08th week of 2009 patent applcation highlights part 53 |
Patent application number | Title | Published |
20090049515 | SYSTEM AND METHOD FOR EFFECTING INFORMATION GOVERNANCE - A method to manage data located on networked devices is provided. The method includes replicating objects residing on the devices and collecting information about at least one of the objects or the devices. The method further includes receiving input on desired information governance policies and outcomes and analyzing the replicated objects, collected information and received input to determine an information governance action. | 2009-02-19 |
20090049516 | COMMUNICATION RELAY METHOD AND APPARATUS AND COMMUNICATION RELAY CONTROL METHOD AND APPARATUS - Provided are a method and apparatus for relaying a communication between a terminal and an external communication network, and a method and apparatus for controlling a relay of a communication between a terminal and an external communication network. The method includes receiving safety policy information of the terminal from an external server that stores a plurality of pieces of safety policy information used to control a communication between at least one terminal and the external communication network. | 2009-02-19 |
20090049517 | METHOD AND SYSTEM FOR PERFORMING AN UNTRACEABLE SECRET MATCHING - Performing an untraceable secret matching between a first credential associated with a first property of a first user and a second credential associated with a second property of a second user includes receiving the first credential, receiving a matching reference formed so the first user can detect a matching of the first property with a remote property from a credential of another user, supplying a first nonce value to the second user, receiving a hidden version of the second credential from the second user formed by the second user on the basis of the second credential, the first nonce value supplied by the first user and a random value locally generated on a side of the second user, and performing the matching by combining the first credential and the received hidden credential with the first nonce value and comparing the combination with the matching reference. | 2009-02-19 |
20090049518 | Managing and Enforcing Policies on Mobile Devices - Embodiments of a system configured to manage policies, including decision policies and active policies, on mobile devices is described. The system is configured to manage policies, including decision policies and active policies, on mobile devices is described that includes a device policy repository, a policy decision point, a decision policy enforcer, and an active policy enforcer. The system includes a method for enforcing policies on mobile devices that proactively monitors the execution environment and automatically triggers active policies. The method further exports an interface and provides functionality to evaluate and enforce decision policies. The system can combine policies from different sources, including detecting and avoiding policy conflicts. | 2009-02-19 |
20090049519 | TERMINAL AND ACCESS POINT FINDING METHOD FOR COMMUNICATING WITH STEALTH ACCESS POINT - There is provided a terminal that is capable of not sending a useless probe request to detect a stealth access point. The terminal communicates with a normal access point that reports a network identifier and a stealth access point that does not report a network identifier. The terminal includes an access point information accumulating section | 2009-02-19 |
20090049520 | METHOD OF CONTROLLING A CONFERENCE SYSTEM, PROGRAM PRODUCT, AND STORAGE MEDIUM - A conference system includes a storage unit configured to store electronic data used as conference material, a display unit configured to display electronic data stored in the storage unit, an identifying unit configured to identify an attendee of a conference, and a memory unit configured to store information about an attendee identified by the identifying unit as viewing history information in association with electronic data displayed by the display. | 2009-02-19 |
20090049521 | Method and system for communication between a secure information storage device and at least one third party, and corresponding entity, device and third party - The disclosure relates to a method for communication between a secure information storage device and at least one third party with which information is exchanged. An entity ensures the management of a plurality of secure information storage devices to which said device pertains. The method includes the following steps: the entity places, in a secure container which is arranged in the device and specific to a third party, an authorisation for communication between the secure container and the given third party; the entity sends an identifier of the device, an address of the device, an identifier of the secure container, and the authorisation to communicate, to the give third party; the given third party attempts to establish communication with the secure container, using the address of the device, the identifier of the device, the identifier of the secure container, and the authorisation to communicate; and, before accepting said communication, the device checks that the authorisation to communicate transmitted by the third party is acceptable in view of the authorisation to communicate previously placed in the secure container by the entity. | 2009-02-19 |
20090049522 | SYSTEMS AND METHODS FOR MANAGING AND DISTRIBUTING USER PROFILES FOR SURGICAL SYSTEMS - A medical system is presented, where the system includes a medical profile directory configured to maintain a set of medical system profiles, a medical profile manager configured to update and maintain medical system profiles within the medical profile directory, and a server configured to interface with the medical profile manager to facilitate medical system profile maintenance. The server is configured to transmit information from at least one medical system profile to a surgical system, thereby enabling the surgical system to employ a current operational parameter within the medical system profile desired by a user. | 2009-02-19 |
20090049523 | METHOD AND SYSTEM FOR MULTIPLEXING MULTIPLE LEVEL SECURITY SERVER APPLICATIONS ON THE SAME INTERNET ADDRESS AND PORT - The invention provides a system and method for sharing (or “multiplexing”) of the same internet (IP) address/port by multiple instances of multiple level security and/or single level security (SLS) server applications (each of which is used for processing one or more client request(s) falling within a range of security labels or other security attribute(s)) where the client processing request is directed to the system server capable of processing the request using the identified security label. | 2009-02-19 |
20090049524 | SYSTEM AND METHOD FOR PARTITIONING A MULTI-LEVEL SECURITY NAMESPACE - The invention provides a system and method for “partitioning” a “namespace” managed by a name (or “directory”) registration server according to “security label” or other security attributes to allow the same registered (e.g., “domain”) name to be used for processing resource(s)/service(s)/application(s) operating under different security labels. | 2009-02-19 |
20090049525 | Platform for providing a social context to software applications - The present invention provides a system and method for providing a social context to software applications. According to one embodiment of the invention, a user of a social network authorizes access by an external software application to information available in the social network. At some time later, the user of the social network uses an application designed by a third-party software developer. The application contacts the social network provider for permission to access the information available in the social network. If access has been authorized, the application incorporates the information from the social network into its interaction with the user, providing a social context to the user's interaction with the application. | 2009-02-19 |
20090049526 | METHOD, SYSTEM AND APPARATUS FOR ACCESSING A VISITED NETWORK - The embodiments of the present invention disclose a method for accessing a visited network. The method includes: a user selects a visited network and initiates an access request to a user information application apparatus; when the user information application apparatus detects that the visited network has changed, it obtains a list of authorized visited networks from a user information storage apparatus and checks whether the user is authorized to access the visited network; or the user information storage apparatus checks whether the user is authorized to access the visited network; if the user is authorized to access the visited network, the user information application apparatus returns an access accept response to the user, allowing the user to access the visited network. The embodiments of the present invention also disclose systems and apparatuses for accessing a visited network. The embodiments of the present invention make it possible to accurately check whether the user is authorized to access a visited network. | 2009-02-19 |
20090049527 | METHOD AND SYSTEM FOR EXCHANGING DATA RESERVED FOR A USER - A method is provided to exchange data reserved for a user or a group of users with personal equipment. The method includes a step of short-distance communication of the data, for example of the NFC type, between the personal equipment and a secure terminal determined by an identification of the user and by a detection of the personal equipment in the vicinity of the secure terminal. The secure terminal preferably obtains the data from an integrated source by a secure end-to-end connection. | 2009-02-19 |
20090049528 | SYSTEM, METHOD AND APPARATUS FOR ESTABLISHING PRIVACY IN INTERNET TRANSACTIONS AND COMMUNICATIONS - A system for conducting a transaction with privacy on a wide area network, the system including a personal access device (PAD) associated with a subscriber to the system, the PAD storing a profile of the subscriber and generating commands, a privacy service provider (PSP) connected to the wide area network, the PAD being accessible by the PSP under first conditions set by the profile and the PSP being responsive to the commands from the PAD, a registered vendor (RV) connected to the wide area network, and a privacy shield network (PSN) connected to the wide area network, the RV being registered with the PSN and the PSN being structured to carry communications between the PSP and the RV related to the transaction under second conditions set by the profile. Advantageously, the PAD stores private data associated with the subscriber, and the PSP releases any of the private data to the RV only under the first and second conditions. | 2009-02-19 |
20090049529 | Method Of Billing A Purchase Made Over A Computer Network - A method of effecting a sale over a computer network in which it is determined whether a user passes fraud control before effecting a sale over a computer network. Information associated with a method of payment, such as credit card information, debit card information, checking account information, a telephone service account, a cable television account, a utility service account, or an Internet service provider account, is requested from the user after the user passes the fraud control. Information associated with the method of payment is received from the user in real time. Method-of-payment information is communicated to a payment authorization database, which can be located locally or remotely. The method-of-payment information includes the received information associated with the method of payment. Payment authorization information associated with the method of payment is received from the payment authorization database. A sale transaction is completed when the payment authorization information is affirmative. Sale charge information associated with the sale effected over the computer network is transmitted to the payment authorization database when the sale transaction is complete. The sale charge information includes information for charging the method of payment an amount representing a charge for the sale. | 2009-02-19 |
20090049530 | Method, System, And Storage Medium For Validating Users Of Communications Services And Messages Transmitted - Exemplary embodiments of the invention relate to a method, system, and storage medium for validating users of communications services. The method includes generating records for communications service users by at least one service provider. The records store information relating to the communications service users including legal liability information, an originator type code, and a validation code assigned to selected originator type codes. The validation code facilitates validation of the communications service users. The method also includes storing the records in a subscriber classification database. The originator type code classifies the communications service users according to nature of use, communications type, business type, geography, and age. | 2009-02-19 |
20090049531 | Coordinating credentials across disparate credential stores - Apparatus and methods are described for coordinating user credentials across multiple disparate credential stores. A synchronizing engine requests and receives past and present credential information from the disparate credential stores. Users indicate which, if any, of the credential information they desire to synch together. Upon common formatting of the credential information, comparisons reveal whether differences exist between the past and present versions. If differences exist, the information is updated. In this manner, users link together various passwords, keys or other secrets to maintain convenience from a single point of control, such as in a single-sign-on (SSO) environment, regardless of the disparateness of the stores. The reverse is also possible such that linked credentials are accessible from the multiple stores. Retrofitting existing SSO services is another feature as are computer program products and computing network interaction. User or enterprise policies are also used in governing these credentials. | 2009-02-19 |
20090049532 | METHOD, DEVICE AND SYSTEM FOR USER AUTHENTICATION ON PASSIVE OPTICAL NETWORK - The present invention relates to a method, a device and a system for user authentication on a PON. The method includes the following steps: an OLT receives a user authentication request initiated by an ONU, which carries a password ID; the OLT authenticates according to the user password ID reported by the ONU, and opens or closes a channel from the ONU to the network side according to the authentication result. The invention further discloses a PON and an OLT. According to the method for user authentication in the invention, user management and maintenance of PON may be easier and simpler, and terminal interchangeability and user security may be improved; moreover, after a user changes the ONU, the new ONU may also access the network using the password ID. | 2009-02-19 |
20090049533 | USER AUTHENTICATION METHOD AND APPARATUS - A user authentication method and apparatus, the user authentication method including: performing a user authentication using user information transmitted by a host through a protocol supporting user authentication; generating user authentication information from the transmitted user information if the user authentication is performed successfully; and determining whether a service requested from the host using a protocol that does not support user authentication is permitted by using the generated user authentication information. Thus, the method can be used to selectively provide a service even when a service using a protocol that does not support user authentication is requested. | 2009-02-19 |
20090049534 | GENERATION AND AUTHENTICATION OF DIGITIZED BIOMETRIC DATA FOR CONDUCTING A TRANSACTION - A method for conducting a transaction over an electronic network may comprise receiving transaction data, receiving biometric data including a relational check code representative of the biometric data, a date time stamp, an identifier of the hardware that recorded the biometric data, or a combination thereof, comparing the biometric data with biometric data previously stored, or with a predetermined threshold value, or with a combination thereof, for authenticating the biometric data for approving or disapproving the transaction. If approved, the transaction data is processed for conducting the transaction. Biometric data may include a locus-based digitized signature, a biometric digital signature, a fingerprint, a palm print, hand geometry, facial geometry, an iris scan, an iris print, a retinal scan, a retinal print, an eye scan, an eye print, or any combination thereof. | 2009-02-19 |
20090049535 | CONTROLLED DISCOVERY OF SAN-ATTACHED SCSI DEVICES AND ACCESS CONTROL VIA LOGIN AUTHENTICATION - A method for accessing data in a storage area network is provided. The method initiates with receiving a request for a list of targets on the storage area network. All the targets on the storage area network are exposed to the requester and authentication requiring a password is requested from the requester to grant access to the targets on the storage are network. Access to the targets is granted if the password is acceptable, and access to the targets is refused if the password is unacceptable. | 2009-02-19 |
20090049536 | SYSTEM AND METHOD FOR AUTHENTICATION - A system and method for authentication including verifying a password is disclosed. In one embodiment, the authentication system includes a first storage unit to store an authentication sequence and a read-only memory unit to store an authentication algorithm. A microcontroller is coupled to the first storage unit, the read-only memory unit, and is configured to be coupled to and uncoupled from a host. The microcontroller is configured to execute the authentication algorithm to verify a password with the authentication sequence, and to send an access request to a web server via the host if the authentication algorithm has verified the password with the authentication sequence. | 2009-02-19 |
20090049537 | System and Method for Distributed Multi-Processing Security Gateway - A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a server side session, receives a data packet, assigns a central processing unit core from a plurality of central processing unit cores in a multi-core processor of the security gateway to process the data packet, processes the data packet according to security policies, and sends the processed data packet. The proxy network address is selected such that a same central processing unit core is assigned to process data packets from the server side session and the host side session. By assigning central processing unit cores in this manner, higher capable security gateways are provided. | 2009-02-19 |
20090049538 | Identifier Authenticating System - There is provided an identifier authenticating system in which information requesting users can share all the predetermined information held in a plurality of information providing servers. In the identifier authentication system, when an identifier holding user | 2009-02-19 |
20090049539 | Generic Hub To Increase Security When Accessing Business Systems - In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user to access an application or application data maintained in an application server. In response to the user request, the generic hub verifies the authorization of the user to access the application server. If the user is authorized, a user interface to the application is presented to the user and input data is received from the user interface. The input data is checked for validity based on application-specific metadata and type checks bound to this metadata associated with fields in the user interface, and any extraneous or non-expected data is removed from the input data. The input data and user request of a first transfer protocol are tunneled to the application using a second transfer protocol. | 2009-02-19 |
20090049540 | METHOD AND SYSTEM FOR PROVIDING TARGETED WEB FEED SUBSCRIPTION RECOMENDATIONS CALCULATED THROUGH KNOWLEDGE OF IP ADDRESSES - A system for providing targeted Web feed subscription suggestions calculated based on IP (“Internet Protocol”) addresses. Web feeds are automatically suggested to users based on the IP (Internet Protocol) address of the user's computer system and previous feed subscriptions made from other computer systems having similar IP addresses. Feed suggestions may be weighted based on differing levels of IP address similarity, in order to reflect differing levels of geographic proximity between users. Users may be permitted to expressly indicate which of their feed subscriptions are to be made public through the feed reader user interface when they make subscriptions. In response to such user indications, the disclosed system passes the IP address of the user's computer system to the centralized server system together with a name or other identifier of the feed that was subscribed to. | 2009-02-19 |
20090049541 | IMAGE FORMATION APPARATUS, FUNCTION EXTENSION METHOD, AND A COMPUTER READABLE STORAGE MEDIUM HAVING FUNCTION EXTENSION PROGRAM STORED THEREIN - An image formation apparatus: previously stores first information allowing functions that a plurality of users are authorized to use, respectively, to be determined, receives second information input to determine a user, the second information allowing that user to be determined, determines from the previously stored first information a normal function that the determined user is authorized to use, is set to make the determined normal function available, receives third information input from a first storage medium having the third information stored therein, to determine an extended function, the third information allowing the extended function to be determined; and is set to make the determined extended function available in addition to the normal function set available. | 2009-02-19 |
20090049542 | METHOD OF SOFTWARE DISTRIBUTION VIA THE INTERNET - In one general aspect there is provided a method for distributing software. The method comprising (a) a software user creating a user profile which includes one or more types of biometric data; (b) providing the biometric data to a software distributor; (c) obtaining the software; and (d) utilizing the software on the user's computer having a biometric sensing device that senses or measures a biometric parameter of the user useful for creating biometric data, wherein utilizing the software causes the activation of a verification program or function that compares the sensed or measured biometric data to the biometric data in the user profile. In another aspect, the invention relates to a method of handicapping two or more players of a game of skill, wherein the players are of varying skill levels. Also provided are methods of ranking players according to skill level and generating a professional gaming league based on skill level. Also provided is a system and an apparatus for verifying the identity of a user in a game of skill. | 2009-02-19 |
20090049543 | METHOD FOR BOOTING AND PROTECTING DATA IN HARD DISK OF COMPUTER SYSTEM AND MODULE FOR PROTECTING DATA THEREOF - A method for protecting data in a hard disk includes the steps of creating a password database in a basic input output system (BIOS) of a computer system and providing a first password column in the password database for a user to set a first password string. When the computer system is booted, a request of inputting a password is sent to the user to continue the booting program of the computer system. When the received password is the first password string, the data in the master boot record of the hard disk is backed up to a storage area, and the data in the master boot record is erased. | 2009-02-19 |
20090049544 | Habit-Based Authentication - A method for authentication is disclosed. During use, the observed usage of the device is compared to an expected pattern of usage of the device. Deviation between the observed and expected usage indicates that the user might not be authorized to use the device. If the deviation exceeds a threshold, a credential is required from the user to authenticate itself as the authorized user. | 2009-02-19 |
20090049545 | TOLERATING AND DETECTING ASYMMETRIC RACES - Detecting and/or tolerating races. Races occur due to malicious threads not respecting software locks. A method of detecting and/or correcting races includes making local copie(s) and reference copie(s) of shared data. Any read and write operations performed by a safe thread are caused to be performed on the local copie(s) during a critical section. The critical section defines a time frame which a variable lock is placed on shared data. Any read and write operations performed by malicious threads are allowed to be performed on the shared data during the critical section. The shared data, the local copie(s), and the reference copie(s) are compared to determine that a race has been detected. An indication can be output that a race has occurred or the race can be corrected. | 2009-02-19 |
20090049546 | Method and Apparatus for Detection of Malicious Behavior in Mobile Ad-Hoc Networks - Systems and methods are provided for detecting malicious behavior in mobile ad-hoc wireless networks. The mobile ad-hoc network contains a plurality of actual nodes and a plurality of decoys that are derived from the actual nodes using duplicate instances of the operational software of the actual nodes in combination with a virtual interconnection topology created to make the decoys appear as actual nodes within the mobile ad-hoc network. The interconnection topology includes routing characteristics indicating that the most efficient path of communication to any given decoy is through at least one actual node in the network. The decoys are used to identify malicious behavior in the network and in particular to identify attempt to communicate directly with decoys in contradiction to the created interconnection topology. When the malicious behavior is associated with an identifiable node, corrective action is taken that includes quarantining that node from the other nodes in the network. | 2009-02-19 |
20090049547 | System for real-time intrusion detection of SQL injection web attacks - A real-time anomaly SQL Injection detection system is provided to detect anomalies specific to the backend Database layer and the Web application layer of a Website. To reduce false alarms, the system correlates abnormal scores for the Database layer and Web application layer to detect and catch different forms of SQL injection attacks. The attacks are detected based on anomalies and not signatures or patterns. | 2009-02-19 |
20090049548 | Semiconductor Device and Method For Preventing Attacks on the Semiconductor Device - The invention relates to a method and to a semiconductor device, comprising means for detecting an unauthorized access to the semiconductor device, wherein the semiconductor device carries out an initialization of the semiconductor device following detection of an unauthorized access, wherein an information item relating to the unauthorized access can be stored by the semiconductor device prior to the initialization, and wherein the stored information item relating to the unauthorized access remains intact following the initialization of the semiconductor device. It is advantageously provided that the stored information item remains intact for a predetermined period of time following disconnection of the semiconductor device from a power supply. | 2009-02-19 |
20090049549 | APPARATUS AND METHOD FOR DETECTION OF MALICIOUS PROGRAM USING PROGRAM BEHAVIOR - An apparatus and method of diagnosing whether a computer program executed in a computer system is a malicious program and more particularly, an apparatus and method of diagnosing whether a computer program is a malicious program using a behavior of a computer program, and an apparatus and method of generating malicious code diagnostic data is provided. The apparatus for diagnosing a malicious code may include a behavior vector generation unit which generates a first behavior vector based on a behavior signature extracted from a diagnostic target program; a diagnostic data storage unit which stores a plurality of second behavior vectors for a plurality of sample programs predetermined to be malicious or normal; and a code diagnostic unit which diagnoses whether the diagnostic target program is a malicious code by comparing the first behavior vector with the plurality of second behavior vectors. | 2009-02-19 |
20090049550 | METHOD OF DETECTING AND BLOCKING MALICIOUS ACTIVITY - A method of detecting and blocking malicious activity of processes in computer memory during unpacking of a file after the code and data contained in the file are unpacked is described. The method includes inserting a hook function into one or more un-assessed processes running in the computer memory. A hook Is then placed on one or more system calls carried out by the one or more un-assessed processes; the one or more system calls determining an optimal time period in which to detect malicious activity in the un-assessed processes. During the optimal time period the one or more system calls carried out by the one or more un-assessed processes are suspended and attributes of the one or more un-assessed processes are detected and the likely maliciousness of the one or more un-assessed processes is determined from the attributes. | 2009-02-19 |
20090049551 | METHOD OF AND APPARATUS FOR MONITORING CODE TO DETECT INTRUSION CODE - A method and apparatus for monitoring a code to detect intrusion code is used to monitor target code to determine whether the target code is a resident code in a system or an intrusion code into the system. A first code pattern is extracted from the target code and a second code pattern is loaded from a storage unit, and a distance between the first code pattern and the second code pattern is calculated. The calculated distance is compared to a threshold to determine whether the target code is an intrusion code. | 2009-02-19 |
20090049552 | Method and Apparatus for Removing Harmful Software - Embodiments of the invention address the problem of removing malicious code from infected computers. | 2009-02-19 |
20090049553 | Knowledge-Based and Collaborative System for Security Assessment of Web Applications - A standardized system for assessing the security of web based applications which has a component for collecting information regarding threat and vulnerabilities to web applications is described. The system includes a component for organizing the information regarding threat and vulnerabilities to web applications into a uniform language so that the information is integrated throughout the entirety of the system. Further, the system has a component for expressing the information in a structured and uniform format of a hierarchical relationship between threat and vulnerabilities which includes threat vulnerability trees. The system includes a component for rating the threats and vulnerabilities under a uniform rating system. The system includes a component for integrating the information into both a storage component and also a presentation component for presenting the information. The presentation component presents the information in a graphical format which visually demonstrates the relationships between the threats and the vulnerabilities. | 2009-02-19 |
20090049554 | SYSTEM AND METHOD FOR MANAGING DOCKING APPLICATIONS FOR A PORTABLE ELECTRONIC DEVICE - A system and method is provided for managing one or more docking applications running on a wireless device. The method displays to a user at least one docking application while the wireless device is coupled to another device. The method comprising the steps of: executing a docking application control module when the wireless device is first coupled with the other device; retrieving user preferences associated with the docking application control module; executing, based on the retrieved user preferences, at least one docking application for use on the wireless device while the wireless device remains coupled to the other device; and terminating the docking application when the wireless device ceases to be coupled to the other device. | 2009-02-19 |
20090049555 | METHOD AND SYSTEM OF DETECTING ACCOUNT SHARING BASED ON BEHAVIOR PATTERNS - A system of detecting account sharing, based on analysis of users' behavior patterns is provided. In the present invention, the system comprises: a user authentication information database storing keystroke dynamics patterns related to a particular account in association with the account; and a sharing detection analyzer to analyze a cluster distribution of the keystroke dynamics patterns stored in the user authentication information database to determine whether the account is shared. | 2009-02-19 |
20090049556 | METHOD FOR REDISTRIBUTING DRM PROTECTED CONTENT - The present invention relates to a method and a device ( | 2009-02-19 |
20090049557 | TRACKING THE ORIGINS OF DATA AND CONTROLLING DATA TRANSMISSION - Provided are methods, apparatus and computer programs for tracking the origins of data and controlling transmission of the data. In one embodiment, transmission of sensitive data by script operations is limited, to prevent transmission to any network location other than to the source of that sensitive data, by a new function within a scripting engine of an HTTP client that is responsive to origin tags placed within the data. Origin tags that are associated with data inputs are propagated to any output data items, so that transmission of derived information can also be controlled. | 2009-02-19 |
20090049558 | SYSTEM AND METHOD FOR TRACING TARDOS FINGERPRINT CODES - A system and method is provided for identifying the source of an unauthorized copy of content. The method includes embedding a unique user fingerprint code to into each of a plurality of authorized copies of content and identifying an unknown fingerprint code in an unauthorized copy of the content. Each member of the unknown fingerprint code is compared to each corresponding member in each of the user fingerprint codes. A score is assigned to each of the user fingerprint codes based on the comparison and users associated with scores exceeding a threshold are identified as a source of the unauthorized copy. | 2009-02-19 |
20090049559 | Informing recipient device of message content properties - According to an aspect of the invention, a content class of a data set for a message to be transmitted to the recipient device is defined. A network element transferring messages to the recipient device specifies at least one information element in a message to the recipient terminal such that the information element comprises an indication of the content class. The message is transmitted to the recipient device. | 2009-02-19 |
20090049560 | System and Method for Tracing Tardos Fingerprint Codes - A system and method is provided for identifying the source of an unauthorized copy of content. The method includes embedding a unique user fingerprint code to into each of a plurality of authorized copies of content and identifying an unknown fingerprint code in an unauthorized copy of the content. Each member of the unknown fingerprint code is compared to each corresponding member in each of the user fingerprint codes. A score is assigned to each of the user fingerprint codes based on the comparison and users associated with scores exceeding a threshold are identified as a source of the unauthorized copy. | 2009-02-19 |
20090049561 | NON-HUMAN ANIMAL EXHIBITING BONE METASTASIS OF TUMOR CELLS - The present invention provides a non-human bone metastasis model animal in which tumor cells capable of inducing bone metastasis by peripheral administration have been introduced, and a method for producing the animal. The bone metastasis model animal in the present invention may be useful for understanding the biology of bone metastasis and developing novel therapeutic strategies for lung cancer patient with multi-organ metastases, including bone metastasis | 2009-02-19 |
20090049562 | PORCINE CMP-N-ACETYLNEURAMINIC ACID HYDROXYLASE GENE - The present invention provides porcine CMP-N-Acetylneuraminic-Acid Hydroxylase (CMP-Neu5Ac hydroxylase) protein, cDNA, and genomic DNA regulatory sequences. Furthermore, the present invention includes porcine animals, tissues, and organs, as well as cells and cell lines derived from such animals, tissues, and organs, which lack expression of functional CMP-Neu5Ac hydroxylase. Such animals, tissues, organs, and cells can be used in research and in medical therapy, including in xenotransplantation, and in industrial livestock farming operations. | 2009-02-19 |
20090049563 | USING CYTOSINE DEAMINASES TO DIMINISH RETROELEMENT TRANSFER FROM PIGS TO HUMANS - Transgenic pigs that express one or more non-porcine cytosine deaminases are described as well as methods of making and using such pigs. | 2009-02-19 |
20090049564 | COTTON VARIETY 02T15 - The invention relates to the novel cotton variety designated 02T15. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 02T15. Also provided by the invention are tissue cultures of the cotton variety 02T15 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 02T15 with itself or another cotton variety and plants produced by such methods. | 2009-02-19 |
20090049565 | Methods to Identify Soybean Aphid Resistant Quantitative Trait Loci in Soybean and Compositions Thereof - The present invention is in the field of plant breeding and aphid resistance. More specifically, the invention includes a method for breeding soybean plants containing quantitative trait loci that are associated with resistance to aphids, | 2009-02-19 |
20090049566 | PLANT QUALITY WITH VARIOUS PROMOTERS - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties, including increased soluble solids, lycopene, and improved plant volume or yield, as compared to wild-type or control plants. The invention also pertains to expression systems that may be used to regulate these transcription factor polynucleotides, providing constitutive, transient, inducible and tissue-specific regulation. | 2009-02-19 |
20090049567 | Transformation of soybean - The present invention relates to improved methods for the incorporation of DNA into the genome of a soybean ( | 2009-02-19 |
20090049568 | METHOD FOR PREVENTING DEHISCENCE AND ALTERING PLANT LIGNIFICATION - A method to prevent dehiscence in a plant or to alter plant lignification including providing the plant with a nucleotide protein coding for a GGL protein or a functional equivalent thereof, and growing the plant. Also, the isolated GGL protein or functional equivalents, a nucleic acid encoding the protein and vectors, host cells and plants including the nucleic acid. | 2009-02-19 |
20090049569 | Seed-Preferred Regulatory Elements - The present invention provides compositions and methods for regulating expression of nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a tissue preferred promoter isolated from the | 2009-02-19 |
20090049570 | Seed-Preferred Regulatory Elements - The present invention provides compositions and methods for regulating expression of nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a tissue preferred promoter isolated from the sorghum legumin coding region. The sequences drive expression preferentially to seed tissue, and most preferably to endosperm tissue of a plant. A method for expressing a nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2009-02-19 |
20090049571 | Seed-Preferred Promoters - The present invention provides compositions and methods for regulating expression of nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a tissue preferred promoter isolated from the | 2009-02-19 |
20090049572 | ELEVATION OF OIL LEVELS IN PLANTS - This present invention provides a method for increasing oil levels in the tissues of plants by expression of a heterologous multifunctional fatty acid synthase (mfFAS) from | 2009-02-19 |
20090049573 | Transgenic plants with enhanced agronomic traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2009-02-19 |
20090049574 | AUXIN TRANSPORT PROTEINS - This invention relates to an isolated nucleic acid fragment encoding an auxin transport protein. The invention also relates to the construction of a chimeric gene encoding all or a substantial portion of the auxin transport protein, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the auxin transport protein in a transformed host cell. The present invention also relates to methods using the auxin transport protein in modulating root development, and in discovering compounds with potential herbicidal activity. | 2009-02-19 |
20090049575 | Interspecific hybidization of Gardenia jasminoides Ellis and G. thunbergia L. - A cultivar of | 2009-02-19 |