51st week of 2012 patent applcation highlights part 69 |
Patent application number | Title | Published |
20120324501 | METHOD AND APPARATUS FOR DISTRIBUTING PROMOTIONAL MATERIALS - A system that incorporates teachings of the present disclosure may include, for example, a server having a memory coupled to a processor. The processor can be operable to receive a request for promotional information responsive to a media processor detecting a promotional tag in a media program stream and transmit to the media processor promotional information associated with a promotion responsive to a determination that a promotional offer is available. The processor can also be operable to receive from the media processor a request for redeemable material associated with the promotion and store the redeemable material in a portion of a database associated with a user of the media processor. Other embodiments are disclosed. | 2012-12-20 |
20120324502 | STREAMING VIDEO WITH ENHANCED OVERLAY POSITIONING - Aspects of the present invention place a second object contained within an overlay atop a first object in a first video stream. Suggested positions at which to place the second object atop the first object are received from a plurality of viewers in a first group of viewers of the first video stream. A consensus position at which to place the second object atop the first object is calculated based on the suggested positions. The second object is placed atop the first object at the consensus position. The first and second objects are transmitted to a second group of viewers of the first video stream after a delay period. | 2012-12-20 |
20120324503 | SETTOP BOX AND DIAGNOSIS METHOD THEREOF - A settop box is provided. The settop box includes a security shell interface unit which provides secured access by authenticating a terminal when the terminal accesses the settop box through a security shell terminal; a storage unit which stores diagnostic information of the settop box; and a diagnostic information processing unit which provides the diagnostic information stored in the storage unit to the terminal side when a diagnostic information request is received from the terminal. | 2012-12-20 |
20120324504 | SYSTEMS AND METHODS FOR PROVIDING PARENTAL CONTROLS IN A CLOUD-BASED MEDIA GUIDANCE APPLICATION - Systems and methods for providing parental controls in a cloud-based media guidance application may provide users with compiled listings of the user's content and parental controls for accessing that and other content based on the user equipment devices from which the content access request is received. A user may identify remote storage providers at which user content is stored, and may provide criteria for limiting or preauthorizing access to selected content by one or more user equipment devices. In response to receiving a user request, a listing of content stored with the remote storage providers may be compiled and presented in a media guidance application. A selection of any one of the user's content, as well as a selection of any other content listed in the media guidance application, may be subject to access control criteria applicable to the user equipment device from which the selection was received. | 2012-12-20 |
20120324505 | ALTERNATIVE AUDIO CONTENT PRESENTATION IN A MEDIA CONTENT RECEIVER - Presented herein is a method of presenting alternative audio content for an audio/visual content segment, such as a television program or a motion picture. In the method, the audio/visual content segment is received into a media content receiver. The audio/visual content segment includes primary visual content and primary audio content. A request to receive alternative audio content for the audio/visual content segment is transmitted. After transmitting the request, the alternative audio content is received into the media content receiver. The primary audio content is replaced with the alternative audio content to generate a revised audio/visual content segment. The revised audio/visual content is transferred for presentation to a user. | 2012-12-20 |
20120324506 | RESTORING PROGRAM INFORMATION FOR CLIPS OF BROADCAST PROGRAMS SHARED ONLINE - To restore context information about a clip that was sampled from a broadcast program, the clip is identified by matching a digital fingerprint of the clip against a database of known digital fingerprints taken from broadcast programs. If the clip can be identified, it is then associated with information about the matching broadcast program. The loss of context data about the clip obtained from a broadcast program is thus remedied, enabling media content available online to be more useable for a variety of purposes, such as media searching, automatic broadcast attribution, and targeting advertisements. | 2012-12-20 |
20120324507 | Interactive Ticker - Methods, apparatuses, graphical user interfaces and computer readable mediums are described for a ticker. The present invention describes, among other things, various ways of processing and displaying data in the ticker, interacting with the ticker, altering characteristics of the ticker and preparing and transmitting data to the ticker. | 2012-12-20 |
20120324508 | PROGRAM INFORMATION SEARCH DEVICE - A program information search device provides an improved operability of genre search. The device includes means for creating an electronic program table which displays information on programs, a genre search screen; means for acquiring information on a program where a cursor is located in the electronic program table, and detecting a genre of the program from the information; and a cursor control means for setting an initial position of a genre cursor for designating a genre on the genre search screen to the detected genre. Upon receiving an instruction to display the genre search screen, the electronic program table creating means extracts programs in the genre detected by the program information acquiring means, creates the genre search screen based on the extracted programs and the initial position of the genre cursor, and causes the display means to display the genre search screen. | 2012-12-20 |
20120324509 | METHOD FOR CUSTOMIZING AN INTERFACE IN TELEVISION SET - A method for customizing an interface in a TV set is provided in the present disclosure. This method comprises the following steps of: step a: setting a TV playing region and a customized function region; step b: storing the customized interface setting parameters into a memory of the TV set; and step c: invoking and displaying the customized interface from the memory depending on the user's settings when the TV set is powered on. By disposing a customized function region, the method for customizing an interface in a TV set according to the present disclosure allows the user who is watching the TV to also acquire other useful information depending on his own needs, and can also satisfy tastes of different users. This enriches functions of the TV set and makes it possible for the user to acquire interested information quickly through the TV set. | 2012-12-20 |
20120324510 | SYSTEM AND METHOD FOR SYNCHRONIZING AN ELECTRONIC PROGRAM GUIDE WITH PAUSED PROGRAMS - An apparatus and method for providing an electronic program guide (EPG) to an end user are provided. The includes a audio video streaming device, content scheduler, and program guide generator provide for includes providing a program guide, the program guide containing a start time and end time for the display of a first program, providing the first program for display at the start time, determining if the first program has been paused during the display of the first program, adjusting the end time for the display of the first program if the program has been paused, and providing an updated program guide containing the adjusted end time. | 2012-12-20 |
20120324511 | APPARATUS, SYSTEM FOR SCHEDULING AND BROADCASTING MEDIA, AUTOMATIC CHANNEL SCHEDULING METHOD AND RECORDING MEDIUM - Disclosed are an apparatus and a system for scheduling and broadcasting media, and an automatic channel scheduling method. In particular, the disclosure is applied to establishing a scheduling and broadcasting system for digital content over a data network, such as to an enterprise. An automatic channel scheduling method is disclosed. A step in the method is to generate a content broadcasting request. Then the step is to acquire information related to the content from a resource, and to store the content. The system is to configure the broadcasting channel, object to be distributed, type to broadcast, and the broadcasting time in accordance with the request and attribute of the content. Consequently, the content is broadcasted to the one or more chosen terminal display devices. | 2012-12-20 |
20120324512 | ENHANCED ELECTRONIC PROGRAM GUIDE - A method for a system that provides an enhanced content guide includes a controller that receives electronic program guide data and parses the received electronic program guide data to identify a program listed in the electronic program guide and data corresponding to at least one program description attribute for the identified program. At least one external source of content information is searched using the Internet interface for information related to the identified program using the at least one program description attribute. A user interface generator generates an enhanced content guide user interface including the information related to the identified program for display on a display device in response to selection of the identified program in the electronic program guide. | 2012-12-20 |
20120324513 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING SIGNALING INFORMATION FOR RECEPTION OF BROADCAST SERVICES IN A DIGITAL BROADCASTING SYSTEM - A method and apparatus for transmitting and receiving signaling information for receiving broadcast services in a digital broadcasting system. The method includes generating service guide information including broadcast service data, information about a transmission network where the broadcast service data is transmitted, and information about a transmission network neighboring the transmission network, and transmitting the service guide information in an upper layer of an Internet Protocol (IP) layer. | 2012-12-20 |
20120324514 | Demonstration System for Electronic Devices - A demonstration arrangement for controlling a plurality of television sets or other controllable electronic devices has one or more programmed processors. A control interface is adapted to receive user commands. The processors are programmed to, upon receipt of user commands: select one or more television sets or groups of television sets while leaving others of the television sets unselected; select one of the content sources; and send signals that cause the selected content sources to be displayed by the selected one or more television sets or groups of television sets without affecting operation of unselected television sets or groups of television sets. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2012-12-20 |
20120324515 | Remote Control System for Electronic Devices - A method of electronic devices arranged on display walls involves a processor receiving information in a self description signal from an electronic device that characterizes it by at least an IP address and a command set which is stored in a database. A video representation is generated for display on a video display. The electronic device is selected from the database to retrieve at least a portion of the self identification information of the device from the database. Instruction are then issued to place an icon representing the device in a location on the video representation of one of the plurality of walls, where the icon is associated with the electronic device in the location on the wall with a selection of the electronic device for remote control. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2012-12-20 |
20120324516 | METHOD AND SYSTEM TO PROVIDE A CONSUMER ELECTRONICS SYSTEM WITH IMPROVED FUNCTIONALITY - A method and system to provide networking related features and other features to a consumer electronics system. The system implementation described herein shows one option to implement the method for a DTV system. The system includes a router and a DTV System-on-a-Chip. The router provides features to the DTV when the DTV system can be in any mode including on and stand-by, features like Access Point, WiFi Direct, Network Storage, Ethernet Switch and Network Pre-fetch. | 2012-12-20 |
20120324517 | Set Top/Back Box, System and Method for Providing a Remote Control Device - A set top/back box and system and method for providing a remote control device are disclosed. In one embodiment, one or more wireless transceivers are located within a housing, which also interconnectively includes television input/output, a processor, and memory. The set top/back box may establish a pairing with a programmable device, such as a proximate wireless-enabled interactive handheld device having a touch screen display, whereby formatted parallel audiovisual experience instructions, including virtual buttons, may be transmitted to the programmable device for display on the touch screen display to create a experience parallel to the experience on the television. The set top/back box receives and processes virtual remote control functionality input instructions from the programmable device to control amenities associated with the set top/back box. | 2012-12-20 |
20120324518 | SYSTEMS AND METHODS FOR SUPPLEMENTING ON-DEMAND MEDIA - Systems and methods for providing supplemental content with on-demand media in an interactive television application are described. | 2012-12-20 |
20120324519 | STREAMING MEDIA BANDWIDTH REDUCTION - A media server reduces media streaming bandwidth by synchronizing start times of media streams sent to clients requesting a particular set of media or other data. The server starts new streams periodically or when it has received a certain number of requests, resulting in multiple streams delivering the media to multiple clients. The streams can be delivered using multicast technologies. Overall media stream bandwidth is further reduced by merging streams. At some point after a stream has become active, a client receiving data from a current stream has enough media stored locally to ensure smooth playback of the media if the client is switched to a trailing stream. A client can switch to a trailing stream after the speed of the current stream is throttled down and the current stream becomes synchronized with the trailing stream. Multiple streams can be merged simultaneously, and streams can be merged multiple times. | 2012-12-20 |
20120324520 | METHOD, SYSTEM AND DEVICE FOR SYNCHRONIZATION OF MEDIA STREAMS - Methods and systems for synchronizing a first and second media stream are describe, wherein said first and second media stream are being transmitted by at least one media source in a network via a first and second media path to one or more terminals. The method comprises: measuring timing information associated with arrival times of media packets in said first and second media stream using a measuring module positioned at a first location in said first and second media paths; in said network generating buffer instructions for at least one buffer on the basis of said timing information, said buffer being positioned at a second location in at least one of said first or second media path; and, delaying one or more media packets transmitted over said media path to said one or more terminals such that arrival times of media packets at said one or more terminals are substantially synchronized. | 2012-12-20 |
20120324521 | METHOD AND APPARATUS FOR CREATING CONTENT IN A BROADCASTING SYSTEM - A method for creating content in a broadcasting system that provides an Internet protocol (IP) based multimedia service, the method comprising combining multiple assets into a package, the multiple assets being transferred from an upper layer and having multiple contents, and adding configuration information for multiplexing the multiple assets to the package and then transferring the package to a lower layer, wherein the configuration information comprises a list of assets contained in the package, composition information including information about relationships among the multiple assets, and a transport characteristic relating to delivery paths of the multiple assets. | 2012-12-20 |
20120324522 | Methods, Systems, And Computer Program Products For Delivering A Program In Advance Of A Scheduled Broadcast Time - A scheduled broadcast time is retrieved for a program that is to be delivered in advance of the scheduled broadcast time, wherein the scheduled broadcast time is associated with a program content identifier for the program. Prior to the scheduled broadcast time, a pre-cast channel is selected on a network by selecting at least one of a currently unused channel or a dedicated pre-cast channel. Prior to the scheduled broadcast time, a signal is sent for placing a viewer program storage device into a pre-cast mode, such that viewing of the pre-cast channel is disabled. Prior to the scheduled broadcast time, the program is delivered to the viewer program storage device over the pre-cast channel, wherein the delivered program is associated with the program content identifier and a time stamp for disabling playback of the delivered program until arrival of the scheduled broadcast time. | 2012-12-20 |
20120324523 | DEMAPPING APPARATUS AND METHOD FOR RECEPTION OF DATA IN A MULTI-CARRIER BROADCAST SYSTEM - The present invention relates to an apparatus and a corresponding method demapping a demapping input data stream (Q′) having a channel bandwidth received in a multi-carrier broadcast system into a demapping output data stream (Sy′). The demapping input data stream (Q′) comprises, alternately arranged, one or more first and one or more second frames (F | 2012-12-20 |
20120324524 | MANAGED VIDEO SERVICES AT EDGE-OF-THE-NETWORK - Systems and methods for managing video delivery to mobile device clients. Videos are assimilated for transmission to clients, a playout lead is estimated for each video and the videos are transmitted to the clients. | 2012-12-20 |
20120324525 | System and Method of Receiving Over-The-Air Television Content - A method and apparatus of receiving over-the-air television content is disclosed and includes receiving input at a media processor. The media processor is coupled to a presentation device and includes processing logic and memory storing instructions executable by the processing logic to perform operations including sending a control command to the presentation device via a second interface having a data connection where the control command instructs the presentation device to tune an over-the-air tuner at the presentation device to a requested channel and receiving the over-the-air television content from the over-the-air tuner in the presentation device via the data connection. Other embodiments are disclosed. | 2012-12-20 |
20120324526 | SYSTEM AND METHOD FOR LIMITING DATA LEAKAGE - System and methods for connection processing with limited data leakage. The system records state associated with a connection request in a connection state engine, records state associated with a connection acknowledgement in the connection state engine, stores data sent after the connection acknowledgement in a buffer and determines, without a proxy, whether to allow or deny a connection as a function of the data stored in the buffer. | 2012-12-20 |
20120324527 | TECHNIQUES FOR WORKLOAD SPAWNING - Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments. | 2012-12-20 |
20120324528 | System and method for merging security constraints when using security annotations - A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server. | 2012-12-20 |
20120324529 | ENFORCING DATA SHARING POLICY THROUGH SHARED DATA MANAGEMENT - Enforcing data sharing policy through shared data management, in one aspect, may include extracting data access rights from the one or more data policies based on a user role, data purpose, an object set and a constraint identification; extracting a data domain from the one or more data policies based on the data purpose and the object set; associating the data access rights and the data domain with data attributes of the shared data; automatically responding to application-based offers and requests for the shared data within a Software-as-a-Service platform based on the data access rights. | 2012-12-20 |
20120324530 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 2012-12-20 |
20120324531 | AUTOMATIC DETECTION OF NON-COMPLIANT CONTENT IN USER ACTIONS - Described herein are methods, systems, apparatuses and products for automatic detection of non-compliant content in user actions. An aspect provides a method including, responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. Other embodiments are disclosed. | 2012-12-20 |
20120324532 | PACKET ROUTING SYSTEM AND METHOD - Methods and systems for offering network-based managed security services are provided. According to one embodiment, an IP service processing switch includes multiple service blades and one or more packet-passing data rings. The service blades each have multiple processors for providing customized security services to subscribers of a service provider. Upon receipt of a packet by a service blade from the one or more packet-passing data rings, a PEID value within the packet is inspected and when the PEID value corresponds to a PEID assigned to a processor associated with the service blade, the packet is steered to a software entity of a VR on the processor that corresponds to an LQID value within the packet. And, when the PEID value does not correspond to any PEIDs assigned to processors on the service blade, the packet is passed to a next service blade on the one or more packet-passing data rings. | 2012-12-20 |
20120324533 | WIRELESS NETWORK HAVING MULTIPLE SECURITY INTERFACES - A number of wireless networks are established by a network device, each wireless network having an identifier. Requests are received from client devices to establish wireless network sessions via the wireless networks using the identifiers. Network privileges of the client devices are segmented into discrete security interfaces based on the identifier used to establish each wireless network session. | 2012-12-20 |
20120324534 | METHOD AND SYSTEM FOR AUTOMATICALLY CHECKING THE AUTHENTICITY OF AN IDENTITY DOCUMENT - The process comprises a data-acquisition phase with the creation of a database of multicomponent digital signatures constituting fingerprints of identity documents, linked to a central server relocated relative to a primary database comprising variable textual data and images of reference identity documents. | 2012-12-20 |
20120324535 | STATELESS HUMAN DETECTION FOR REAL-TIME MESSAGING SYSTEMS - Stateless human detection for real-time systems allows a real-time message system to challenge incoming messages suspected of being generated by an automated application. When a suspect message is detected, a challenge is presented to a sender of the message. The challenge is designed to require human intervention to provide a correct answer to the challenge. A challenge packet is sent with the challenge and includes a challenge answer and, possibly, a server identifier, a challenge identifier and/or a time stamp that can be used to prevent attacks on the challenge. The challenge packet is encrypted so that the sender cannot access the contents thereof. When the sender provides a response to the challenge, the sender returns the challenge packet. The challenge packet is decrypted and the challenge answer is compared to a sender answer. If the answers match, the sender is allowed subsequent access to the messaging system. | 2012-12-20 |
20120324536 | VIRTUAL EXTENDED NETWORK - A network device may receive a data structure, intended for a second computing device, from a first computing device. The network device may determine, based on the first data structure, whether the first computing device and the second computing device correspond to the same virtual network. When then the first computing device and the second computing device correspond to the same virtual network, the network device may communicate the data structure to the second computing device. However, when the first computing device and the second computing device do not correspond to the same virtual network, the network device may disregard the data structure. | 2012-12-20 |
20120324537 | MULTIPLE USER LOGIN DETECTION AND RESPONSE SYSTEM - A method is provided for controlling multiple access to a network service to prevent fraudulent use of the network service. The method includes identifying an account access counter for an account using identification information received from a user at a first device using a network, wherein the user is requesting access to a service provided at a second device, and further wherein the account access counter is the number of service access sessions active for the account; comparing the account access counter to a maximum account access number, whrerein the maximum account access number defines a maximum number of service access sessions allowed for the account; and providing the user at the first device access to the service at the second device if the account access counter is less than the maximum account access number. | 2012-12-20 |
20120324538 | SYSTEM AND METHOD FOR DISCOVERING VIDEOS - A method is provided in one example and includes receiving network data from a plurality of users; identifying a data file within the network data; determining whether a particular user associated with the data file is authenticated for a communications platform; identifying an access right associated with the data file; and providing the data file to a video portal, wherein the access right associated with the data file is maintained as the data file is provided to the video portal. | 2012-12-20 |
20120324539 | DYNAMIC APPLICATION ADAPTATION IN SOFTWARE-AS-A-SERVICE PLATFORM - Dynamic application adaptation in software-as-a-service platform, in one aspect, may receive an access permission associated with a published shared data management data object in the software-as-a-service platform having shared data management and a plurality of applications deployed, look up one or more rules associated with one or more features of an application deployed on the software-as-a-service platform, based on the received access permission, and activate or deactivate said one or more features associated with said plurality of applications based on said one or more rules. | 2012-12-20 |
20120324540 | SYSTEM AND METHOD FOR THE INTEROPERABILITY OF PERSONAL ELECTRICAL APPLIANCES - Systems for, and methods of, enabling selective control of resource of an electronic device having a display by a controlling electronic device wherein one device is housed within the other and each device having a display are disclosed. Selective control of the electronic device is implemented by the electronic device via a set of control permissions for a detected controlling device, based upon an identifier of the controlling device. A controlling device can be any electronic device having a processor, a memory, a display and a communication module. Enabling selective control of the display of an electronic device having a display, by a personal computer, enables the personal computer to operate as a dual screen personal computer. | 2012-12-20 |
20120324541 | METHOD AND SYSTEM FOR SUBSCRIBING TO SERVICES VIA EXTENDED UPNP STANDARD AND NASS TISPAN AUTHENTICATION - The present invention relates to a subscription method and system providing a modification of the UPnP standard, which by means of TISPAN delegated NASS authentication allows a user to play contents provided by a service provider via subscription by means of a control point which can be any consumer electronic device of the user. The modification of the standard is based on adding a field called ‘subscriptionURL’ and a variable called ‘subscriptionStatus’. These modifications, the association established by the TISPAN CLF module between the user IP and the user IMSI and the implementation of a UPnP device in the user equipment, allow subscribing to the services provided by several service providers. | 2012-12-20 |
20120324542 | SYSTEMS AND METHODS FOR IMPROVED ACCESS TO AN ATTRACTION - The present invention is directed towards systems and methods for improved access to an attraction via a computing device of a user. A first computing device of a user records an identification code associated with an attraction. The first computing device transmits, to a second computing device, a request for access to the attraction, the request comprising the identification code. The first computing device receives, from the second computing device, an access authorization comprising an access code. The first computing device presents the access code to an attraction operator for access to the attraction. | 2012-12-20 |
20120324543 | SYSTEM AND METHOD FOR CREATING A SECURE TRUSTED SOCIAL NETWORK - A system for a plurality of users to share resources with access, control and configuration based on pre-defined relationships of trust between the users of the system. A computer-based authority provides the services of authentication, identification and verification of each user within network. Processes are described that leads to the formation of an electronic community, which facilitates electronic communication and transactions in a defined manner. | 2012-12-20 |
20120324544 | INFORMATION PROCESSING APPARATUS, TERMINAL APPARATUS AND INFORMATION PROCESSING METHOD - This invention is directed to achievement of a content sharing with a high level of safety by restricting the other end of communication with which contents are shared. | 2012-12-20 |
20120324545 | AUTOMATED SECURITY PRIVILEGE SETTING FOR REMOTE SYSTEM USERS - A method of secure communication involves determining that a remote system is trusted prior to authorizing secure communication therewith. A removable security device is coupled with a first system. When the first system communicates with a remote system securely, the remote system is evaluated to ensure that it is a trusted remote system prior to secure communication therewith being allowed. | 2012-12-20 |
20120324546 | Providing Secure Dynamic Role Selection and Managing Privileged User Access From a Client Device - An approach is provided that receives a first role selection from a client device. Each of the roles includes various user accounts provisioned to access various software applications. An authentication challenge is retrieved. The authentication challenge is based upon the role selection that was received from the client device. The authentication challenge is transmitted to the client device. An authentication submission is received from the client device. This authentication submission is authenticated and, if the authentication is successful, then the client device access is granted access to software applications using the provisioned user accounts that were included in the role selection. In addition, audit data of usage of the software applications by the client device is recorded. The audit data includes identification of the provisioned user accounts used to access the software applications using the role selection. | 2012-12-20 |
20120324547 | Device, System, and Method of Accessing Electronic Mail - Device, system, and method of accessing electronic mail. For example, a computerized method includes: receiving an identifier of an email account, and a password; if the password matches a first reference password previously stored in association with said email account, then authorizing a substantially full access to said email account; if the password matches a second reference password previously stored in association with said email account, then authorizing a restricted access to said email account. | 2012-12-20 |
20120324548 | MESSAGING SYSTEMS AND METHODS - A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In particular, the subscriber can send a trust indicator to the group member, who can then determine whether to accept the trust indicator for all or specific groups that are associated with the group member, as appropriate. In at least one embodiment, the group member can send a trust indicator acceptance message to the subscriber that identifies the group member, and any or all group lists associated with the group member. The subscriber can then receive messages directed to the trusted group member or group lists, and can send group messages to the group lists subject to a receive setting associated with the group lists or group members of the group lists. | 2012-12-20 |
20120324549 | PEER TO PEER SUBSCRIPTION SERVICE - Peer-to-peer approaches to servicing subscriptions to information feeds are generally disclosed. Network nodes may exchange information about information feeds that they can provide to other nodes, and other information about information feeds to which they may be interested in subscribing. Any of a variety of techniques may then be applied to allow the nodes to negotiate for feeds to which they may be interested in subscribing. For example, each node may apply algorithms that service feed subscriptions of other nodes on a prioritized basis, prioritized for example based on which other nodes service subscriptions in return. | 2012-12-20 |
20120324550 | Systems and Methods for Combining User Profiles - Certain embodiments of the invention may include systems and methods for combining user profiles. According to an example embodiment, a method is provided for refining group content choices. The method includes identifying that at least two users are accessing media content on a same device, wherein each of the at least two users is associated with a different set of profile attributes; generating a spliced user profile having spliced profile attributes based at least in part on at least a portion of the set of profile attributes associated with at least one of the at least two users; determining at least one content recommendation based on the spliced profile attributes; and delivering the at least one content recommendation over a content distribution channel to the at least two users on the media device. | 2012-12-20 |
20120324551 | Method of Improving Online Credentials - The invention comprises a method of providing additional assurance regarding a websites authenticity, The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations. The assurance is also provided by scanning the website associated with the credential for changes and alerting the website operator or a website visitor of the changes. The invention includes a method of ensuring the proper operation of the credential and a method of protecting the credential from mis-issuance. | 2012-12-20 |
20120324552 | System and Method for Securing Embedded Media - Set forth herein are systems, methods, and non-transitory computer-readable storage media for processing media requests in a secure way. A server configured to practice the method receives, from a media player client, a request for media content. The server requests a playback token from a playback service associated with the media content and generates a tag containing the playback token. Then the server transmits to the media player client a response to the request for media content based on the tag, wherein the media player client retrieves the media content by presenting the playback token to the playback service. The media player client can be an embedded media player or other player in a web browser. The server and the playback service can operate based on a common, pre-shared feed token. Other playback client and playback service embodiments exist. | 2012-12-20 |
20120324553 | METHOD FOR THE DISCOVERY AND SECURE ACCESS TO MOBILE DEVICES IN PROXIMITY BY MEANS OF THE USE OF A VISUAL CHANNEL - Disclosed is a method for the secure access of a mobile device to a nearby client device that includes the following: | 2012-12-20 |
20120324554 | AUTOMATIC DEVICE PAIRING - One embodiment relates to a security apparatus. The apparatus includes a security controller. The security controller is within a secure domain. The controller is configured to receive a trigger event from a first device outside the secure domain and a second trigger event. The controller is configured to automatically generate a secure password from a provisional password using a secure password provisioning protocol in response to the first trigger event and the second trigger event. The controller is also configured to pair the first device with the secure domain by establishing secure communications using the secure password. | 2012-12-20 |
20120324555 | LUHN VALIDATION AND DATA SECURITY ACROSS MULTIPLE ACTIVE DOMAINS - Systems and methods for maintaining data security using Luhn validation in a multiple domain computing environment are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The token generation algorithm includes a Luhn validation routine for producing a tokenized data string that either passes or fails Luhn. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found. | 2012-12-20 |
20120324556 | PASSPORTING CREDENTIALS BETWEEN A MOBILE APP AND A WEB BROWSER - Systems and methods for passporting credentials provide a mechanism by which a native app on a client device can invoke a service provider's core web site web addresses (URL) while keeping the existing session active and shared between the two experiences (native app and web flow) so that the end user does not need to re-login at each context switch. The mechanism can include a unique way for the web flow context to communicate conditions and pass control back to the native app context of the shared session. Embodiments may operate by authenticating a device session from a native app executing on a client device producing a device session token; passing the device session token from a native app to an embedded browser to authenticate a user when entering a web flow; and entering the web flow, according to the session token, on an embedded browser driven by the native app so that the user encounters a single shared session (device session and web session) running at least two parallel secure communication interactions with an infrastructure. | 2012-12-20 |
20120324557 | SYSTEM AND METHOD FOR REMOTE INTEGRITY VERIFICATION - Systems and methods are disclosed herein for verifying the integrity of a remote computing device. The system includes a challenge processor in communication with a communication device. The challenge processor selects a challenge from a plurality of challenges for determining the integrity of a computer program on a remote computing device. The challenge is selected in a manner which is substantially unpredictable by the remote computing device. The communication device transmits the challenge to the remote computing device and receives an output of the challenge. The challenge processor is also configured to determine from the output of the challenge whether the integrity of the computer program on the remote computing device has been compromised. | 2012-12-20 |
20120324558 | SYSTEMS AND METHODS OF INTEGRATING OPENID WITH A TELECOMMUNICATIONS NETWORK - A solution is described which allows mobile devices to specify that certain sites are allowed to be logged into based on the device credentials alone. The solution integrates OpenID with a telecommunications network in order to verify the user's identity. This verification is based on the trust that the telecom carrier has to identify the subscriber at the GGSN. The solution splits the OpenID Provider (OP) into two systems—an internal OP and an external OP. The external OP can reside in the public network and can allow the user to authenticate with a password. The internal OP resides in the private network of the carrier and is directly connected to the GGSN such that it is only reachable from the GGSN. | 2012-12-20 |
20120324559 | ESTABLISHING A SECURE CONNECTION BASED ON A JOINT GESTURE - During a transaction, an electronic device (such as a cellular telephone) captures a gesture performed by a user of the electronic device. This gesture is analyzed to determine salient features, such as accelerations of the electronic device during the gesture and associated time intervals. Then, the electronic device generates a token based on the salient features, and provides the token to a server. When a second token, associated with the token, is received by the server from a second electronic device, the server establishes a secure connection between the electronic device and the second electronic device. | 2012-12-20 |
20120324560 | TOKEN DATA OPERATIONS - In one embodiment, a host application may manage a data set maintained at a storage device using a token. A processor | 2012-12-20 |
20120324561 | ROAD BLOCK the next evolution of security software for network operations - Road Block simply put is a blockade against any and all hacker attempts. It is a security software program that resides on a server and the user machine with specific coding interchanging between the two for a secure link and transference of information. Unlike VPN technology Road Block establishes a Binary code link specific to computer chips residing on a server and also on the user computer. This technology can be used by banks, medical offices, insurance companies, credit unions and facilities allowing employees to work remotely. In a nutshell Road Block is the ultimate security software package to ensure safe and secure transmission of any information between a user and server. | 2012-12-20 |
20120324562 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 2012-12-20 |
20120324563 | MICROCHIPS WITH MULTIPLE INTERNAL HARDWARE-BASED FIREWALLS AND DIES - Embodiments useful for a network of computers are presented. In an embodiment, microchip includes a plurality of dies. Each die is made by a separate fabrication process and assembled into a package with the separate die sections connected directly. | 2012-12-20 |
20120324564 | Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments - A personal computer or microchip comprising at least one Faraday Cage, two or more microprocessors or processing units and an internal hardware firewall. The internal hardware firewall is configured to separate a protected side of the computer or microchip from an unprotected side of the computer or microchip. The unprotected side being configured to connect to a network including the Internet. The protected hardware side of the computer or microchip includes at least one microprocessor or processing unit. The unprotected network side of the computer or microchip is located between the internal hardware firewall and the network and includes the unprotected microprocessors or processing units. At least one of the unprotected microprocessors or processing units is not a network communications component and is a separate component from the internal hardware firewall. The computer or microchip can include two, four, or more internal hardware compartments. | 2012-12-20 |
20120324565 | NEURAL NETWORK DATA FILTERING AND MONITORING SYSTEMS AND METHODS - Systems and methods are disclosed for filtering data in a neural network environment to filter out inappropriate content. In some embodiments, a data signal including a sensible representation is received. The sensible representation included in the data signal is produced in a sensible format. From the sensible representation in the sensible format, a clean copy of the sensible representation can be generated such that any inappropriate content present within the received data signal is not reproduced in the clean copy. Optionally, additional filtering can occur before and/or after the generating of the clean copy. The (filtered) clean copy of the sensible representation is sent to a network. Embodiments can permit the filtering of input to and/or output from a network. | 2012-12-20 |
20120324566 | Takeover Processes In Security Network Integrated With Premise Security System - An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a coupling with a first controller of a security system installed at the first location. The security system includes security system components coupled to the first controller. The takeover component automatically extracts security data of the security system from the first controller. The gateway automatically transfers the security data extracted from the controller to a second controller. The second controller is coupled to the security system components and replaces the first controller. | 2012-12-20 |
20120324567 | Method and Apparatus for Home Network Discovery - Methods of remotely discovering information of hosts connected to a local area network (LAN) are provided. Electronic communications sent from a gateway behind which the LAN is configured are received by a remote server connected to a wide area network (WAN). The electronic communications include information of a list of hosts connected to the LAN, a log of LAN events, or diagnostic data concerning the LAN. Apparatus for remotely discovering information of hosts or devices connected to a LAN behind a gateway are also disclosed. | 2012-12-20 |
20120324568 | MOBILE WEB PROTECTION - On a mobile communications device, visiting a link from a messaging application or web browser may result in an undesired action, such as visiting a phishing site, downloading malware, causing unwanted charges, using too much battery, or the device being exploited. In an implementation, a mobile application intercepts a request including an identifier associated with an action to be performed by another application on the device and evaluates the identifier to determine when the request should be permitted, blocked, or conditionally permitted. The client may use local data or make a request to a server to evaluate the identifier. In an implementation, server communications are optimized to minimize latency by caching evaluation results on the device, proactively priming the device's DNS cache, optimizing when DNS lookups are performed, and adapting evaluation policy based on factors such as the source of the request, and the currently active network connection. | 2012-12-20 |
20120324569 | RULE COMPILATION IN A FIREWALL - A firewall system comprises a rule compiler operable to use florets and factoring to produce a rule data structure that enables a rules engine to apply a rule from a rule set in phases, including rules applicable during a first scan with second factors not available and rules applicable during a second scan such that only the second factors need be applied. | 2012-12-20 |
20120324570 | INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an information processor includes a display module and an operation module. The display module displays a plurality of display objects each at a predetermined display position. The display objects are selected in advance by a user from a plurality of objects and includes authentication objects. The operation module is used for operation to select the authentication objects in a predetermined order upon user authentication. | 2012-12-20 |
20120324571 | INFORMATION INPUT DISPLAY DEVICE AND CONTROL PROGRAM THEREOF - An information input display device, having an input section for inputting information and a display section for displaying the information, which enables an access to protected information after being authenticated by an authentication processing executed after starting up of the information input display device, the information input display device including: an authentication processor which executes the authentication processing based on authentication information inputted by the input section; and an input display controller which, after the starting up of the information input display device and before being authenticated by the authentication processing, accepts inputting of prescribed information different from the authentication information through a screen displayed on the display section, and allows the display section to display the prescribed information on the screen. | 2012-12-20 |
20120324572 | SYSTEMS AND METHODS THAT PERFORM APPLICATION REQUEST THROTTLING IN A DISTRIBUTED COMPUTING ENVIRONMENT - Methods of managing network traffic in a distributed computing environment include segmenting a plurality of virtual hosts into sub-groups. A first security agent monitors first communications of virtual hosts within a first sub-group of virtual hosts, and a second security agent monitors second communications of virtual hosts within a second sub-group of virtual hosts. Information regarding the first communications and the second communications is collected from the security agents and analyzed to detect a denial of service attack. A defense mechanism is initiated in response to detecting the denial of service attack. | 2012-12-20 |
20120324573 | METHOD FOR DETERMINING WHETHER OR NOT SPECIFIC NETWORK SESSION IS UNDER DENIAL-OF-SERVICE ATTACK AND METHOD FOR THE SAME - Provided is an apparatus and method for determining whether or not a specific network session is under a denial-of-service (DoS) attack. The method includes detecting a packet transmitted in the session, initializing the number of attack-suspicion continuation packets, increasing the number of attack-suspicion continuation packets by a predetermined number, and determining that the session is under the DoS attack. | 2012-12-20 |
20120324574 | ENGINE, SYSTEM AND METHOD OF PROVIDING A DOMAIN SOCIAL NETWORK HAVING BUSINESS INTELLIGENCE LOGIC - An engine, system and method for a domain social network that interconnects Internet users with at least domains owned by or of interest to those Internet users, and that may obtain and/or forward obtained dynamic data regarding those domains automatically, such as by web service or email service. The dynamic data may be used to filter and protect content and data of the respective domains, to protect users by identifying low quality web pages or malicious software or pages, to isolate or improve search results regarding the domain, and/or to improve Internet-based transaction flow, such as the creation of advertising. | 2012-12-20 |
20120324575 | System, Method, Program, and Recording Medium for Detecting and Blocking Unwanted Programs in Real Time Based on Process Behavior Analysis and Recording Medium for Storing Program - A system, method and program for detecting and blocking unwanted programs in real time based on process behavior analysis and a recording medium for storing the program. In particular, the invention relates to a system, method and program for detecting and blocking unwanted programs in real time based on process behavior analysis and a recording medium for storing the program, in which a security server defines lists of unwanted abnormal actions of a process in advance, detects the number of abnormal actions that have occurred, collects the abnormal actions, and detects and blocks an unwanted process by matching a program executed on a user terminal with the lists of abnormal actions. | 2012-12-20 |
20120324576 | BLOCKING INTRUSION ATTACKS AT AN OFFENDING HOST - A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host. | 2012-12-20 |
20120324577 | DETECTING MALICIOUS SOFTWARE ON A COMPUTING DEVICE WITH A MOBILE DEVICE - Systems, methods, devices, and machine readable media for detecting malicious software on a computing device with a mobile device are provided. One method includes causing a mobile device to mount a non-volatile memory of the computing device, scanning the non-volatile memory of the computing device with the mobile device using a low-level read operations scan, collecting data on the mobile device from the low-level read operations scan, and evaluating the data collected on the mobile device for malicious software on the computing device. | 2012-12-20 |
20120324578 | MOBILE DEVICE OPERATIONS WITH BATTERY OPTIMIZATION - Techniques for conserving battery power in devices are provided. One or more deferrable tasks are queued for later execution. An initiation of a subsequent charging event for a battery of the device is detected. The queued deferrable task(s) are enabled to be executed during the charging event. For instance, the queued deferrable task(s) may be enabled to be executed if the charging event is predicted to be a long duration charging event, such as by referring to a charging profile of the mobile device. In this manner, battery power is conserved while the device is in use and not connected to a battery charger. | 2012-12-20 |
20120324579 | CLOUD MALWARE FALSE POSITIVE RECOVERY - Methods, systems, and computer program products are provided for recovering from false positives of malware detection. Malware signatures that are defective may be causing false positives during software scanning for malware. Such defective malware signatures may be detected (e.g., by user feedback, etc.) and revoked. Computers that are using the malware signatures to detect malware may be notified of the revoked signatures, and may be enabled to re-scan content identified as containing malware using malware signatures that do not include the revoked malware signatures. As such, if the content is determined during the re-scan to not be infected, the content may be re-enabled for usage on the computer (e.g., may be restored from quarantine storage). | 2012-12-20 |
20120324580 | Method and Apparatus for Selective E-Mail Processing - Disclosed is a system and method for selective email processing. A traffic separator includes an interface for receiving electronic mail traffic from a source network address. The traffic separator also includes a processor for comparing the source network address to a stored list of network addresses to determine a categorization of the network source address. The traffic separator also includes at least one interface for forwarding the electronic mail traffic to one of many message transfer agents (MTAs) based upon said determination. A database stores the list of network addresses. In one embodiment, one or more network addresses in the stored list are network address ranges. | 2012-12-20 |
20120324581 | System, Method and Device for Cloud-Based Content Inspection for Mobile Devices - A content inspection system provides cloud-based content inspection for mobile devices. The content inspection system includes a content inspection server for receiving a request providing a digital fingerprint of content for evaluation for threats and a data reputation services server for maintaining a threat database. The content inspection system communicates with the mobile device using a service oriented architecture web services based on exchanges of messages between agents of the content inspection system and the mobile device. The content inspection server authenticates the received request belongs to a subscriber, and once the request is authenticated, the data reputation services server operates on the request to determine whether content identified by the digital fingerprint matches pre-existing claims in the threat database. The content inspection system generates a threat evaluation response for the mobile device based on reviewing the threat database for pre-existing claims. | 2012-12-20 |
20120324582 | SERVICE SYSTEM THAT DIAGNOSES THE VULNERABILITY OF A WEB SERVICE IN REAL TIME MODE AND PROVIDES THE RESULT INFORMATION THEREOF - A service system that diagnoses the vulnerability of a web service in real time mode and provides the result information thereof according to the present invention receives the input of a user web service address through the web service, automatically visits the corresponding web service to perform the real-time analysis on a web page and check if the web page has a vulnerability, and transmits the result information to a user PC. The service system can provide an intuitive service by displaying the discovery of the vulnerability, the procedure and an external URL linked to the web page are displayed on the user screen; find out the possibility of an outflow of the information contained in the URL by checking, on the basis of the web page analysis, whether a symbol or reserved word (system command) among the factors has been filtered; and display the classification of vulnerabilities of respective DBs by analyzing the result to be sent to an object system before being displayed on the web page. Further, the service system retains the data on the vulnerability of each DB in a program as a resource to compare the data with the result received from the web service and identify a problem if present; includes a script analysis section; and conducts an analysis on links according to an analyzed portion of an index page sot that the user can see the checking procedure via a taken place link in real time mode as well as the diagnosis progress that has been proceeded up to that point whenever desired and find links being connected. Moreover, when the service system analyzes the web page, the user can easily check an external link section and detect any external domain, if present, which spreads a malicious code in the web service. In addition, the service system allows the user to check over the internet the items for the service diagnosis selected by the user and the diagnosis result, and thus to personally see the problems and solutions therefor. | 2012-12-20 |
20120324583 | System and Method for Processing and Protecting Content - Systems and methods that process and protect content are provided. In one example, a system may include, for example, a first device coupled to a second device. The first device may include, for example, an integrated circuit that may include a content processing system and a security system. The security system may include, for example, a digital rights manager. The first device and the second device may be part of a network. The network receives content and control information via the first device. The content processing system processes incoming content based upon at least the control information. The integrated circuit protects the content before placing the content on the network. | 2012-12-20 |
20120324584 | SYSTEM AND METHOD FOR MANAGING AND/OR RENDERING INTERNET MULTIMEDIA CONTENT IN A NETWORK - A system and a method render internet multimedia content in a network using an application to render the internet multimedia content and/or locally stored multimedia content on one or more rendering devices in the network. The application may provide web browser functions, such as, for example, receiving, processing, decoding and/or rendering the internet multimedia content. The application may have an enhanced user interface which may enable a user to select the internet multimedia content and a rendering device in the network, send the internet multimedia content to the rendering device and/or control rendering of the internet multimedia content on the rendering device. | 2012-12-20 |
20120324585 | Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System - Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned. | 2012-12-20 |
20120324586 | SYSTEM AND METHOD FOR CONTROLLING UTILIZATION OF CONTENT - Apparatus, method, and media for controlling utilization of content. An exemplary method comprises associating one or more usage rights with content, wherein the usage rights are based at least in part on a usage rights grammar, and wherein each of the usage rights corresponds to a permitted utilization of the content and one or more conditions which must be satisfied in order for the respective usage right to be exercised, receiving from an external computing device external, a request to access the content, the request corresponding to a utilization of the content, determining whether the requested utilization corresponds to at least one of the usage rights associated with the content, and transmitting to an external a computing device, at least one of the usage rights based at least in part on a determination that the requested utilization corresponds to at least one of the usage rights. | 2012-12-20 |
20120324587 | SYSTEM AND METHOD FOR PERMITTING USE OF CONTENT USING TRANSFER RIGHTS - Apparatus, method, and media for permitting use of content. An exemplary method comprises associating a transfer right with content, the transfer right specifying that the content is permitted to be transferred from a first computing device to a second computing device, transferring the content from the first computing device to the second computing device in accordance with the transfer right, updating information associated with the transfer right based on the transfer of the content from the first computing device to the second computing device, and associating a usage right with the content, the usage right corresponding to a utilization of the content, wherein the first computing device includes at least a server mode of operation, and wherein the second computing device includes both a requester mode of operation and a server mode of operation. | 2012-12-20 |
20120324588 | DATA MODEL OPTIMIZATION - A name of one or more entity classes of the data model may be refined to conform to a naming convention. A semantic meaning of each of the names and one or more attributes of each entity class may be determined. It may be determined that the name of a first entity class is semantically similar to the name of a second entity class based on a semantic distance between the semantic meaning of the names, where a substantial similarity may be determined between the first entity class and the second entity class by comparing the semantic meaning of the one or more attributes of the first entity class to the semantic meaning of the one or more attributes of the second entity class. The data model may be normalized based on the substantial similarity. | 2012-12-20 |
20120324589 | AUTOMATIC SHARING OF EVENT CONTENT BY LINKING DEVICES - Embodiments enable content sharing using event notifications that include a global identifier and a private identifier. The event notifications are sent to potential participants to an event. Potential participants that accept the event notification or otherwise request to join the event use the private identifier to submit content to a content sharing service. Based at least on the private identifiers associated with event participants, the content from event participants is selectively shared among the other event participants. | 2012-12-20 |
20120324590 | Method and Apparatus for Content Management - The present disclosure relates generally to audio and video processing. One claim recites a portable apparatus comprising: electronic memory comprising one or more identifiers, each of the identifiers being associated with previously accessed audio or video items, with each previously accessed audio or video item including an identifier associated therewith; and a logic processor programmed for: a. restricting access to an encountered audio or video item if an identifier associated with the encountered audio or video item is one of the one or more identifiers associated with the previously accessed audio or video items, and b. limiting a number of content items with different user identifiers that can be accessed in a predetermined amount of time. Other claims and combinations are provided as well. | 2012-12-20 |
20120324591 | SYSTEM AND METHOD TO PROTECT A RESOURCE USING AN ACTIVE AVATAR - A data source owner in a computing system protects that source via a “virtual” or surrogate entity or “avatar.” The entity is an object whose presence in the system is human-like, and it is given the specific task of protecting the data source for the owner. The avatar is associated with (or defined by) a non-human userid that has the same accesses and privileges of all (or defined) users, user groups and other resources that have access to the data source to be protected. During an initial setup, one or more actions to be performed by the non-human userid upon an occurrence of an actionable event with respect to the data source are specified, and a “baseline” associated with the data source is determined. Following setup, a monitor process is executed under the non-human userid, and this process records one or more accesses to the data source. Periodically, or upon a given occurrence, the monitor process spawns one or more ancillary processes to determine whether an actionable event has been triggered. If the avatar's monitoring efforts indicate an actionable event (such as an access violation), an action as defined in an action matrix is taken. The action typically includes reporting to the data source owner and, optionally, a security administrator, and restricting access to the data source. | 2012-12-20 |
20120324592 | SYSTEM AND METHOD FOR FLEXIBLE SECURITY ACCESS MANAGEMENT IN AN ENTERPRISE - Some embodiments provide a method and system for flexibly managing access to enterprise resources. To flexibly manage security, some embodiments secure the enterprise resources and provide a security access manager (SAM) to control access to the secured resources. The SAM controls access to the enterprise and the secure resources through one or more configurable management modules of the SAM. Each management module of the SAM is configurable to facilitate control over different security services of an enterprise security hierarchy (e.g., authentication, authorization, role mapping, etc.). Specifically, each management module is configurable to leverage security services that are provided by different security systems. In some embodiments, the management module is configured to interface with one or more adapters in order to establish the interfaces, logic, and protocols necessary to leverage the security functionality of such security systems. | 2012-12-20 |
20120324593 | Lysyl Oxidase-Like 1 (LOXL1) and Elastogenesis - Described are methods of treating and preventing conditions associated with a loss of elastic fibers. Also provided herein are methods of screening for agents useful in treating such conditions, and animal models of conditions associated with a loss of elastic fibers. | 2012-12-20 |
20120324594 | PEA LINE EX08240782 - The invention provides seed and plants of the pea line designated EX08240782. The invention thus relates to the plants, seeds and tissue cultures of pea line EX08240782, and to methods for producing a pea plant produced by crossing a plant of pea line EX08240782 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line EX08240782, including the seed, pod, and gametes of such plants. | 2012-12-20 |
20120324595 | CUCUMBER HYBRID PS 14741865 AND PARENTS THEREOF - The invention provides seed and plants of cucumber hybrid PS 14741865 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of cucumber hybrid PS 14741865 and the parent lines thereof, and to methods for producing a cucumber plant produced by crossing such plants with themselves or with another cucumber plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-12-20 |
20120324596 | BROCCOLI HYBRID PX 05181808 AND PARENTS THEREOF - The invention provides seed and plants of broccoli hybrid PX 05181808 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of broccoli hybrid PX 05181808 and the parent lines thereof, and to methods for producing a broccoli plant produced by crossing such plants with themselves or with another broccoli plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants. | 2012-12-20 |
20120324597 | MELON PLANTS COMPRISING TETRA-CIS-LYCOPENE | 2012-12-20 |
20120324598 | GENETIC LOCI ASSOCIATED WITH FUSARIUM SOLANI TOLERANCE IN SOYBEAN - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to | 2012-12-20 |
20120324599 | Methods and Compositions for Gray Leaf Spot Resistance in Corn - The present invention relates to the field of plant breeding. More specifically, the present invention includes a method of using haploid plants for genetic mapping of traits of interest such as disease resistance. Further, the invention includes a method for breeding corn plants containing quantitative trait loci (QTL) that are associated with resistance to Gray Leaf Spot, a fungal disease associated with | 2012-12-20 |
20120324600 | CONSTITUTIVE SYNTHETIC PLANT PROMOTERS AND METHODS OF USE - Control of transgene expression in planta is dependent upon genetic elements that affect both transcription and translation of mRNA transcripts. The disclosed invention describes the combination of DNA elements from four different plant viruses that function as an activator of transcription and enhancer of translation of mRNA transcripts in transgenic plants. | 2012-12-20 |