AND METHOD FOR DATA MINING AND SECURITY POLICY MANAGEMENT - A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a capture system. | 2012-07-12 |
20120180138 | TRUST BASED MODERATION - A network device, system, and method are directed towards detecting trusted reporters and/or abusive users in an online community using reputation event inputs, such as abuse reports. When an abuse report is received for a content item, the combined trust (reputation) of previous reporters on the reported content item and the trust (reputation) of the content author are compared to determine whether to trust the content item. If the content item is un-trusted, the content item may be hidden from public view. In one embodiment, the content item might still be visible to the content author, and/or members in the author's contact list, or the like, while being hidden from another user in the community. In one embodiment, the author may appeal the determined trust, and results of the appeal may be used to modify a trust of at least one reporter. | 2012-07-12 |
20120180139 | INFORMATION PROCESSOR - An information processor according to the present invention is designed to operate in accordance with a right to use a content that is stored on a first storage medium. The first storage medium has a write-once area on which right-to-use information is writable a limited number of times, and a data area on which data of the content is stored. The information processor includes: a second storage medium; a right-to-use information generating section, which generates right-to-use information indicating whether the first storage medium or the second storage medium holds the right to use the content; and a drive device that writes the right-to-use information on the write-once area. | 2012-07-12 |
20120180140 | SECURE PIN ENTRY DEVICE - A secure PIN entry device including a PIN entry assembly operative to receive a PIN from a user, a PIN entry prompter operative when actuated to prompt a user to enter a PIN via the PIN entry assembly, a PIN entry prompt security check enabled controller operative to prevent operation of the PIN entry prompter unless a predetermined security check has been successfully completed and security check functionality operative to check at least part of the PIN entry device for the presence of an unauthorized PIN eavesdropping element thereat and to provide an output to the PIN entry prompt security check enabled controller indicating whether the predetermined security check has been successfully completed. | 2012-07-12 |
20120180141 | Transgenic Animal Models of Disease - The present invention provides transgenic, large non-human animal models of diseases and conditions, as well as methods of making and using such animal models in the identification and characterization of therapies for the diseases and conditions. | 2012-07-12 |
20120180142 | CLONED TRANSMEMBRANE RECEPTOR FOR 24-HYDROXYLATED VITAMIN D COMPOUNDS AND USES THEREOF - The instant invention relates to the use of 24-hydroxylated vitamin D compounds as therapeutics in mammalian bone fracture repair. In addition, the instant invention relates to novel 24-hydroxylated vitamin D compound receptors which can be employed in the development of compounds capable of facilitating fracture repair in animals. The instant invention also relates to nucleic acids encoding such receptors as well as vectors, host cells, transgenic animals comprising such nucleic acids and screening assays employing such receptors. | 2012-07-12 |
20120180143 | TRANSGENIC ANIMAL MODEL OF NEURODEGENERATIVE DISORDERS - The present invention provides a transgenic animal model of Alzheimer's Disease designated TgCRND8 as well as a method for making such model, which allows for the characterization of the etiology of the disease as well as for provide a system for the development and testing of potential treatments. | 2012-07-12 |
20120180144 | ANIMAL MODELS OF NEUROLOGICAL DISORDERS - The present invention relates to the field of neurological disorders and more particularly to the field of neuropsychiatric disorders. The invention provides non-human, transgenic animal models for brain disorders such as schizophrenia, bipolar disorders, compulsive disorders, addictive disorders and the like. The animals also have applications in the field of GABA neuro-transmission and other disorders in which GABA-dependent gene regulation has a role. | 2012-07-12 |
20120180145 | Tool for Studying Endothelial Haematopoietic Transition (EHT) and Epithelial-Mesenchymal Transition (EMT) Associated Events - The present invention relates to the field of endothelial haematopoietic transition (EHT) and epithelial-mesenchymal transition (EMT) and more particularly relates to the use of fish embryo or larva as a model for the study of EHT and EMT. | 2012-07-12 |
20120180146 | Methods for maintaining genetic stability of inbred animal strains - The present invention provides novel methods of maintaining genetic stability of non-human animal inbred strains. In the methods, pedigree-tracked cryopreserved embryos derived from a foundation colony are produced and used to re-establish the foundation colony at appropriate intervals. | 2012-07-12 |
20120180147 | MICRORNA-24 - The present invention relates to a modulator, in particular an inhibitor, of microRNA-24 (miR-24) and to direct and indirect miR-24 targets for use in a method of treatment and/or prevention of ischemia, in a method of prevention of endothelial apoptosis or in a method of induction of angiogenesis. The present invention further relates to a precursor of miR-24 and to siRNAs or shRNAs against direct or indirect miR-24 targets for use in a method of treatment of angiogenesis associated with cancer. The present invention also relates to an in vitro method for diagnosing ischemia or prevalence or disposition for ischemia, and to a method for identifying a modulator of miR-24 and/or direct or indirect miR-24 targets. In addition, the present invention relates to pharmaceutical compositions or kits comprising any of the above agents, to endothelial cells devoid of expressing functional miR-24, and to a non-human, transgenic animal comprising these endothelial cells. | 2012-07-12 |
20120180148 | TRANSGENIC MOUSE MODEL FOR DEVELOPING ENZYME REPLACEMENT THERAPY FOR IDURONATE-2-SULFATASE DEFICIENCY SYNDROME - The present invention relates to a transgenic mouse model for developing enzyme replacement therapy for iduronate-2-sulfatase deficiency syndrome, for example, Hunter syndrome. More specifically, the present invention relates to a transgenic mouse to be used for developing enzyme replacement therapy for iduronate-2-sulfatase, wherein the immune response against injected enzyme, such as, recombinant iduronate-2-sulfatase has been minimized in transgenic mouse model in the course of treating in vivo iduronate-2-sulfatase replacement. | 2012-07-12 |
20120180149 | DOUBLE MUTANT MOUSE AND CELL LINES - A mutant transgenic mouse and cell line derived from the mouse are disclosed. The mutant transgenic mouse was developed from a cross between a mutant mouse which carries mutant genes that express a phenotype similar to human Hermansky-Pudlak Syndrome, and a mouse strain containing a transgene encoding a temperature sensitive protein that is inactive at physiological temperatures. The resulting mutant mouse is characterized by the presence of the HPS mutations as well as the transgene. The mutant mouse and cell lines derived from the lung tissue of the mouse are useful models for lung pathology associated with human HPS, lung fibrosis and inflammation. Methods and assays utilizing the cell lines also are disclosed. | 2012-07-12 |
20120180150 | INOSITOL 1,4,5-TRIPHOSPHATE RECEPTOR-BINDING PROTEIN AND ITS NON-HUMAN TRANSGENIC MAMMALIAN ANIMALS - The instant invention provides an inositol 1,4,5-triphaosphate receptor (IP3R)-binding protein and its transgenic non-human mammalian animal. | 2012-07-12 |
20120180152 | BEAN LINE EX 08071301 - The invention provides seed and plants of the bean line designated EX 08071301. The invention thus relates to the plants, seeds and tissue cultures of bean line EX 08071301, and to methods for producing a bean plant produced by crossing a plant of bean line EX 08071301 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line EX 08071301, including the pods and gametes of such plants. | 2012-07-12 |
20120180153 | COTTON VARIETY 09R536B2R2 - The invention relates to the novel cotton variety designated 09R536B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 09R536B2R2. Also provided by the invention are tissue cultures of the cotton variety 09R536B2R2 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 09R536B2R2 with itself or another cotton variety and plants produced by such methods. | 2012-07-12 |
20120180154 | COTTON VARIETY 10R052B2R2 - The invention relates to the novel cotton variety designated 10R052B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 10R052B2R2. Also provided by the invention are tissue cultures of the cotton variety 10R052B2R2 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 10R052B2R2 with itself or another cotton variety and plants produced by such methods. | 2012-07-12 |
20120180155 | COTTON VARIETY 09R532B2R2 - The invention relates to the novel cotton variety designated 09R532B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 09R532B2R2. Also provided by the invention are tissue cultures of the cotton variety 09R532B2R2 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 09R532B2R2 with itself or another cotton variety and plants produced by such methods. | 2012-07-12 |
20120180156 | GENES HOMOLOGOUS TO THE FLOWERING LOCUS T (FT) GENE AND THE USE THEREOF FOR MODULATING TUBERIZATION - Use of genes homologous to the FT gene of | 2012-07-12 |
20120180157 | ISOLATION AND TARGETED SUPPRESSION OF LIGNIN BIOSYNTHETIC GENES - The subject invention concerns materials and methods for modulating lignin biosynthesis in sugarcane plants. In one embodiment, lignin biosynthesis is down-regulated. Genes and the proteins encoded thereby that can be targeted for achieving down-regulation of lignin in sugarcane include, for example, 4-coumarate-CoA ligase (4CL). In one embodiment, the 4CL gene is 4CL-M, 4CL-N, or 4CL-L. The subject invention also concerns a sugarcane plant, specific plant tissue, and plant cells having modulated (e.g., down-regulated) lignin biosynthesis. The subject invention also concerns methods for producing a sugarcane plant having modulated (e.g., decreased or down-regulated) biosynthesis of lignin. | 2012-07-12 |
20120180158 | UBIQUITIN PROMOTER AND METHODS OF USE - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a constitutive regulatory element isolated from sorghum. A method for expressing a heterologous nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a heterologous nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2012-07-12 |
20120180159 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING FERROCHELATASES - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a ferrochelatase. | 2012-07-12 |
20120180160 | ANTIFUNGAL PLANT PROTEINS AND METHODS OF THEIR USE - DNA constructions that provide for production of potent antifungal proteins in transgenic plants and transformed yeast cells are described. Methods of using the DNA constructs to produce transgenic plants that inhibit growth of plant pathogenic fungi are also disclosed. The use of transformed yeast cells containing the DNA constructs to produce the antifungal proteins and methods of isolating the antifungal proteins are also described. | 2012-07-12 |
20120180161 | Method of Modifying the Carbohydrate Content of a Plant - A method of modifying at least one carbohydrate in a tissue of a plant is described. The method is typically applied to a sugarcane plant of the genus | 2012-07-12 |
20120180162 | GENERATION OF HIGH POLYHYDROXYBUTRATE PRODUCING OILSEEDS - Transgenic plants, plant material, plant cells, and genetic constructs for synthesis of biopolymers, for example polyhydroxyalkanoates (“PHA”) are provided. In one embodiment, the transgenic plants synthesize polyhydroxybutyrate (“PHB”). In one embodiment the transgenic plant encodes siRNA for one or more of the genes encoding enzymes for producing PHA. In a more preferred embodiment, the siRNA expression is under the control of an inducible regulatory element. In another embodiment, the transgenic plant contains transgenes that encode expression enzymes that will degrade the polymer. In a preferred embodiment, the expression of these enzymes is under the control of a germination specific, inducible, or minimal promoter. In another embodiment, the transgenic plant contains transgenes encoding enzymes that increase carbon flow for polymer synthesis. In a preferred embodiment, these transgenes encode enzymes that increase carbon flow in the Calvin Cycle. | 2012-07-12 |
20120180163 | WOODY PLANTS HAVING IMPROVED GROWTH CHARACTERISTICS AND METHOD FOR MAKING THE SAME - The present invention pertains to a novel and extensive analytical platform for selecting genes with a possible commercial phenotype from a large group of candidate genes identified using tools in bioinformatics, data from EST sequencing and DNA array. An aspect of the invention provides a method of producing a transgenic plant having an increased growth compared to its wild type. The method comprises altering in the plant the level of a gene product of at least one gene specifically expressed during different phases of wood formation. Further aspects of the invention provide a plant cell or plant progeny of a transgenic plant comprising a recombinant polynucleotide according to the invention. Other aspects pertain a DNA construct comprising a nucleotide sequence of the invention and a plant cell or plant progeny comprising the DNA construct. | 2012-07-12 |
20120180164 | POLYNUCLEOTIDES AND POLYPEPTIDES INVOLVED IN PLANT FIBER DEVELOPMENT AND METHODS OF USING SAME - Isolated polynucleotides are provided. Each of the isolated polynucleotides comprise a nucleic acid sequence encoding a polypeptide having an amino acid sequence at least 80% homologous to SEQ ID NOs:130-258 and 536-791, wherein the polypeptide is capable of regulating cotton fiber development. Also provided are methods of using such polynucleotides for improving fiber quality and/or yield of a fiber producing plant, as well as methods of using such polynucleotides for producing plants having increased biomass/vigor/yield. | 2012-07-12 |
20120180165 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - The present invention relates generally to the field of molecular biology and concerns a method for improving various plant growth characteristics by modulating expression in a plant of a nucleic acid encoding a GDH (Glutamate DeHydrogenase) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a GDH polypeptide, which plants have improved growth characteristics relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. The present invention relates generally to the field of molecular biology and concerns a method for enhancing various economically important yield-related traits in plants. More specifically, the present invention concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a FLA-like (Fasciclin-like) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a FLA-like polypeptide, which plants have enhanced yield-related traits relative to control plants. The invention also provides constructs comprising FLA-like-encoding nucleic acids, useful in performing the methods of the invention. The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a SAUR polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a SAUR polypeptide, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. Furthermore, the present invention also relates to a SAUR-based protein complex. It further relates to the use of the complex to enhance yield-related traits, and to a method for stimulating the complex formation, by overexpressing at least two members of the complex. The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield traits in plants by modulating expression in a plant of a nucleic acid encoding a dehydroascorbate reductase (DHAR) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a DHAR polypeptide, which plants have enhancing yield traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2012-07-12 |
20120180166 | METHODS FOR PRODUCING TRANSGENIC PLANTS - A method of producing a stably transformed corn plant in a single container is demonstrated. This method allows for the automation of the transformation process and reduces labor, material, and ergonomic costs associated with traditional plant tissue culture systems. | 2012-07-12 |
20120180167 | MEDIUM FOR CULTIVATING TRUFFLES, TRUFFLE MYCELIUM, AND TRUFFLE FRUITING BODY - The purpose is to provide the truffle mycelium and fruiting body cultivated by the medium that are developed for cultivating the truffles with a very high radical oxygen scavenging capacity. A medium for cultivating truffles includes a mixture of at least one carbohydrate source selected from a group consisting of rice bran, wheat bran, and glucose, and at least one edible ingredient selected from a group consisting of burdock, nuts, and berries. A weight ratio of the edible ingredient to the carbohydrate source is between 0.5 and 5. As for one of the ingredients, it is preferable that the burdock is granulated. The medium may exist in a liquid state. By injecting truffle seeds for cultivation into such a medium, the truffle mycelium and fruiting body with the high reactive oxygen scavenging capacity could be provided. | 2012-07-12 |
20120180168 | METHOD FOR PRODUCING DOUBLE HAPLOID PLANTS - The present invention relates to a method for producing double haploid plants, which may comprise the steps of allowing pollen with one functional sperm cell to fertilize an embryo sac cell which is not the central cell; allowing the central cell to proliferate into endosperm; and regenerating a double haploid plant from the endosperm. The pollen with one functional sperm cell may be for example mutant pollen, which is obtainable by chemical mutation, transformation with a nucleic acid, or irradiation. | 2012-07-12 |
20120180169 | Shrub rose plant named 'Poulren019' - A new garden rose plant of the shrub class which has abundant, deep pink, fragrant flowers, and attractive foliage. This new and distinct variety has shown to be uniform and stable in the resulting generations from asexual propagation. | 2012-07-12 |
20120180170 | Interspecific tree - A new and distinct variety of interspecific tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Nemaguard’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features:
| 2012-07-12 |
20120180171 | Peach Tree Named 'Aspen White' - A new and distinct variety of peach tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Nemaguard’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features: | 2012-07-12 |
20120180172 | Strawberry Plant Named 'FL 05-107' - A new and distinct variety of strawberry ( | 2012-07-12 |
20120180173 | Variety of lantana plant named 'NEBLAN5151' - ‘NEBLAN5151’ is a new variety of | 2012-07-12 |
20120180174 | Aster plant named ' Mystery Lady Grace' - A new and distinct cultivar of Aster plant named ‘MYSTERY LADY GRACE’, characterized by its upright and somewhat outwardly spreading plant habit, dark green foliage, freely flowering habit, decorative-type inflorescences with violet ray florets, and few disk florets (i.e., “double” capitulae.) | 2012-07-12 |
20120180175 | Aster plant named 'Mystery Lady Maggie' - A new and distinct cultivar of Aster plant named ‘MYSTERY LADY MAGGIE’, characterized by its upright and somewhat outwardly spreading plant habit, dark green foliage, freely flowering habit, decorative-type inflorescences with purple colored ray florets, and few disk florets (i.e., “double” capitulae.) | 2012-07-12 |