38th week of 2010 patent applcation highlights part 62 |
Patent application number | Title | Published |
20100242064 | SYSTEMS AND METHODS FOR PROVIDING A DYNAMIC USER INTERFACE FOR A SETTOP BOX - Various embodiments of the present invention provide systems and methods for providing a dynamic user interface for a settop box, and more specifically, to systems and methods for providing a dynamic user interface for a settop box by utilizing one or more I-frames based on user inputs. In particular embodiments, the systems and methods receive one or more inputs from a user and generate I-frames based on the user's inputs. In various embodiments, the I-frames are sent to the user's settop box and are decoded to generate a signal for displaying images to the user. | 2010-09-23 |
20100242065 | CONTENT DISTRIBUTION DEVICE, CONTENT DISTRIBUTION METHOD, VIEWER TERMINAL, AND CONTENT REPRODUCTION METHOD - A content distribution device includes a first receiver which receives, from the broadcasting station, the program content having the commercial image data and electronic program information; an commercial extractor which extracts the commercial image data and creates commercial metadata based on the electronic program information; a first storage which stores the commercial image data and the commercial metadata that are associated with each other; a second storage which stores distribution contents; a content selector which selects the distribution content according to a request from the view terminal from the second storage; a third receiver which receives, from the viewer terminal, viewing history information of program contents; an commercial inserter which selects the commercial metadata from the first storage based on the viewing history information and inserts the commercial image data corresponding to the selected commercial metadata in the distribution content; and a distribution unit which distributes the distribution content to the viewer terminal. | 2010-09-23 |
20100242066 | Method of Performing Random Seek Preview for Streaming Video - To provide random seek of a preview position for streaming video, while playing a video stream, a preview position of the video stream is sought, and a preview result extracted from the video stream corresponding to the preview position is displayed while the video stream continues playing. Over the Internet, the preview position may be sent to a transmitting device, and the transmitting device may extract the preview result, then transmit the preview result simultaneously while transmitting the video stream. | 2010-09-23 |
20100242067 | TRANSMITTING/RECEIVING SYSTEM AND METHOD OF PROCESSING DATA IN THE TRANSMITTING/RECEIVING SYSTEM - A receiving system and a method for processing data in the receiving system are disclosed. The receiving system includes a receiving unit, a first handler, and a second handler. The receiving unit receives a broadcast signal through a mobile broadcast network. Herein, the broadcast signal includes mobile service data and a first signaling table. And, the first signaling table includes service guide transmission information and service guide bootstrapping information on the mobile service data. The first handler acquires the service guide bootstrapping information based upon the service guide transmission information included in the first signaling table. And, the second handler accesses a service guide by using the acquired service guide bootstrapping information. | 2010-09-23 |
20100242068 | System and Method for Capturing Video Clips for Focused Navigation within a User Interface - A video clip is captured from a television broadcast on each of a plurality of channels. The captured video clips are provided to a display interface, which successively displays the captured video clips within a focus area of a user interface in response to an initiating action by a user. The display interface then discontinues the successive display of video clips to show a particular video clip corresponding to a selected channel in response to a terminating action by the user. | 2010-09-23 |
20100242069 | SYSTEM AND METHOD FOR CREATING PERSONALIZED ADVERTISEMENT AND PERSONALIZING PRODUCTS WITH INTERACTIVE GRAPHICAL USER INTERFACE EMBEDDED IN ADVERTISEMENT - Systems, methods, and computer storage media for creating a personalized advertisement. A web development platform prepares an interactive user interface including a personalization area; prepares an advertisement; embeds the user interface in the advertisement; and sends the advertisement with the embedded interactive user interface to a device via a network to thereby enable a user of the device to use the embedded interface for personalization of the personalization area. When the user uploads an image file to be displayed on the personalization area, the platform causes a process to produce a personalized video including the personalization area to thereby create a personalized advertisement and displays the personalized video on the device. | 2010-09-23 |
20100242070 | System and method for combining information content from data transmission network with television signal - A system and method for adding information from a data transmission network to a television display includes a first receiver for receiving data signals from a data transmission network, a first signal processor for decoding the data signals and rendering a graphics image based on the data signals in a first area of a frame buffer, a second receiver for receiving television signals, and a second signal processor for decoding the television signals and rendering a video image based on the television signals in a second area of the frame buffer. A display component is provided for mixing the graphics image and the video image from the frame buffer to create a combined image for display on a display device. The data transmission network can be a wireless information network. The graphic image can be a change in the color of wallpaper of the display device. | 2010-09-23 |
20100242071 | METHOD AND APPARATUS FOR TRANSFERRING USER INFORMATION BETWEEN TERMINALS IN BROADCAST STREAMING SERVICE - A method and apparatus for transferring user information between different terminals are disclosed. The method includes saving by a first terminal, when a change is made to user information during playback of content, the changed user information in a scene history, performing a terminal change from the first terminal to a second terminal, and resuming, by the second terminal, playback of the content from a continued scene after the last scene played back by the first terminal. Consequently, in a terminal change, the user may use the second terminal to play back the same content from the continued scene using the same content usage environment as the first terminal. | 2010-09-23 |
20100242072 | NETWORK-BASED SERVICE TO PROVIDE ON-DEMAND VIDEO SUMMARIES OF TELEVISION PROGRAMS - A network-based device allows customers to receive television programming and to view summaries of the programming. A method of providing the summaries comprises: dividing a received program into program segments each identified by index marks, summarizing each program segment into summary segments identified by similar index marks, generating metadata files for delimiting a beginning and an end of summary segments and program segments, storing the summary segments and accessing the summary segments to supply the summary segments in lieu of program segments upon demand. | 2010-09-23 |
20100242073 | Apparatus and Methods for Syndication of On-Demand Video - Metadata are provided to video generators using a syndication protocol, so that the video generators may produce interactive video content for television subscribers. Metadata relating to source media content are transformed in a computer process from a storage format into a syndication format. Relevant metadata to transform are chosen to reflect the type of interactivity desired by a television service provider and the demands of the video generation process. The transformed metadata are published according to a syndication protocol, so that another computer process that participates in the protocol may generate the interactive video content using the metadata, the source media content, and subscriber commands. | 2010-09-23 |
20100242074 | VIDEO SHARING COMMUNITIES IN A CABLE SYSTEM - A social networking service defines a community group of cable system viewers as members, who share a common experience or interest based on viewing a common video. Various attributes define how the community group is created and how membership is defined. Members can invoke the service and join an active session thereby allowing them to view and potentially post content that is then displayed in a chat window. A software application downloaded to the set top box creates the chat window on the television screen. Content may comprise text and/or video clips identified by the member. Members can post messages by using their remote control or other device to provide text entry which is processed by the set top box application. Input is received by a social networking server which then distributes the content to the group members. | 2010-09-23 |
20100242075 | Method and Device for Wireless Transmissions of Internet Protocol TV - The invention relates to a method for transmitting a television data stream via a wireless network connection. The method comprises receiving at least one television data stream via the User Datagram Protocol (UDP); converting the at least one UDP television data stream into a Transmission Control Protocol (TCP) data stream; and transmitting the TCP data stream via the wireless network connection over a point-to-point link. | 2010-09-23 |
20100242076 | SYSTEM AND METHOD FOR PROGRAMMING VIDEO RECORDERS - The invention relates to a method for programming video recorders ( | 2010-09-23 |
20100242077 | TV search - A device consistent with certain embodiments has a television receiver and an Internet Protocol television (IPTV) receiver. A decoder decodes television programming from either of the television receiver or the IPTV receiver. A programmed processor(s) retrieves metadata relating to television programming, IPTV content, any installed Widgets, and the television (TV) receiver device's function, all of which are considered search targets. The programmed processor stores tags from the metadata in a database and associates the tags with their targets. A search engine searches the database for tags in response to a search query and to retrieve the associated target on command. The control processor executes the target by either tuning to the target's program content or by launching or resuming a Widget or TV device function. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2010-09-23 |
20100242078 | APPARATUS AND METHOD FOR USE IN A MOBILE/HANDHELD COMMUNICATIONS SYSTEM - An Advanced Television Systems Committee Digital Television (ATSC DTV) transmitter transmits a digital multiplex that includes a legacy DTV channel and a mobile DTV channel. The mobile DTV channel is conveyed in mobile packets that comprise mobile data and additional mobile training information. A mobile packet comprises 207 bytes wherein 2 bytes are header information, 20 bytes are Reed-Solomon (RS) parity information and 185 bytes convey mobile data and mobile training information. The mobile training information is inserted into mobile packets such that the additional training information appears in contiguous positions after convolutional interleaving. | 2010-09-23 |
20100242079 | APPARATUS AND METHODS FOR NETWORK VIDEO RECORDING - Apparatus and methods for the capture and delivery of content over a network. In one embodiment, the network comprises a cable television network, and the apparatus comprises a local server which stores, processes and assembles content prior to its delivery to a VOD server, thus obviating the need for superfluous VOD storage. This approach also facilitates various pre-streaming processing in a video recording (e.g., nPVR) system, and gives a network operator dynamic control over local playlists. In another embodiment, the local server of the improved system obviates the need for a VOD server in the nPVR system. One or more content libraries adapted to facilitate nPVR content access across one or more regions of a broadcast network are also disclosed. Secondary content (e.g., promotions, advertisements, etc.) can also be selectively inserted into nPVR content. Various access, business or operational rules and methods implementing the foregoing are also described. | 2010-09-23 |
20100242080 | METHOD FOR DISPLAYING A MOSAIC IMAGE A RECEIVER FOR THE SELECTION OF AUDIOVISUAL PROGRAMS, RECEIVERS AND RELATED SERVERS - The present invention makes it possible to present a mosaic image to a user of an audiovisual receiver. The method comprises a step for generating a list of at least one audiovisual channel in order to display its content in a mosaic image. Then, the list is transmitted to a server which then transmits visual data associated with each channel in the list. The visual data is aggregated in order to form a mosaic image which is then displayed at the level of the receiver. According to a first embodiment, the mosaic image is produced at the level of the receiver. According to another embodiment, the mosaic image is created at the level of the server before being transmitted. According to a refinement, a channel is graphically highlighted at the level of the mosaic image, the receiver receives either the audio stream or the video stream or both of the highlighted channel. | 2010-09-23 |
20100242081 | SYSTEM FOR DISTRIBUTING A PLURALITY OF UNIQUE VIDEO/AUDIO STREAMS - A system and method for distributing a plurality of unique streams of video data. Each stream of video data may be encoded with a unique identifier and each receiver may be associated with one of the unique identifiers. The streams of video data may be multiplexed onto a single cable and distributed to the receivers using various networking techniques. A receiver may decode only the video stream for which it has been previously associated with. Once decoded the video stream may be displayed by an electronic display. The streams of video data may be in different resolutions and/or different frame rates from one another. The network may be in two-way communication with the internet so that a receiver's association with a particular stream of video data can be changed remotely. | 2010-09-23 |
20100242082 | PROTECTING SENSITIVE INFORMATION FROM A SECURE DATA STORE - In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a secure data store, causing a security parameter of a storage medium local to the computer facility to be assessed, determining if the security parameter is compliant with a security policy relating to computer access of the remote secure data store, and in response to an indication that the security parameter is non-compliant, cause the computer facility to implement an action to prevent further dissemination of information, to disable access to network communications, to implement an action to prevent further dissemination of information, and the like. | 2010-09-23 |
20100242083 | RESTRICTING ACCESS TO OBJECTS CREATED BY PRIVILEGED COMMANDS - A method and system for restricting access to objects created by privileged commands. In an RBAC environment, execution of certain privileged commands creates objects, which typically, have traditional access permissions based on the user ID and not the role. To enhance security of these objects, a new security attribute is introduced. The security attribute can be associated to the privileged command. Therefore, whenever a privileged command creates an object, the security attribute associated with the privileged command is applied on the object. The security attribute can mask the traditional access permissions of the object, and modify the access permissions, which can be stored along with the object. An AND operation can be performed on the traditional access permissions and the security attribute, to determine the modified permissions of the object. Further, an authorized user can modify, add, delete, or customize the security attribute at any time. | 2010-09-23 |
20100242084 | NETWORK SECURITY MONITOR APPARATUS AND NETWORK SECURITY MONITOR SYSTEM - A network security monitoring apparatus and a network security monitoring system manages “permitted” or “not permitted” communication between nodes based on an access policy. A network security monitoring system includes nodes | 2010-09-23 |
20100242085 | SYSTEM AND METHOD FOR DOCUMENT ISOLATION - A computer based system and method of providing document isolation during routing of a document through a workflow is disclosed. The method comprises maintaining a separate “working” copy of the original base document while the document is routed through a workflow. Access controls, which define who may access the original document as well as any versions of the working copy document, are defined and stored in relation to the documents. The access controls further define the types of actions users may take with respect to the document. Users are selectively directed to the appropriate document, either the base document or working copy, and selectively granted permission to perform publishing operations on the working copy document, as determined by the access controls. | 2010-09-23 |
20100242086 | SYSTEM AND METHOD FOR HANDLING DATA TRANSFERS - Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention. | 2010-09-23 |
20100242087 | DISPLAY DATA TRANSMISSION DEVICE AND METHOD THEREOF - A display data transmission device includes a security level data acquisition unit configured to acquire security level data about a security level of a display device connected through a network, and a display data transmission unit configured to transmit display data created in a format corresponding to the security level data acquired by the security level data acquisition unit. | 2010-09-23 |
20100242088 | COMPUTER SECURITY LOCK DOWN METHODS - Embodiments of the present invention extend the enforcement of computer security policies by blocking device access as well as network access. In some embodiments, communications with external devices are blocked upon discovery that some aspect of the client computing facility is out of compliance vis-à-vis a security policy. | 2010-09-23 |
20100242089 | PRIVACY CONTROL BETWEEN MOBILE AND HOME NETWORK BASE STATION - A method, a mobile system, and a home network base station are disclosed. A network operator server | 2010-09-23 |
20100242090 | USER AUTHENTICATION METHOD AND SYSTEM - A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing system enables a security manager software application and connects the specified software application to a computing apparatus. The computing system executes first security functions associated with the computing apparatus. The computing system executes second security functions associated with additional computing apparatuses. The computing system determines if the user may access the specified functions executed by the specified software application based on results of executing the first security functions and the second security functions. The computing system generates and stores a report indicating the results. | 2010-09-23 |
20100242091 | NETWORK VIDEO MESSAGING - Embodiments related to network video messaging are disclosed. One disclosed embodiment provides a method that comprises receiving a video message from a client application of a source client; associating a navigation link with the video message; transmitting a notification message to the recipient client including the navigation link; receiving a retrieval request from the recipient client to access the video content via the navigation link; and transmitting the video content to the recipient client responsive to receiving the retrieval request by providing a persistent download of the video content from the storage server if the download condition indicates that a persistent download of the video content is permissible; and providing a transient download of the video content to the recipient client while prohibiting a persistent download of the video content if the download condition indicates that a persistent download of the video content is not permissible. | 2010-09-23 |
20100242092 | SYSTEMS AND METHODS FOR SELECTING AN AUTHENTICATION VIRTUAL SERVER FROM A PLURALITY OF VIRTUAL SERVERS - The present invention provides a system and method for dynamically selecting an authentication virtual server from a plurality of authentication virtual servers. A traffic management virtual server may determine from a request received from a client to access content of a server that the client has not been authenticated. The traffic management virtual server can identify a policy for selecting an authentication virtual server to provide authentication of the client. Responsive to the identification, the traffic management virtual server can select, via the policy, an authentication virtual server of the plurality of authentication virtual servers to authenticate the client. Responsive to the request, the traffic management virtual server may transmit a response to the client The response includes an instruction to redirect to the selected authentication virtual server. | 2010-09-23 |
20100242093 | INTELLIGENT INTEGRATED NETWORK SECURITY DEVICE FOR HIGH-AVAILABILITY APPLICATIONS - Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system. | 2010-09-23 |
20100242094 | IDENTIFICATION OF TELEMETRY DATA - Methods, systems, and computer-readable media are disclosed for identifying telemetry data. A particular method scans a file and compares the file to at least one attribute to be used for telemetry collection. When the file is identified as a telemetry candidate, an offer to submit a sample of the file is sent to a server. A response to the offer is received from the server. If the response to the offer indicates an acceptance, a sample of the file is sent to the server. | 2010-09-23 |
20100242095 | METHOD AND APPARATUS FOR MULTI-USER, MULTI-APPLICATION INTERNET ACCESS AUTHENTICATION AND CONTROL - Methods, system, computer program products and data structures are described to allow a client to be identified using a plurality of methods during the process of accessing Internet resources through a Proxy or Firewall device. The resultant plurality of methods combines to result in a specific user identification process via multiple data stores. These independent data stores are then quarried to identify a user via a network access process that would not commonly respond to a specific authentication process. A single aggregate data store of user identification information is created to facilitate a more effective search process. | 2010-09-23 |
20100242096 | MANAGING CONNECTIONS IN A DATA STORAGE SYSTEM - Described in detail herein are systems and methods for managing connections in a data storage system. For example, the systems and methods may be used to manage connections between two or more computing devices for purposes of performing storage operations on the data of one of the computing devices. The data storage system includes at least two computing devices. A first computing device includes an unauthorized connection data structure and a connection manager component. The connection manager component receives a connection request from a second computing device. If the second computing device is not identified on the unauthorized connection data structure, the connection manager component can request that an authentication manager authenticate the second computing device and/or determine whether the second computing device is properly authorized. If so, the connection manager component can allow the second computing device to connect to the first computing device. | 2010-09-23 |
20100242097 | SYSTEM AND METHOD FOR MANAGING APPLICATION PROGRAM ACCESS TO A PROTECTED RESOURCE RESIDING ON A MOBILE DEVICE - A computer-implemented method for managing application program access to a protected resource residing on a mobile device is provided. The method includes receiving from an application program a request for a permission to access the protected resource, and receiving from a source external to the mobile device an authentication of the application program. An authorization to provide the permission to access the protected resource is received and permission to access the protected resource is provided to the application program in response to receiving the authorization. Data produced by the protected resource is cryptographically signed, and a notification is generated in response to at least one of the application program requesting the permission to access the protected resource and the application program accessing the protected resource. A system for managing application program access to a protected resource residing on a mobile device is further provided. | 2010-09-23 |
20100242098 | NETWORK ATTACHED DEVICE WITH DEDICATED FIREWALL SECURITY - Dedicated firewall security for a network attached device (NAD) is provided by a firewall management system integrated directly into the NAD or into a NAD server. A local area network arrangement includes a network client and the NAD and the firewall management system includes computer readable medium having computer-executable instructions that perform the steps of receiving a request for network access to the NAD from the network client, determining whether the request for network access to the NAD is authorized, and only if the request for network access is authorized, providing the network client with network access to the NAD. | 2010-09-23 |
20100242099 | Method and apparatus of UI design for web-based computer user working environment - This invention takes the course of evolution and creating a web based computer user work environment for a control management station and its associated systems on the network crossing Intranet, Internet or LAN. Therefore, users can access and manage the control management station and all its associated system through web browser on any other systems or devices. To establish a web based computer user work environment, the resources information on control management station and on associated systems on network need to be collected and convert them to standard structured format for web based communication and further displaying them in web browser. These information need to be collected by control management station at its and the associated systems' boot up time or at the time when a user logins and requests to access and manage these resources. | 2010-09-23 |
20100242100 | NETWORK ACCESS AUTHENTICATION - The invention relates to a method, an element, and a system for providing access authentication for a user using user equipment ( | 2010-09-23 |
20100242101 | METHOD AND SYSTEM FOR SECURELY MANAGING ACCESS AND ENCRYPTION CREDENTIALS IN A SHARED VIRTUALIZATION ENVIRONMENT - A computing system for managing a virtual server includes a machine remote from the virtual server that operates a provisioning service, a credentials server remote from the virtual server, and at least one guest server manager running on a guest host associated with the virtual server. The provisioning service obtains credentials from the credentials server and delivers them to the at least one guest server manager. The server manager acts under the direction of the provisioning service. | 2010-09-23 |
20100242102 | Biometric credential verification framework - Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to validate the user and the biometric sample. Once validated, the biometric matching server return the data package plus a temporary certificate and a public/private key pair to the client computer. The client computer may then use this information to access an authentication system to subsequently gain access to a secure resource. | 2010-09-23 |
20100242103 | Identifying Hand-Over Targets - In general, a method performed on a portable access terminal operating in an active mode includes detecting a presence of a personal base station. An encoded identification message transmitted from the personal base station is received, and the encoded identification message includes a unique identifier associated with the personal base station. The encoded identification message is decoded to extract the unique identifier, and the unique identifier is transmitted to a source network entity. | 2010-09-23 |
20100242104 | METHODS AND SYSTEMS FOR SECURE AUTHENTICATION - A system, device, method, program instructions, and means for securely authenticating a user, the method including mapping, by a one time code generating device in the possession of a user, a one time code onto a graphical representation of a positional array; displaying the one time code mapped onto the graphical representation of the positional array; determining an encoded personal identification number (PIN), the encoded PIN is based on the one time code mapped onto the graphical representation of the positional array and a static PIN known by the user; and authenticating the user based on the encoded PIN. | 2010-09-23 |
20100242105 | SYSTEMS AND METHODS FOR SELECTIVE AUTHENTICATION, AUTHORIZATION, AND AUDITING IN CONNECTION WITH TRAFFIC MANAGEMENT - The present invention provides a system and method for authentication of network traffic managed by a traffic management virtual server. A traffic management virtual server may determine that a client has not been authenticated from a request of the client to access a server. Responsive to the request, the traffic management virtual server may transmit a response to the client with instructions to redirect to an authentication virtual server. The authentication virtual server may receive a second request from the client. The authentication virtual server may then authenticate credentials received from the client and establish an authentication session for the client. Further, the authentication virtual server may transmit a second response to redirect the client to the traffic management virtual server. The second response identifies the authentication session. The traffic management virtual server then receives a request from the client with an identifier to the authentication session. | 2010-09-23 |
20100242106 | SYSTEMS AND METHODS FOR USING END POINT AUDITING IN CONNECTION WITH TRAFFIC MANAGEMENT - The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result. | 2010-09-23 |
20100242107 | Image Processing Device - A low-cost Multi Function Peripheral (MFP) prevents a user from forgetting to cancel an authenticated state. The MFP includes a scanner unit, a printer unit, a touch screen, and a reset key for initializing various settings. When the user is authenticated, the MFP accepts various operations. Under a state in which the user is authenticated, when the reset key is operated, a control unit executes a logout process. | 2010-09-23 |
20100242108 | METHOD AND SYSTEM FOR MEMORY PROTECTION AND SECURITY USING CREDENTIALS - A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory. | 2010-09-23 |
20100242109 | METHOD AND SYSTEM FOR PREEMPTIVE SCANNING OF COMPUTER FILES - In embodiments of the present invention improved capabilities are described for reducing computer file access time associated with on-access scanning through predictive preemptive scanning, where the prediction may be enabled through the development and use of a file access performance cost mapping of a computing facility's file system. In a first step, file access information describing a pattern of each of a plurality of computer files that have been accessed in a computer file system may be collected. In a second step, the file access information may be processed to generate a file access performance cost statistic for each of the plurality of computer files, where the file access performance cost statistic may be a measure of the time aggregate effect on the computing facility's system performance associated with the access of the file. In a third step, the file access performance cost statistic may be maintained for each of the plurality of files accessed by the computing facility. In a fourth step, the file access performance cost mapping of the computing facility's file system relating to the plurality of computer file may be generated, where the file access performance cost mapping may provide an indication of which of the plurality of files in the file system produce the greatest time aggregate file access effect based on the computing facility's system performance. Finally, in a fifth step, files from the computer file system may be pre-scanned based on the file access performance cost mapping. In embodiments, pre-scanning may access at least one of the plurality of files for scanning prior to the file being called for a use, such as by an operating system, an application, a utility program, and the like. The step of pre-scanning may be performed during periods of low computing facility processing activity, and may result in a reduced need to scan the computer file when the computer file is accessed for use. | 2010-09-23 |
20100242110 | Widget Security - A widget security system, method and computer-readable medium detects a security event associated with a widget, assesses the risk associated with the security event, and initiates a security action based on the assessed risk. | 2010-09-23 |
20100242111 | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing - A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model. | 2010-09-23 |
20100242112 | SYSTEM AND METHOD FOR PROTECTING NETWORK RESOURCES FROM DENIAL OF SERVICE ATTACKS - The present disclosure generally pertains to systems and methods for protecting network resources from denial of service attacks. In one exemplary embodiment, a responder stores an access filter value used to determine whether an incoming message frame has been transmitted from an authorized user. In this regard, a user communication device includes logic for determining the access filter value stored at the responder and includes the access filter value in a message frame transmitted from the computer to the responder. The responder compares the received access filter value to the stored access filter value. If such values match or otherwise correspond, the responder authenticates the message frame. However, if such values do not match or otherwise correspond, the responder discards the message frame. Thus, the responder processes authenticated message frames and discards unauthenticated message frames thereby preventing denial of service attacks from malicious users. | 2010-09-23 |
20100242113 | DETECTION OF ROUTING LOOPS BASED ON TIME-TO-LIVE EXPIRIES - A method and system for detecting routing loops and time-to-live (TTL) expiry attacks in a telecommunications network are disclosed. The detection of routing loops and TTL expiry attacks can be achieved based on the comparison of TTL expiries occurring on two or more routers in the network. A quantity of TTL expiries associated with a router can be summed. Additionally, a quantity of TTL expiries associated with other routers that are operatively coupled to the router can be summed. A difference between the sums can be calculated and a determination of whether a routing loop exists can be made in response to the difference. | 2010-09-23 |
20100242114 | SYSTEM AND METHOD FOR SELECTING AND APPLYING FILTERS FOR INTRUSION PROTECTION SYSTEM WITHIN A VULNERABILITY MANAGEMENT SYSTEM - A system for controlling selection of filters for protecting against vulnerabilities of a computer network includes a vulnerability management system analyzes the computer network and determines network vulnerabilities for the computer network. The vulnerability management system is configured to receive real-time data on a status of filters protecting against vulnerabilities of the computer network. A database contains a pre-generated mapping of network vulnerabilities to filters for protecting against the network vulnerabilities. The vulnerability management system enables user control of filters for protecting against vulnerabilities of the computer network based upon the determined network vulnerabilities of the computer network, the pre-generated mapping of network vulnerabilities to the filters for protecting against the network vulnerabilities and the real-time data on the status of the filters. | 2010-09-23 |
20100242115 | SECURITY COVER - The present invention is available for the field of electronic circuit protection, and provides a security cover for enclosing a protective area on the protected PCB and protecting the components in this area. The security cover comprises a flexible PCB that is folded with a receiving space and an opening in a side in the space. The flexible PCB is covered on the protective area of the protected PCB and encloses the components in the protective area. The flexible PCB triggers the related circuits to remove or destroy the information on the components in this protective area in case of physical attack. The present invention is to enclose the key components on PCB via the flexible PCB with the receiving space so as to prevent the key components from being attacked. | 2010-09-23 |
20100242116 | INTEROPERABLE DIGITAL RIGHTS MANAGEMENT DEVICE AND METHOD THEREOF - Provided are an interoperable DRM device and method thereof. The interoperable DRM device includes: an interface for communicating with a terminal that performs predetermined operations for reproducing contents; and a DRM processor for managing digital rights of the contents. The DRM processor exchanges messages with the terminal for interoperably managing the digital rights. | 2010-09-23 |
20100242117 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM, AND STORAGE MEDIUM STORING THE SAME - An information processing apparatus in which a part of a plurality of different programs included in an application package is validated includes an invalidation command input unit configured to input a command to invalidate a license of the application package, a generation unit configured to generate invalidation verification data by invalidating the license of the program which is included in the application package, is already installed in the information processing apparatus, and has a validated license, and to generate invalidation verification data of the license of the program without installing the program which is included in the application package and is not installed in the information processing apparatus, and an output unit configured to output the invalidation verification data generated by the generation unit. | 2010-09-23 |
20100242118 | SECURITY MANAGEMENT DEVICE AND SECURITY MANAGEMENT METHOD - To provide a security management device, a security management method, a security management program and a security management system that are capable of ensuring a desired security while scheming to save a labor for the security management by the security management device performing access control of a terminal in accordance with a security level of the terminal and prompting it to do security setting. Whether or not a security level reaches a predetermined level is judged by detecting the security level of a terminal from an access pattern, and, in the case of judging that the security level of the terminal does not reach the predetermined level, an access permission range of the terminal is changed. | 2010-09-23 |
20100242119 | ELECTRONIC DOCUMENT RIGHTS AND TRACKING SYSTEM - Method and system to identify document rights by use of the Internet or other networking system and then perform action(s) based on the rights identified in the document. A log may be created where predefined information will be populated and that log will be viewable by the document owner or other person who has access to the log. | 2010-09-23 |
20100242120 | Mitigating and managing privacy risks using planning - System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is receive a request for at least one output product from the system. The request includes a set of privacy parameters. At least one set of workflow generating strategies are created that results in the output product having a privacy risk value below a predefined threshold. At least one of the workflow generating strategies is deployed for automatically producing the at least one output product. | 2010-09-23 |
20100242121 | APPARATUS, SYSTEMS AND METHODS FOR AUTHENTICATING WIDGET ACCESS AND WIDGETS - In some embodiments, a content server receives a request for a widget from a web server, specifying a user identifier and a delegation server. If the delegation server is trusted, the user's identity is ascertained using the user identifier. The widget is delivered having a context of the user's identity. The content server receives a request to access content generated utilizing the widget incorporated into a web page and allows access based on the context of the widget. In other embodiments, a social network server receives a request from a web server for a widget. The widget is delivered having a source indicator. Subsequently, the social network server receives a request to access the social graph generated utilizing the widget incorporated into a web page. If the request includes a change to the social graph, the social network server allows the request if the widget is trusted. | 2010-09-23 |
20100242122 | INFORMATION PROCESSING APPARATUS - An information processing apparatus ( | 2010-09-23 |
20100242123 | MODELS OF ATHEROSCLEROSIS, HYPERLIPIDEMIA, LIPOPROTEIN OXIDATION AND BLOOD VESSEL INFLAMMATION AND METHODS FOR MAKING AND USING THEM - The invention provides genetically altered fish of the family Cyprinidae, or genus | 2010-09-23 |
20100242124 | COMPOSITIONS AND METHODS FOR THE TREATMENT AND PREVENTION OF ULCERATIVE COLITIS AND COLON CANCER AND SCREENING METHODS TO IDENTIFY SAME - The instant invention is based, at least in part, on the discovery that T-bet maintains host commensal relationships in the gastrointestinal tract. Accordingly, this invention provides methods of treating and/or preventing ulcerative colitis, and/or colon cancer, and/or preventing colonization of a subject's gastrointestinal tract with commensal bacteria that promote ulcerative colitis as well as methods of identifying agents that treat and prevent the same. | 2010-09-23 |
20100242125 | METHODS FOR CORRECTING MITOTIC SPINDLE DEFECTS AND OPTIMIZING PREIMPLANTATION EMBRYONIC DEVELOPMENTAL RATES ASSOCIATED WITH SOMATIC CELL NUCLEAR TRANSFER IN ANIMALS - The present invention is directed to various methodologies to make NT a practical procedure for animals, specifically, primates including human and non-human primates. Furthermore, the methods and molecular components provided by the present invention provide a practical means for producing embryos with desired characteristics. In a specific embodiment, the methodology of the present invention comprises introducing nuclei having desired characteristics along with one or more molecular components into an enucleated egg, thus creating a nuclear transfer construct, culturing the egg to produce a viable embryo, transferring the embryo to the oviducts of a female, and producing a cloned animal. | 2010-09-23 |
20100242126 | Regulator of ephrin-Eph receptor signaling and mouse having abnormal ephrin-Eph receptor signaling mechanisms - It is intended to provide an agent for regulating axon extension during neuranagenesis by regulating ephrin-Eph receptor signaling mechanisms and to provide a mouse having abnormal ephrin-Eph receptor signaling mechanisms. The present invention relates to a regulator of axon extension, comprising an agent for promoting or suppressing the function of α-chimerin, and to a miffy (mfy) mouse derived from a B6 strain, which displays autosomal recessive inheritance of an abnormal walking trait exhibiting a hopping gait with left-right synchronized movement of limbs and has mutation in an α-chimerin gene. | 2010-09-23 |
20100242127 | METHODS TO IDENTIFY MODULATORS OF B-RAF PROTEIN KINASE AND THEIR USE FOR THE TREATMENT OF ANXIETY AND DEPRESSION - The present invention relates to a method for identifying a compound capable of modulating an anxiety or depression disorder comprising the steps of: (a) contacting a composition comprising a B-Raf protein or a B-Raf gene in expressible form or a transcript thereof with a compound under conditions that allow for an interaction of the B-Raf protein or the B-Raf gene or a transcript thereof and the compound; and (b) measuring whether said interaction, if any, results in (i) a change of B-Raf kinase activity compared to B-Raf kinase activity in the absence of said compound; (ii) a modulation of the expression of the B-Raf gene compared to B-Raf gene expression in the absence of said compound; or (iii) the formation of a complex between the compound and the B-Raf protein, wherein such a change in activity, modulation of expression or the formation of a complex is indicative of the compound being a modulator of an anxiety or depression disorder. Further, the invention relates to a method for treating an anxiety or depression disorder in an individual comprising administering to the individual an effective amount of a compound inhibiting B-Raf kinase activity or gene expression and to a use of a compound that inhibits B-Raf kinase activity or gene expression in the manufacture of a pharmaceutical composition for treating an anxiety or depression disorder. Moreover, the invention relates to a method of diagnosing a B-Raf associated anxiety or depression disorder and to a genetically engineered mouse. Finally, the invention also relates to a method of identifying another gene contributing to the pathophysiology of an anxiety or depression disorder apart from B-Raf. | 2010-09-23 |
20100242128 | METHOD TO PRODUCE MODIFIED PLANTS WITH ALTERED N-GLYCOSYLATION PATTERN - Provided is a novel method to produce a plant cell or plant having an altered N-glycosylation pattern resulting, in particular, in a low level of β-1,2-xylose residues and core α-1,3-fucose residues on protein-bound N-glycans. The plant cell or plant is of particular interest for producing therapeutic glycoproteins with a low, or not detectable, level of β-1,2-xylose and α-1,3-fucose residues. Also provided are novel α-1,3-fucosyltransferase nucleotide sequences and uses. | 2010-09-23 |
20100242129 | SOYBEAN VARIETY D5632454 - The invention relates to the soybean variety designated D5632454. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5632454. Also provided by the invention are tissue cultures of the soybean variety D5632454 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5632454 with itself or another soybean variety and plants produced by such methods. | 2010-09-23 |
20100242130 | SOYBEAN VARIETY D5247567 - The invention relates to the soybean variety designated D5247567. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5247567. Also provided by the invention are tissue cultures of the soybean variety D5247567 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5247567 with itself or another soybean variety and plants produced by such methods. | 2010-09-23 |
20100242131 | INBRED CORN LINE PHEHG - A novel inbred maize line designated PHEHG and seed, plants and plant parts thereof. Methods for producing a maize plant that comprise crossing inbred maize line PHEHG with another maize plant. Methods for producing a maize plant containing in its genetic material one or more traits introgressed into PHEHG through backcross conversion and/or transformation, and to the maize seed, plant and plant part produced thereby. Hybrid maize seed, plant or plant part produced by crossing the inbred line PHEHG or a trait conversion of PHEHG with another maize line. Inbred maize lines derived from inbred maize line PHEHG, methods for producing other inbred maize lines derived from inbred maize line PHEHG and the inbred maize lines and their parts derived by the use of those methods. | 2010-09-23 |
20100242132 | Reversible Male Sterility in Transgenic Plants by Expression of Cytokinin Oxidase - Methods for the production of reversibly male-sterile plants by introduction of a polynucleotide encoding a cytokinin oxidase are disclosed along with nucleic acid constructs and transformed cells useful in the production of such plants. Also disclosed is the use of plants containing recombinant nucleic acid sequences in preventing pollination of plants with pollen containing one or more transgenes and in the introduction of economically important traits into elite varieties of plants. | 2010-09-23 |
20100242133 | MANIPULATION OF THE FUNCTION OF AtDBP1 IN ORDER TO GENERATE POTYVIRUS RESISTANCE - The invention relates to the use of a mutation for the generation of virus-resistant mutant plants and, specifically, to the use of mutation 8.1 of the AtDBP1 gene of | 2010-09-23 |
20100242134 | METHODS AND POLYNUCLEOTIDES FOR IMPROVING PLANTS - The invention provides methods for producing a plant with altered tillering time, the methods comprising transformation of a plant with a genetic construct including a polynucleotide encoding of a polypeptide with the amino acid sequence of SEQ ID NO: 1 or a variant or fragment thereof. The method also provides isolated polypeptides, polynucleotides, constructs and vectors useful for producing a plant with altered tillering time. The method also provides plant cell and plants transformed to contain and express the polypeptides, polynucleotides and constructs. The invention also provides plants produced by methods of the invention. | 2010-09-23 |
20100242135 | ETP1 AND ETP2 REGULATE PLANT ETHYLENE RESPONSE - ETP1 and ETP2 bind to EIN2 and modulate plant ethylene sensitivity. | 2010-09-23 |
20100242136 | UDP-GLUCOSE MODIFIERS - This invention relates to an isolated nucleic acid fragment encoding a UDP-galactose 4-epimerase. The invention also relates to the construction of a chimeric gene encoding all or a portion of the UDP-galactose 4-epimerase, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the UDP-galactose 4-epimerase in a transformed host cell. | 2010-09-23 |
20100242137 | POLYNUCLEOTIDES ENCODING PROTEINS INVOLVED IN PLANT METABOLISM - The invention provides isolated pyruvate dehydrogenase kinase nucleic acids and their encoded polypeptides. The present invention provides methods and compositions relating to altering pyruvate dehydrogenase kinase levels in plants. The invention further provides recombinant expression cassettes, host cells, transgenic plants, and antibody compositions. | 2010-09-23 |
20100242138 | ODP1-2 Genes and Uses Thereof in Plants - Methods are provided for altering plant characteristics by introducing into plants, isolated nucleic acid molecules that can be used to produce transgenic plants characterized by altered oil levels within the seed. Also provided are isolated nucleic acids that encode AP2 domain transcription factor proteins and fragments thereof, vectors capable of expressing such nucleic acid molecules, host cells containing such vectors, and polypeptides encoded by such nucleic acids. | 2010-09-23 |
20100242139 | XENOHORMESIS BASED COMPOSITIONS AND METHODS - The present invention provides methods and compositions for improving the health of subjects, such as their resistance to stress. | 2010-09-23 |
20100242140 | Modulation Of Plant Cell Wall Deposition - The present invention is predicated, in part, on the functional characterisation of a homeodomain/leucine zipper (HD-Zip) polypeptide which modulates various aspects of cell wall deposition in plant cells, including secondary cell wall deposition. The present invention provides, among other things, methods for modulating cell wall deposition in plant cells; plant cells and plants having modulated cell wall deposition; and methods for determining and/or predicting the rate and/or extent of cell wall deposition in plant cells and plants. | 2010-09-23 |
20100242141 | COMPOSITION FOR PRODUCTION OF PLANT BODY HAVING IMPROVED SUGAR CONTENT, AND USE THEREOF - The composition, in accordance with the present invention, for producing a plant body having an improved sugar content includes glutathione, a polynucleotide encoding γ-glutamylcysteine synthetase, or a polynucleotide encoding glutathione-binding plastid type fructose-1,6-bisphosphate aldolase. The composition preferably includes oxidized glutathione. This allows provision of a composition for easily producing a plant body having an improved sugar content. | 2010-09-23 |
20100242142 | SCANNING PROBE MICROSCOPE - The invention relates to a scanning probe microscope comprising: a specimen holder holding a specimen; and a probe for scanning the relief of the upper surface of the specimen, which probe is movable in a vertical direction and two orthogonal horizontal directions, wherein the upper surface of the specimen is tilted relative to at least one of the two orthogonal horizontal directions. | 2010-09-23 |
20100242143 | Muscadine grape plant named 'Majesty' - A new and distinct cultivar of the muscadine grape plant, | 2010-09-23 |
20100242144 | Hydrangea plant named 'Carina' - A new and distinct cultivar of | 2010-09-23 |
20100242145 | KENTUCKY BLUEGRASS PLANT NAMED 'B-5.0815' - A variety of Kentucky bluegrass produced vegetatively by rhizomes, tillers and apomictic caryopses, distinguished by a unique combination of characters including coarse leaf blade width and high dry matter yield under grazing. | 2010-09-23 |