52nd week of 2011 patent applcation highlights part 66 |
Patent application number | Title | Published |
20110321085 | SYSTEM AND METHOD OF AD DELIVERY - A system that incorporates teachings of the present disclosure may include, for example, a network device having a controller programmed to store a subscriber selectable preference for advertisements used for selecting advertisements to send to a set top box (STB) and receive a signal from a broadcast stream indicating the location for insertion of an advertisement based on the subscriber selectable preference. Other embodiments are disclosed. | 2011-12-29 |
20110321086 | ALTERNATING EMBEDDED DIGITAL MEDIA CONTENT RESPONSIVE TO USER OR PROVIDER CUSTOMIZATION SELECTIONS - A solution for altering content embedded in digital media responsive to user or provider preferences where, upon identifying embedded media content that represents product placement or is linked to specific consumer ratings, the solution can manipulate said embedded media content in accordance with the selection previously made. Playback of the digital media artifact is adjusted accordingly and seamlessly from the viewpoint of the user. | 2011-12-29 |
20110321087 | ADVERTISING METHODS FOR ADVERTISING TIME SLOTS AND EMBEDDED OBJECTS - Disclosed is a process for an advertising bidding system in which advertisers can bid on advertising time slots or enhanced ads that can be inserted in either prerecorded or live television programming. A high degree of flexibility is provided by allowing embedded ads to be purchased and displayed in a very short time period. This allows TV broadcasters to increase revenues and allows advertisers to have more flexibility in advertising. Objects can be inserted in the display video broadcast using enhancements such as by using mark-up language overlay pages or by video combination techniques. The effect of these ads can be evaluated for advertising campaigns. | 2011-12-29 |
20110321088 | ADVERTISING DRIVEN SWITCHED DIGITAL VIDEO - Advertising driven switched digital video may be provided. A plurality of content streams may be transmitted. In response to determining that an available transmission bandwidth has increased, at least one new content stream may be provided according to a bandwidth-based priority list. In response to determining that the available transmission bandwidth has decreased, at least one content stream may be removed according to the bandwidth-based priority list. | 2011-12-29 |
20110321089 | Apparatus and Methods for Accessing Content Using Alternative Identifiers - Apparatus and methods are described for allowing users to access channels of a receiving device using custom channel identifiers rather than content provider assigned channel identifiers. A receiving device receives a first set of channel identifiers assigned by a content provider for a plurality of channels. The receiving device further receives a second set of custom channel identifiers identifying the plurality of channels. At least a portion of the first set of channel identifiers maps to the second set of channel identifiers. The user provides user input specifying one of the second identifiers to access and the receiving device correlates the user input to a corresponding first identifier to determine the selected channel the user desires to access. | 2011-12-29 |
20110321090 | SELECTING TELEVISION INPUTS THROUGH AN ELECTRONIC PROGRAM GUIDE - A system includes a television having one or more input ports. The television has software that displays both program information and input port information in an electronic program guide. Upon selecting of a program information entry in the electronic program guide, the software changes a current channel of the television to the channel associated with the program entry information. Upon selecting of one of the input port entries in the electronic program guide, the software changes the input of the television to the input port associated with the one of the input port entries. The software performs scrolling operations on the electronic program guide responsive to directional inputs from a remote control device. | 2011-12-29 |
20110321091 | DISPLAY APPARATUS AND METHOD FOR DISPLAYING THEREOF - A display apparatus and displaying method are provided. The display apparatus includes a display unit, a communication interface unit which receives content, a determination unit which determines whether there is a three-dimensional (3D) viewing setting regarding the received content, and a controller which controls the display unit to display the received content in a 3D mode if it is determined that there is a 3D viewing setting. | 2011-12-29 |
20110321092 | PORTABLE TERMINAL, CONTENT REPRODUCTION SYSTEM, REMOTE CONTROLLER AND TELEVISION APPARATUS - A portable terminal includes: a communication portion that communicates with an electronic device to acquire content from the electronic device; and a reproduction portion that reproduces the content acquired through the communication portion. | 2011-12-29 |
20110321093 | SELECTING ATTACHED CONTENT THROUGH AN ELECTRONIC PROGRAM GUIDE - A system includes one or more devices connected to a television. The television has software that displays both program information and information about the devices in an electronic program guide. Upon selecting of a program information entry in the electronic program guide, the software changes a current channel of the television to the channel associated with the program entry information. Upon selecting of one of the device entries in the electronic program guide, the software displays an exploration menu for the viewer to select content from the device for viewing (or listening to) at the television. The software performs scrolling operations on the electronic program guide responsive to directional inputs from a remote control device. | 2011-12-29 |
20110321094 | IPTV EPG LINKING BROADCAST CHANNELS TO INTERNET SOURCES OF SCHEDULED PROGRAMMING - An EPG presented on an IPTV lists broadcast TV programming but when an entry on the EPG is selected, an Internet server, and not the TV broadcast source, is accessed and streams the listed programming to the IPTV. | 2011-12-29 |
20110321095 | APPARATUS, SYSTEMS AND METHODS FOR A VIDEO THUMBNAIL ELECTRONIC PROGRAM GUIDE - Video thumbnail electronic program guide (EPG) systems and methods are operable to include a video thumbnail. An exemplary embodiment receives a media content stream at a media device; picks a plurality of still image video frames from the received media content stream, wherein each still image video frame has information that is sufficient to construct the still image video frame; generate a plurality of still image video frame thumbnails, wherein each of the still image video frame thumbnails correspond to one of the still image video frames; generate a video thumbnail from the plurality of still image video frame thumbnails; and incorporate the video thumbnail with at least one program descriptor and a channel identifier associated with the media content stream into the video thumbnail EPG. | 2011-12-29 |
20110321096 | APPARATUS, SYSTEMS AND METHODS FOR ACCESSING AND SYNCHRONIZING PRESENTATION OF MEDIA CONTENT AND SUPPLEMENTAL MEDIA RICH CONTENT IN RESPONSE TO SELECTION OF A PRESENTED OBJECT - Media rich content systems and methods are operable to provide access to supplemental media rich content in response to user selection of a presented object of interest. An exemplary embodiment receives at a media device a video stream comprising at least a plurality of video frames, wherein at least one of the video frames is configured to present an object of interest; processes a supplemental media rich content trigger associated with the at least one video frame, wherein the supplemental media rich content trigger comprises information that identifies a region where the object of interest is presented in the video frame, and comprises information configured to access supplemental media rich content associated with the object of interest; receives a user selection of the object of interest presented in the at least one video frame; and presents the supplemental media rich content on a presentation device. | 2011-12-29 |
20110321097 | METHOD AND APPARATUS FOR THE INTUITIVE BROWSING OF CONTENT - A method and apparatus are disclosed. The method comprises: associating a 3D object having first, second and third faces, with a theme; populating the first face with a first icon that represents the theme; populating the second face with a second icon, the second icon representing a first attribute of the theme; populating the third face with a third icon, the third icon representing a second attribute of the theme; generating a first perspective view of a three dimensional object, the first perspective view having the first and second faces but not the third face; displaying the first perspective view on a portion of a display; receiving a command; generating a second perspective view of the three dimensional object, the second perspective view having the third face; removing the first perspective view from the display; and displaying the second perspective view on the portion of the display. | 2011-12-29 |
20110321098 | System and Method for Automatic Identification of Key Phrases during a Multimedia Broadcast - An Internet Protocol television system includes a user profile agent, a keyword detection agent, and an information search agent. The user profile agent is in communication with a multimedia device, and generates a user profile based on information received from the multimedia device. The keyword detection agent is in communication with the user profile agent, and searches text associated with a multimedia video stream transmitted to the multimedia device for keywords associated with the user profile. The information search agent is in communication with the keyword detection agent, and connects to an information source associated with the keywords detected by the keyword detection agent, and provides additional information associated with the keywords to the multimedia device. | 2011-12-29 |
20110321099 | Television Channel Selection Canvas - A channel selection canvas for display on a video display device is disclosed. The video display device can be a television, a laptop computer, or personal digital assistant device. The channel selection canvas allows a user to preview and choose video signals to be watched. The channel selection canvas displays a set of television channel video thumbnails, which can be full motion video, slow motion video or sampled video snapshots. A channel selection canvas can also display video thumbnails for security cameras, baby monitors, video phones and the like. A channel selection canvas generator that generates channel selection canvases is also disclosed. The channel selection canvas generator can reside within a television, set top box or similar video processing device. | 2011-12-29 |
20110321100 | Systems and Methods for Producing Processed Media Content - A method for producing processed media content includes receiving media content at a network computing device. The media content is obtained from a media source at a scheduled time via a public network based on a user recording request received from a user device associated with a user. The method includes processing the media content to generate processed media content at the network computing device based on user settings associated with the user recording request. The method also includes storing the processed media content at a memory device identified in the user recording request. | 2011-12-29 |
20110321101 | INFORMATION DISTRIBUTION SYSTEM FOR USE IN AN ELEVATOR - A method of providing video information to a display monitor within an elevator located in a building, which includes receiving first data defining a category of video information, receiving second data, associated with the category of video information and defining at least one source of the video information; and retrieving from the source, over a data communications path and on the basis of the first data and the second data, the video information to be displayed on the monitor within the elevator. | 2011-12-29 |
20110321102 | PROCESS FOR LOCALLY DIFFUSING THE AUDIO/VIDEO CONTENT BETWEEN A SOURCE DEVICE INCLUDING A HDMI CONNECTOR AND A RECEPTOR DEVICE - A method for locally broadcasting audio/video content between a source device equipped with an HDMI interface and a target device, the method including: compressing the audio/video content in the source device; transmitting the compressed audio/video content over a wireless link, from a transmitter associated with the source device, the transmitter receiving the audio/video content from the HDMI interface of the source device, and receiving the compressed audio/video content using a receiver device. | 2011-12-29 |
20110321103 | APPARATUS, SYSTEMS AND METHODS FOR IDENTIFYING A VIDEO OF INTEREST USING A PORTABLE ELECTRONIC DEVICE - Systems and methods are operable to identify videos of interest using information acquired by a portable electronic device. An exemplary embodiment receives the acquired information pertaining to a video of interest, wherein the acquired information was acquired by the portable electronic device; determines an identity of the video of interest based upon the acquired information; and communicates the video of interest to a media device. | 2011-12-29 |
20110321104 | SYSTEM AND METHOD FOR MASS DISTRIBUTION OF HIGH QUALITY VIDEO - Systems and methods of compressing source video to 3 MBits/sec and under (deep compression), making it is possible to distribute a wide range of movies, sports and other action laden videos simultaneously to a wide number of viewers. In one embodiment, deeply compressed video distribution is delivered on demand to requesting viewers via an addressable network. | 2011-12-29 |
20110321105 | System and Method for Alternate Multi-Channel Bi-Directional Data Transmission - A system and method are disclosed for alternate multi-channel bi-directional data transmission in a multi-unit environment. In one embodiment, legacy infrastructure connects entertainment centers in respective rooms to a service server to provide downstream communication from the service server to the entertainment center. To provide bi-directional data transmission, an upstream data transmission channel is provided which includes multiple transmission mediums from the entertainment centers to the service center. The resulting bi-directional channel is asymmetrical with respect to bandwidth and the upstream communication link includes non-continuous bandwidth links. | 2011-12-29 |
20110321106 | TRANSMITTER, RECEIVER, COMMUNICATION EQUIPMENT, COMMUNICATION SYSTEM, TRANSMISSION METHOD AND RECEPTION METHOD - To reduce the time required for communication of a video image data, as well as to prevent deterioration of image quality caused by compression and decompression. A clock control means | 2011-12-29 |
20110321107 | System and Method for Interactive Use of Cable Television Devices and Other Devices - Systems, methods, and computer program products are described for sending interactive content from a cable television device to another device such as a mobile device or a computer device. A cable television device receives an input request from a consumer, using a TV remote control, in response, e.g., to an advertisement displayed on a TV. The cable television device transmits the consumer's input request and electronic address (e.g., a telephone number) to a server, which generates content on the server. The server transmits the content to the other device associated with the electronic address. The content may comprise interactive content related to the advertisement displayed on the TV, such as an internet URL or link to content or an item such as a song or software that can be electronically delivered to the device. | 2011-12-29 |
20110321108 | METHOD AND SYSTEM FOR TELEVISION DISPLAY OF WEB FEED CONTENT - A system and method are described that provide television content broadcast system subscribers with convenient access to aggregated web feed content. In one embodiment, a television content broadcast system ( | 2011-12-29 |
20110321109 | SYSTEM AND METHOD FOR INTERACTIVE VIDEO CONTENT PROGRAMMING - The present invention is directed to a system and method for interacting with video by displaying one or more interface links associated with video content being displayed, pausing the video content when an interface link is interacted with, allowing the user to view ancillary content the interface link is linked to over a network, and un-pausing the video content after the user elects to continue viewing the video content. In one or more embodiments, the ancillary content may permit e-commerce, display additional video or other images, and/or include links to additional ancillary content. The present invention also includes a method for creating an interactive video. | 2011-12-29 |
20110321110 | SYSTEMS AND METHODS FOR ADAPTING VIDEO DATA TRANSMISSIONS TO COMMUNICATION NETWORK BANDWIDTH VARIATIONS - Systems and methods are described for modifying the hint track to smooth out the data transmission rates thereby reducing bandwidth spikes during transmission. In one embodiment, this is accomplished by examining the size of each frame and using the frame rate to calculate per-frame bitrates. The transmission start times are then adjusted for each packet in order to spread out packet transmission times and (if necessary) lengthen frame transmission times. This has the effect of reducing the bandwidth peaks. In effect, every network packet is planned in advance and a detailed description of what data should be sent at what point in time is stored in the hint tracks. Thus, the streaming server simply looks up the correct data send timing in a table, rather than performing expensive calculations repeatedly at send time. | 2011-12-29 |
20110321111 | DYNAMIC LAYOUT OF CONTENT FOR MULTIPLE PROJECTORS - A projection system distributed on a network, the projection system comprising a projection server and at least one projection client. The projection client hosts a projector array of multiple projectors which together project a tiling of an image onto a projection surface. The projection server accepts an incoming request from the projection client via the network, the request providing the projection server with area information for a projection area of the projector array onto the projection surface. The projection server determines a layout for the image by calculations using the area information. Layout information based on the layout is transmitted via the network to the projection client in response to the request, and image data is projected in accordance with the layout information received from the projection server. | 2011-12-29 |
20110321112 | SYSTEM AND METHOD FOR ADJUSTING TRANSMISSION DATA RATES TO A DEVICE IN A COMMUNICATION NETWORK - The disclosure relates to a system and method for adjusting a characteristic of a data transmission in order to maintain a rate of transmission. For the method, it comprises: monitoring for initiation of the data transmission to the device; identifying characteristics of the device relating to the data transmission; automatically adjusting the transmission rate according to a preset transmission rate progression established for the communication network; and adjusting characteristics of the data transmission to allow the characteristics of data transmission to conform to the characteristics of the device while maintaining the transmission rate for the device. | 2011-12-29 |
20110321113 | LOCATION-BASED SERVICE GROUP DISCOVERY FOR SWITCHED DIGITAL VIDEO - A broadcast system and method that includes a video content network that connects a video server, a discovery server, a switched digital video service, a switched video manager, and a set-top box. The set-top box receives and stores an assigned location identifier, and receives a mapping from the discovery server, where the mapping includes records, each record associating a location identifier and a service group. The set-top box matches the assigned location identifier to the mapping to determine an assigned service group for the set-top box. The set-top box receives an address from the discovery server that identifies the switched video manager that is associated with the assigned service group. The set-top box operates in the broadcast system by communicating with the switched digital video service, and the switched video manager. | 2011-12-29 |
20110321114 | SYSTEMS AND METHODS FOR PROCESSING SUPPLEMENTAL INFORMATION ASSOCIATED WITH MEDIA PROGRAMMING - Various systems and methods allow supplemental information such as recipes, parts lists, instructions, notes, outlines or other information associated with a television program to be delivered in the same transport stream that carries the television program to the viewer. The transport stream includes at least two elementary streams, wherein the first elementary stream conveys video content associated with the television program and the second elementary stream conveys supplemental information that summarizes at least a portion of the television program. The device receiving the digital transport stream identifies the first and second elementary streams in the digital transport stream, processes the first elementary stream to present the video content associated with the television program to the viewer, and makes the supplemental information in the second elementary stream available to the viewer. | 2011-12-29 |
20110321115 | TV FUNCTION EXPANSION COMPONENT USING GOLD FINGER CONNECTOR - A TV function extension assembly is electrically connected with a core circuit of a display apparatus through a gold finger connector. It comprises a function extension module, an external interface, and a memory. The function extension module is connected with the core circuit of the display apparatus through the gold finger connector for mutual communication and data communication. The external interface is connected between the function module and an external device or external network to enable mutual communication and data transmission between the function extension module and the external device or external network. The memory is connected with the function extension module to store data transmitted by the function extension module. | 2011-12-29 |
20110321116 | TV SIGNAL SWITCHING BOX AND CONTROLLING METHOD THEREOF - A TV set signal switching box is provided. The switching box is connected between a TV set and a plurality of signal sources to enable the signal sources to transmit media signals with the TV set interactively. The signal switching box comprises a first interface and a second interface, the first interface is electrically connected to and communicates interactively with the TV set, and the second interface is electrically connected to a plurality of signal sources and outputs a power supply signal and a control signal to the signal sources. | 2011-12-29 |
20110321117 | Policy Creation Using Dynamic Access Controls - A method and system for dynamically managing access to assets such as an electronic document or a hardware component, using policies that comprise one or more dynamic access controls, which are linked to data sources such as databases or web services. The access controls are dynamic because, each time the policy is invoked, the policy and its component access controls must be evaluated with respect to the current information in the linked data sources. | 2011-12-29 |
20110321118 | METHOD AND APPARATUS FOR PERFORMING A MULTI-ROLE COMMUNICATION USING A MEMORY TAG - An approach is presented for performing a multi-role communication using a Radio Frequency (RF) memory tag. The control manager receives a content request, at a memory tag, from a first device according to a first access policy. Further, the control manager determines one or more sources of content data responsive to the content request. Then, the control manager provides access from the one or more sources to the memory tag according to a second access policy. The access facilitates transmission of the content data to the first device according to a third access policy. | 2011-12-29 |
20110321119 | Consigning Authentication Method - A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management includes making a first request for delivery of content, receiving the requested electronic content, receiving a second request for delivery of the electronic content, communicating the second request, receiving a decision, and delivering the electronic content if the second request is granted. The first request is made to a policy enforcement point in the network for delivery of content to a first client, and includes a trust level of the first client. The second request is for delivery of the content to a second client at the trust level of the first client and includes integrity information about the second client, and is communicated to the policy enforcement point. If the second request is granted, the content is delivered from the first client to the second client. | 2011-12-29 |
20110321120 | METHOD AND SYSTEM FOR PROVIDING MASKING SERVICES - A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is authorized to access the requested application data. For an authorized user, a category of the user is determined to ascertain whether the user is privileged to obtain full access. In case the user is a privileged user, unmasked application data is fetched from a database utility and provided to the user. In case the user is not a privileged user, application data access request is transferred to a data masking service. Application data is fetched from database utility, masked based on pre-defined masking rules and provided to the user. | 2011-12-29 |
20110321121 | INFORMATION PROCESSING SYSTEM AND OPERATION METHOD OF INFORMATION PROCESSING SYSTEM - An information processing system is equipped with a first information processing device that stores first object group, and a second information processing device that obtains an operation request from a subject, said operation request indicating content of an operation for an object to be operated, and processes the object to be operated on the basis of the operation request. The first information processing device is equipped with a storage means for additional access control policies, wherein for each first object in the first object group, a set of second objects for which the feasibility of an operation is determined using the same control rule as the first object is indicated as a changed object group. In cases when the object to be operated is included in the aforementioned changed object group, the second information processing device references the additional access control policy and acquires the changed object group corresponding to the object to be operated. Thereafter, the determination of whether an operation request can be processed for the object to be operated is made by determining whether the operation request can be processed for the changed object group. | 2011-12-29 |
20110321122 | SPECIFYING AN ACCESS CONTROL POLICY - A system for specifying an access control policy comprises: A user interface ( | 2011-12-29 |
20110321123 | ACCESS CONTROL LIST CONVERSION SYSTEM, AND METHOD AND PROGRAM THRERFOR - An access control list conversion system includes: a first rule judgment unit | 2011-12-29 |
20110321124 | Enterprise Evidence Repository - A controller is configured to generate and propagate instructions to an execution agent which, in turn, is configured to collect and deposit collected artifacts into a repository. Write access to a location in the repository for collected artifacts that are to be deposited into a specified location is granted to the execution agent. Once the execution agent deposits the collected artifacts in the specified location in the repository, a summary of collected artifacts is propagated to the controller. The controller manages appropriate levels of access to the collected artifacts, while the repository enforces the level of access. The controller can grant read only access to the collected artifacts or it can allow for controlled changes to be made to the metadata associated with the collected artifact. An agent processes the data and generates additional metadata that can be associated with the collected artifacts and then saved in the repository. A system can have more than one repository, where the controller allocates storage in an appropriate repository and issues instructions to the execution agent with the location in an appropriate repository. The summary of the actual collections is then propagated to the controller from the repositories. | 2011-12-29 |
20110321125 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD AND PROGRAM FOR CAUSING COMPUTER TO EXECUTE THE SAME - Provided is an authentication device and an authentication method of, even in the case of selecting correct images for authentication from among the displayed images to perform authentication, making hard to be read by others and improving security, and a program for causing a computer to execute the same. A main control portion | 2011-12-29 |
20110321126 | METHOD FOR WIRELESS COMMUNICATION AND WIRELESS TRANSMIT/RECEIVE UNIT - A method for wireless communications and a wireless transmit/receive unit are disclosed. At least one first wireless communication link with a base station for transmitting/receiving data packets is established, which at least one first wireless communication link complies with at least a first authentication mechanism. At least one second wireless communication link with at least one user device for transmitting/receiving data packets is established, which at least one second wireless communication link complies with at least a second authentication mechanism, wherein the at least one second wireless communication link comprises a peer-to-peer wireless communication link. The at least one first wireless communication link and the at least one second wireless communication link are concurrently maintained. | 2011-12-29 |
20110321127 | TRANSACTIONAL SERVICES - Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple service providers. | 2011-12-29 |
20110321128 | PUBLIC ACCESS POINT - The invention instantiates a Personal VLAN bridge, using IEEE Std. 802.11 elements. The result is a bridge, referred to as a public access point, that is better suited for implementing public wireless data networks than the IEEE Std. 802.11 architecture. The invention also provides a location-update protocol for updating the forwarding tables of bridges that connect public access points together. The invention further provides a method for more controlled bridging, which is referred to as fine bridging. | 2011-12-29 |
20110321129 | DISAMBIGUATING ONLINE IDENTITIES - Described herein are technologies pertaining to disambiguating identities/accounts over a plurality of online services. Public data streams pertaining to accounts of different online services are analyzed, and a determination is made that the accounts are owned by a same user. A searchable profile is generated for the user that comprises data that indicates that the user represented by the profile owns the accounts. The profile is claimable by the user such that the user is enabled to customize contents of the profile. | 2011-12-29 |
20110321130 | NETWORK LAYER CLAIMS BASED ACCESS CONTROL - Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s). | 2011-12-29 |
20110321131 | SECURITY MODEL FOR WORKFLOWS AGGREGATING THIRD PARTY SECURE SERVICES - A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language. | 2011-12-29 |
20110321132 | SYSTEM, METHOD, AND POLICY ENGINE FOR GRANTING TEMPORARY ACCESS TO ELECTRONIC CONTENT - A system, method, and Policy Engine for granting a first user temporary access to a second user's electronic content. The Policy Engine receives a request originating from the first user to access the second user's content, and retrieves from a relationship database, relationship information regarding a relationship between the two users. If an access rule matching the relationship information is stored in the Policy Engine, the Policy Engine applies the access rule to control access by the first user for a period of time specified in the rule. If an access rule is not stored, the Policy Engine obtains the access rule from the second user. The Policy Engine allows access when the matching rule grants access and the matching rule has not expired, and denies access when there is no matching rule, when the matching rule does not allow access, or when the matching rule has expired. | 2011-12-29 |
20110321133 | SYSTEM AND METHOD FOR AUTHENTICATING WEB USERS - Disclosed are systems and methods for authenticating web users. In one embodiment, a method includes sending the destination web page to the parent frame of the web browser, where the destination web page when processed by the web browser is operable to perform operations, including determining if the web user is authenticated with the content provider and generating a child frame associated with the parent frame if the web user is not authenticated with the content provider. The destination web page is operable to perform further operations, including requesting, by the child frame, an authentication web page from an authorization provider, receiving, by the child frame, the authentication data from the authorization provider, and receiving, by the parent frame, the authentication data. | 2011-12-29 |
20110321134 | Consigning Authentication Method - A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management includes receiving integrity information from a first client at a first trust level in the trust hierarchy at a second client at the first trust level, requesting permission to receive electronic content from the first client, receiving a determination regarding the requested permission, and communicating the determination to the first client. The first client obtained content from a policy enforcement point in the network. The request for permission is made to the policy enforcement point and the request includes the integrity information. The determination is received from the policy enforcement point and is based in part on the integrity information about the first client. The second client communicates to the first client the determination of whether the second client receives the content from the first client. | 2011-12-29 |
20110321135 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING ACCESS TO A RESOURCE - Methods, apparatuses, and computer program products are provided for controlling access to a resource. A method may include determining one or more request attributes associated with a request for access to the resource. The method may further include accessing an access control list associated with the resource. The access control list may include one or more access control attributes associated with the resource. The method may additionally include determining a permission defining one or more access abilities for the resource at least in part by comparing the request attributes to the access control attributes and, for any access control attribute corresponding to a request attribute, including an ability associated with the corresponding access control attribute in the permission. The method may also include determining whether to grant the request based at least in part on the determined permission. Corresponding apparatuses and computer program products are also provided. | 2011-12-29 |
20110321136 | GENERALIZED IDENTITY MEDIATION AND PROPAGATION - Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level operation such as message brokering, identity mediation, and transformation to enhance interoperability among service consumers and service providers. A mediator component may also delegate identity related operations to a token service of handler. Identity mediation may include such operations as identity determination, or “identification,” authentication, authorization, identity transformation and security audit. | 2011-12-29 |
20110321137 | ACCESS CONTROL DEVICE, ACCESS CONTROL METHOD, PROGRAM, STORAGE MEDIUM, AND INTEGRATED CIRCUIT - An access control device for use in a system for providing users with a content access service, the access control device obtaining a content including one or more pieces of personal information, storing a plurality of pieces of personal information in correspondence with a plurality of pieces of first user information each of which indicates one of (i) a user who is permitted by a person related to a corresponding piece of personal information to access a content including the corresponding piece of personal information, and (ii) a user who is not permitted by the person related to the corresponding piece of personal information to access the content, and determining whether or not to give permission to access the content obtained by the obtaining unit, in accordance with a piece of first user information stored in the storage unit in correspondence with the piece of personal information included in the content. | 2011-12-29 |
20110321138 | Mask Based Challenge Response Test - A method for providing a challenge response test associated with a computer resource performed by a physical computing system includes, with the physical computing system, generating a challenge response test image comprising a plurality of well-formed construct elements forming a well-formed construct and a plurality of random construct elements, and providing a number of masks to be placed over the image, one of the number of masks configured to reveal the well-formed construct elements when placed over the image. | 2011-12-29 |
20110321139 | Online Protection Of Information And Resources - A computer implemented method and system for protecting information and resources in an online environment is provided. A process initialization monitor application monitors process initialization of a client application provided on a user's communication device. The client application identifies and authenticates one or more components operating on the communication device and one or more third party applications attempting to access the client application. The client application performs the authentication by performing a code integrity check integrated in the client application independent of the communication device, and grants access to the authenticated components and the authenticated third party applications. The client application protects information being processed, exchanged, stored, and displayed within the client application. The client application masks input information, encrypts a communication channel that transfers the input information, blocks attempts to monitor, intercept and manipulate information by unauthorized entities, and prevents access of certificates, resources, etc., by unauthorized entities. | 2011-12-29 |
20110321140 | SYSTEM AND METHOD FOR AUTOMATICALLY LEARNING MAILBOX CONFIGURATION CONVENTIONS - A system and method automatically learns mailbox configuration conventions. The validator module determines a valid set of configuration parameters used for accessing an electronic mailbox of a user within a mail domain after receiving configuration information from the user that is limited in the configuration parameters required for accessing the electronic mailbox. A learner module accepts from the validator module a set of configuration parameters determined to be valid and generates configuration conventions for a mail domain. A database store is the generated configuration conventions. The validator and learner modules can be operative as part of a web server. | 2011-12-29 |
20110321141 | NETWORK DEVICES WITH LOG-ON INTERFACES - A credential provider component receives predetermined identity information (IDINF) from a portable device and controls an information database to provide a predetermined credential if the predetermined IDINF matches content in the information database. A log-on component allows the portable device to log on to a network device using the predetermined credential if the predetermined credential is valid. | 2011-12-29 |
20110321142 | AUTHENTICATION METHOD, AUTHENTICATION GATEWAY, AND DATA GATEWAY - An authentication method is applied in a gateway group comprising an authentication gateway and at least one data gateway. The gateway group receives a connection request from a user terminal, and determines whether there is an authentication record on the user terminal in an authentication list. The gateway group provides access service for the user terminal, if there is the authentication record. The gateway group sends an authentication request to an authentication authorization accounting (AAA) server and receives an authentication response from the AAA server, upon no authentication record. The gateway group provides access service for the user terminal, upon receiving a passing authentication response, and storing as the authentication record. The gateway group rejects the access for the user terminal, upon receiving a denying authentication response. | 2011-12-29 |
20110321143 | CONTENT PROTECTION USING AUTOMATICALLY SELECTABLE DISPLAY SURFACES - Embodiments of the invention are directed to systems and methods for protecting content by automatically identifying a display surface viewable only to authorized users and displaying protected content on the identified display surface. In one example embodiment, content is displayed on a first display surface in viewable range of a first user authorized to view the content. The entrance of a second user into viewable range of the first display surface is detected, and automatically determined to be unauthorized to view the content. A second display surface in viewable range of the first user but not viewable by the second user is automatically identified in response to detecting the entrance of the second, unauthorized user into viewable range of the first display surface. The display of the content is automatically moved from the first display surface to the second display surface to prevent the content from being viewed by the unauthorized user. | 2011-12-29 |
20110321144 | SYSTEMS AND METHODS OF AUTHENTICATION IN A DISCONNECTED ENVIRONMENT - A communication system and method are disclosed for establishing a secure communication channel including: a server for generating and storing a first instance of a unique personalized client application associated with a first-time user on the server, a client terminal for the user to communicate with the server over a communication channel and a standalone computing device having a second instance of the unique personalized application. The user authenticates the server based on a first dynamic identifier (DI- | 2011-12-29 |
20110321145 | Method for Ensuring Security of Computers Connected to a Network - A network authentication method is disclosed. A transmission-side client and a reception-side client have the same password. The transmission-side client transmits multiple authentication packets to the reception-side client at a slot interval according to an authentication code generated based on the password. The reception-side client measures a slot interval corresponding to the arrival timings of the respective authentication packets and then generates an authentication code based on the same password. The reception-side client compares the measured slot interval with the generated authentication code. When the two comparison targets are identical, the reception-side client concludes that the authentication is successful and transmits packets that have not been transmitted until such moment to a layer higher than an Internet layer. | 2011-12-29 |
20110321146 | System and method for securely sending a network one-time-password utilizing a mobile computing device - An apparatus, method, and computer program for securely sending a network one-time-password (OTP) from a user computer to an authentication server. A Network Client Application in the user computer interfaces with the authentication server, and a Mobile Server Application in the user computer interfaces with a Mobile Client Application in a mobile computing device (MCD) such as a smartphone. When a user enters a User ID and password into the user computer, the Network Client Application sends the User ID to the authentication server to obtain an index value (Index-1) from the authentication server. The Mobile Server Application authenticates the MCD and then sends Index-1 to the MCD to obtain a network OTP second factor from the MCD. The Network Client Application modifies the user password in accordance with the network OTP second factor to create the network OTP, and sends the network OTP to the authentication server. | 2011-12-29 |
20110321147 | DYNAMIC, TEMPORARY DATA ACCESS TOKEN - Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user. | 2011-12-29 |
20110321148 | Methods And Systems For Providing a Token-Based Application Firewall Correlation - Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A token is associated with the request. The token and associated information are stored in an event correlator coupled with the application firewall. The token is associated with one or more subsequent actions by the resource in response to receiving the request. A response to the request including the token is generated. The response with the token is transmitted to the remote user device via the application firewall. The application firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information. | 2011-12-29 |
20110321149 | SYSTEM AND METHOD FOR AUTHENTICATING A SOURCE OF RECEIVED ELECTRONIC DATA - A method for verifying and identifying users, and for verifying users' identity, by means of an authentication device capable of transmitting, receiving and recording audio or ultrasonic signals, and capable of converting the signals into digital data, and performing digital signal processing. Voice pattern(s) and user(s) information of one or more authorized user(s) are recorded and stored on the authentication device. User(s) identification is verified by inputting to the authentication device a vocal identification signal from a user, and comparing the voice pattern of the vocal identification signal with the recorded voice pattern(s) of the authorized user(s), and if a match is detected issuing an indication that the user is identified as an authorized user. | 2011-12-29 |
20110321150 | Methods And Systems For Context-Based Application Firewalls - Context-based application firewall functionality. A user session is initiated with a client device. The user session allows access a remote resource on a server device coupled with the client device over a network. The connection between the client device and the remote resource is through an application firewall. An application firewall context setup is performed with the application firewall in response to the user session. The application firewall context comprises firewall context information to be used during the user session to perform network and application security operations with the application firewall. A response is created to provide information from the remote resource to the client device. The response includes metadata to be used to update the firewall context information. The firewall context information is updated with the application firewall based on the metadata. The response is transmitted to the client device. | 2011-12-29 |
20110321151 | Methods And Systems For Providing Context-Based Outbound Processing Application Firewalls - Outbound processing with application firewalls. An outbound message is generated with an application. The outbound message includes at least a trustworthiness indicator and/or marking information for the one or more portions of the outbound message. The outbound message is received by an application firewall. The outbound message is analyzed based on the trustworthiness indicator and/or marking information, and context information. An action is performed on the outbound message based on the trustworthiness indicator and/or marking information, and the context information. | 2011-12-29 |
20110321152 | TRUSTED INTERMEDIARY FOR NETWORK LAYER CLAIMS-ENABLED ACCESS CONTROL - Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information. | 2011-12-29 |
20110321153 | SECURITY MECHANISM FOR INCREASED PERSONAL DATA PROTECTION - Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include apparatus and methods to manage security of data in an electronic system on an application-by-application basis. Such application-by-application basis can be applied in addition to managing data security globally in the electronic system. Additional apparatus, systems, and methods are disclosed. | 2011-12-29 |
20110321154 | SYSTEMS AND METHODS FOR GENERATING CONSTRAINTS FOR USE IN ACCESS CONTROL - In one embodiment the present invention includes a computer-implemented method for generating constraints for use in an access control system. In one embodiment, roles, document types, and permissions are stored in a 3-D model, such as a matrix or table. The 3-D model is converted to 2-D models, where users are inserted for roles and documents are inserted for document types. The 3-D model and 2-D models represent access rights. Supplemental information about the access rights is added to the 2-D tables. In one embodiment, attribute exploration is used to generate supplemental information. Constraints are generated from the 2-D tables for use in controlling access rights in a computer system. | 2011-12-29 |
20110321155 | DIGITAL SIGNAL PROCESSING APPARATUS - If content is transmitted/received through a digital signal bus, protection of copyright causes a problem because of no deterioration in quality. Accordingly, authentication is required. The quantity of information to be processed is, however, so large that a long time is required for authentication. Accordingly, both achievement of handling property as in conventional analog connection and protection of copyrighted content without user's awareness become an object. The foregoing object can be achieved by authentication which is executed, for management of copyright, among apparatuses connected to the digital signal bus when the apparatuses are powered on or connected to the digital signal bus or when an input terminal connected to the digital signal bus is selected. The object can be further achieved by an encryption key shared among these apparatuses. | 2011-12-29 |
20110321156 | Privacy Tool - The present invention provides a method and system for hiding private activities on logged on computing devices of all types. Its countermeasures help users inconspicuously block snoops manually or automatically by moving from sub-profiles displaying sensitive data to sub-profiles displaying non-sensitive data, or even no data at all. | 2011-12-29 |
20110321157 | SYSTEM AND METHOD FOR USER AUTHENTICATION - A system and a related method are disclosed for authenticating a user of an electronic system. The system, and related method access (a) data relating to a defined interaction with an input device for a purported authorized user, (b) a probability distribution representation for the defined interaction for an authorized user, and (c) a probability distribution representation for the defined interaction for a wide population, from which it can determine value indicative of whether the purported authorized user is the authorized user. The purported authorized user can be authenticated as the authorized user, if the value satisfies a prescribed threshold. | 2011-12-29 |
20110321158 | GUEST ACCESS TO ADDRESS SPACES OF ADAPTER - An authorization mechanism allows a host executing a guest operating system to grant permission for the guest to directly access an adapter function's address spaces without host intervention. This access is via instructions implemented based on the architecture of the adapter function. The host also has the capability to intervene in the execution of the instruction, if desired. | 2011-12-29 |
20110321159 | Dynamic Management of Role Membership - A method and system for dynamically managing entity membership in a role, using role configurations that comprise one or more dynamic role filters, which are linked to data sources such as databases or web services. The role filters are dynamic because, each time a role membership is queried, the role configuration and its component role filters must be evaluated with respect to the current information in the linked data sources. The roles may be used in role-based access control systems or entity identification systems. | 2011-12-29 |
20110321160 | SYSTEMS AND METHODS TO DETECT MALICIOUS MEDIA FILES - Systems and method to detect malicious media file are described. In one example, an apparatus including a network connection, a memory, and a programmable processor communicatively coupled to the memory is discussed. The memory can include instructions, which when executed by the programmable processor cause the apparatus to receive a data stream from the network connection and detect at least a portion of a media file within the data stream. The instructions can also cause the apparatus to determine a file type of the media file and extract the media file from the data stream. Further, the instructions cause the apparatus to parse the media file to location a suspicious tag, extract an embedded URL from the suspicious tag, determine with the embedded URL is malicious, and block the media file if the embedded URL is malicious. | 2011-12-29 |
20110321161 | MITIGATING EXCESSIVE OPERATIONS ATTACKS IN A WIRELESS COMMUNICATION NETWORK - A technique for mitigating excessive operations attacks in a wireless communication network includes receiving message requests from stations, detecting an excessive operation attack, checking if a received request is a first request or a retry request, and ignoring any first requests. The method can also include saving information about the first request, and wherein if checking reveals that the received request is a retry request, the method further confirms that the retry request and the saved information about the first request meet matching conditions, whereupon the retry request is further processed as normal. Since attacks rarely utilize retry requests, this technique effectively ignores attack messages. | 2011-12-29 |
20110321162 | Methods And Systems For Providing Security For Page Framing - Techniques for analyzing a page to be presented by a browser running on a computing platform. The page is disabled. The page is tested to determine if the page is framed by a second page. The page is enabled if the testing indicates that the page is not framed by a second page. Each level of a hierarchy of framed pages is inspected to determine whether each level is authorized. The page is enabled if the inspecting indicates that each level of the hierarchy of framed pages is authorized. | 2011-12-29 |
20110321163 | PLATFORM FOR A COMPUTER NETWORK - A platform for a computer network for managing and sharing mostly unstructured data passing through said network, and having an infrastructure including an information system having a database and/or data servers, as well as terminals from which the users generate, modify or consult data of the information system, where the information system includes unique data to be shared and is insulated from the terminals of the users by an application that manages the accessibility to said information system and/or the security of the unique data contained by the same by a physical disconnection of the network protocol used for communication between the information system and the terminals of the users. | 2011-12-29 |
20110321164 | METHOD AND SYSTEM FOR ADAPTIVE VULNERABILITY SCANNING OF AN APPLICATION - A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability. | 2011-12-29 |
20110321165 | System and Method for Sampling Forensic Data of Unauthorized Activities Using Executability States - A method includes receiving a list of target addresses, locating a first page table entry corresponding to the first page, and determining the first executability state. When the first executability state is non-executable, a first set of one or more target addresses that correspond to the first page, and a second set of one or more target addresses that correspond to one or more pages other than the first page are identified. One or more target addresses are stored in breakpoint registers of the computer system. The first executability state of the first page table entry is set as executable, and the executability states of page table entries that correspond to the second set of target addresses are set as non-executable. When the first address matches one of the target addresses stored in the breakpoint registers, forensic data is recorded. | 2011-12-29 |
20110321166 | System and Method for Identifying Unauthorized Activities on a Computer System Using a Data Structure Model - A computer implemented method includes monitoring activity on the virtual machine. A plurality of activities being performed at the virtual machine is identified. Each of the activities includes an activity source, an activity target, and an association between the activity source and the activity target. The activity sources, activity targets, and associations are stored in the memory. A fingerprint indicative of the activity on the virtual machine is created from the stored activities. The fingerprint is transmitted to prevent future attacks that comprise the same or similar activities as indicated by the fingerprint. | 2011-12-29 |
20110321167 | AD PRIVACY MANAGEMENT - In general, this specification relates to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving a privacy request from a mobile device, the privacy request including an encoded device identifier; authenticating the request; decoding the device identifier; retrieving mobile device advertising data associated with the decoded device identifier; and applying the privacy request to the mobile device advertising data. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products. | 2011-12-29 |
20110321168 | THWARTING CROSS-SITE REQUEST FORGERY (CSRF) AND CLICKJACKING ATTACKS - Embodiments of the invention generally relate to thwarting fraud perpetrated with a computer by receiving a request from a computer to perform a transaction. Embodiments of the invention may include receiving the request together with transaction data and a cookie, where the transaction data are separate from the cookie; determining in accordance with predefined validation criteria whether the cookie includes a valid representation of the transaction data; and performing the transaction only if the cookie includes a valid representation of the transaction data. | 2011-12-29 |
20110321169 | Generating Minimality-Attack-Resistant Data - The present disclosure is directed to systems, methods, and computer-readable storage media for generating data and data sets that are resistant to minimality attacks. Data sets having a number of tuples are received, and the tuples are ordered according to an aspect of the tuples. The tuples can be split into groups of tuples, and each of the groups may be analyzed to determine if the group complies with a privacy requirement. Groups that satisfy the privacy requirement may be output as new data sets that are resistant to minimality attacks. | 2011-12-29 |
20110321170 | FRAUDULENT MANIPULATION DETECTION METHOD AND COMPUTER FOR DETECTING FRAUDULENT MANIPULATION - A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent manipulation, and, if the determination is a positive result, performs security processing which is processing related to security of data to be transmitted. If the data is data within a group to which the user belongs and a destination of the data is a server or a storage device outside the group, the determination is a positive result. | 2011-12-29 |
20110321171 | Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. | 2011-12-29 |
20110321172 | MANAGEMENT APPARATUS, LICENSE MANAGEMENT SERVER, ELECTRONIC EQUIPMENT, ELECTRONIC EQUIPMENT MANAGEMENT SYSTEM, MANAGEMENT METHOD, PROGRAM, AND RECORDING MEDIUM - A management apparatus has a storage unit that stores software information and license information. The management apparatus periodically acquires software information introduced into an information processing apparatus communicably connected to the management apparatus from the information processing apparatus and compares the software information with the software information in the storage unit. Upon detecting any difference between the software information, the management apparatus notifies a user of the detection of a change in software configuration and updates the corresponding software information in the storage unit with the acquired software information. Then, upon detecting the change request of the software configuration from the user, the management apparatus makes a request to the information processing apparatus for changing the software configuration using the corresponding license information in the storage unit and notifies the user of the result of the request. | 2011-12-29 |
20110321173 | Multimode Retail System - A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input. | 2011-12-29 |
20110321174 | Apparatus and Method for Securing Portable USB Storage Devices - An apparatus and method for controlling and securing information stored on portable USB storage devices. Using the software application stored on the USB storage device in conjunction with functionality performed by a designed server, use of the storage device is limited to authorized users, PCs and locations, and other criteria while information contained within the device is protected from unauthorized access. | 2011-12-29 |
20110321175 | MONITORING AND REPORTING OF DATA ACCESS BEHAVIOR OF AUTHORIZED DATABASE USERS - A computer-implemented system and method of monitoring data access activity of a user of a system is presented here. The method maintains a respective score for each of a plurality of monitored data access events, resulting in a set of scores for the user. The method continues by monitoring behavior of the user to detect occurrences of the monitored data access events, and updating the set of scores in response to detected occurrences of the monitored data access events. The method initiates an appropriate course of action when the updated set of scores is indicative of unauthorized, suspicious, or illegitimate data access activity. | 2011-12-29 |
20110321176 | AUTHORITY TRANSFER SYSTEM, AUTHORITY TRANSFER METHOD, INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM - To prevent a transfer of an authority from being useless as much as possible, an authority transfer unit includes a decision unit for making a decision that an authority of a user with respect to a management unit is transferred to a processing request unit. | 2011-12-29 |
20110321177 | INFORMATION PROCESSING APPARATUS AND OPERATION METHOD OF THE SAME - Provided is a service processor (SVP) | 2011-12-29 |
20110321178 | SYSTEM FOR AND METHOD OF DYNAMIC EXTENSION ASSIGNMENT - A system for and method of system for performing dynamic extension assignment is presented. In one exemplary embodiment, the method may comprise receiving, via a network, an extension assignment request associated with a network endpoint, identifying the network endpoint based on one or more properties of the network endpoint, applying one or more rules to identify an extension to be assigned to the network endpoint based on the one or more properties of the endpoint, and assigning the extension to the network endpoint. | 2011-12-29 |
20110321179 | NON-HUMAN ANIMAL MODEL FOR AMYOTROPHIC LATERAL SCLEROSIS (ALS) WITH LOSS-OF-TDP-43 FUNCTION - A non-human animal model for amyotrophic lateral sclerosis (ALS) is disclosed. The animal model comprises a rodent whose spinal cord motor neurons have a loss of TAR-DNA binding protein-43 (TDP-43) function and phenotypes exhibit ALS-like symptoms. A method for identifying a candidate agent for treating, preventing and/or inhibiting ALS associated with a loss-of-function of TDP-43 is also disclosed. | 2011-12-29 |
20110321180 | COMPOSITIONS AND METHODS TO GENERATE PILOSEBACEOUS UNITS - The invention provides compositions and methods to generate pilosebaceous units. In one aspect, the invention comprises a biocompatible scaffold and an effective amount of dermal and epidermal precursor cells. | 2011-12-29 |
20110321181 | DEVICE TO BE PLACED IN BLOOD VESSEL, ANGIOSTENOSIS MODEL USING SAME AND METHOD FOR MAKING MODEL - An indwelling vascular device is constructed such that a vascular stenosis model can be controlled from the partial stenosis to the total occlusion. There is also described a vascular stenosis model of such non-human animal, and a method for making the same. The model can be used for diagnosis or therapy of a disease resulting from the stenosis or total occlusion in a blood vessel or further for the development of therapeutic approaches. The indwelling vascular device includes a device substrate containing a metal and/or metal compound which elutes toxic metal ions at least from a surface thereof and having a structure ensuring a vascular flow immediately after indwelling in a blood vessel, and a polymer coating layer formed on at least a metal and/or metal compound containing surface of the substrate. | 2011-12-29 |
20110321182 | SELECTION OF ANIMALS FOR DESIRED MILK AND/OR TISSUE PROFILE - The present invention is directed to mutations in the DGAT1 gene that produce an advantageous milk, tissue and/or growth rate profile in animals carrying the mutations. The present invention is also directed to methods of identifying animals carrying the mutations in order to facilitate the selection of animals with altered milk, tissue and/or growth rate traits. | 2011-12-29 |
20110321183 | METHODS FOR LIGATION AND USES THEREOF - The present invention relates to methods for ligation. The invention provides novel reagents and methods for ligating an acyl donor compound with an acyl acceptor compound. Provided acyl donor compounds comprise a transamidase recognition sequence that allows ligation with a nucleophilic acyl acceptor in the presence of transamidase. The invention further provides kits comprising acyl donor compounds and optionally comprising other reagents for ligation. | 2011-12-29 |
20110321184 | PLANT WITH ALTERED INFLORESCENCE - The invention relates to genetically engineered plants with altered inflorescence. Plants such as spray carnations are transformed with a non-indigenous flavonoid 3′,5′ hydroxylase (F3′5′H) and dihydroflavanol-4-reductase (DFR) in conjunction with a genetic suppressor of indigenous DFR. Preferably the substrate specificity of the indigenous DFR is different to the non-indigenous DFR in order to enhance the colour of the inflorescence. | 2011-12-29 |