31st week of 2011 patent applcation highlights part 64 |
Patent application number | Title | Published |
20110191774 | NOC-CENTRIC SYSTEM EXPLORATION PLATFORM AND PARALLEL APPLICATION COMMUNICATION MECHANISM DESCRIPTION FORMAT USED BY THE SAME - Network-on-Chip (NoC) is to solve the performance bottleneck of communication in System-on-Chip, and the performance of the NoC significantly depends on the application traffic. The present invention establishes a system framework across multiple layers, and defines the interface function behaviors and the traffic patterns of layers. The present invention provides an application modeling in which the task-graph of parallel applications is described in a text method, called Parallel Application Communication Mechanism Description Format. The present invention further provides a system level NoC simulation framework, called NoC-centric System Exploration Platform, which defines the service spaces of layers in order to separate the traffic patterns and enable the independent designs of layers. Accordingly, the present invention can simulate a new design without modifying the framework of simulator or interface designs. Therefore, the present invention increases the design spaces of NoC simulators, and provides a modeling to evaluate the performance of NoC. | 2011-08-04 |
20110191775 | ARRAY-BASED THREAD COUNTDOWN - The forking of thread operations. At runtime, a task is identified as being divided into multiple subtasks to be accomplished by multiple threads (i.e., forked threads). In order to be able to verify when the forked threads have completed their task, multiple counter memory locations are set up and updated as forked threads complete. The multiple counter memory locations are evaluated in the aggregate to determine whether all of the forked threads are completed. Once the forked threads are determined to be completed, a join operation may be performed. Rather than a single memory location, multiple memory locations are used to account for thread completion. This reduces risk of thread contention. | 2011-08-04 |
20110191776 | LOW OVERHEAD DYNAMIC THERMAL MANAGEMENT IN MANY-CORE CLUSTER ARCHITECTURE - A semiconductor chip includes a plurality of multi-core clusters each including a plurality of cores and a cluster controller unit. Each cluster controller unit is configured to control thread assignment within the multi-core cluster to which it belongs. The cluster controller unit monitors various parameters measured in the plurality of cores within the multi-core cluster to estimate the computational demand of each thread that runs in the cores. The cluster controller unit may reassign the threads within the multi-core cluster based on the estimated computational demand of the threads and transmit a signal to an upper-level software manager that controls the thread assignment across the semiconductor chip. When an acceptable solution to thread assignment cannot be achieved by shuffling of threads within the multi-core cluster, the cluster controller unit may also report inability to solve thread assignment to the upper-level software manager to request a system level solution. | 2011-08-04 |
20110191777 | Method and Apparatus for Scheduling Data Backups - An apparatus and computer-executed method for scheduling data backups may include accessing a specification for a backup job. The specification may include an identification of a data source, a start time and a target storage device to which backup data should be written. A first history of past backup jobs that specify the data source, and a second history of past backup jobs that specify the target storage device, may be identified. Using the first history, an expected size of the backup data may be computed. Using the second history, an expected rate at which the backup data may be written to the target storage device may be computed. Using the expected size, the expected rate and the start time, an expected completion time for the backup job may be computed. | 2011-08-04 |
20110191778 | COMPUTER PROGRAM, METHOD, AND APPARATUS FOR GROUPING TASKS INTO SERIES - In an apparatus for generating a series, a task discrimination unit identifies a task executed on a first device and tasks executed on a second device, on the basis of messages exchanged between those devices. A memory stores models defining caller-callee relationships between caller tasks on the first device and callee tasks on the second device. A series grouping unit produces a series of tasks from a callee-eligible sequence of tasks executed on the second device during a processing time of the identified task on the first device. The series grouping unit achieves this by selecting one of the models that defines the identified task on the first device as a caller task and extracting a portion of the callee-eligible sequence that matches at least in part with the callee tasks defined in the selected model while excluding therefrom the tasks that cannot be the callee tasks. | 2011-08-04 |
20110191779 | RECORDING MEDIUM STORING THEREIN JOB SCHEDULING PROGRAM, JOB SCHEDULING APPARATUS, AND JOB SCHEDULING METHOD - A job scheduling apparatus determines an assignment order, which is the order in which jobs are assigned to a computational resource, on the basis of priority levels and being associated with the assignment order. The apparatus assigns the jobs to the computational resource on the basis of the assignment order. The apparatus reduces the priority levels for the jobs that have been assigned to the computational resource. The apparatus increases the priority levels with time. Regarding a priority level among the priority levels, if, at a future time, which is a fixed time period from the start of execution of the jobs, an amount of an increase in the priority level is expected to be equal to or larger than an amount of a reduction in the priority level for a job, assignment of the job to the computational resource is executed. | 2011-08-04 |
20110191780 | METHOD AND APPARATUS FOR DECOMPOSING I/O TASKS IN A RAID SYSTEM - A data access request to a file system is decomposed into a plurality of lower-level I/O tasks. A logical combination of physical storage components is represented as a hierarchical set of objects. A parent I/O task is generated from a first object in response to the data access request. A child I/O task is generated from a second object to implement a portion of the parent I/O task. The parent I/O task is suspended until the child I/O task completes. The child I/O task is executed in response to an occurrence of an event that a resource required by the child I/O task is available. The parent I/O task is resumed upon an event indicating completion of the child I/O task. Scheduling of any child I/O task is not conditional on execution of the parent I/O task, and a state diagram regulates the child I/O tasks. | 2011-08-04 |
20110191781 | RESOURCES MANAGEMENT IN DISTRIBUTED COMPUTING ENVIRONMENT - A method, system and a computer program product for determining resources allocation in a distributed computing environment. An embodiment may include identifying resources in a distributed computing environment, computing provisioning parameters, computing configuration parameters and quantifying service parameters in response to a set of service level agreements (SLA). The embodiment may further include iteratively computing a completion time required for completion of the assigned task and a cost. Embodiments may further include computing an optimal resources configuration and computing at least one of an optimal completion time and an optimal cost corresponding to the optimal resources configuration. Embodiments may further include dynamically modifying the optimal resources configuration in response to at least one change in at least one of provisioning parameters, computing parameters and quantifying service parameters. | 2011-08-04 |
20110191782 | APPARATUS AND METHOD FOR PROCESSING DATA - A data processing apparatus and method for allocating data to processors, allowing the processors to process the data efficiently. The data processing apparatus may predict a result of processing data, based on a workload for the data, according to a number of processors, and may determine the number of processors to be allocated with the data, using the predicted processing result. | 2011-08-04 |
20110191783 | Techniques for managing processor resource for a multi-processor server executing multiple operating systems - A multiprocessor server system executes a plurality of multiprocessor or single-processor operating systems each using a plurality of storage adapters and a plurality of network adapters. Each operating system maintains load information about all its processors and shares the information with other operating systems. Upon changes in the processor load of the operating systems, processors are dynamically reassigned among operating systems to improve performance if the maximum load of the storage adapters and network adapters of the reassignment target operating system is not already reached. Processor reassignment includes shutting down and restarting dynamically operating systems to allow the reassignment of the processors used by single-processor operating systems. Furthermore, the process scheduler of multi-processor operating systems keeps some processors idle under light processor load conditions in order to allow the immediate reassignment of processors to heavily loaded operating systems. | 2011-08-04 |
20110191784 | PROCESSING OBSERVABLE EVENTS USING JOIN PATTERNS - Methods, systems, and computer-readable media of processing observable events using join patterns are disclosed. A particular method includes receiving a first notification indicating an occurrence of a first observable event and a second notification indicating an occurrence of a second observable event. The method also includes determining that the first and second notifications satisfy a join pattern. The method may further include taking one or more actions in response to determining that the join pattern has been satisfied. | 2011-08-04 |
20110191785 | Terminating An Accelerator Application Program In A Hybrid Computing Environment - Terminating an accelerator application program in a hybrid computing environment that includes a host computer having a host computer architecture and an accelerator having an accelerator architecture, where the host computer and the accelerator are adapted to one another for data communications by a system level message passing module (‘SLMPM’), and terminating an accelerator application program in a hybrid computing environment includes receiving, by the SLMPM from a host application executing on the host computer, a request to terminate an accelerator application program executing on the accelerator; terminating, by the SLMPM, execution of the accelerator application program; returning, by the SLMPM to the host application, a signal indicating that execution of the accelerator application program was terminated; and performing, by the SLMPM, a cleanup of the execution environment associated with the terminated accelerator application program. | 2011-08-04 |
20110191786 | METHOD, APPARATUS, AND SYSTEM FOR ENHANCING APPLICATION RELIABILITY OF A SCRIPT-BASED SERVICE - A method, an apparatus, and a system for enhancing application reliability of a script-based service are disclosed. The method includes: analyzing data source information of a script-based service; obtaining current state information of the data source of the script-based service according to the analysis result; and judging the availability state of the script-based service according to the obtained current state information. With the technical solution of the present invention, a related analysis function is added to a script-based service server to analyze related data source information in the script-based service logic and mark the script-based service. In this way, a user can know the state of the script-based service when requesting a service, thus avoiding unnecessary service trials, saving system resources, and improving the user experience. | 2011-08-04 |
20110191787 | SYSTEM AND METHOD FOR PROVIDING SENSOR DATA FROM EMBEDDED DEVICE TO SOFTWARE DEVELOPMENT ENVIRONMENT - A system and method for providing device data for use in developing application software for a microprocessor-based embedded device having at least one physical sensor using a software development environment include an agent executing on the target embedded device and a connectivity module executing within the software development environment to communicate sensor data from the embedded device to the software development environment. In one embodiment, the target device is a mobile phone that provides sensor data from an integrated physical sensor to a development computer executing mobile phone software within the development environment using the same API's within the development environment as used on the embedded device. | 2011-08-04 |
20110191788 | EXTENSIBLE APPLICATION VIRTUALIZATION SUBSYSTEMS - An extensible virtualization system provides an object model and manages a virtual application lifecycle in a way that allows new virtualization subsystems to be added to extend a virtualization product without reworking the product itself. Virtualizing an application generally involves three steps: metadata extraction, metadata storage and reconstitution, and runtime management of requests. The extensible virtualization system receives notification of an application preparation session and allows virtualization subsystems to monitor the session to collect configuration information specific to each subsystem that the application uses to run on a client. Each subsystem provides collected information to the extensible virtualization system, which stores the collected information until the application to be virtualized is deployed. When the application is deployed, the system invokes the same virtualization subsystem and provides the subsystem with the stored information. | 2011-08-04 |
20110191789 | APPLICATION EXECUTING APPARATUS AND METHOD - An application executing apparatus and method to execute an application in real time in a portable terminal is provided. The application executing apparatus includes an application providing unit for transmitting execution information necessary for executing an application in real time if the application is requested from a portable terminal; and the portable terminal for executing the application in real time through the execution information, which is received from the application providing unit upon the request for the application. | 2011-08-04 |
20110191790 | METHOD AND APPARATUS FOR GENERATING USER ADAPTIVE APPLICATION IN MOBILE TERMINAL - A method and apparatus for generating a user adaptive application in a mobile terminal are provided. The method includes displaying a list of applications in the mobile terminal and displaying a list of services provided by at least one of the applications in the mobile terminal from among lists of services provided by each of the applications in the mobile terminal, receiving a selection of at least one service for an operation of a desired application module from among the displayed list of services, dynamically loading library modules for performing the selected services, and generating a specific application by combining the loaded library modules. | 2011-08-04 |
20110191791 | RETRIEVING AN OBJECT - A method of locating an object across a network comprises locating the copy of object | 2011-08-04 |
20110191792 | INFORMATION PROCESSING SYSTEM, PROGRAM AND DATA RELAY METHOD - An information processing system includes a first process, a second process, a management process and a relay process. The first process executes a predetermined process and communicates with other processes. The second process is started in response to a start request sent from the first process and executes a predetermined process. The management process manages communication between the first process and the second process. The relay process receives, from the first process, the start request to the second process and usage data used in the first process and the second process. The relay process further starts the second process by proxy, transfers the usage data to the second process, and notifies the management process of the start of the second process. | 2011-08-04 |
20110191793 | OPTICAL DISC DRIVE - There is provided an optical disc drive comprising: a chassis assembly formed in a box shape, including a chassis; and a tray on which an optical disc is loaded, wherein: the tray is able to move between a close state in the chassis assembly and a open state ejecting form the chassis assembly; the optical disc drive further comprises a flexible wiring member for connecting a first circuit board mounted on the chassis and a second circuit board mounted on the tray; the flexible wiring member includes a thicker reinforced part in a part of the flexible wiring member than in the other part of the flexible wiring member; and the reinforced part has a width which is narrower at an end on the chassis side than the other part of the reinforced part. | 2011-08-04 |
20110191794 | OPTICAL PICKUP APPARATUS - An optical-pickup apparatus includes first and second objective lenses that focus first and second laser light on information-recording layers of first and second optical discs, the second optical disc having an information-recording format different from that of the first optical disc; and a lens holder that integrally holds the first and second objective lenses in an adjacent manner, a disc surface of the first optical disc and of the second optical disc being substantially parallel to confronting faces of the first and second objective lenses, that confront the disc surface, a minimum distance between the disc surface and the confronting faces in a direction of an optical axis of the turntable being greater than a thickness of the turntable in a direction of a rotation axis of the turntable, either one or both of the first and second objective lenses configured to focus bluish-violet laser light on an optical disc. | 2011-08-04 |
20110191795 | Highlights of Premium Multimedia Content - One embodiment may take the form of method for providing highlights of multimedia content that may be of interest to a user of a television system. The interest of a particular user of the television system may be obtained from a viewing history gathered about the user. From this information, one or more available multimedia programs may be identified as being of interest to the user. Highlights of such content, such as pay-per-view or other premium content, may be gathered and sent to or recorded on the receiver associated with the user such that the highlights may be presented to the user during use of the television system. The highlights may be viewed by the user through the television system and, if the user is interested in the content, may also purchase or otherwise access the highlighted programs. | 2011-08-04 |
20110191796 | Media Player-Based Authentication - Computer-implemented method, computer program products and systems for authenticating a user to view content from at least one domain as authorized for viewing by a Multichannel Video Programming Distributor (MVPD). Receiving an MVPD identification. Loading and launching a client executable MVPD authentication application specific to the identified MVPD. Authenticating the user for viewing content from a first domain with the identified MVPD using the MVPD authentication application. In some embodiments receiving a first content identifier associated with the first domain of the MVPD, and authenticating the user's access to the identified content from the first domain. In some embodiments receiving a content identifier associated with a second domain associated with the identified MVPD, and playing the content associated with the second domain based on the authentication, and the association of the second domain with the MVPD, without further authentication. | 2011-08-04 |
20110191797 | SYSTEM FOR CONVERTING CONTENT FROM A MULTIPLE SYSTEM OPERATOR (MSO) TO CONTENT SUITABLE FOR DISTRIBUTION WITHIN A MULTI-DWELLING UNIT - There is disclosed an integrated system for converting content provided by an operator of multiple cable television systems (e.g. a MSO) to content suitable for distribution within a multi-dwelling unit (MDU). A chassis is provided comprising slots for receiving cableCARDs, an input for receiving a cable feed, and an output for transmitting the RF signal. Circuitry within the chassis is configured to extract selected encrypted programs from the cable feed, forward these encrypted programs to the cableCARDs for decryption, and encrypt the decrypted programs using an encryptor such as a Pro:Idiom™ encryptor. A control unit is provided for controlling the operation of at least some of the circuitry within the chassis. The control unit is responsive to instructions sent over a network cable to allow for remote control of the circuitry. | 2011-08-04 |
20110191798 | Dynamic Advertisement Insertion Methods and Systems - An exemplary method includes maintaining data representative of a plurality of advertisements each having one of a plurality of different resolutions, detecting a message indicative of an upcoming advertisement break in a media content program being transmitted to a media content access device by way of a content channel, detecting a resolution of the media content program, directing a dynamic advertisement delivery subsystem communicatively coupled to the media content access device to dynamically transmit a subset of the advertisements by way of one or more advertisement channels, wherein each advertisement included in the subset has the same resolution as the resolution of the media content program, and distributing tuning information associated with each of the one or more advertisement channels to the media content access device prior to an occurrence of the advertisement break. Corresponding methods and systems are also disclosed. | 2011-08-04 |
20110191799 | Communications between networked cable services system devices - Communication methods between networked cable services system devices are provided. Two or more cable services system set-top boxes may be networked together in a house, business or other facility. Alternatively, two or more set-top boxes may be networked together where the two or more set-top boxes are located remotely from each other and are networked via a cable services system. A first set-top box may be designated and equipped as a proxy server for managing communications between networked set-top boxes and one or more other set-top boxes may be designated and equipped as client devices for communicating with other networked set-top boxes via the proxy server set-top box. One or more communication applications may be deployed on each of the networked set-top boxes for allowing user-to-user communications via the networked set-top boxes, as well as, user-to-set-top box communication via the networked set-top boxes. Communications between set-top boxes that may be enabled include, but are not limited to, text communications, voice communications, video communications, set-top box control communications, real time gaming, and the like. | 2011-08-04 |
20110191800 | METHOD AND SYSTEM FOR PRODUCING PROGRAM-INTEGRATED ADVERTISEMENTS - A method and system for incorporating thematic content from a particular program into product or service advertisements uses program-advancing elements of a program in an advertisement in order to entice viewers to view the advertisements. Increased viewership of advertisements can result in increased revenue generated from advertisements that may be realized by programs, television and movie producers, networks, publishers and advertisers. | 2011-08-04 |
20110191801 | System and methods for switching between two or more media streams - Provided herein are systems and related methods for switching to an alternate audio/video signal or stream during advertisement breaks in a media provider's programming signal, or other events detected by the system. The system for switching to alternate stream may include a system to detect an event and switch to an alternate signal or stream. Exemplary components may comprise a client based cue generation system, a server based cue generation system, an advertisement cue handling and stat recorder element, viewer dataminer and categorizer, an alternate signal selector, a personal data backup process and a server based controller and alternate signal storage server. | 2011-08-04 |
20110191802 | Systems and Methods for Managing and Distributing Media Content - In accordance with the present invention, a media content management application that allows a user to customize, assemble, distribute, and track one or more versions of media content based on semantic criteria is provided. | 2011-08-04 |
20110191803 | Trick Mode Support for VOD with Long Intra-Frame Intervals - A video-on-demand system encodes multiple video streams from media content, such that the video streams have staggered intra-frame intervals. When a client device requests a video stream, the video-on-demand system selects one of the multiple video streams based on the position of the intra-frames, and transmits the selected video stream to the client device. | 2011-08-04 |
20110191804 | METHOD AND SYSTEM FOR DISPLAYING ADVERTISEMENTS IN AN ELECTRONIC PROGRAM GUIDE - A system and method for displaying an electronic program schedule guide is provided. The system has areas for displaying program schedule information. In addition, the system also has areas that may be used for advertising programs, products or services. In another embodiment, the system has areas for displaying messages to the user. | 2011-08-04 |
20110191805 | GUIDE SYSTEM AND METHOD OF OPERATION - A system and method for displaying a simplified electronic program schedule guide on a user's television monitor is provided. In one embodiment, the program schedule guide is abbreviated to include only the programs currently available for viewing on a subset of the available channels. In another embodiment, the program guide screen visually distinguishes between programs for the convenience of the viewer. | 2011-08-04 |
20110191806 | PROGRAM GUIDE SYSTEM WITH COMBINATION CATEGORY SEARCH - An interactive television program guide system is provided in which the program guide may provide the user with a selectable list of combination categories. Combination categories are composed of multiple simple categories such as sports, news, comedy, movies, children, etc. Program listings are supplied to the program guide. At least some of the program listings are associated with combination categories. A combination category build process may be used to assign combination categories to program listings. The user is able to use the selectable categories list to quickly identify programming of interest. | 2011-08-04 |
20110191807 | ELECTRONIC DEVICE AND DATA RECEIVING METHOD - In one embodiment, there is provided an electronic device. The device includes: a program-related information receiver configured to receive program-related information provided by broadcast waves; a page data receiver configured to receive data of a Web page at a given time based on text data included in the program-related information; and a storage configured to store the data of the Web page in a storage medium. | 2011-08-04 |
20110191808 | INTERNET TELEVISION PROGRAM GUIDE SYSTEM - An Internet television program guide system is provided that allows a user at a multimedia system to access information related to television programs over an Internet communications link. The user can view television program guide listings and related video stills and video clips. The user can perform database searches on the program guide listings (e.g., to search for a particular type of television program). If desired, the user can select an option that directs the multimedia system to tune directly to a television channel for a selected program or to a related television program guide or movie guide service on a television channel. The user can order pay-per-view events using the system. | 2011-08-04 |
20110191809 | Viral Syndicated Interactive Product System and Method Therefor - A method for facilitating the order of commercial products in connection with the display of media content, whereby a player comprises a media production component and an interactive e-commerce component embedded therein. The player with the e-commerce component can be virally copied and propagated from one web page to any number of other web pages. | 2011-08-04 |
20110191810 | Method and System for Distribution of Computer and Entertainment Information - Methods and systems provide for the distribution of both computer and home entertainment information. Computer and home entertainment audio-visual sources are distributed to displays throughout a house, and any of the sources can be viewed from any of the displays. Computers and televisions are integrated while allowing the computers and the televisions to be located in separate rooms of the house, thereby minimizing the need to co-locate items or to install additional wiring. The computer and home entertainment sources may be located in a single area and distributed to various receivers throughout the house. Multiple users may share any given information source. The entertainment and computer sources are connected to a single information hub that distributes the various source signals to remote receivers. Users may view any of the sources from any receiver in the house, and multiple different users may view different sources from any receivers in the house. | 2011-08-04 |
20110191811 | SYSTEM AND METHOD OF MAPPING CUSTOMER PREMISE EQUIPMENT IN A VOD SYSTEM OF A CABLE SERVICE PROVIDER - A system, method, and web-based application platform enabling a television viewer to utilize an Internet device to request a Video-On-Demand (VOD) server to stream a selected video to the viewer's Set Top Box (STB). An Internet Protocol (IP) connection is established between the Internet device and an application executing at a web site, and an Internet device identifier is passed to the application. The application communicates with the VOD server to obtain a listing of available videos, and provides the listing to the Internet device. When the viewer selects a video, the application accesses an equipment-mapping table, which associates the Internet device identifier with an STB identifier. The application then sends the STB identifier and a request for the selected video to the VOD server, which delivers the video to the STB over a television delivery system. | 2011-08-04 |
20110191812 | Video Download Mechanism for Transferring Large Data - A content delivery system stores large content as frames of video that can be served by content servers already optimized for streaming video. Instead of storing image tiles in separate files, the system treats each tile as a frame of a video and stores the tiles in a video format. This allows transfer of large data from a publisher to a content server by transferring a single file or a small handful of files (rather than thousands or millions of files). Web servers such as MICROSOFT Internet Information Server (IIS) include smooth streaming support that can return individual images as video frames as though the images were stored in separate files. Thus, the content delivery system provides easier management of large data for publishers while continuing to provide a smooth experience consuming the data for clients. | 2011-08-04 |
20110191813 | USE OF PICTURE-IN-PICTURE STREAM FOR INTERNET PROTOCOL TELEVISION FAST CHANNEL CHANGE - A method and apparatus of controlling an Internet Protocol television (IPTV) channel change to a first multimedia stream of an IPTV channel, where the channel change is initiated by a set top box coupled to the network device is described. A network device receives a request from a set top box for a high-resolution multimedia stream from a device downstream and transmits a low-resolution multimedia stream upstream in place of the high-resolution multimedia stream request. The network device receives the low-resolution multimedia stream and forwards the low-resolution stream to the requesting set top box. The set top receives the low-resolution stream and displays this stream. Furthermore, the network device transmits the high-resolution multimedia stream request and receives the high-resolution multimedia stream. The set top box receives the high-resolution multimedia stream and displays this stream. | 2011-08-04 |
20110191814 | PACKET-BASED DIGITAL DISPLAY INTERFACE SIGNAL MAPPING TO BI-DIRECTIONAL SERIAL INTERFACE SIGNALS - A passive cable adaptor for connecting a data source device with a display device is described. The adaptor has a packet-based interface connector at one end, the connector having a positive main link pin, a negative main link pin, a positive auxiliary channel pin, and a negative auxiliary channel pin. Also at the same end is a serial interface connector, such as a serial interface connector. At the other end is an upgraded serial interface connector (e.g., enhanced serial interface) connector having high-speed transmission pins, high-speed receiving pins, and a ground pin, wherein multimedia content is transmitted over the cable adaptor and electrical power is supplied over the cable adaptor simultaneously. | 2011-08-04 |
20110191815 | AGILE DISTORTION AND NOISE CANCELLATION ACROSS MULTIPLE CHANNELS AND PORTS IN A CATV UPCONVERTER/MODULATOR - A distortion-cancellation method for analog CATV or QAM transmission over cable is provided wherein a single feedback path from the output of a multiple-channel multiple-port upconverter/modulator is down-converted and used to reduce or cancel undesirable noise components including LO leakage, spurious, and modulated noise. The method allows for real-time monitoring, tuning, or control of the CATV/QAM output and of interfering signals and aging effects as compared to a desired performance metric. | 2011-08-04 |
20110191816 | COMMUNICATION TECHNIQUE ABLE TO SYNCHRONISE THE RECEIVED STREAM WITH THAT SENT TO ANOTHER DEVICE - An audio stream is to be synchronized with a video stream. Therefore a system that comprises a first device ( | 2011-08-04 |
20110191817 | Host apparatus, image forming apparatus, and method of managing security settings - An image forming apparatus is provided. The image forming apparatus includes a storage unit which stores security settings information of the image forming apparatus, an image forming unit to perform an image forming job, a function management unit which controls the functions of the image forming unit, a communications interface unit which is connected to a host apparatus, and a security settings management unit which transmits stored security settings information through the communications interface unit and changes stored security settings information according to a packet of changing the received security settings, if a packet of changing the security settings is received from the host apparatus through the communications interface unit. | 2011-08-04 |
20110191818 | METHOD, APPARATUS, AND SYSTEM FOR IMPLEMENTING HOT-LINING FUNCTION - A method, an apparatus, and a system for implementing a hot-lining function are provided, which relate to the field of communications, so as to solve a problem in the prior art that a solution for implementing the hot-lining function is unable to be provided. The technical solution includes: acquiring a hot-lining function enabling message sent from a hot-lining application (HLA) network element, where the hot-lining function enabling message carries hot-lining rule information; enabling the hot-lining function according to the hot-lining rule information in the enabling message, and instructing a hot-lining device (HLD) to enable the hot-lining function according to the hot-lining rule information. The technical solution is applicable to a fixed network and a wireless network. | 2011-08-04 |
20110191819 | Diameter Signaling for Mobile IPv4 - The invention consists of a new registration and authentication protocol for between a Mobile Node and a Home Agent. The new protocol uses a novel messaging sequence to request registration, authentication and authorization of the Mobile Node when it is located on a foreign network, and the novel protocol will avoid some of the standard registration and authentication protocol messages in order to eliminate the problems associated with re-transmission errors. | 2011-08-04 |
20110191820 | System and Method for Restricting Access to a Computer System to Live Persons by Means of Semantic Association of Images - A system and method for restricting access to a computer system, resource, or network to live persons, and for preventing the execution of automated scripts via an interface intended for human interaction. | 2011-08-04 |
20110191821 | CONTROLLED USE MEDICAL APPLICATION - In an example, a client application can be implemented, including controlling access of a medical application to a client operating system resource; receiving medical data according to a first medical standard, and providing information to the medical application using the received medical data. | 2011-08-04 |
20110191822 | CONTROLLED USE MEDICAL APPLICATION - In an example, a plurality of virtualized medical application containers can be stored on one or more servers, wherein each server includes a memory, and wherein each virtualized medical application container includes a virtualized operating system, separate from a client operating system and a medical application executable installed on the virtualized operating system. | 2011-08-04 |
20110191823 | Bump validation - A “bump” occurs when two devices at the same place at the same time indicate their intention to establish a connection for transferring information. A process for validating bumps is described. | 2011-08-04 |
20110191824 | METHOD FOR PROVIDING CONTENTS DATA USING WIRELESS COMMUNICATION DEVICE AND NAVIGATION DEVICE PERFORMING THE SAME - A method of providing content information using a wireless communication device and a navigation device of performing the method are disclosed. The navigation device may comprise a terminal searching unit that searches a wireless communication terminal that may perform near field wireless communication in response to a content information providing request, a terminal authenticating unit that performs terminal authentication on whether the searched wireless communication terminal has been subscribing for a content providing service, and a content information displaying unit that, if it is identified that the wireless communication terminal is a terminal subscribing for the content providing service, receives content information from the wireless communication terminal and displays the content information on a display. | 2011-08-04 |
20110191825 | WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION METHOD, AND PROGRAM - There is provided a wireless communication device including a storage unit for storing authentication information distributed to a plurality of users including a user of the wireless communication device belonging to a community on a network; an authentication unit for authenticating a peripheral wireless communication device based on the authentication information stored in the storage unit; and a control unit for forming a communication group with the peripheral wireless communication device when the authentication of the peripheral wireless communication device by the authentication unit is successful. | 2011-08-04 |
20110191826 | SYSTEM AND METHOD FOR PROVIDING VIRTUAL USER GROUPS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes communicating an access request to a network element, the access request is associated with network authentication relating to a subscriber. The method also includes receiving an access response that includes a profile associated with the subscriber. The profile can include a group attribute that defines the subscriber as being part of a group of subscribers sharing a network data plan, which defines a data allotment assigned to the group over a specified time interval. In more detailed embodiments, a unique data string sent by an Authentication, Authorization, and Accounting element is received, where the unique data string identifies a full set of subscribers belonging to the group. Data underutilization of a first subscriber is offset by data overutilization of a second subscriber, where a summation of the data underutilization and the data overutilization do not exceed the data allotment assigned. | 2011-08-04 |
20110191827 | Detecting Unauthorized Router Access Points or Rogue APs in the Wired Network - Detecting rogue access points (APs) or rogue router APs on the wireless network. An authorized access point (AAP) on a network collects wired MAC addresses of wired devices in its subnet, and also collects BSSIDs of wireless devices operating in its vicinity. A rogue is detected by correlating the OUI portion of MAC addresses and BSSIDs after filtering out authorized OUIs. | 2011-08-04 |
20110191828 | AUTHORIZATION AND TRACKING OF MODIFICATIONS TO MEDICAL DEVICES - A system and method for authorizing and tracking a modification to a medical device are provided. The modification may be an installation of software or firmware, an upgrade of software or firmware, an enablement of a feature, and/or a disablement of a feature. The system includes a server for generating and transmitting an authorization key before the modification can be performed. The system also includes a device for generating a confirmation key and transmitting the confirmation key to the server after the modification has been performed. The server is configured for updating a database with information regarding the modification performed on the medical device. In this manner, the system avoids performing unauthorized modifications to a medical device and efficiently traces authorized modifications made to the medical device. | 2011-08-04 |
20110191829 | Method for Storing Data, Computer Program Product, ID Token and Computer System - The invention relates to a method for storing data, having the following steps: establishing a first connection between a first ID token and a first computer system via a second computer system for reading at least one first attribute from the first ID token, establishing a second connection between a second ID token and the first computer system via the second computer system for reading at least one second attribute from the second ID token, sending the first and the second attributes from the first computer system to a third computer system, receiving the data from the third computer system by the first computer system, writing the data into the second ID token via the second connection by the first computer system in order to store the data in the second ID token, where the condition for writing the data is that also the first connection still exists, wherein the first and the second connection are respectively connection with end-to-end encryption and a connection oriented protocol. | 2011-08-04 |
20110191830 | Common Point Authoring System For The Complex Sharing Of Hierarchically Authored Data Objects In A Distribution Chain - The Common Point Authoring system functions to provide Livestock Informational Objects via the use of a centralized repository of uniquely identified, immutable Livestock Informational Objects. This system automates the authoring, maintenance, and distribution of the Livestock Informational Objects by using an Internet-based paradigm and a centralized repository of uniquely-identified, immutable Data Elements. The Common Point Authoring system provides a set of software modules that the manufacturers can use to author, maintain, and distribute Livestock Informational Objects and their customers, as Members of the system of Livestock Informational Objects, can use to retrieve, maintain, and distribute the Livestock Informational Objects. The system's interconnectivity allows for the use of an Internet-based paradigm for the purchase and sale among Members of the system of Livestock Informational Objects as commodities, and for reducing the burden costs among Members of compliance with government regulations. | 2011-08-04 |
20110191831 | Multiple Identity Management in an Electronic Commerce Site - In electronic commerce (e-commerce) sites that are executed on a single e-commerce application, a user's session is only associated with a single user identity for e-commerce site domain. Acting under a single identity across the site may not be desired. There may be requirements to associate an individual user with one or more separate identities within parts of the site. Aspects of the invention provide a method, system and computer program product for managing multiple user identities for a user of an electronic commerce (e-commerce) site. The method comprises defining the e-commerce site as one or more security domains; and in response to a user's request to invoke an operation of the e-commerce site: determining a one of the one or more security domains to which the operation relates; performing one of a) creating a session and b) reusing a session for the user automatically in accordance with the determined security domain, said session associated with a user identity and a role indicating privileges for invoking operations of the e-commerce site in at least the determined security domain; and persisting said session for reuse. The user's request may be received in association with one or more sessions persisted for the user and a one of the sessions selected in accordance with the determined security domain. In response, either a session may be created or reused. Persisting may comprise providing one or more cookies defining the session to the user for associating with a subsequent request. In accordance with a feature of this aspect, the e-commerce site may define each of the one or more security domains as a hierarchy of organizations and assets owned by the organizations and the determining a one of the one or more security domains to which the operation relates may comprise evaluating the user's request in accordance with the hierarchy. | 2011-08-04 |
20110191832 | RESCUING TRUSTED NODES FROM FILTERING OF UNTRUSTED NETWORK ENTITIES - Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity. | 2011-08-04 |
20110191833 | MATCHING AUTHENTICATION METHOD, DEVICE AND SYSTEM FOR WIRELESS COMMUNICATION - A matching authentication method for wireless communication equipment comprises that: a device at the transmitting end sends a matching request (S | 2011-08-04 |
20110191834 | Maintaining the Domain Access of a Virtual Machine - A method for maintaining domain access of a virtual machine is described. According to one embodiment, a generation of a new computer account password by an operating system is identified. The new computer account password is copied to an auxiliary storage location. An existing computer account password is replaced with the new computer account password when it is determined that a file system of the computer has been restored to a previous state. The copying of the new computer account password may be performed in response to the generation of the new computer account password. The replacing of the existing computer account password may be performed in response to the restoring of file system to the previous state. | 2011-08-04 |
20110191835 | METHOD AND APPARATUS FOR IDENTITY REUSE FOR COMMUNICATIONS DEVICES - An apparatus and method for identity reuse operable in a communications system, the method comprising selecting an identity value for a device; registering the device onto a network with the selected identity value; determining if the registration of the device is successful; and establishing a communication session for the device and deregistering the selected identity value upon termination of the communication session if the registration is successful, or determining whether to try a different identity value if the registration is not successful. In one aspect, the apparatus and method further comprising waiting a predetermined time period before either re-registering with the selected identity value or registering with the different identity value. | 2011-08-04 |
20110191836 | Apparatus For Real-Time Management Of The Performance Of Security Components Of A Network System - An apparatus for real-time management of a plurality of security components (SCs) connected to a network. The apparatus comprises a network interface for communication with the plurality of SCs connected to the network; a permanent storage unit for storing at least logon information to each of the plurality of SCs; a security component management unit (SCMU) having a plurality of integration point components (IPCs) enabled to identify the plurality of SCs connected to the network; a temporal storage unit for storing at least data collected from the plurality of SCs in the form of information units, each of the information units has a predefined limited lifetime after which such information unit is voided, thereby rendering the apparatus stateless; and a processing unit for carrying out at least one process designated to perform a specific generic task irrespective of a physical manifestation of each of the plurality of SCs. | 2011-08-04 |
20110191837 | AUTHENTICATING A DEVICE AND A USER - A method of authenticating a device and a user comprises receiving a user input, generating a first key from the user input, performing a physical measurement of the device, obtaining helper data for the device, computing a second key from the physical measurement and the helper data, and performing an operation using the first and second keys. In a preferred embodiment, the method comprises performing a defined function on the first and second keys to obtain a third key. Additionally security can be provided by the step of receiving a user input comprising performing a biometric measurement of the user and the step of generating a first key from the user input comprises obtaining helper data for the user and computing the first key from the biometric measurement and the user helper data. | 2011-08-04 |
20110191838 | Authentication Using Transient Event Data - Some embodiments provide a method for authenticating a user to access computing resources that uses transient event data regarding previous interactions of the user with the computing resources. The method receives a notification that a user is unable to provide a correct user identifier and password. The method generates authentication questions for the remote user using the transient event data. The authentication questions are presented to the user. The method authenticates the user based on answers to the password recovery questions. The user may be a remote user and the computing resources are a set of application servers to which the user has forgotten a password. The computing resources may be a portable device that the user wishes to access remotely in order to delete data from the portable device. | 2011-08-04 |
20110191839 | Image forming apparatus, input control method, input control program, and storage medium - Inputs from multiple input devices including an internal input device | 2011-08-04 |
20110191840 | BIOMETRIC AUTHENTICATION UTILIZING UNIQUE BIOMETRIC SIGNATURES AND PORTABLE ELECTRONIC DEVICES - A method and system for the authentication of a user at a point of entry. Biometric data can be provided after preliminary identification of the user based on identification information wirelessly provided from a portable electronic device carried with the user when the user is located near a point of entry, such as, for example, a border crossing or access point to a secure facility. Such a method and system can incorporate RFD tags, cellular wireless communications data and links, and/or Bluetooth communications link, etc. | 2011-08-04 |
20110191841 | METHOD AND TRUSTED SERVICE MANAGER FOR PROVIDING FAST AND SECURE ACCESS TO APPLICATIONS ON AN IC CARD - A method for providing fast and secure access to MIFARE applications installed in a MIFARE memory (MM) being configured as a MIFARE Classic card or an emulated MIFARE Classic memory, comprises: keeping a repository ( | 2011-08-04 |
20110191842 | Authentication in a Communication Network - A method and apparatus for authentication in a communication network. A network node receives an initial request message from a user device, and sends an authentication message to an authentication node. In reply, the network node receives an expected response value and an authentication token from the authentication node. The expected response value is determined using a first shared secret known to the authentication node and the user and a second shared secret known to the authentication node and the user device, and the authentication token is determined using the second shared secret. The network node sends the authentication token from the network node to the user device, and in response receives a response value calculated using authentication token, the first shared secret and the second shared secret. The network node then determines if the response value matches the expected response value and, if so, authenticates the user. | 2011-08-04 |
20110191843 | UNIVERSAL DEVICE ID REGISTRY, BACK-END, AND SELF-VERIFICATION ARCHITECTURE - Modular devices consist of a user-interface shell and a detachable communication cartridge. The shell and cartridge both contain unique serial numbers, user-defined passwords, and secret authentication keys, which can be communicated to cartridges and shells, and to a network. A universal wireless device registry system stores serial numbers of integrated devices, device shells, and device cartridges, and other characteristics associated with devices such as secret keys, passwords, screen size, operating system, service usage, and supply chain information. This registry system is able to track communication devices all around the world and is connected to and shares information with computer servers controlled by service providers, manufacturers, and supply chain companies. When shells and cartridges communicate their numbers to the registry system, the registry system can authenticate shells and cartridges. Service providers can also track and control shells and cartridges (as well as devices) based on information from the registry system. Market research can be done using the information associated with each device on the registry system. | 2011-08-04 |
20110191844 | TECHNIQUES FOR MANAGING SECURITY IN NEXT GENERATION COMMUNICATION NETWORKS - Disclosed techniques provide enhanced security for a communications network. Access terminal devices intended for operation via the network are expected to have security agent functionality, e.g. in the form security agent software loaded into or otherwise enabled on each of the access terminal devices. Registration procedures include verification that such an agent is present/enabled on an access terminal and that the agent currently implemented on the terminal device provides adequate security for the communications network against malicious traffic from that device. | 2011-08-04 |
20110191845 | WIRELESS COMMUNICATION DEVICE WITH DURESS PASSWORD PROTECTION AND RELATED METHOD - A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device. | 2011-08-04 |
20110191846 | IMAGE PROCESSING DEVICE CAPABLE OF SWITCHING CONTROL MODES - An image processing device includes a processing unit that performs processing on image data, an obtaining unit that obtains a number of users, and a control unit that executes a job by controlling the processing unit to perform the processing in one of control modes. The control unit switches between the control modes based on the number of users. | 2011-08-04 |
20110191847 | ACTIVITY FILTERING BASED ON TRUST RATINGS OF NETWORK ENTITIES - The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity. | 2011-08-04 |
20110191848 | PREVENTING MALICIOUS JUST-IN-TIME SPRAYING ATTACKS - A method disclosed herein includes acts of receiving code at a Just-in-Time compiler executing in an application on a computing device and compiling the code to generate machine code and causing the machine code to be placed on at least one page that is accessible by at least one processor on the computing device, wherein the Just-in-Time compiler compiles the code utilizing at least one technique for preventing a Just-in-Time spraying attack. | 2011-08-04 |
20110191849 | SYSTEM AND METHOD FOR RISK RATING AND DETECTING REDIRECTION ACTIVITIES - A method in one example implementation includes sending a first request to a first network address on a first server and determining whether the first network address has been redirected on the server to a second network address. The method further includes searching a memory element for a predetermined risk rating associated with the second network address if the first network address has been redirected to the second network address. The method also includes providing a risk response to a client if a predetermined risk rating is found. In more specific embodiments, the risk response includes sending an alert to the client or blocking the client from accessing the second network address if the predetermined risk rating indicates the second network address is malicious. In other more specific embodiments, the first network address is redirected to one or more other network addresses before being redirected to the second network address. | 2011-08-04 |
20110191850 | Malware detection - According to a first aspect of the present invention there is provided a method of operating a computer to detect malware, which malware writes a copy of an executable file to a non-volatile memory of the computer and creates a launch point that causes that executable file to be run at start-up of the computer. The method includes, during the shutdown procedures of the computer, monitoring the creation and/or modification of any launch points and, for any such modification or creation, saving a further copy of any executable file associated with the launch point to the non-volatile memory, and, following a subsequent start-up of the computer, examining said further copy to determine if it is potential malware. | 2011-08-04 |
20110191851 | COMPUTER AND METHOD FOR SAFE USAGE OF DOCUMENTS, EMAIL ATTACHMENTS AND OTHER CONTENT THAT MAY CONTAIN VIRUS, SPY-WARD, OR MALICIOUS CODE - System, method, computer, and computer program and computer program product for safe usage of potentially malicious code and documents or other content to may contain malicious code. System and method for a virus and hacker-resistant computer. Method and system for supporting a computer systems self repair. | 2011-08-04 |
20110191852 | METHOD TO PERFORM A SECURITY ASSESSMENT ON A CLONE OF A VIRTUAL SYSTEM - A system to create a virtual clone of a production system for the purpose of executing security services without risk to the original production system. The service host makes a copy of the dedicated memory and physical storage of the virtual target, and then uses that data to initiate a clone in an isolated virtual environment within the service host. Once the target system has been cloned, security services can be performed on the clone without any risk to the target system, and provide an accurate reflection of the security state of the target system. | 2011-08-04 |
20110191853 | SECURITY TECHNIQUES FOR USE IN MALICIOUS ADVERTISEMENT MANAGEMENT - The present invention provides methods and systems for use in malicious advertisement management. Methods and systems are provided in which, after an advertisement is determined not to present a security threat, whether initially or after removal any such threat, then a first modification is performed to code associated with the advertisement which may introduce a security coding. Further modification, which may breach the security coding, may indicate that the advertisement is more likely to present a security threat than if the further modification had not occurred. | 2011-08-04 |
20110191854 | METHODS AND SYSTEMS FOR TESTING AND ANALYZING VULNERABILITIES OF COMPUTING SYSTEMS BASED ON EXPLOITS OF THE VULNERABILITIES - A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities. The security tool can determine the risk level based on exploits associated with the vulnerabilities. The security tool can determine the risk level based on factors associated with the exploits such as whether an exploit exists, a rank of the exploit, a number of exploits that exist for the vulnerability, a difficulty to identify whether the exploit exists, and an effect of the exploit on the vulnerability. The security tool can a report identifying the vulnerabilities of the computing system, the exploits associated with the vulnerabilities, and the risk level of the vulnerabilities. The report can also include links to information about the exploits. | 2011-08-04 |
20110191855 | IN-DEVELOPMENT VULNERABILITY RESPONSE MANAGEMENT - In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance. | 2011-08-04 |
20110191856 | RECEIVING INPUT DATA - A method of securing the inputting of sensitive information by a user, the method comprising: generating a mapping that associates each symbol of a plurality of symbols with a respective location at which to display that symbol on a display; displaying the plurality of symbols to the user, each symbol being displayed at the associated location on the display according to the generated mapping; the user providing a sequence of selections, each selection being a selection of a respective one of the locations; and converting the sequence of selections into a corresponding sequence of input symbols representing the input from user, each input symbol being the symbol associated with the respective selected location in the sequence of selections according to the generated mapping. | 2011-08-04 |
20110191857 | METHOD FOR MASKING DATA - A method for masking data in communications comprising: assigning a user identifier and a tag to private data associated with a user, wherein the user identifier and the tag is associated with the private data in a data structure associated with a second data processing node; receiving a request for a first list from a first data processing node; sending to a second request for a second list of user identifiers associated with a corresponding one or more users and sending a third request for one or more tags assigned to private data of the one or more users. The second list is merged with the one or more tags in order to generate the first list which is sent to the first data processing node. The first list can be used to initiate a communication request without requiring private data to be stored on the first data processing node. | 2011-08-04 |
20110191858 | OFFLINE ACCESS IN A DOCUMENT CONTROL SYSTEM - Systems and techniques to provide offline access in a document control system. In general, in one implementation, the technique includes: receiving a request from a client, and pre-authorizing the client, in response to the request, to allow actions by a user as a member of a group of users by sending to the client offline access information including a first key associated with the group, the first key being useable at the client to access an electronic document by decrypting a second key in the electronic document. Receiving a request can involve receiving a request from the client to take an action with respect to a second document. The technique can also include verifying the user at the client as an authenticated user, and the offline access information can include user-specific keys, group-specific keys, a policy, and a document revocation list. | 2011-08-04 |
20110191859 | Digital Rights Management in User-Controlled Environment - A method of controlling access to content comprises receiving, at a domain gateway ( | 2011-08-04 |
20110191860 | Midlet Signing and Revocatoin - The present invention is related to a method of securing integrity and authenticating origin and privileges of a piece of code. According to the invention, a method of securing integrity and authenticating origin and privileges of a piece of code in a communication network by digitally signing said piece of code, is characterized by the steps of: providing an aggregator (C), which is a holder of a valid signing certificate, —submitting a developer material to the aggregator, inserting a revocation code into the developer material, building a complete piece of code using the developer material and the revocation code, digitally signing the complete piece of code using the certificate held by the aggregator, making the digitally signed complete piece of code retrievable to the holder (B) of the developer material, providing a server (C | 2011-08-04 |
20110191861 | Systems and Methods for Dynamic Management of Geo-Fenced and Geo-Targeted Media Content and Content Alternatives in Content Management Systems - Computer-implemented systems and methods are described for providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region associated with the user. An upload of content for distribution and metadata describing the content are received. A first option definition is received that defines first criteria for accessing the content in a first region. A second option definition defining second criteria for accessing the content in a second region is received. One or more options for the content are provided to the user based on the region associated with the user. An identification of an option is received from the user, and access to the content is provided according to the criteria of the option that the user has identified. | 2011-08-04 |
20110191862 | System and Method for Restricting Access to Requested Data Based on User Location - A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison. | 2011-08-04 |
20110191863 | System and Method for Identifying Systems and Replacing Components - A system, method, and computer-readable medium are disclosed for managing a system's entitlement to digital assets when the system's components are replaced. A unique system identifier, comprising the unique identifiers of predetermined system components, is associated with digital assets data to generate digital assets entitlement data, which in turn entitles the system to process the digital assets data. The digital assets entitlement is perpetuated when a first unique system component identifier is replaced with a second unique system component identifier. | 2011-08-04 |
20110191864 | ANTITHEFT DEVICE AND INTERFACE DEVICE PROVIDED WITH THE SAME - By attaching a connector | 2011-08-04 |
20110191865 | Novel Gene Disruptions, Compositions and Methods Relating Thereto - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO227, PRO233, PRO238, PRO1328, PRO4342, PRO7423, PRO10096, PRO21384, PRO353 or PRO1885 genes. Such in vivo studies and characterizations may provide valuable identification and discovery of therapeutics and/or treatments useful in the prevention, amelioration or correction of diseases or dysfunctions associated with gene disruptions such as neurological disorders; cardiovascular, endothelial or angiogenic disorders; eye abnormalities; immunological disorders; oncological disorders; bone metabolic abnormalities or disorders; lipid metabolic disorders; or developmental abnormalities. | 2011-08-04 |
20110191866 | METHODS OF MAKING MONOCLONAL ANTIBODIES USING FUSION-PEPTIDE EPITOPE ADOPTIVE TRANSFER (F-PEAT) TECHNOLOGY - Disclosed are compositions and methods for related to monoclonal antibodies specific for single amino acid variation in an antigen. | 2011-08-04 |
20110191867 | PEPTIDE VACCINE FOR INFLUENZA VIRUS - The invention provides peptide epitopes for use in the prevention and/or treatment of influenza or for the development of such treatment or vaccine against influenza. The invention also relates to a method for evaluating the potential of a chemical entity, such as an antibody, to bind to a peptide epitope derived from the divalent sialoside binding site of hemagglutinin protein of influenza virus, and to conjugates containing one or more such peptide epitopes. The peptide epitopes of the invention are cyclic peptides comprising a 7-mer peptide derived from H1, H3 or H5 hemagglutinin of influenza virus. The 7-mer peptide has a sequence corresponding to the loop sequence at positions 220-226 of X31-hemagglutinin. | 2011-08-04 |
20110191868 | METHODS FOR IDENTIFICATION AND USE OF AGENTS TARGETING CANCER STEM CELLS - The invention relates to methods for identifying compounds and compositions that target cancer stem cells. In some aspects, the invention relates to treatment methods that use compounds and compositions that specifically target cancer stem cells for inhibiting the growth and/or survival of cancer stem cells in a subject in need thereof. Other aspects of the invention relate to the use of cancer stem cell biomarkers in the selection of a treatment for inhibiting the growth and/or survival of cancer stem cells in a subject in need thereof. | 2011-08-04 |
20110191869 | Method For Characterising The Biological Activity Of Helminth Eggs, In Particular Trichuris Eggs - A method for determining the biological activity of embryonated | 2011-08-04 |
20110191870 | I-CREI HOMING ENDONUCLEASE VARIANTS HAVING NOVEL CLEAVAGE SPECIFICITY AND USE THEROF - A method for engineering I-CreI homing endonuclease variants able to cleave mutant I-CreI sites having variation in positions ±8 to ±10. A I-CreI homing endonuclease variant obtainable by said method, a vector encoding said variant, a cell, an animal or a plant modified by said vector. Use of said I-CreI endonuclease variant and derived products for genetic engineering, genome therapy and antiviral therapy. | 2011-08-04 |
20110191871 | METHODS TO IDENTIFY FACTORS ASSOCIATED WITH MUSCLE GROWTH AND USES THEREOF - The present invention relates to methods to identify factors associated with muscle growth, angiogenesis, obesity, insulin sensitivity body weight, fat mass, muscle mass and cardiovascular function. In particular, the methods of the present invention relates to assays to identify such factors using a transgenic animal model and/or a cell-based assay. | 2011-08-04 |
20110191872 | METHOD FOR THE HUMANIZATION OF ANTIBODIES AND HUMANIZED ANTIBODIES THEREBY OBTAINED - Method for the humanization of the VH and VL variable regions of an animal antibody of known sequence, humanized animal antibody obtainable according to the method, in particular anti-NGF and anti-TrkA humanized animal antibodies. | 2011-08-04 |
20110191873 | Methods of Protein Destabilization and Uses Thereof - This invention is directed towards methods of destabilizing proteins in living cells, and their use for the development of novel assays. In one embodiment, the invention comprises the use of non-cleavable multimerized ubiquitin fusion proteins to destabilize a target protein, such as a reporter moiety. In one aspect of this method the constructs also comprises a linker that operatively couples the reporter moiety to the multimerized ubiquitin fusion protein. In this embodiment, enzymatic modification of the linker results in a modulation of the coupling of the reporter protein to the multimerized ubiquitin domains resulting in a change in the stability of the reporter moiety. The level of the reporter moiety in the cell can then be used as a measure of the enzymatic activity in the cell. In another embodiment the invention provides for a generalized way of coordinately regulating the cellular concentration of a plurality of target proteins. In one aspect of this method, the target proteins are operatively coupled to a ubiquitin fusion protein via a linker containing a protease cleavage site. Cleavage of the linker by a protease results in uncoupling of the target protein from the multimerized ubiquitin construct, and results in an increase in the stability and concentration of the target protein. | 2011-08-04 |